Information Security Breach Report – 21 May 2015

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.

 

Breaches, Incidents and Alerts:

New Router Attack Displays Fake Warning Messages – http://blog.trendmicro.com/trendlabs-security-intelligence/new-router-attack-displays-fake-warning-messages/

Data breach involves Southwest Licking student info – http://www.newarkadvocate.com/story/news/local/pataskala/2015/05/20/southwest-licking-schools-data-breach/27655485/

Android stock browser vulnerable to URL spoofing – http://www.csoonline.com/article/2924996/vulnerabilities/android-stock-browser-vulnerable-to-url-spoofing.html#tk.rss_all

Cps Experiencing Data Breach After Sharing 4,000 Students Personal Information – http://www.styrk.com/posts/cps-experiencing-data-breach-after-sharing-4-000-students-personal-information

Tech experts urge cyber ‘vigilance’ after ATW website hacked Tuesday – http://fox11online.com/2015/05/20/tech-experts-urge-cyber-vigilance-after-atw-website-hacked-tuesday/

Fee website used by Weber School District hacked – http://www.standard.net/Education/2015/05/20/School-fee-website-hacked.html

Data Belonging To 1.1 Million CareFirst Customers Stolen In Cyber Attack – http://www.forbes.com/sites/katevinton/2015/05/20/data-belonging-to-1-1-million-carefirst-customers-stolen-in-cyber-attack/

Say hello to the latest cyber superbug – http://www.businessspectator.com.au/article/2015/5/21/technology/say-hello-latest-cyber-superbug

‘Venom’ Security Bug Allows Network Intrusion via the Cloud – http://thevarguy.com/network-security-and-data-protection-software-solutions/052015/venom-security-bug-allows-network-intrusion-

Crypto Ransomware Seeks Dominance as New Threats Emerge to Encrypt and Destroy Files – http://www.spywareremove.com/crypto-ransomware-dominance-threats-encrypt-destroy-files.html

Hard-coded credentials placing dental offices at risk – http://www.csoonline.com/article/2923887/vulnerabilities/hard-coded-credentials-placing-dental-offices-at-risk.html#tk.rss_all

 

Miscellaneous Infosec stories:

Apple Fixes Security Bugs With First Update for Watch OS – http://www.securityweek.com/apple-fixes-security-bugs-first-update-watch-os?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29

Cracking down on poor cyber hygiene – http://fcw.com/articles/2015/05/20/cracking-down-on-cyber.aspx

Phishing and Malware Cyberattacks are Directed at Law Firms (and Clients) – So it’s Time to Train Employees – http://abovethelaw.com/2015/05/phishing-and-malware-cyberattacks-are-directed-at-law-firms-and-clients-so-its-time-to-train-employees/

FTC looks ‘favorably’ on firms that report data breach – http://thehill.com/policy/technology/242703-ftc-looks-favorably-on-firms-that-report-data-breach

Cyber thieves targeting the Internet with more sophistication – http://wivb.com/investigative-story/cyber-thieves-targeting-the-internet-with-more-sophistication/

EFF Asks Court To Reconsider Ruling That Would Make Violating Work Computer Policies A Criminal Act – https://www.techdirt.com/articles/20150515/07365131013/eff-asks-court-to-reconsider-ruling-that-would-make-violating-work-computer-policies-criminal-act.shtml

E-paper display gives payment cards a changing security code – http://www.csoonline.com/article/2924958/data-protection/epaper-display-gives-payment-cards-a-changing-security-code.html#tk.rss_all

DDoS attacks increase and methods changed in Q1 2015, report says – http://www.scmagazine.com/q1-report-shows-uptick-in-low-bandwidth-ddos-attacks/article/415876/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SCMagazineNews+%28SC+Magazine+News%29

This 9-Year-Old CEO Knows more about Cyber Security Than You Do – http://tech.co/reuben-paul-9-year-old-ceo-cyber-security-2015-05

Google changes Chrome extension policy amid security concerns – http://searchsecurity.techtarget.com/news/4500246699/Google-changes-Chrome-extension-policy-amid-security-concerns

Cyber risk now seen as a top 10 global threat to businesses – http://www.supplymanagement.com/news/2015/cyber-risk-now-seen-as-a-top-10-global-threat-to-businesses

How much money do cyber crooks collect via crypto ransomware? – http://www.net-security.org/malware_news.php?id=3042

 

Tools, Tips and How it’s done:

5 Easy Ways to Avoid Getting Hacked at ATMs – http://time.com/3890898/atm-security/

Logjam vulnerability – what you need to know – http://blog.lumension.com/10143/logjam-vulnerability-faq/

All Roads Lead to the Need to Strengthen Your Security Operations Center? – http://www.csoonline.com/article/2925114/security0/all-roads-lead-to-the-need-to-strengthen-your-security-operations-center.html#tk.rss_all

Legally Blind and Deaf – How Computer Crime Laws Silence Helpful Hackers – https://hackerone.com/news/legally-blind-and-deaf

Hacker launches ransomware rescue kit – http://www.theregister.co.uk/2015/05/21/ransomware_rescue_kit/

What combination locks teach us about encryption weakness – http://www.csoonline.com/article/2922372/security-industry/what-combination-locks-teach-us-about-encryption-weakness.html#tk.rss_all

 

Miscellaneous Privacy stories:

Tribunal finds no breach of privacy law by employer using Facebook to investigate misconduct claims – http://www.smartcompany.com.au/legal/47015-tribunal-finds-no-breach-of-privacy-law-by-employer-using-facebook-to-investigate-misconduct-claims.html

Americans’ Attitudes About Privacy, Security and Surveillance – http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/

 

Safeguarding Children and School E-Safety stories:

Online safety: If you want something done right, do it yourself – http://phys.org/news/2015-05-online-safety.html

Raising cyber kids in GenNBN – http://www.nbnco.com.au/blog/raising-cyber-kids-in-gennbn.html

Suspend, blacklist cyberbullies – http://www.odt.co.nz/news/schools-news/342761/suspend-blacklist-cyberbullies

 

If you would like this report sent to your inbox each morning, email me at jon.fisher@srm-solutions.com

You can see all previous issues of this blog at http://blog.srm-solutions.com/

or www.jonfisherthoughts.co.uk

Posted 3 years ago on · Permalink