Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 01 April 2015

Written by SRM

1st April 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Energy companies infected by newly Laziok trojan malware –

Hackers attack the energy industry with malware designed for snooping –

Data Breach at Westland Middle School Releases Student Locker Combinations –

Fake Pirate Bay site pushes banking Trojan to WordPress users –

Mozilla Patches Critical Vulnerabilities With Release of Firefox 37 –

Google Says 5% Of Visitors To Its Sites Have Ad Injectors Installed –

Ethiopian Government Uses Cyber-Attacks to Restrict Media Houses –

Indiana Government Website Targeted By Cyber Attacks –

POODLE vuln dogs Australian consumer modems –

More details on the French Lick Resort payment card breach –

China’s CNNIC issues false certificates in serious breach of crypto trust –

Lebanese cyberespionage campaign hits defense, telecom, media firms worldwide –

Cisco wipes its memory from susceptible-to-Row Hammer list –

Cyber Crime: Fake email from the boss is a popular fraud –

Syrian Electronic Army hacks hosting companies to fight the IS –

NUI Galway examining possible data breach –

Oregon’s Department of Administrative Services Suffers Data Breach –

Cyber attack hits Fairleigh Dickinson; Rutgers works to restore internet service –

Nite Ize Inc. Submits Data Breach Notification –

Colonial Car Wash credit breaches investigated –

British Airways Executive Club members warned of hacked accounts –


Miscellaneous Infosec stories:

National Risk Register for Civil Emergencies – 2015 edition –

Hacked uni’s admins hand ID theft prevention reward to data burglars –

Would financial incentives stop the rise of cybercrime? –

Why We Need Holistic Context-based Security Decisions –

mDNS Can Be Used to Amplify DDoS Attacks: Researcher –

FFIEC: New Threats to Banks? –

We can’t address cyber threats in isolation”, chief lawyers of top companies agree –

30 percent of practitioners say they would pay cyber extortionists to retrieve their data –

Let’s send an unencrypted thumb drive via mail. What can possibly go wrong, right? –

The CFO’s Role in Cyber Security –


Tools, Tips and How it’s done:

How to stop attackers getting a toehold on the corporate network –

Intro to E-Commerce and PCI Compliance – Part I –

Phishing Attacks: Not Sophisticated, but Successful –

A Fresh Look at Application Security –

You Are What You Keep: Data Breach –

How to build physical security into a data center –

Put those smartphones away: Google adds anti-copying measures to Drive for Work –

Report Spells Out Medical Device Risks –

Inception: DMA Attack Against Linux, Windows, and Mac –

How Would I?… Inside the devious mind of a security professional –


Miscellaneous Privacy stories:

Periscope’s first privacy foul-up –


Safeguarding Children and School E-Safety stories:

Osgodby Primary School in UK first on cyber-security –

Record A Teacher Bullying A Student? That’s A Suspension –

Computer whizz kids learn how to stay safe online –

Cyber Awareness: A Teen’s Perspective –

Teen cyberbullying victims shun online help, UniSA study finds –


If you would like this report sent to your inbox each morning, email me at

You can see all previous issues of this blog at


My Linkedin Profile is