Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 04 March 2015

Written by SRM

4th March 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Phishers target victims of iOS device theft –

Spammers leverage DMARC to more successfully distribute ransomware –

Outbreak! Fake Amazon voucher offer seeds mobile malware attack –

Apple plans fix next week for newly uncovered Freak security bug – and

Hackers Breach Canadian ISP Rogers –

Venmo mobile payment service under fire for security carelessness –

phpMoAdmin MongoDB GUI affected by a Zero-Day Remote Code Execution flaw –

New gTLD Portals Taken Offline by ICANN Due to Security Flaw –

D-Link home routers affected by remote command injection flaw –

Cops take 7 months to file FIR in skimming fraud –

BitDefender bit trip slaps ‘valid’ on revoked certs –

Seagate NAS owners: hide it behind a firewall. Fast –

Natural Grocers Investigating Card Breach –

Bad movie: Hackers can raid networks with burnt Blu-Rays – and

Apple Pay: Fraudsters Exploit Authentication –

Crooks targeting call centers to further Apple Pay fraud –

Lossy Image Compression Can Hide Malicious Code in PDF Files: Researcher –


Miscellaneous Infosec stories:

Exposing the organized crime of tomorrow –

Security threats and the retail industry –

2015 Internet Security Trend Report –

Small, Medium Biz Uncertain on Breach Rules –

Data breaches, you say? Study says ID theft fell in 2014 –

Breach Victims Three Times Likelier To Be Identity Theft Victims –

Disappointing: Google Not Yet Requiring Phone Makers To Encrypt By Default –

Getting Breach Notification Right –

Costly Shift to New Credit Cards Won’t Fix Security Issues –

Lockheed sees shift in focus on infrastructure cyber security ––finance.html

Terrorists are leaving secret messages in porn and on websites like eBay and Reddit to communicate with each other and plan future attacks, new book claims –

CIOs and cyber security—a growing match –


Tools, Tips and How it’s done:

FREAK attack: What is it? Here’s what you need to know –

9 Dirty Tricks: Social Engineers’ Favorite Pick-Up Lines –

Firewall: The king of network security –

HTTP2 for front-end web developers –

6 tips to secure your Android device –

How Data Diets Can Improve Cyber Health –

Practice Makes Perfect: Making Cyber Hygiene Part of Your Security Program –

Internet Enumeration and Discover –


Communicating security concepts –

How to keep your email private with PGP encryption on your Mac –


Miscellaneous Privacy stories:

US court rubber-stamps dragnet metadata surveillance (again) –

Privacy? What privacy? EU’s draft law on your data is useless, say digital rights orgs –


Safeguarding Children and School E-Safety stories:

School’s e-safety measures praised –

[Note – requires answer to 3 questions before content visible] Study: Most people who witness online abuse ignore it –

Pupils warned over ‘sexting’ danger by police –


If you would like this report sent to your inbox each morning, email me at

You can see all previous issues of this blog at


My Linkedin Profile is