Cyber Security News of the Week, May 11, 2014by Fred F. Farkel, Monday, May 12th, 2014
Guest column by Citadel Information Group
The Target Breach, By the Numbers: News that Target’s CEO Gregg Steinhafle is stepping down has prompted a flurry of reports from media outlets trying to recap events since the company announced a data breach on Dec. 19, 2013. Sprinkled throughout those reports were lots of numbers, which got me to thinking about synthesizing them with some of the less-reported numbers associated with this epic breach. KrebsOnSecuriy, May 6, 2014
Target CEO Gregg Steinhafel Resigns In Data Breach Fallout: Target’s TGT +1.39% CEO is the latest casualty of the widespread data breach that saw hackers steal personal data and credit card information from millions of customers. Forbes, May 5, 2014
My Experiment Opting Out of Big Data Made Me Look Like a Criminal: Here’s what happened when I tried to hide my pregnancy from the Internet and marketing companies. Time, May 1, 2014
Cyber Security Management
Are rogue employees the biggest threat to information security?: Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. Help Net Security, May 9, 2014
The rising strategic risks of cyberattacks: More and more business value and personal information worldwide are rapidly migrating into digital form on open and globally interconnected technology platforms. As that happens, the risks from cyberattacks become increasingly daunting. Criminals pursue financial gain through fraud and identity theft; competitors steal intellectual property or disrupt business to grab advantage; “hacktivists” pierce online firewalls to make political statements. McKinsey&Company, May 2014
Cyber Security Management – Cyber Defense
Accidental Heartbleed Vulnerabilities Undercut Recovery Effort: Scans find 300,000 affected servers, but a surprising number of newly vulnerable servers have surfaced since Heartbleed warning was first sounded. Dark Reading, May 9, 2014
Antivirus is Dead: Long Live Antivirus!: An article in The Wall Street Journal this week quoted executives from antivirus pioneer Symantec uttering words that would have been industry heresy a few years ago, declaring antivirus software “dead” and stating that the company is focusing on developing technologies that attack online threats from a different angle. KrebsOnSecurity, May 7, 2014
Google blocks filesharing website Demonoid over malware downloads: Google is warning users of its search engine that if they visit filesharing website Demonoid, they could find malicious software being downloaded and installed on their computers. The Guardian, May 9, 2014
DOJ Asks for New Authority to Hack and Search Remote Computers: IDG News Service (Washington, D.C., Bureau) — The U.S. Department of Justice wants new authority to hack and search remote computers during investigations, saying the new rules are needed because of complex criminal schemes sometimes using millions of machines spread across the country. CIO, May 9, 2014
FTC Must Disclose Consumer Data Security Standards: A company accused by the FTC of failing to provide adequate data security has the right to know the required security standards, administrative judge rules. InformationWeek, May 8, 2014
When Hitting ‘Find My iPhone’ Takes You to a Thief’s Doorstep: WEST COVINA, Calif. — After a boozy Saturday night, Sarah Maguire awoke the next morning to find that her iPhone was gone. Her roommate’s phone was gone, too. Were they at the bar, she wondered, or in the cab? The New York Times, May 3, 2014
Can Hackers Really Manipulate Traffic Lights Like You’ve Seen in the Movies?: The hacker in The Italian Job did it spectacularly. So did the fire-sale team in Live Free or Die Hard. But can hackers really hijack traffic lights to cause gridlock and redirect cars? Yahoo, May 2, 2014
Bitcoin Vies with New Cryptocurrencies as Coin of the Cyber Realm: As hundreds of “altcoin” knockoffs are minted online, bitcoins no longer dominate as the principal form of digital currency. Scientific American, April 29, 2014
ISSA-LA Sixth Annual Information Security Summit, May 16, Universal City Hilton. Speakers include Richard Clarke, former Assistant to the President; Jackie Lacey, Los Angeles County District Attorney;Jeremiah Grossman,Founder & iCEO, WhiteHat Security; Marcus Ranum, CSO, Tenable; Marc Maiffret, CTO, Beyond Trust; Jim Manico, Secure Coding Instructor and Author, Global OWASP Board of Directors; Ira Winkler, ISSA International President; Andrea Hoy, ISSA International Vice-President. For more information and to register, visit ISSA-LA.
EFF at ISSA-LA Information Security Summit: Join EFF at the 6th annual ISSA-LA Information Security Summit! The Los Angeles Chapter Information Systems Security Association presents this event to provide a unique opportunity to learn from leading cyber security experts like Former White House cyber security czar Richard A. Clarke and Los Angeles County District Attorney Jackie Lacey. Electronic Frontier Foundation at ISSA-LA Information Security Summit, Event Date: May 16, 2014
BeyondTrust Chief Technology Officer Marc Maiffret to Speak at ISSA-LA Sixth Annual Information Security Summit on Cybercrime Solutions: Marc Maiffret, Chief Technology Officer of BeyondTrust, is one of the outstanding speakers at the Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) Sixth Annual Information Security Summit on May 16, 2014, at Hilton Universal City Hotel in Los Angeles. The theme of the Summit, The Growing Cyber Threat: Protect Your Business, emphasizes the financial impact of cybercrime on all organizations, and it highlights finding solutions to protecting and securing private information on the Internet. MarketMen, April 4, 2014
Copyright © 2014 Citadel Information Group. All rights reserved.
The IT Summit would like to thank Citadel Information Group for allowing us to provide this information to you. The post Cyber Security News of the Week, May 11, 2014 appeared first on Citadel Information Group.