Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 02 February 2015

Written by SRM

2nd February 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Hackers tapped into Syrian opposition’s battle plans –

Did your BMW just download a security patch? –

Telephone sex: Beware of invites on WhatsApp –

Topface Cuts Deal With Hacker to Prevent Sale of Massive Email Database –

New “F0xy” Malware Uses Clever Techniques to Stay Hidden –

6,000 Digital Certificates Used to Sign Malware, PUAs in 2014: Kaspersky –

Terrorist cyber-attack ‘very close’, security expert warns –

Singapore Hacker Dubbed “The Messiah” Jailed Almost Five Years –

Researcher Calls Out Microsoft Over Outlook For iOS Security –

For alleged Russian hacker, a visit to Amsterdam is a costly trip –

Isle of Man transport chiefs apologize after security breach on pupils’ bus cards –

[WARNING – contains images which may offend] Hacking sex toys and dolls –

February fraud alert as hackers cash in on data harvested during Christmas shopping bonanza –

Internet love scams and cyber extortions up 7.4 per cent in 2014 –

Insider Threat Alert as Former Spokesman Allegedly Leaks Corporate Data –

Hackers Compromise Business IM Service HipChat –

How consumers are at risk of email terror scam –

Abu Dhabi Police issue warning on new cyber bank scam –

Top smut site Flashes visitors, leaves behind nasty virus –

Spam campaign relies on macros embedded in empty Word documents –

Critical DNS hijacking flaw affects D-Link DSL router – Announces Data Breach –


Miscellaneous Infosec stories:

2015: Top 5 application security trends to watch out for –

GitHub Raises Maximum Bug Bounty Payout to $10,000 –

Significant data breach class action ruling –

Cybercriminals are on the prowl –

The Gulf Between Perception and Reality of Cyber Threats is Widening, Says Cisco –

Google PRECOGS to pay researchers before they find software flaws –

The Top Two Cloud Computing Security Concerns of 2015 –

Google boffins PROVE security warnings don’t … LOOK! A funny cat! –

Security Experts Unite to Rewrite Proposed Cyber Laws –


Tools, Tips and How it’s done:

Online Trust Alliance offers tips for preventing data breaches –

Data Breaches: The Government’s Approach –

Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility –

Improving SSL Warnings: Comprehension and Adherence –

Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems –

How to handle a security breach –

Why Alice has a problem if Bob can’t encrypt –

Protect critical assets in the cloud by applying Operations Security –

Defending Against Spear Phishing, RAT Deployment and Email Tracking –


Miscellaneous Privacy stories

Cyberthreat sharing must include strong privacy protections, advocates say –

Telstra: we don’t collect the metadata the government wants now –

European Commission Wants Collection And Retention Of Passenger Data For Everyone Flying In And Out Of Europe –

IBM punts cryptotastic cloudy ID verification services –


If you would like this report sent to your inbox each morning, email me at


You can see all previous issues of this blog at


My Linkedin Profile is