Information Security Breach Report – 18 February 2015

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.

 

Breaches, Incidents and Alerts:

New detail emerges on Boston Baskin Cancer Foundation breach – http://www.databreaches.net/new-detail-emerges-on-boston-baskin-cancer-foundation-breach/

Scammers target State of Franklin Healthcare employees in payroll breach – http://www.johnsoncitypress.com/article/124335/scammers-target-state-of-franklin-healthcare-employees-in-payroll-breach

16-year-old claims to be behind USyd data breach – http://honisoit.com/2015/02/16-year-old-claims-to-be-behind-usyd-data-breach/

16 Million Mobile Devices Infected With Malware in 2014: Alcatel-Lucent – http://www.securityweek.com/16-million-mobile-devices-infected-malware-2014-alcatel-lucent

Israeli gov & boffins targeted by pr0ntastic malware from Gaza – http://www.theregister.co.uk/2015/02/16/israel_egypt_targeted_by_gaza_apt_style_hackers/

Haskell Confirms Security Breach in Debian Builds – http://www.hackbusters.com/news/stories/258093-haskell-confirms-security-breach-in-debian-builds

Information disclosure flaw exposes Netgear wireless routers to attacks – http://www.csoonline.com/article/2883760/mobile-security/information-disclosure-flaw-exposes-netgear-wireless-routers-to-attacks.html#tk.rss_all

LOVELY HORSE: GCHQ Program Monitored Hacker/InfoSec Community on Social Media – http://leaksource.info/2015/02/16/lovely-horse-gchq-program-monitored-hacker-infosec-community-on-social-media/

Russian report says 100 groups hit by $1bn cyber attack – http://www.ft.com/cms/s/0/3bca441c-b535-11e4-8362-00144feab7de.html#axzz3S5R7au5o

Scammers pushing fake AdwCleaner in active scareware campaign – http://www.net-security.org/secworld.php?id=17952&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29

 

Miscellaneous Infosec stories:

Hacking Goes Mainstream – http://www.inforisktoday.com/blogs/hacking-goes-mainstream-p-1811

Payment Security Initiatives Unveiled – http://www.databreachtoday.co.uk/payment-security-initiatives-unveiled-a-7913

Regulator Hints at New Cyber Guidance – http://www.bankinfosecurity.com/regulator-hints-at-new-cyber-guidance-a-7910

New Studies Proving Non Immediate Reaction of Antivirus Tools to Threats – http://securityaffairs.co/wordpress/33588/malware/non-immediate-reaction-antivirus.html

MasterCard, Visa to Introduce New Cybersecurity Enhancements – http://www.securityweek.com/mastercard-visa-introduce-new-cybersecurity-enhancements

What Makes Hacker News Fame? – http://goodattheinternet.com/2015/02/13/getting-to-the-hacker-news-front-page/

Swinney: Scotland’s cyber security strategy ‘will not involve monitoring the internet’ – https://www.holyrood.com/articles/feature/swinney-scotlands-cyber-security-strategy-will-not-involve-monitoring-internet

8 areas where CSOs and CIOs will converge in 2015 – http://www.csoonline.com/article/2884205/security-leadership/8-areas-where-csos-and-cios-will-converge-in-2015.html#tk.rss_all

Small Business Cyberattacks continuing to pose a threat – http://blanchardinfosec.blogspot.co.uk/2015/02/wk-10-small-business-cyberattacks.html

Li-Fi-like System Would Bring 100-Gbps Speeds Straight to Your Computer – http://spectrum.ieee.org/tech-talk/semiconductors/optoelectronics/fiber-to-the-living-room

ARE YOU LIVING IN A COMPUTER SIMULATION? – http://simulation-argument.com/simulation.html

Are you ready for EU laws on cyber security and data protection? – http://community.f-secure.com/t5/BSB-Blog/Are-you-ready-for-EU-laws-on/ba-p/66449

The UK Cyber Security Strategy – Update – http://blog.srm-solutions.com/the-uk-cyber-security-strategy-update/

 

Tools, Tips and How it’s done:

Security Think Tank: Use the Sony breach to plan for the worst – http://www.computerweekly.com/opinion/Security-Think-Tank-Become-business-leader-by-using-the-Sony-breach-to-plan-for-the-worst

Don’t let a breach trash your company’s reputation: look at Data Loss Prevention – http://www.techradar.com/news/world-of-tech/management/how-data-loss-prevention-can-avert-financial-and-reputational-ruin-1284528

Fingerprinting is an increasingly common yet rarely discussed technique of identifying individual Web users – http://www.networkworld.com/article/2884026/security0/browser-fingerprints-and-why-they-are-so-hard-to-erase.html

Risk reduction key to tackling cyber crime, says Stroz Friedberg – http://www.computerweekly.com/news/2240240425/Risk-reduction-key-to-tackling-cyber-crime-says-Stroz-Friedberg

Tor design proposals: how we make changes to our protocol – https://blog.torproject.org/blog/tor-design-proposals-how-we-make-changes-our-protocol

 

Miscellaneous Privacy stories

Euro ministers trade data for data protection – yes, your passenger records – http://www.theregister.co.uk/2015/02/13/mep_trade_data_for_data_protection_govts_pnr_pressure_takes_its_toll/

 

If you would like this report sent to your inbox each morning, email me at jon.fisher@srm-solutions.com

 

You can see all previous issues of this blog at http://blog.srm-solutions.com/

or www.jonfisherthoughts.co.uk

My Linkedin Profile is uk.linkedin.com/in/jonfisher99/

 

Posted 3 years ago on · Permalink