Landmark Leadership Conferences for IT Executives
Cyber Security News of the Week, September 8, 2013
by Fred F. Farkel, Monday, September 9th, 2013


Guest column by Citadel Information Group

Cyber Security News of the Week

Cyber Privacy

Privacy Groups Ask FTC to Oppose Facebook’s Policy Changes: IDG News Service (Bangalore Bureau) – Six privacy groups have asked the U.S. Federal Trade Commission to strike down proposed changes to Facebook’s policies, as they violate a 2011 settlement with the agency over user privacy. CIO, September 5, 2013

Government to Release Hundreds of Documents Related to NSA Surveillance: In response to a lawsuit by the Electronic Frontier Foundation, the Department of Justice is preparing to release a trove of documents related to the government’s secret interpretation of Section 215 of the PATRIOT Act. The declassified documents will include previously secret opinions of the Foreign Intelligence Surveillance Court. ThreatPost, September 6, 2013

Identity Theft

Facebook Security Issues Might Stymie Payments Push: Facebook (FB) created a stir recently on word it’s testing a payments product that lets shoppers make purchases on mobile devices using their Facebook login information., September 4, 2013

Online Bank Fraud

Sophisticated, ‘potent’ trojan targets online bank users: A new trojan has been discovered by security researchers, who say that although similar to the infamous Zeus and SpyEye, “Hesperbot” is a potent member of a new malware family. ZDNet, September 6, 2013

Banks’ resilience to cyber crime to be tested by Government: Banks’ resilience to cyber attacks are being rated by government officials for the first time amid concerns about the increasing risks to the financial system from electronic criminals and terrorists. The Telegraph, August 31, 201 

Warning: A New DDoS-Fraud Link: Gartner analyst Avivah Litan says fraudsters are using DDoS attacks as a distraction for a new, extremely effective account takeover scheme. How should institutions respond to this emerging threat? GovInfoSecurity, August 26, 2013

Cyber Threat

World’s Trouble Spots Escalating Into Cyberthreats For Businesses: As regional troubles spill over to the digital world, companies should reinforce their defenses and demand their suppliers do the same, experts say. DarkReading, September 5, 2013

Cyber Warning

Why Your iPhone Will Inevitably Catch A Virus: Android may dominate mobile market share, but it also comes with a host of ills like fragmentation and, more potently, malware. While the mobile malware threat has been surprisingly light to date, that’s starting to change. For now, Android is the malware capital of mobile in part because of its popularity and in part because of its more open approach to engineering., September 5, 2013

Researchers: Oracle’s Java Security Fails: Faced with an onslaught of malware attacks that leverage vulnerabilities and design weaknesses in Java, Oracle Corp. recently tweaked things so that Java now warns users about the security risks of running Java content. But new research suggests that the integrity and accuracy of these warning messages can be subverted easily in any number of ways, and that Oracle’s new security scheme actually punishes Java application developers who adhere to it. KrebsOnSecurity, September 4, 2013

Cyber Security Management

COBIT 5 for information security: The underlying principles: COBIT 5, a governance model for enterprise IT, introduces a framework that is better focused on information security. TechRepublic, September 4, 2013

Cyber Security Management – HIPAA

FTC Charges LabMD with Exposing Data to Identity Thieves: The Federal Trade Commission is taking action against medical laboratory services firm LabMD for enabling patient information to be accessible on a peer-to-peer file sharing network, which resulted in identity theft. LabMD vigorously disputes the charges. Health Data Management, August 30, 2013

Securing the Village – ISSA-LA

ISSA-LA & OWASP-LA September Dinner Meeting: Developers cannot defend against unknown threats. Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs. ISSA-LA Event – September 18, 2013

National Cyber Security

NSA Able to Foil Basic Safeguards of Privacy on Web: The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The New York Times, September 5, 2013

Terrorists tout new encryption technology that thwarts U.S. intelligence: Terrorists and jihadists say they have a new tool to undercut American and Western intelligence – a mobile encryption software system that operates cell phone-to-cell phone, and works on even those devices that aren’t equipped with the technology. The Washington Times, August 5, 2013

Budget Documents Detail Extent of U.S. Cyberoperations: WASHINGTON – Newly disclosed budget documents for America’s intelligence agencies show how aggressively the United States is now conducting offensive cyberoperations against other nations, even as the Obama administration protests attacks on American computer networks by China, Iran and Russia. The New York Times, August 31, 2013

Cyber Sunshine

Romanian Hackers Get Hefty Sentences in NH: Two Romanian computer hackers who stole credit card information from more than 800 U.S. merchants and more than 150,000 credit and debit card holders have been given lengthy prison sentences by a federal judge in New Hampshire. ABC News, September 5, 2013

The IT Summit would like to thank Citadel Information Group for allowing us to provide this information to you.

Comments Off on Cyber Security News of the Week, September 8, 2013

Comments are closed.