Plymouth boy, 15, charged over global cyber-attacks
http://www.bbc.com/news/uk-england-34846895
Excerpt:
“A 15-year-old British boy has been charged over cyber-attacks on international websites and bomb hoaxes against US airlines, police have said.”
Operating a music piracy site gets man three years in prison
Andrea Peterson
Excerpt:
“The operator of a major music piracy site was sentenced to three years in prison Tuesday. Rocky Ouprasith, now 23, was the man behind RockDizMusic.com and RockDizFile.com. The latter was the second-largest online file-sharing site specializing in pirated music in the United States in 2013, according to the Recording Industry Association of America.”
Data center fire kills Internet in Azerbaijan
Max Smolaks
Excerpt:
“Almost the entire population of Azerbaijan lost Internet connectivity on Monday, after a fire broke out at a telecommunications facility owned by Delta Telecom.”
A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet
Pierluigi Paganini
http://securityaffairs.co/wordpress/42022/intelligence/paris-attacks-darkweb-hub.html
Excerpt:
“The popular security expert Scot Terban (aka @krypt3ia ) discovered a few hours after the Paris attacks, a new ISIS propaganda hub appeared on the Darknet.”
The mafia of the digital age
Greg Farrell, Patricia Hurtado and Elizabeth Dexheimer
http://www.iol.co.za/business/international/the-mafia-of-the-digital-age-1944882
Excerpt:
“Through the dark world of cybercrime, its tentacles spread everywhere: stock manipulation, money laundering, gambling and more.”
FAKBEN Ransomware-as-a-service emerges from the underground
Pierluigi Paganini
http://securityaffairs.co/wordpress/41950/cyber-crime/fakben-ransomware-as-a-service.html
Excerpt:
“FAKBEN is offering a professional Ransomware-as-a-service that relies on a new CryptoLocker ransomware which can be downloaded through the executable file.”
Email is more secure today than it was two years ago
Zeljka Zorz
http://www.net-security.org/secworld.php?id=19105
Excerpt:
“Google has partnered with University of Michigan and the University of Illinois, and they have been trying to discover, for the last couple of years, how email security has evolved.”
Hackers Shut Down Donald Trump Election Campaign Website
Waqas
https://www.hackread.com/hackers-shut-down-donald-trump-election-campaign-website/
Excerpt:
“The official Election Campaign website of American Presidential candidate Donald Trump was taken offline by hackers who earlier claimed to conduct a cyber attack on BBC websites.”
Turkish hackers took over a Russian Govt Instagram account
Pierluigi Paganini
http://securityaffairs.co/wordpress/43255/hacking/turkish-hackers-instagram-account.html
Excerpt:
“Alleged Turkish hackers have taken over the Russian Communications and Mass Media Minister Nikolai Nikiforov’s Instagram account.”
Hacker Breaches Database of 70 Million Prisoner Phone Calls
Catalin Cimpanu
Excerpt:
“An anonymous hacker has breached the servers of Securus Technologies, a communications provider that logs phone calls made from US prison phones. The hacker has offered some of the stolen data to The Intercept, a website co-founded by Glenn Greenwald, the Pulitzer-winning journalist that published Edward Snowden's classified documents.”
Cops gain access to phone location data
http://www.theregister.co.uk/2015/11/10/phone_location_data_open_to_us_police/
Excerpt:
“Police in some states can now access your phone location data without a warrant, following a Supreme Court decision not to hear the appeal of an armed robber.”
Attackers Abuse Security Products to Install "Bookworm" Trojan
Eduard Kovacs
http://www.securityweek.com/attackers-abuse-security-products-install-bookworm-trojan
Excerpt:
“While analyzing the activities of a threat group, researchers at network security firm Palo Alto Networks came across a new Trojan which they have dubbed “Bookworm.”
JPMorgan's 2014 Hack Tied to Largest Cyber Breach Ever
Greg Farrell and Patricia Hurtado
Excerpt:
“The U.S. described a vast, multi-year criminal enterprise centering on hacks of at least nine big financial and publishing firms and the theft of information on 100 million of their customers that fueled a web of stock manipulation, credit-card fraud and illegal online casinos.”
Standing in Data Breach Cases: A Review of Recent Trends
Robert D. Fram, Simon J. Frankel and Amanda C. Lynch
http://www.bna.com/standing-data-breach-n57982063308/
Excerpt:
“For most substantial companies, it is said, experiencing a data breach is not a matter of “if,” but “when.” Particularly when a company is consumer-facing, any publicized data breach is likely to be followed by consumer class action lawsuits.”
GCHQ and NCA join forces to police dark web
Warwick Ashford
http://www.computerweekly.com/news/4500257028/GCHQ-and-NCA-join-forces-to-police-dark-web
Excerpt:
“Government intelligence agency GCHQ and the National Crime Agency (NCA) have announced that a joint unit to police the dark web and tackle serious cyber crime is up and running.”
What Happens to Hacked Social Media Accounts
Excerpt:
“We read about hacks of social media accounts all the time, but what’s the point of it? How can someone benefit from hacking a personal social media account, especially a non-celebrity, when there are so many other things to hack? Go steal from a bank or something, right?”
German intelligence spied on allies, U.N., the Vatican
Jeremy Seth Davis
http://www.scmagazine.com/german-intelligence-spied-on-allies-un-the-vatican/article/453070/
Excerpt:
“Germany's federal intelligence service, the Bundesnachrichtendienst (BND), spied on the embassies and interior departments of ally countries, and international non-governmental organizations, according to Der Spiegel.”
We talked to people close to the TalkTalk hack before the arrests began -- and they told us why they allegedly did it
Rob Price
http://www.businessinsider.com.au/talktalk-hack-vamp-c-glubz-hackers-interviews-2015-11
Excerpt:
“The net is closing in on the TalkTalk hackers. Four individuals have now been arrested in the police investigation of the October 21 hack on the company.”
Egyptian Hacker Creates KillerRat Spying Tool Out of the Ashes of njRAT
Catalin Cimpanu
Excerpt:
“An Egyptian-based hacker has created a new RAT (Remote Access Trojan) on the old skeleton of the njRAT toolkit. This new tool can be deployed and allows attackers to run their operations in anonymity and with enhanced spying powers.”
New insight on the Rocket Kitten Iranian hacking crew
Pierluigi Paganini
http://securityaffairs.co/wordpress/41865/cyber-crime/rocket-kitten-report.html
Excerpt:
“The Rocket Kitten group has been suspected to be active since 2011 and have been increasing their activity since 2014. The main targets are based in the Middle East, and it seems that their targets are involved in policy research, diplomacy and international affairs like policy research, diplomacy and international affairs.”
British police make fourth arrest in TalkTalk cyber attack
Elizabeth Piper
http://www.reuters.com/article/us-talktalk-cyberattack-idUSKCN0SS2PG20151103
Excerpt:
“British police have made a fourth arrest in connection with a cyber attack on telecoms company TalkTalk (TALK.L) in which the company said bank details of more than 20,000 customers were hacked.”
CoinVault and Bitcryptor, R.I.P.
Max Metzger
http://www.scmagazineuk.com/coinvault-and-bitcryptor-rip/article/450862/
Excerpt:
“The bell has tolled for CoinVault and Bitcryptor ransomware according to international cyber-security giant Kaspersky. The final blow was dealt just recently in a joint effort between Dutch law enforcement authorities and Kaspersky.”
Serious Flaws Found in ATMs of German Bank
Eduard Kovacs
http://www.securityweek.com/serious-flaws-found-atms-german-bank
Excerpt:
“German savings bank Sparkasse has started patching its ATMs and self-service terminals after a researcher discovered that the machines can be tricked into revealing a lot of sensitive information during software updates.”