Landmark Leadership Conferences for IT Executives
Cyber Security News of the Week, June 29, 2014
by Fred F. Farkel, Monday, June 30th, 2014


Guest column by Citadel Information Group

Cyber Crime

2014: The Year Extortion Went Mainstream: The year 2014 may well go down in the history books as the year that extortion attacks went mainstream. Fueled largely by the emergence of the anonymous online currency Bitcoin, these shakedowns are blurring the lines between online and offline fraud, and giving novice computer users a crash course in modern-day cybercrime. KrebsOnSecurity, June 26, 2014

MTV: Nokia paid several million to extortionists to keep code secret: The commercial broadcaster MTV reports Tuesday that mobile phone company Nokia handed over millions of euros to extortionists to ensure the protection of part of its mobile phone code. yle uutiset, June 27, 2014

Card Wash: Card Breaches at Car Washes: An investigation into a string of credit card breaches at dozens of car wash locations across the United States illustrates the challenges facing local law enforcement as they seek to connect the dots between cybercrime and local gang activity that increasingly cross multiple domestic and international borders. KrebsOnSecurity, June 23, 2014

Hacker puts ‘full redundancy’ code-hosting firm out of business: A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company’s backups. Network World, June 20, 2014

Cyber Attack

As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered: F-Secure has unearthed a new attack against industrial control systems that goes after European targets, using rare infection vectors. Dark Reading, June 26, 2014

Anonymous hackers found accessing Vietnam ministry computers: Unidentified hackers have launched targeted attacks against computers used by officials of the Vietnamese Ministry of Natural Resources and Environment, an Internet security company said in a report on Friday., June 23, 2014

Cyber Privacy

A New Cybersecurity Bill Could Give the NSA Even More Data: Privacy groups are sounding the alarm that a new Senate cybersecurity bill could give the National Security Agency access to even more personal information of Americans. National Journal, June 27, 2014

Cops Need A Warrant To Search Your Phone, Rules Supreme Court: This term, the Supreme Court sank its teeth into yet another technology privacy issue that divided the country: whether the police can snoop in the smartphone of an arrested person without getting a warrant first. Looking at two cases in California and Massachusetts where photos and call logs from phones helped police bust a gang member for a shooting and a drug dealer, the country’s highest court ruled that law enforcement should have gotten warrants before trawling through the contents of their phones. Forbes, June 25, 2014

Financial Cyber Security

Android malware targets South Korean online banking customers: Malicious software that swaps itself for legitimate online banking applications is striking users in South Korea, with thousands of devices infected in the last week, according to a Chinese mobile security company. PCWorld, June 26, 2014

CLONED ANDROID BANKING APP HIDES PHISHING SCHEME: Cloned mobile applications, such as the legions of Flappy Bird knock-offs that surfaced once the popular game was removed from Google Play and the Apple App Store, are an increasingly popular malware vehicle for attackers. ThreatPost, June 25, 2014

Financial firms need ‘skin in the game’ on cybersecurity, DHS official: A top Homeland Security Department official on Tuesday urged the financial services industry to have more “personal skin in the game” if it is serious about fighting cyber security attacks. Politico, June 24, 2014

Cyber Warning

Decades-Old Vulnerability Threatens ‘Internet Of Things’: A newly discovered bug in the pervasive LZO algorithm has generated a wave of patching of open-source tools such as the Linux kernel this week. Dark Reading, June 26, 2014

PATCHED CODE EXECUTION BUG AFFECTS MOST ANDROID USERS: A serious code-execution vulnerability in Android 4.3 and earlier was patched in KitKat, the latest version of the operating system. ThreatPost, June 26, 2014

Beware Flappy Bird clones carrying malware: SAN FRANCISCO – Scratching the Flappy Bird itch could be dangerous, a report by computer security company McAfee finds. USA Today, June 24, 2014 website redirects to Caphaw malware, WebSense says:, a popular website with millions of monthly visitors, was redirecting visitors to other domains that delivered the Caphaw malware, according to security vendor WebSense. PCWorld, June 23, 2014

Hacker Tactic: Holding Data Hostage: THE perpetual cat-and-mouse game between computer hackers and their targets is getting nastier. Cybercriminals are getting better at circumventing firewalls and antivirus programs. More of them are resorting to ransomware, which encrypts computer data and holds it hostage until a fee is paid. Some hackers plant virus-loaded ads on legitimate websites, enabling them to remotely wipe a hard drive clean or cause it to overheat. Meanwhile, companies are being routinely targeted by attacks sponsored by the governments of Iran and China. Even small start-ups are suffering from denial-of-service extortion attacks, in which hackers threaten to disable their websites unless money is paid. The New York Times, June 22, 2014

Cyber Security Management

Why senior leaders are the front line against cyberattacks: All companies are aware of the growing risk of cyberattacks, yet few are taking the steps necessary to protect critical information. The key? Senior managers need to lead. McKinsey&Company, June, 2014

National Cyber Security

China cyber crime cooperation stalls after U.S. hacking charges: WASHINGTON (Reuters) – Fledging cooperation between the United States and China on fighting cyber crime has ground to a halt since the recent U.S. indictment of Chinese military officials on hacking charges, a senior U.S. security official said on Thursday. Yahoo News, June 26, 2014

Cyber Law

MASSACHUSETTS SUPREME COURT RULES DEFENDANT MUST DECRYPT DATA: Encryption software has been enjoying a prolonged day in the sun for about the last year. Thanks to the revelations of Edward Snowden about the NSA’s seemingly limitless capabilities, security experts have been pounding the drum about the importance of encrypting not just data in transit, but information stored on laptops, phones and portable drives. But the Massachusetts Supreme Judicial Court put a dent in that armor on Wednesday, ruling that a criminal defendant could be compelled to decrypt the contents of his laptops. ThreatPost, June 26, 2014

Cyber Sunshine

The ‘Fly’ Has Been Swatted: A Ukrainian man who claimed responsibility for organizing a campaign to send heroin to my home last summer has been arrested in Italy on suspicion of trafficking in stolen credit card accounts, among other things, has learned. KrebsOnSecurity, June 24, 2014

Copyright © 2014 Citadel Information Group. All rights reserved.

The IT Summit would like to thank Citadel Information Group for allowing us to provide this information to you. The post Cyber Security News of the Week, June 29, 2014 appeared first on Citadel Information Group.

Comments Off on Cyber Security News of the Week, June 29, 2014

Comments are closed.