470 million sites exist for 24 hours, 22% are malicious



“Blue Coat researchers analyzed more than 660 million unique hostnames requested by 75 million global users over a 90-day period. They found that 71 percent of the hostnames, or 470 million, were “One Day Wonders,” sites that appeared only for a single day.”

The synergy of hackers and tools at the Black Hat Arsenal

Mirko Zorz



“Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts – from the brightest in academia to world-class researchers and leaders in the public and private sectors.”


50 confirmed, possibly more Norwegian oil companies hacked

Zeljka Zorz



“50 Norwegian oil and energy companies have been hacked, and 250 more have been warned to check their networks and systems for evidence of a breach, The Local reports.”


California phone kill-switch law could lead to abuse

Zeljka Zorz



“On Monday, California Governor Jerry Brown signed into law a bill (SB 962) that will require any smartphone sold in the state after July 1, 2015, to include a software or hardware (or both) "kill switch" that "can render inoperable the essential features of the smartphone to an unauthorized user", i.e. anyone who is not the rightful owner of the device.”

Cellphone surveillance systems can track almost anybody

Zeljka Zorz



“The surveillance tech industry is booming, and we should be worried about it. Poorly regulated and exceedingly secretive, the companies that create surveillance solutions for law enforcement and intelligence agencies may say that they are vetting its customers carefully, but the depressing reality is that their tools can easily find their way into the hands of repressive regimes.”

NSA's metadata search engine used by US, foreign agencies

Zeljka Zorz



“The NSA has secretly built a “Google-like” search engine to be used by various US government agencies and intelligence agencies of the Five Eyes countries to sift through phone call, email, and Internet chat metadata, as well as cellphone locations collected and stored in a number of different databases.”

Hundreds of police investigated over social media misuse



“More than 800 police workers have been investigated for breaching police guidelines on social media in the last five years. Of the 828 cases in England and Wales, from January 2009 to February this year, nine per cent ended in resignation, dismissal or retirement, according to research by the Press Association.”

2.1 Million Stolen Credit Card Numbers Found on Seleznev’s Laptop, Bail Denied

Ionut Ilascu



“During a bail hearing on Friday for Roman Valerevich Seleznev, prosecutors revealed that a laptop computer containing 2.1 million stolen credit card numbers was seized from the defendant.”

Why you’re not as secure as you think you are

Larry Bridwell



“There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time and time again, we see these companies fail to effectively protect sensitive customer data.”

Identity theft vendor sentenced to 100 months in prison



“A northern California man who served as an information and document vendor in the identity theft and credit card fraud ring known as Carder.su was sentenced yesterday to serve 100 months in federal prison. He was further ordered to pay approximately $50.5 million in restitution.

Securing networks in the Internet of Things era

Cricket Liu



“We all know that the Internet of Things (IoT) is coming, and it’s going to change everything. Its sheer scale alone is almost mind-boggling: Gartner reckons that the number of connected devices will hit 26 billion by 2020, almost 30 times the number of devices connected to the IoT in 2009. This estimate doesn’t even include connected PCs, tablets and smartphones.”

Personal info of 4.5 million patients stolen in US hospital group breach

Zeljka Zorz



“Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients has been stolen from their systems.”


The most wanted man in the world

James Bamford



“The Message Arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says.”


Data breaches and high-risk vulnerabilities continue to dominate




“Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and banking institutions as well as retail outlets, according to Trend Micro."


86% of hackers don't worry about repercussions




“Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face repercussions for their activities. In a double-edged sword conundrum, 88% of respondents also believe their own personally identifiable information (PII) is at risk of online theft.”


Millions Of PCs Affected By Mysterious Computrace Backdoor


Brian Donohue



“Nearly every PC has an anti-theft product called Computrace embedded in its BIOS PCI Optional ROM or its unified extensible firmware interface (UEFI). Computrace is a legitimate, trusted application developed by Absolute Software. However, it often runs without user-consent, persistently activates itself at system boot, and can be exploited to perform various attacks and to take complete control of an affected machine.”


Iran's Internet Users Outsmart Government in Cat-and-Mouse Censorship Game


Mahsa Alimardani



“Tor, a popular online anonymity tool used by many Iranians to bypass Internet censorship, was blocked from late July until the beginning of August. The block prevented 75 percent of the network's estimated 40,000 daily users in Iran from connecting to Tor.”


Russian PM's Twitter hacked, posting 'I resign'


Joe Miller



“The Twitter account of Russia's prime minister was hacked on Thursday. The infiltrators posted a message saying Dmitry Medvedev had resigned. The Russian-language feed, which has more than 2.5 million followers, was also filled with tweets denouncing the country's president, Vladimir Putin.”


Young Hacker Charged with Financial Crimes in Prepaid Card Scheme


Chris Stobing



“When Muneeb Akhter first graduated from George Mason University at age 19 with a Master’s degree in computer engineering, behind bars was probably the last place he thought he would end up.”


Snowden allowed to stay in Russia for three more years


Zejlka Zorz



“NSA whistleblower Edward Snowden has been permitted to stay in Russia for another three years, and is free to travel within the country and abroad, Russia Today reports."


US govt is after another secret document leaker


Zejlka Zorz



“It seems that there is a leaker following in the footsteps of Edward Snowden, and US government officials are trying to discover his or her identity, as they confirmed for the CNN on Tuesday.'


China bans Symantec, Kaspersky software from govt systems


Zejlka Zorz



“Symantec and Kaspersky Lab have become the latest victims of Chinese government's procurement agency's axe as the two firms have been dropped from the approved list of security software suppliers, reports People's Daily Online."


Poweliks malware creates no files, lays low in the registry


Zejlka Zorz



“For most malware, performing their malicious task(s) is the primary goal, and a close second is to stay unnoticed on the system for as long as possible. As developers of security software constantly improve detection methods, malware creators are always trying to keep one step ahead of their efforts.”


Chinese TV channel hacked while on air


Chandni Sembhi



“Hacktivists in China put anti-government messages up over broadcast programmes while Wenzhou TV station was on air.”


UK cyber security body warns of IT security flaws and risks posed by malware




“Weak passwords and unpatched software is enabling hackers to use organisations' own servers as the hosts of cyber attacks, the UK's National Computer Emergency Response Team (CERT-UK) said.”


Russian crime ring amasses over a Billion credentials


Pierluigi Paganini



“Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data breaches worldwide.”


Israel-Hamas conflict sparks surge in DDoS attacks


Charlie Osborne



“As conflict between Israel and the Palestinian militant Islamist organisation Hamas escalates, new research has revealed the impact politics has had on cyberattack trends.”