Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 04 February 2015

Written by SRM

4th February 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Information Disclosure Vulnerability Found in HP UCMDB –

UMass Breach Could Expose 14,000 to Fraud –

XSS, XFS, Open Redirect Vulnerabilities Found on –

Dangerous IE vulnerability opens door to powerful phishing attacks –

Information Disclosure Vulnerability Found in HP UCMDB –

LinkedIn’s Data Breach Settlement Moves Forward –

Millions of Android users at risk from adware, secretly lurking inside Google Play apps –


Miscellaneous Infosec stories:

Vulnerability of operational technology is a ticking time bomb –

Hey, Gmail me that cash you owe –

Lost chunk of pioneering Edsac computer found –

BLETCHLEY PARK: Alan Turing’s notes found being used as roof insulation in Hut 6 at Bletchley Park –

Is cyber-insurance an enterprise essential in a data breach age? –

Visa on Unique EMV Challenges in U.S. –

Universities: Prime Breach Targets –

Security Seen as Top Obstacle to Success in Application Economy: Report –

FBI put Anonymous ‘hacktivist’ Jeremy Hammond on terrorism watchlist –

Inside the prison system’s illicit digital world –

Modeling tools lets insurers write data breach risk ‘with more confidence,’ Willis Re says –

APTs Not Always as Advanced as You May Think: Sophos –


Tools, Tips and How it’s done:

Five questions every board should ask after Sony Pictures breach –

Creative Evasion Technique Against Website Firewalls –

Data Breach Aftermath –

How to Avoid Becoming a Victim of the Next Big Box Security Breach –

Facial recognition technology: How well does it work? –

Worlds Biggest Data Breaches –

Account Security 101: Passwords, Multifactor, Social Engineering, and You –

How to build threat intelligence for your business by creating a honeynet –

How a penetration test helps you meet PCI compliance guidelines –

Your Best Hacker Defence … Revealed –

The worst of the worst phishing scams –

How corporate spies access your company’s secrets –

2014 Top Security Tools –

How to Hack an ADT Alarm System –


Miscellaneous Privacy stories

Abuse of health data deserves JAIL, thunders ethics body –


If you would like this report sent to your inbox each morning, email me at


You can see all previous issues of this blog at


My Linkedin Profile is