Thursday, January 29, 2015

Email scammers stole $215M from businesses in 14 months

From Help Net security:

Email scammers stole $215M from businesses in 14 months

The Business E-mail Compromise scam is alive and well, and expected to rise both when it comes to the number of victims and the total money loss sustained by them.

How important is online privacy?

From Help Net Security:

How important is online privacy?

Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same percentage as in January 2014. 44 percent said they were frequently or always concerned and 42 percent agreed they were more concerned than one year ago.

APTs: Minimizing losses with early detection

From Help Net Security:

APTs: Minimizing losses with early detection

Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an informer for South Boston’s Irish Mob. Working his way up the ranks, he gathers sensitive information about the plans and counter-plans of the operations he has penetrated and leaks them to his organized crime cohorts. Eventually, police suspect that there's a mole in their midst. Now, we all know how this ends – Damon is exposed and killed by Mark Wahlberg for his stint – but not before wreaking havoc throughout the department.

Hotels that block personal Wi-Fi hotspots will get busted, says FCC

From Sophos Naked Security:

Hotels that block personal Wi-Fi hotspots will get busted, says FCC

The US Federal Communications Commission (FCC) didn't mince its words: hotels that block Wi-Fi are breaking the law.

From a warning posted on Tuesday:
In the 21st Century, Wi-Fi represents an essential on-ramp to the internet. Personal Wi-Fi networks, or "hotspots", are an important way that consumers connect to the internet. Willful or malicious interference with Wi-Fi hotspots is illegal.

Cop who stole nude photos from arrested women's seized phones escapes jail time

From Sophos Naked Security:

Cop who stole nude photos from arrested women's seized phones escapes jail time

A former California Highway Patrol (CHP) officer who forwarded nude photos of arrested women from their mobile phones to his and his colleagues' phones has escaped jail time.

US Military wants to replace passwords with "cognitive fingerprints"

From Sophos Naked Security:

US Military wants to replace passwords with "cognitive fingerprints"

Researchers at the US military's elite West Point military academy have been awarded a multi-million dollar contract to produce a new identity verification system based on users' behavior.

Massive DEA license plate reader program tracks millions of Americans

From Sophos Naked Security:

Massive DEA license plate reader program tracks millions of Americans

The US Drug Enforcement Administration (DEA) has been building a massive national license plate reader (LPR) database over several years that it shares with federal and local authorities, with no clarity on whether the network is subject to court oversight.

Facebook vs 25,000 users - privacy class action lawsuit has initial hearing date set

From Sophos Naked Security:

Facebook vs 25,000 users - privacy class action lawsuit has initial hearing date set

An Austrian court has given the go ahead to a class action lawsuit brought against Facebook for alleged privacy violations across Europe.

Bughunter cracks "absolute privacy" Blackphone - by sending it a text message

From Sophos Naked Security:

Bughunter cracks "absolute privacy" Blackphone - by sending it a text message

Serial Aussie bugfinder Mark Dowd has been at it again.

He loves to look for security flaws in interesting and important places.

This time, he turned his attention to a device that most users acquired precisely because of its security pedigree, namely the Blackphone.

The "Dirty Dozen" SPAMPIONSHIP: Who's the biggest? Who's the worst?

From Sophos Naked security:

The "Dirty Dozen" SPAMPIONSHIP: Who's the biggest? Who's the worst?

At last!

The United States of America can finally celebrate failing to win our SPAMPIONSHIP!

If it seems odd to cheer yourself for losing the top spot, remember that this is a league table where lower is better.

Apple fixes Thunderstrike and 3 Project Zero bugs in OS X 10.10.2 Yosemite

From Sophos Naked Security:

Apple fixes Thunderstrike and 3 Project Zero bugs in OS X 10.10.2 Yosemite

Apple is readying a series of fixes to defend Yosemite, its flagship operating system, from so-called 'evil maid' attacks.

Google asked to muzzle Waze 'police-stalking' app

From Sophos Naked Security:

Google asked to muzzle Waze 'police-stalking' app

GPS trackers on vehicles; stingray devices to siphon mobile phone IDs and their owners' locations; gunshot-detection sensors; license plate readers: these are just some of the types of surveillance technologies used by law enforcement, often without warrants.

Pinterest to sell ads based on what you're thinking of buying

From Sophos Naked Security:

Pinterest to sell ads based on what you're thinking of buying

Pinterest users, get ready to be squeeeeeeeeeeeeezed like the data-rich, spendy sponges that you are.

Beyond "fake invoice" scams - crooks can get money out of real invoices, too!

From Sophos Naked Security:

Beyond "fake invoice" scams - crooks can get money out of real invoices, too!

Breaches are a personal nightmare for corporate security pros

From Network World:

Breaches are a personal nightmare for corporate security pros

FTC Alert: Another tax scam: IRS imposters

From the Federal Trade Commission:

Another tax scam: IRS imposters

FTC Alert: FTC Shuts Down Diploma Mill Operators

From the Federal Trade Commission:

FTC Shuts Down Diploma Mill Operators

FTC Alert: Is anybody horrified?

From the Federal Trade Commission:

Is anybody horrified?

Jan 2015 RSA Monthly Online Fraud Report

From RSA:

Jan 2015 RSA Monthly Online Fraud Report

D-Link routers vulnerable to DNS hijacking

From Help Net Security:

D-Link routers vulnerable to DNS hijacking

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered.

The Next Step in the Cybersecurity Plan

From US DoD Science Blog:

The Next Step in the Cybersecurity Plan

Regin super-malware has Five Eyes fingerprints all over it says Kaspersky

From The Register:

Regin super-malware has Five Eyes fingerprints all over it says Kaspersky

Fed Reveals Plan for Faster Payments

From InfoRiskToday:

Fed Reveals Plan for Faster Payments

The Federal Reserve on Jan. 26 revealed its roadmap for an overhaul of the U.S. payments system, which includes plans for faster settlement in all payment categories and near real-time settlement of peer-to-peer payments.

IT Security Hiring Surge Continues

From InfoRiskToday:

IT Security Hiring Surge Continues

If 2014 was a harbinger of things to come, with the supply failing to keep pace with the demand, 2015 will be a banner year for IT security employment.

FTC Alert: FTC Announces Schedule for Reviewing Regulations

From the Federal Trade Commission:

FTC Announces Schedule for Reviewing Regulations

As part of the Federal Trade Commission’s systematic review of all current FTC rules and guides, the agency is announcing a modified 10-year regulatory review schedule.

NFL Mobile App Leaks Unencrypted Credentials

From ThreatPost:

NFL Mobile App Leaks Unencrypted Credentials

As if the National Football League doesn’t have enough to worry about during Super Bowl week with deflated footballs and cheating allegations marring its most important event, a security firm has found a glaring vulnerability in its mobile application.

'Ghost' flaws poses high risk to Linux distributions

From ComputerWorld:

'Ghost' flaws poses high risk to Linux distributions

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.

RansomWeb: Crooks Start Encrypting Websites And Demanding Thousands Of Dollars From Businesses

From Forbes:

RansomWeb: Crooks Start Encrypting Websites And Demanding Thousands Of Dollars From Businesses

In another startling development in the world of cyber crime, malicious hackers have started taking over website servers, encrypting the data on them and demanding payment to unlock the files. A large European financial services company, whose name was not disclosed, was the first known victim of this potentially business-destroying attack, according to Swiss security firm High-Tech Bridge, which investigated the breach in December 2014.

China crackdown makes it harder to get around the Great Firewall

From CNN Money:

China crackdown makes it harder to get around the Great Firewall

U.S. FCC warns against blocking personal Wi-Fi access

From CNBC:

U.S. FCC warns against blocking personal Wi-Fi access

The U.S. Federal Communications Commission on Tuesday warned hotels and other entities against blocking personal Wi-Fi access, or hot spots, saying it was illegal and could incur heavy fines.

Malaysia Airlines Website Hacked

From DataBreachToday:

Malaysia Airlines Website Hacked

Reporting HIPAA Breaches: A New Approach

From DataBreachToday:

Reporting HIPAA Breaches: A New Approach

Was Dating Website Breached?

From DataBreachToday:

Was Dating Website Breached?

Facebook Denies Hackers Caused Outage

From DataBreachToday:

Facebook Denies Hackers Caused Outage

Wednesday, January 28, 2015

Cybersecurity savant

From The Hill:

Cybersecurity savant

Supposedly clean Office documents download malware

From Help Net Security:

Supposedly clean Office documents download malware

MalDrone: Malware that which hijacks your personal drone

From ZDNet:

MalDrone: Malware that which hijacks your personal drone

Today: Congressional cyber double-header – Internet of Things in FTC spotlight – First Look: More grim statistics about DDoS

From politico:

Today: Congressional cyber double-header – Internet of Things in FTC spotlight – First Look: More grim statistics about DDoS

Self-destructing chat app Wickr uses cat pics to hide photos in plain sight

From Engadget:

Self-destructing chat app Wickr uses cat pics to hide photos in plain sight

DOJ fears tech ‘zone of lawlessness’

From The Hill:

DOJ fears tech ‘zone of lawlessness’

Fast-talk from Straight Talk and others about unlimited data

From OnGuardOnline:

Fast-talk from Straight Talk and others about unlimited data

FTC Alert: Prepaid Mobile Provider TracFone to Pay $40 Million to Settle FTC Charges It Deceived Consumers About ‘Unlimited’ Data Plans

From the Federal Trade Commission:

Prepaid Mobile Provider TracFone to Pay $40 Million to Settle FTC Charges It Deceived Consumers About ‘Unlimited’ Data Plans

Happy Data Privacy Day!

From the Federal Trade Commission:

Happy Data Privacy Day!

FTC Alert: Best Practices for businesses facing Internet of Things onslaught

From Network World:

FTC: Best Practices for businesses facing Internet of Things onslaught

US-CERT: Apple Releases Security Updates for OS X, Safari, iOS and Apple TV

From US-CERT:

Apple Releases Security Updates for OS X, Safari, iOS and Apple TV


Apple has released security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities, one of which could allow a remote attacker to take control of an affected system.
Updates available include:
  • OS X v10.10.2 and Security Update 2015-001 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10 and v10.10.1
  • Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.1
  • iOS 8.1.3 for iPhone 4s and later, iPod touch 5th generation and later, and iPad 2 and later
  • Apple TV 7.0.3 for Apple TV 3rd generation and later
US-CERT encourages users and administrators to review Apple security updates HT204244 (link is external), HT204243 (link is external)HT204245 (link is external) and HT204246 (link is external), and apply the necessary updates.

FTC Alert: In Comment to Federal Communications Commission, FTC Says No Legal Barriers or Policy Considerations Stop Common Carriers from Providing Call-Blocking Services to Consumers

From the Federal Trade Commission:

In Comment to Federal Communications Commission, FTC Says No Legal Barriers or Policy Considerations Stop Common Carriers from Providing Call-Blocking Services to Consumers

FTC Alert: Is that gadget internet-connected?

From the Federal Trade Commission:

Is that gadget internet-connected?

RSA Breach Readiness Survey

How prepared are you?  Take the survey from RSA:

RSA Breach Readiness Survey

FTC Alert: IRS imposter complaints up more than 2,300% in 2014

From Network World:

FTC: IRS imposter complaints up more than 2,300% in 2014

US-CERT: Security Advisory for Adobe Flash Player

From US-CERT:

Security Advisory for Adobe Flash Player


"Adobe has released Flash Player desktop version 16.0.0.296 to address a critical vulnerability (CVE-2015-0311) in 16.0.0.287 and earlier versions for Windows and Macintosh. This vulnerability could allow an attacker to take control of the affected system.

Users and administrators are encouraged to review Adobe Security Bulletin APSB15-01 (link is external) and apply the necessary updates."

NIST (SP) 800-163, Vetting the Security of Mobile Applications

From NIST:

NIST (SP) 800-163, Vetting the Security of Mobile Applications

FTC Alert: Marketer Who Promoted a Green Coffee Bean Weight-Loss Supplement Agrees to Settle FTC Charges

From the Federal Trade Commission:

Marketer Who Promoted a Green Coffee Bean Weight-Loss Supplement Agrees to Settle FTC Charges

US-CERT: Linux "Ghost" Remote Code Execution Vulnerability

From US-CERT:
Linux "Ghost" Remote Code Execution Vulnerability


"The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu (link is external) and Red Hat (link is external). The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement."

Monday, January 26, 2015

Psychological profile-based security - could it work?

From Sophos Naked Security:

Psychological profile-based security - could it work?

FTC Alert: 3 ways to use Tax Identity Theft Awareness Week to help people in your life

From the Federal Trade Commission:

3 ways to use Tax Identity Theft Awareness Week to help people in your life

FTC Alert: Tax ID Theft Tops FTC Complaints in 2014; IRS Imposter Complaints Up More Than 2,300 Percent

From the Federal Trade Commission:

Tax ID Theft Tops FTC Complaints in 2014; IRS Imposter Complaints Up More Than 2,300 Percent

Generation Z predicts the end of passwords and PIN codes

From Business Reporter:

Generation Z predicts the end of passwords and PIN codes

Quebec town says cyberattack on its website has them perplexed

From The Globe & Mail:

Quebec town says cyberattack on its website has them perplexed

China denies Microsoft hacking allegations

From The Hill:

China denies Microsoft hacking allegations

ESET reports trojan in Orbit Downloader

From ZDNet:

ESET reports trojan in Orbit Downloader

How an Internet trolling victim bonded with her worst troll

From ars technica:

How an Internet trolling victim bonded with her worst troll

Siemens Fixes Web Vulnernability in SIMATIC PLC

From ThreatPost:

Siemens Fixes Web Vulnernability in SIMATIC PLC

Privacy is dead, Harvard professors tell Davos forum

From Yahoo!:

Privacy is dead, Harvard professors tell Davos forum

Apple readies fix for Thunderstrike bootkit exploit in next OS X release

From ars technica:

Apple readies fix for Thunderstrike bootkit exploit in next OS X release

"Yosemite 10.10.2 also squashes three unpatched bugs disclosed by Google."

Rooting a Moto E XT1021 phone from an OS X 10.9 system to install SnoopSnitch

From Matthijs R. Koot:

Rooting a Moto E XT1021 phone from an OS X 10.9 system to install SnoopSnitch

Here’s the Secret Silk Road Journal From the Laptop of Ross Ulbricht

From Wired:

Here’s the Secret Silk Road Journal From the Laptop of Ross Ulbricht

Google discloses three severe vulnerabilities in Apple OS X

From CNET:

Google discloses three severe vulnerabilities in Apple OS X

Thousands of US Gas Stations Vulnerable to Remote Hacks

From ThreatPost:

Thousands of US Gas Stations Vulnerable to Remote Hacks

Adobe updates Flash Player again, plugs 0-day exploited by Angler

From Help Net Security:

Adobe updates Flash Player again, plugs 0-day exploited by Angler

True Cybersecurity: 'Intelligent' Computer Keyboard Identifies Users By Pattern Of Their Key Taps

From The Washington Times:

True Cybersecurity: 'Intelligent' Computer Keyboard Identifies Users By Pattern Of Their Key Taps

Independent assessment gives VA's cybersecurity positive mark

From Federal News Radio:

Independent assessment gives VA's cybersecurity positive mark

Who Stole Your Identity?

From Slate:

Who Stole Your Identity?

US-CERT: IC3 Releases Alert for a Scam Targeting Businesses

From US-CERT:

IC3 Releases Alert for a Scam Targeting Businesses

US-CERT: FBI Releases "Ransomware on the Rise"

From US-CERT:

FBI Releases "Ransomware on the Rise"

US-CERT: Google Releases Security Updates for Chrome

From US-CERT:

Google Releases Security Updates for Chrome

FTC Alert: Today’s news, tomorrow’s scam

From the Federal Trade Commission:

Today’s news, tomorrow’s scam

Get ready for National Consumer Protection Week!

From OnGuardOnline:

Get ready for National Consumer Protection Week!

Critical Java updates fix 19 vulnerabilities, disable SSL 3.0

From Network World:

Critical Java updates fix 19 vulnerabilities, disable SSL 3.0

Friday, January 23, 2015

When cybersecurity makes the difference in protecting life

From BetaNews:

When cybersecurity makes the difference in protecting life

With more than 200,000 unfilled jobs, colleges push cybersecurity

From PBS News Hour:

With more than 200,000 unfilled jobs, colleges push cybersecurity

NSA Report: How To Defend Against Destructive Malware

From Dark Reading:

NSA Report: How To Defend Against Destructive Malware

Journalist gets 5 years for linking to hacked data

From The Hill:

Journalist gets 5 years for linking to hacked data

FBI and IRS warn of pervasive, maddening business, consumer scams

From Network World:

FBI and IRS warn of pervasive, maddening business, consumer scams

Taking the next big step in banking fraud prevention

From Business Reporter:

Taking the next big step in banking fraud prevention

Is Cyber-Terrorism the New Normal?

From Wired:

Is Cyber-Terrorism the New Normal?

Europol 'to be given new internet watchdog powers'

From The Telegraph:

Europol 'to be given new internet watchdog powers'

"The EU is planning to give Europe’s police intelligence agency, Europol, new powers to become a European internet watchdog and censor, according to a secret policy document."

Cybersecurity fears put a chill on the Davos feelgood vibe

From Fortune:

Cybersecurity fears put a chill on the Davos feelgood vibe

Future Cyber Security Army Needs More Than Just Programmers

From SecurityToday:

Future Cyber Security Army Needs More Than Just Programmers

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

From ComputerWorld:

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Unconfirmed zero-day vulnerability discovered in Adobe Flash Player

From Symantec:

Unconfirmed zero-day vulnerability discovered in Adobe Flash Player

School rule-breakers to hand over Facebook and Twitter passwords

From Sophos Naked Security:

School rule-breakers to hand over Facebook and Twitter passwords

Silk Road 2.0 deputy arrested after 6-month attack on Tor

From Sophos Naked Security:

Silk Road 2.0 deputy arrested after 6-month attack on Tor

If you use either of these WordPress themes update them now

From Sophos Naked Security:

If you use either of these WordPress themes update them now

Thursday, January 22, 2015

Introducing SHIPS – Centralized Local Password Management for Windows

From SecurityOrb:

Introducing SHIPS – Centralized Local Password Management for Windows

Bypass Demonstrated for Microsoft Use-After-Free Mitigation in IE

From ThreatPost:

Bypass Demonstrated for Microsoft Use-After-Free Mitigation in IE

Firefox Meta Referrer A Move Toward Browser Privacy

From ThreatPost:

Firefox Meta Referrer A Move Toward Browser Privacy

Angler exploit kit goes after new Adobe Flash 0-day flaw

From Help Net Security:

Angler exploit kit goes after new Adobe Flash 0-day flaw

Why insider threat is thriving

From Help Net Security:

Why insider threat is thriving

Can the next EU regulation guarantee data protection for all?

From Help Net security:

Can the next EU regulation guarantee data protection for all?

Researchers create inexpensive versions of NSA's spying tools

From Help Net Security:

Researchers create inexpensive versions of NSA's spying tools

Facebook update aims to reduce News Feed hoaxes

From Sophos Naked Security:

Facebook update aims to reduce News Feed hoaxes

WhatsApp issues 24 hour ban for WhatsApp Plus users

From Sophos Naked Security:

WhatsApp issues 24 hour ban for WhatsApp Plus users

Whisper editor's out the door after scandal, internal investigation

From Sophos Naked Security:

Whisper editor's out the door after scandal, internal investigation

Report: NSA not only creates, but also hijacks, malware

From Network World:

Report: NSA not only creates, but also hijacks, malware

Obama Wants Companies to Stop Stealing Your Data. Good Luck.

From Mother Jones:

Obama Wants Companies to Stop Stealing Your Data. Good Luck.

"...According to Evidon, an online marketing analytics service, an app called My Pregnancy Today shared data with 19 different third parties, including Google, Facebook, Twitter, BabyCenter, AdMob, Dynamic Logic, and various other obscurely named companies. An app that tracks when women menstruate did the same. Weight Watchers International sends your diet plans directly to Kraft Foods."

Playing NSA, hardware hackers build USB cable that can attack

From ars technica:

Playing NSA, hardware hackers build USB cable that can attack

DEA settles fake Facebook profile lawsuit without admitting wrongdoing

From ars technica:

DEA settles fake Facebook profile lawsuit without admitting wrongdoing

'Je Suis Charlie' malware shows attackers' agility

From CSO:

'Je Suis Charlie' malware shows attackers' agility

Patched API Flaw Allowed Anyone Access to Verizon Email Accounts

From ThreatPost:

Patched API Flaw Allowed Anyone Access to Verizon Email Accounts

Why cybersecurity will suffer the same fate in 2015 as it did in 2014

From CSO:

Why cybersecurity will suffer the same fate in 2015 as it did in 2014

Cyber crime and cyber security

From EY:
 
Cyber crime and cyber security

Wednesday, January 21, 2015

MitM Attack Targets Outlook Users in China

From Security Week:

MitM Attack Targets Outlook Users in China

A Lot of Security Purchases Remain Shelfware

From DarkReading:

A Lot of Security Purchases Remain Shelfware

Recruit, Reward & Retain Cybersecurity Experts

From DarkReading:

Recruit, Reward & Retain Cybersecurity Experts

Hard-Coded FTP Credentials Found in Schneider Electric SCADA Gateway

From ThreatPost:

Hard-Coded FTP Credentials Found in Schneider Electric SCADA Gateway

Global shortage of skilled cybersecurity pros

From Help Net Security:

Global shortage of skilled cybersecurity pros

Cyber forensics competition goes local

From the Md Gazette:

Cyber forensics competition goes local

How Obama Fell Short on Cybersecurity

From Politico:

How Obama Fell Short on Cybersecurity

UK Shoe Retailer's Database Breached

From DataBreachToday:

UK Shoe Retailer's Database Breached

Securing Mobile Transactions

From DataBreachToday:

Securing Mobile Transactions

Infographic: Payment Card Breach Lifecycle

From DataBreachToday:

Infographic: Payment Card Breach Lifecycle

Application Security: Four Key Steps

From DataBreachToday:

Application Security: Four Key Steps

Hacker hits Australian travel insurer, leaks records of 800,000 customers

From Help Net Security:

Hacker hits Australian travel insurer, leaks records of 800,000 customers

11% of Android banking and finance apps are dangerous

From Help Net Security:

11% of Android banking and finance apps are dangerous

Of the more than 40,000 mobile apps listed as suspicious:
  • 21,076 contained adware
  • 20,000 contained Trojan malware
  • 3,823 contained spyware
  • 209 contained exploit code
  • 178 contained malicious JavaScript.
Meanwhile, of these 40,000 suspicious apps, the following number exhibited excessive permissions:
  • 8,672 could capture device logs
  • 8,408 could record audio
  • 7,188 could access contacts lists
  • 4,892 could read SMS messages
  • 2,961 could write to contacts lists
  • 4,018 could disable key guard
  • 3,783 could read the device’s settings
  • 1,148 could install packages
  • 1,028 could access GPS information.

People happily give away their (bad) passwords to TV reporter

For Pete's sake people DO NOT GIVE AWAY YOUR PASSWORDS!!!  One would think that to be common sense.  Evidently it's not as intuitive as one would think.

From Sophos Naked Security:

People happily give away their (bad) passwords to TV reporter

Gamergate target Zoe Quinn launches network to battle online harassment

From Sophos Naked Security:

Gamergate target Zoe Quinn launches network to battle online harassment

Does Facebook know you better than your friends and family do?

From Sophos Naked Security:

Does Facebook know you better than your friends and family do?


"What if a computer could predict your behavior and understand your personality better than your coworkers, friends, siblings, and even your spouse do?

According to researchers from the University of Cambridge and Stanford University, it's already possible - by studying your Facebook likes.

...

The study also found that the computer model was better than personal acquaintances at predicting life outcomes such as substance use, political attitudes and physical health - and "for some outcomes, they even outperform the self-rated personality scores.""

US-CERT: Oracle Releases January 2015 Security Advisory

From US-CERT:

Oracle Releases January 2015 Security Advisory

Versions affected:

  • 8 for Oracle Database Server
  • 36 for Oracle Fusion Middleware
  • 10 for Oracle Enterprise Manager Grid Control
  • 10 for Oracle E-Business Suite
  • 6 for Oracle Supply Chain Products Suite
  • 7 for Oracle PeopleSoft Products
  • 1 for Oracle JD Edwards Products
  • 17 for Oracle Siebel CRM
  • 2 for Oracle iLearning
  • 2 for Oracle Communications Applications
  • 1 for Oracle Retail Applications
  • 1 for Oracle Health Sciences Applications
  • 19 for Oracle Java SE
  • 29 for Oracle Sun Systems Products Suite
  • 11 for Oracle Linux and Virtualization
  • 9 for Oracle MySQL

  • Tuesday, January 20, 2015

    Twitter, Tumblr Leaders Ditch Smartphones to Combat Addiction

    From NewsMax:

    Twitter, Tumblr Leaders Ditch Smartphones to Combat Addiction

    US-CERT: Ubuntu Releases Security Updates

    From US-CERT:

    Ubuntu Releases Security Updates

    FTC Alert: Kids’ game claims to boost brain power, draws FTC’s attention

    From the Federal Trade Commission:

    Kids’ game claims to boost brain power, draws FTC’s attention

    N.Y. AG Seeks to Toughen Data Safeguards

    From GovInfoSecurity:

    N.Y. AG Seeks to Toughen Data Safeguards

    Memory Corruption Bugs Found in VLC Media Player

    From ThreatPost:

    Memory Corruption Bugs Found in VLC Media Player

    Report: Companies Still Not Patching Security Vulnerabilities

    From ThreatPost:

    Report: Companies Still Not Patching Security Vulnerabilities

    Nasty Oracle Vulnerability Leaves Researcher ‘Gobsmacked’

    From ThreatPost:

    Nasty Oracle Vulnerability Leaves Researcher ‘Gobsmacked’

    New privacy concerns over government's health care website

    From AP:

    New privacy concerns over government's health care website

    1-15 January 2015 Cyber Attacks Timeline

    From Hackmageddon:

    1-15 January 2015 Cyber Attacks Timeline

    Please don't use these passwords. Sincerely, the Internet

    From Engadget:

    Please don't use these passwords. Sincerely, the Internet

    For more on passwords please see my Cyber Tips & IT Security threads.

    Gamers hit with trojanized versions of official League of Legends releases

    From Help Net Security:

    Gamers hit with trojanized versions of official League of Legends releases

    SQL injection vulnerabilities surge to highest levels in three years

    !!! SANITIZE USER INPUT !!!

    From Help Net Security:

    SQL injection vulnerabilities surge to highest levels in three years


    Leaked Minecraft usernames and passwords - a storm in a security teacup?

    From Sophos Naked Security:

    Leaked Minecraft usernames and passwords - a storm in a security teacup?

    Police seize robot and its shopping, including drugs, master keys and stash can

    From Sophos Naked Security:

    Police seize robot and its shopping, including drugs, master keys and stash can

    Traffic Patterns For CryptoWall 3.0

    From SANS ISC:

    Traffic Patterns For CryptoWall 3.0

    Monday, January 19, 2015

    How a team of social media experts is able to keep track of the UK jihadis

    From The Guardian:

    How a team of social media experts is able to keep track of the UK jihadis

    World Economic Forum Warns About "Global Threat" of IoT Hacking

    From Gizmodo:

    World Economic Forum Warns About "Global Threat" of IoT Hacking

    The privacy of ordinary Australians is under serious threat

    From The Guardian:

    The privacy of ordinary Australians is under serious threat

    The Internet Of Things Is A Cybercriminals Dream Come True

    From Forbes:

    The Internet Of Things Is A Cybercriminals Dream Come True

    Fighting Cybercrime Doesn’t Have to Cost a Fortune

    From The Fiscal Times:

    Fighting Cybercrime Doesn’t Have to Cost a Fortune

    CES: Selfies may replace your passcodes (video)

    From CNN:

    CES: Selfies may replace your passcodes

    The cost of malware containment

    From Help Net Security:

    The cost of malware containment

    2+ million US cars can be hacked remotely, researcher claims

    From Help Net Security:

    2+ million US cars can be hacked remotely, researcher claims

    Lizard Squad’s DDoS service hacked, buyers’ details revealed

    From Sophos Naked Security:

    Lizard Squad’s DDoS service hacked, buyers’ details revealed

    Do terrorists use spam to shroud their secrets?

    From Sophos Naked Security:

    Do terrorists use spam to shroud their secrets?

    Hackers for hire? Hacker's List - for those with no ethics or espionage skills

    From Sophos Naked Security:

    Hackers for hire? Hacker's List - for those with no ethics or espionage skills

    Man dies after 3-day video gaming binge

    I'm not sure what I find more disturbing, the fact that he died after playing a game for 3 days straight or this was:

    "... the country's second "sudden death" involving an Internet café customer this year."


    From Fox News:

    Man dies after 3-day video gaming binge

    Guide on actionable information for security incident response

    Another piece on ENISA's new manual.  From Help Net Security:

    Guide on actionable information for security incident response

    NSA secretly hijacked existing malware to spy on N. Korea, others

    Lots & lots on the NSA & N. Korea today.  From ars technica:

    NSA secretly hijacked existing malware to spy on N. Korea, others

    Wounded Warriors Get Training To Protect Nation from Computer Hacking Attacks

    From Fredericksburg.com:

    WOUNDED WARRIORS GET TRAINING TO PROTECT NATION FROM COMPUTER HACKING ATTACKS

    N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say

    From the NY Times:

    N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say

    Mercenary Hacker Crews Offering Espionage-as-a-Service Are On The Rise

    From Digital Dao:

    Mercenary Hacker Crews Offering Espionage-as-a-Service Are On The Rise

    EMV Cards Still Prone to Payments Crime

    From American Banker:

    EMV Cards Still Prone to Payments Crime

    It's hacker jihad: Islamist skiddies square up to Anonymous

    From The Register:

    It's hacker jihad: Islamist skiddies square up to Anonymous

    Financial Malware Explained

    Downloadable whitepaper from Security Intelligence:

    Financial Malware Explained