Landmark Leadership Conferences for IT Executives
Cyber Security News of the Week, January 26, 2014
by Fred F. Farkel, Monday, January 27th, 2014


Guest column by Citadel Information Group

Cyber Crime

Gang Rigged Pumps With Bluetooth Skimmers: Authorities in New York on Tuesday announced the indictment of thirteen men accused of running a multi-million dollar fraud ring that allegedly installed Bluetooth-enabled wireless gas pump skimmers at filling stations throughout the southern United States. KrebsOnSecurity, January 22, 2014

A Sneaky Path Into Target Customers’ Wallets: It was, in essence, a cybercriminal’s dream. For months, an amorphous group of Eastern European hackers had been poking around the networks of major American retailers, searching for loose portals that would take them deep into corporate systems. The New York Times, January 17, 2014

A Closer Look at the Target Malware, Part II: Yesterday’s story about the point-of-sale malware used in the Target attack has prompted a flood of analysis and reporting from antivirus and security vendors about related malware. Buried within those reports are some interesting details that speak to possible actors involved and to the timing and discovery of this breach. KrebsOnSecurity, January 16, 2014

Cyber Warning

Bug Exposes IP Cameras, Baby Monitors: A bug in the software that powers a broad array of Webcams, IP surveillance cameras and baby monitors made by Chinese camera giant Foscam allows anyone with access to the device’s Internet address to view live and recorded video footage, KrebsOnSecurity has learned. KrebsOnSecurity, January 23, 2014

DHS Alerts Contractors to Bank Data Theft: A security breach at a Web portal for the U.S. Department of Homeland Security has exposed private documents and some financial information belonging to at least 114 organizations that bid on a contract at the agency last year. KrebsOnSecurity, January 21, 2014

ANDROID VULNERABILITY ENABLES VPN BYPASS: A vulnerability in the Android mobile operating system could allow hackers to write applications that would bypass a secure virtual private network connection and redirect traffic in clear text to an attacker. ThreatPost, January 20, 2014

Cyber Security Management

Risk and responsibility in a hyperconnected world: Implications for enterprises: For the world’s economy to get full value from technological innovation, it must have a robust, coordinated approach to cybersecurity. A new report from the World Economic Forum and McKinsey & Company looks at how that could happen. Mckinsey&Company, January 2014

National Cyber Security

Obama Stands Fast on Intelligence Gathering but Promises More Oversight: In his speech on Friday the U.S. president made no apologies for the National Security Agency’s work. The government will, however, stop storing citizen phone records. Scientific America, January 20, 2014

Cyber Misc

Google pulls browser extensions after complaints: Such extensions are part of a larger business that focuses on installing software add-ons, such as toolbars, on people’s computers when they download some other type of software from the Internet. USA Today, January 20, 2014

The Adventures of a Cybercrime Gumshoe: I was fortunate to spend several hours this past week with two reporters whose work I admire. Both wanted to learn more about my job as an independent investigative reporter. Their stories about my story are below. KrebsOnSecurity, January 18, 2014

Unto the Breach: On Wednesday, a letter landed in my email inbox from Gregg Steinhafel, the chief executive of Target. He wanted me to know that there was a decent likelihood that some of my personal information had been stolen by criminals who had “forced their way into our systems,” as Steinhafel put it, and pulled off one of the biggest data breaches in history. The New York Times, January 17, 2014

Cyber Sunshine

Feds Infiltrate, Bust Counterfeit Card Shop: Federal authorities in New Jersey announced a series of arrests and indictments of 14 individuals thought to be connected to an online one-stop shop selling embossed, counterfeit credit cards and holographic overlays. KrebsOnSecurity, January 24, 2014

Cyber Calander

Join OWASP Los Angeles, Orange County, San Diego, Santa Barbara, and the Bay Area as we join forces to host AppSec California!: AppSec California is the first of hopefully many annual conferences hosted by all of the California chapters. Join us on the beaches of Santa Monica which is closest to our Los Angeles Chapter. Space is limited to around 200 attendees so be sure to get your ticket before we sell out! AppleSec California, Event Date: January 27-28, 2014

“Lunch Meeting – It Takes the Village to Secure the Village”: Dr. Stan Stahl, President of the Los Angeles Chapter of the Information Systems Security Association and President of Citadel Information Group presents. SOCALAFP, Event Date: February 14, 2014

Cybersecurity Essentials for Business Professionals: Please join us in this free presentation where we will discuss essential issues that every entrepreneur and business professional must know about cybersecurity laws, guidelines, and protocols. This event will be moderated and conducted by Salar Atrizadeh, Esq., principal and founder of the Law Offices of Salar Atrizadeh. Also, Stan Stahl, Ph.D., President of Citadel Information Group and ISSA-LA, Brad Maryman, and Howard Miller will serve as panelists Law Offices of Salar Atrizadeh, Event Date: February 21, 2014

The IT Summit would like to thank Citadel Information Group for allowing us to provide this information to you.

Comments Off on Cyber Security News of the Week, January 26, 2014

Comments are closed.