Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 09 February 2015

Written by SRM

17th February 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.

 

Breaches, Incidents and Alerts:

DDoS malware for Linux systems comes with sophisticated custom-built rootkit – http://www.csoonline.com/article/2881134/malware-cybercrime/ddos-malware-for-linux-systems-comes-with-sophisticated-custombuilt-rootkit.html#tk.rss_all

New phishing scam preys on fear of child sexual predators – http://www.pcworld.com/article/2877951/new-phishing-scam-preys-on-fear-of-child-sexual-predators.html

55th Largest Private Company In America Sent Millions To China Because An Email Told Them To – https://www.techdirt.com/articles/20150205/06583729917/55th-largest-private-company-america-sent-millions-to-china-because-email-told-them-to.shtml

Bootle man admits to cyber attacks on more than 300 websites – http://www.bbc.co.uk/news/uk-england-merseyside-31161778

Free Tax Software Is Bad – https://common-form.com/blog/free-tax-software-bad/

New Web flaw enables powerful social engineering attacks – http://www.computerworld.com/article/2835091/new-web-flaw-enables-powerful-social-engineering-attacks.html

E-Mail Phishing Scam Related to Anthem Data Breach – http://wabi.tv/2015/02/06/e-mail-phishing-scam-related-anthem-data-breach/

Southwest Ohio county hit by cyber scammers – http://www.chillicothegazette.com/story/news/state/2015/02/07/southwest-ohio-county-hit-cyber-scammers/23037193/

HSBC leak shows 3100 secret Turkish bank accounts – http://www.worldbulletin.net/world/154654/hsbc-leak-shows-3100-secret-turkish-bank-accounts

#SwissLeaks: Irish people who made settlements with Revenue feature in leaked secret files – http://www.independent.ie/business/irish/swissleaks-irish-people-who-made-settlements-with-revenue-feature-in-leaked-secret-files-30974918.html

Australian Tax Office probes high-profile Australians’ Swiss bank accounts after account data leak – http://www.theaustralian.com.au/news/australian-tax-office-probes-high-profile-australians-swiss-bank-accounts-after-account-data-leak/story-e6frg6n6-1227213823578?nk=7edcdafcf42bd13e541b155991b2afd3

Capita has been responsible for a breach of NHS employees’ personal data in Liverpool – http://www.nursingtimes.net/nursing-practice/specialisms/management/hr-firm-reviews-protocols-after-nhs-staff-data-breach-in-liverpool/5081951.article

Viewers duped by TV game shows – http://www.deccanchronicle.com/150209/nation-current-affairs/article/viewers-duped-tv-game-shows

Popular CS:GO website HLTV reports security breach – http://www.tweaktown.com/news/43399/popular-cs-go-website-hltv-reports-security-breach/index.html

 

Miscellaneous Infosec stories:

Make sure your company isn’t the next Anthem – http://www.csoonline.com/article/2881181/data-breach/make-sure-your-company-isn-t-the-next-anthem.html#tk.rss_all

ACMC stresses importance of cyber innovation – http://www.marinecorpstimes.com/story/military/2015/02/06/acmc-stresses-importance-of-cyber-innovation-at-onr-conference/22953233/

Why sheep could be fitted with WiFi sensors – http://www.bbc.co.uk/news/technology-31188251

UK government asks: How’s our hacking? – http://mashable.com/2015/02/06/uk-government-hacking/

How much is a retro-computer worth? – http://www.bbc.co.uk/news/business-31188257

11 percent of mobile banking apps includes harmful code – http://securityaffairs.co/wordpress/33212/malware/mobile-banking-apps-suspect.html

Cyber Security in 2015 – https://www.ssls.com/blog/cyber-security-2015/

Is Your Middle-Market Company Under Cyber Attack? – http://www.middlemarketgrowth.org/middle-market-company-cyber-attack/

GCHQ created ‘Lovely Horse’ to keep track of top hackers’ and security specialists’ blogs and tweets – http://www.computing.co.uk/ctg/news/2394090/gchq-created-lovely-horse-to-keep-track-of-top-hackers-and-security-specialists-blogs-and-tweets

Here’s why the cyber insurance industry is worth £55.6 billion – http://www.itproportal.com/2015/02/07/heres-cyber-insurance-industry-worth-55-6-billion/

Our Favourite Scammers – http://www.head-fi.org/t/701900/schiit-happened-the-story-of-the-worlds-most-improbable-start-up/5130#post_11289247

SEC Examines Response From Financial Advisory, Brokerage Firms to Cyber Threats – http://www.securityweek.com/sec-examines-response-financial-advisory-brokerage-firms-cyber-threats

Cybercriminals ‘often start out with minor thefts in online games’ – http://www.theguardian.com/technology/2015/feb/07/cybercriminals-often-start-minor-thefts-online-games

Robert E. Stroud: Concerted action will help thwart cyber attacks – http://gulftoday.ae/portal/4f1ba6f0-9c64-47be-b35a-eaa0addff6fd.aspx

Computer hacking evolves from malicious to heroic – http://college.usatoday.com/2015/02/07/computer-hacking-evolves-from-malicious-to-heroic/

Cybersecurity is a C-Level Activity – http://www.tenable.com/blog/cybersecurity-is-a-c-level-activity

At the third beep, the Atomic Clock will be 60 … imprecisely – http://www.theregister.co.uk/2015/02/08/feature_atomic_clock_60_years_old/

There’s a weird problem with the new Raspberry Pi computer – http://cio.economictimes.indiatimes.com/news/hardware/theres-a-weird-problem-with-the-new-raspberry-pi-computer/46161680

How a dozen ministers who tried to smuggle mobiles into Cabinet were caught when GCHQ went to brief them – http://www.dailymail.co.uk/news/article-2944602/How-dozen-ministers-tried-smuggle-mobile-phones-Cabinet-meeting-caught-GCHQ-went-brief-them.html

Don’t count on antivirus software alone to keep your data safe – http://www.theregister.co.uk/2015/02/09/dont_count_on_antivirus_alone_to_protect_your_data/

How cyberattacks are turning the industry around – http://cio.economictimes.indiatimes.com/news/digital-security/how-cyberattacks-are-turning-the-industry-around/46171725

 

Tools, Tips and How it’s done:

Making PGP Key Management Invisible So Johnny Can Encrypt – https://blog.whiteout.io/2015/02/06/making-pgp-key-management-invisible-so-johnny-can-encrypt/

10 steps to deter and defeat Cyber Hackers – http://forums.juniper.net/t5/Security-Now/10-steps-to-deter-and-defeat-Cyber-Hackers/ba-p/268452

Credentials –> Compromises | Rinse and Repeat – https://community.rapid7.com/community/metasploit/blog/2015/02/06/credentials–compromises-rinse-and-repeat

Risk Management Lessons from Anthem Hack – http://www.inforisktoday.com/interviews/risk-management-lessons-from-anthem-hack-i-2571

I TURNED CAPS LOCK ON FOR A WEEK AND EVERYONE HATED IT – http://fusion.net/story/42057/caps-lock/

7 Best WordPress Security Plugins – http://resources.infosecinstitute.com/7-best-wordpress-security-plugins/

Hacking pinterest android app – http://kiennt.com/blog/2014/03/28/hacking-pinterest.html

Cybersecurity Coordinator: Don’t ‘Waste a Crisis’ – http://www.databreachtoday.com/cybersecurity-coordinator-dont-waste-crisis-a-7892

TOP 2015 Cell Phone Spy Software Apps – http://spyearpiece.com/shop/

The Computer as a Communication Device – http://www.utexas.edu/lbj/archive/news/images/file/20_20_03_licklider-taylor-1.pdf

The Computer Science Handbook – http://www.thecshandbook.com/public_html/TheComputerScienceHandbook.pdf

All about Cloud Computing – http://www.cloudcomputingpatterns.org/

An Introduction to Virtual Memory – http://deathbytape.com/post/110371790629/intro-virtual-memory

Security Breach 101 – https://medium.com/@magoo/security-breach-101-b0f7897c027c

Investigating online dating fraud – http://www.net-security.org/secworld.php?id=17922&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29

Using Social Engineering Toolkit (SET) over the Internet – http://www.discoverykeywords.com/keyword-research-tools/using-social-engineering-toolkit-set-over-the-internet/

They’ve finally solved it: Schrödinger’s cat is both ALIVE AND DEAD – http://www.theregister.co.uk/2015/02/08/schrdingers_cat_really_is_alive_and_dead/

VPNs Dissolve National Boundaries Online, for Work and Movie-Watching – http://bits.blogs.nytimes.com/2015/02/08/in-ways-legal-and-illegal-vpn-technology-is-erasing-international-borders/

Temporary credit card numbers safeguard cyber-shoppers – http://www.freep.com/story/money/business/michigan/2015/02/08/temporary-credit-card-numbers/23086507/

Dissidents and dealers rejoice! Droid app hides your stash in plain sight – http://www.theregister.co.uk/2015/02/09/droidstealth/

 

Miscellaneous Privacy stories

Facebook can now stalk you everywhere on the internet – http://cio.economictimes.indiatimes.com/news/internet/facebook-can-now-stalk-you-everywhere-on-the-internet/46146234

British Tribunal Rules Mass Internet Surveillance by GCHQ Was Unlawful – http://www.csoonline.com/article/2880945/cyber-attacks-espionage/british-tribunal-rules-mass-internet-surveillance-by-gchq-was-unlawful.html#tk.rss_all

Slurping air passengers’ private details not great for privacy, concede EU data bods – http://www.theregister.co.uk/2015/02/06/eu_data_watchdogs_say_tracking_flight_passengers_is_a_breach_of_privacy/

Canary Watch Site Launches to Track Warrant Canaries – http://threatpost.com/canary-watch-site-launches-to-track-warrant-canaries/110813

7 Things To Love About reddit’s First Transparency Report – https://www.eff.org/deeplinks/2015/02/7-things-love-about-reddits-first-transparency-report

Samsung SmartTV models transmit voice, and more, to a third-party service – http://securityaffairs.co/wordpress/33238/digital-id/samsung-smarttv-privacy-issue.html

Iggy Azalea hits out at Papa John’s Pizza over information leak – http://www.digitalspy.co.uk/showbiz/news/a627556/iggy-azalea-hits-out-at-papa-johns-pizza-over-information-leak.html#~p3TosNQ9dWDwNT

 

 

If you would like this report sent to your inbox each morning, email me at jon.fisher@srm-solutions.com

 

You can see all previous issues of this blog at http://blog.srm-solutions.com/srm-breach-reports/ or www.jonfisherthoughts.co.uk

My Linkedin Profile is uk.linkedin.com/in/jonfisher99/