Thursday, October 22, 2015

Business Continuity vs. Disaster Recovery; What’s the Difference?

There’s no doubt that there is overlap between Business Continuity (BC) and Disaster Recovery (DR) tools and planning. However, each one exists independent of the other. Companies can choose to focus more on one or the other, but to be completely prepared, having both a Business Continuity plan and a Disaster Recovery plan ensures complete coverage should the unthinkable happen.

Have Employees Become the Biggest Threat to Enterprise Data?

66% of companies now believe that careless employees are a larger risk to enterprise data than cyber criminals (Check Point Software Technologies). In this article I outline the steps a business should take in order to minimize dangerous internal threats. Feel free to share and comment--I always welcome feedback.

Android.Fakelogin Trojan Targeting Banking Apps

tripwire.com

Researchers have identified a new Trojan that targets mobile banking apps with customized phishing pages in an attempt to steal users' login credentials.

Cybersecurity firm: Chinese Hacking On US Companies Persists

Chinese hacking attempts on American corporate intellectual property have occurred with regularity over the past three weeks, suggesting that China almost immediately began violating its newly minted cyber agreement with the United States, according to a newly published analysis by a cybersecurity company with close ties to the U.S. government.

Reference:

Friday, October 9, 2015

Uber Finally Fixed a Bug that Let Hackers Keep Control of Hacked ...
Motherboard-10 hours ago
Uber just fixed a major security issue that allowed hackers to maintain access to compromised accounts even after the victim had changed his ...


When hackers talk, this research team listens
Phys.Org-12 hours ago
If you're researcher Hsinchun Chen, you gather as much data as you can on the hackers. Chen, a professor of management information ...


Codoso Group Hackers Breach Samsung Subsidiary LoopPay
eSecurity Planet-12 hours ago
A Chinese hacking team known as the Codoso Group or the Sunshock Group breached the network of Samsung subsidiary LoopPay earlier ...
Was Samsung Pay Hacked? What Users Need to Know
TheStreet.com-9 hours ago
Explore in depth (9 more articles)


China Cyberspying on U.S.After No-Hacking Deal
Daily Beast-9 hours ago
The hackers have been observed collecting credentials and moving “laterally through the network” of their victims, the alert said, meaning that ...


Exclusive: Hackers try to extort money from well-known Phoenix ...
Phoenix Business Journal-19 hours ago
FBI Special Agent and spokesman Kurt Remus said the hacking is under investigation and extends beyond Streets of New York.


Our Main Weapon Against Hackers Is A 30-Year-Old Law
Huffington Post-5 hours ago
In December 2010, a group of hackers logged into the Los Angeles Times' website and altered an article about tax policy, essentially turning ...

Why the Government Went After Matthew Keys
Highly Cited-Motherboard-12 hours ago
Explore in depth (22 more articles)


Chinese Hackers Breached LoopPay, Whose Tech Is Central to ...
New York Times-Oct 7, 2015
As early as March, the hackers — alternatively known as the Codoso Group or Sunshock Group by those who track them — had breached the ...

Chinese hackers breached LoopPay, the company behind Samsung ...
In-Depth-Fortune-Oct 7, 2015
Explore in depth (218 more articles)


Report: Hackers in China Tried to Attack Clinton's Server
Newsweek-Oct 8, 2015
Computer hackers in China, South Korea and Germany tried to attack Democratic presidential candidate Hillary Clinton's private email server ...

Hackers Targeted Hillary Clinton's Private Servers (Obviously)
Opinion-Gizmodo-Oct 8, 2015
Explore in depth (97 more articles)

Vigilante Team White hackers admit to infecting 300000 devices
TechTarget-9 hours ago
Team White hackers have taken credit for infecting more than 300,000 devices with the Wifatch malware designed to harden security, but ...

Washington Post
Journalist found guilty for aiding computer hackers
Reuters-Oct 7, 2015
A story on the Tribune's Los Angeles Times website was soon altered by one of those hackers, the indictment said. Tor Ekeland, an attorney for ...

'Beyond disgusting,' says journalist Matthew Keys of his hacking ...
In-Depth-Washington Post-Oct 8, 2015
Daily Mail

Don't throw out your boarding pass. Hackers can use it to access ...
WTSP 10 News-16 hours ago
After you hand the gate agent your boarding pass to scan and head back onto the plane, there's a pretty good chance you quit paying attention ...

How hackers can steal your private details every time you post an ...
Daily Mail-19 hours ago

Lawmakers push to protect trade secrets from Chinese hackers
The Hill-10 hours ago
Lawmakers are pushing for legislation that would give companies the right to take legal action in federal court against cyber thieves who steal ...

Clinton e-mails were vulnerable to hackers, tech firm warned
Washington Post-Oct 7, 2015
A technology subcontractor that has worked on Hillary Rodham Clinton's e-mail setup expressed concerns over the summer that the system ...

Clinton email server reportedly target of cyberattacks from China ...
In-Depth-Fox News-Oct 7, 2015

Hackers zero in on boarding passes
WTSP 10 News-Oct 8, 2015
If passengers drops it, leaves it in on the plane, or ditches it an airport trash can, a hacker can use a bar scanning app on any smartphone to get ...

Police issue warning after hackers use handheld device to break ...
Fox 59-2 hours ago
The device allows hackers to steal the code and come back when you're not home. Wireless keys to your house that are easy to fund for cheap ...

Congressman: Chinese hackers tried to steal my identity
Washington Post (blog)-Oct 7, 2015
Intelligence and White House officials have characterized the thefts, particularly the hacking of background investigation files, as political ...

The Register
Journalist who allegedly helped hackers makes final pitch to jury
Reuters-Oct 6, 2015
(Reuters) - A lawyer for journalist Matthew Keys, accused of aiding members of the Anonymous hacking collective, told a jury on Tuesday that ...

In a first, Chinese hackers are arrested at the behest of the U.S. government


Story image for hacker news from Washington Post
In a first, Chinese hackers are arrested at the behest of the US ...
The Chinese government has quietly arrested a handful of hackers at the urging of the U.S. government — an unprecedented step to defuse ...


Indian Hackers Launch Massive Counter Attack; Hack 250+ ...
In an interesting chain of events, Indian hackers launched a massive counter attack on Pakistani websites, after a hacker group from across the ...

Where Do Major Tech Companies Stand on Encryption?

Where Do Major Tech Companies Stand on Encryption?
In an era of ubiquitous malicious hacking and sensitive personal information data breaches, it's time for President Obama to listen to Internet ...

Wednesday, September 9, 2015

UPS Now The Third Company In A Week To Disclose Data Breach

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.

The complete listings: Computerworld's 100 Best Places to Work in IT for 2015

A compact list of the 56 large, 18 midsize and 26 small organizations that ranked as Computerworld's READ NOW

In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems.

A subsequent investigation by an IT security firm showed that attackers had installed previously unknown malware on systems in more than four-dozen stores to gain access to cardholder data. The affected stores represent about 1% of the 4,470 UPS Store locations around the country.

The intrusion may have exposed data on transactions conducted at the stores between Jan. 20 and Aug. 11, 2014. "For most locations, the period of exposure to this malware began after March 26, 2014," UPS said in a statement.

Reference:

Chrysler Recalls 1.4 Million Vehicles After Jeep Hacking Demo

Today, Fiat Chrysler recalled 1.4 million vehicles possibly affected by a vulnerability in the UConnect infotainment system that could allow attackers to hijack the vehicle's steering and braking. Car hacking researchers Chris Valasek and Charlie Miller demonstrated proof of concept in striking fashion, when they wirelessly took control of a 2014 Jeep Cherokee driven by Wiredreporter Andy Greenberg and brought it from 70 mph to a screeching halt.

The National Highway Traffic Safety Administration (NHTSA) is launching an investigation to determine the effectiveness of Fiat Chrysler's recall.

As Dark Reading's Kelly Jackson Higgins wrote yesterday in an interview with Valasek:

Miller and Valasek were able to control a 2014 Jeep Cherokee's steering, braking, high beams, turn signals, windshield wipers and fluid, and door locks, as well as reset the speedometer and tachometer, kill the engine, and disengage the transmission so the accelerator pedal failed.

Thursday, May 7, 2015

Kicking The Stool Out From Under The Cybercrime Economy

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

CSO Online had the opportunity to chat with Shape Security's senior threat researcher, Wade Williamson, at this year's Black Hat conference, and he offered a brief background of these types of popular malware platforms before putting the threat landscape into perspective.

Google Report Unmasks Ad Injection Economy


More than five percent of unique IPs visiting Google-owned websites had at least one ad injector installed, according to a new study.

"Our results reveal that ad injection has entrenched itself as a cross-browser monetization platform that impacts tens of millions of users around the globe," according to a report from Google and a team of researchers that will be presented at the IEEE Symposium on Security and Privacy later this month. "Our client-side telemetry finds that 5.5% of unique daily IP addresses visiting Google properties have at least one ad injector installed. The most popular, superfish.com, injects ads into more than 16,000 websites and grossed over $35 million in 2013 according to financial reports."

UPS Now The Third Company In A Week To Disclose Data Breach

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.

In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems.

A subsequent investigation by an IT security firm showed that attackers had installed previously unknown malware on systems in more than four-dozen stores to gain access to cardholder data. The affected stores represent about 1% of the 4,470 UPS Store locations around the country.

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

There are five actions that can be taken to move you toward the ideal. These include:
  1. Establish a policy and technology to allow BYOD
  2. Upgrade the web filter
  3. Protect owned devices while off the network
  4. Anti-malware protection does still matter
  5. Integrate and move your security to the cloud