Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 09 March 2015

Written by SRM

9th March 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any website’s domain name –

Stolen Patient Records in Calif. Mean Possible Data Breach –

Cybercriminals Use Help Files to Distribute Ransomware –

DDoS attack on feminist blog backfires on International Women’s Day –

Email Spoofing Flaw Found in Google Admin Console –

University of Chicago suffers data breach –

Point-of-Sale Vendor NEXTEP Probes Breach –

Hackers target passwords and loyalty cards –

Two New POS Breaches Lead to Fraud –

Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner –

Fake “Flash Player Pro” update delivers password-stealing Trojan –

SF General investigates security breach involving patient records –

IoT’s dark side: Hundreds of unsecured devices open to attack –

BILLION email address spam scam: Feds collar two blokes, hunt another – and

Pupils’ personal data shared online in “serious breach” of data protection –

WhatsApp users duped by cyber scammers –

Dozens arrested in cybercrime ‘strike week’ –


Miscellaneous Infosec stories:


BACK OFF, spooks: UK legal hacking code should be ‘resisted at all costs’ says lawyer –

PHI Data Breaches Up 25% –

To Counter Systemic Cyber Threats, Share Information –

No more weak links – elite law firms unite to fight cyber security threat –

Making microchips part of credit card culture –

Cyveillance Weekly Trends Report – March 6, 2015 –

Hillary’s Secret Email Was a Cyberspy’s Dream Weapon –


Tools, Tips and How it’s done:

Security in the Application Economy –

5 common Wi-Fi attacks – and how to defend against them –

Big Data, Surveillence, and Social Engineering –

Web protection: A flu mask for the internet –

How Malware Generates Mutex Names to Evade Detection –

Internet Explorer Zones and Stealing Autologon Hashes –

Protecting yourself and your mobile in an ever connecting world –


How PayPal uses deep learning and detective work to fight fraud –

A website that irrevocably deletes itself once indexed by Google –

Guide to HTTP Header Configuration –

Researchers hack NSA’s website with only $104 and 8 hours of Amazon’s cloud computing power using the #FREAK vulnerability –

Bootkit Disk Forensics – Part 1 –

The Tricky World of Securing Firmware –

Give biometrics the FINGER: Horror tales from the ENCRYPT –

Mind-reading DNS security analysis offers early warning for APT attacks –


Miscellaneous Privacy stories:

‘CCTV in all homes’: Police chief’s domestic security call attacked by privacy groups –

Privacy glasses that let you go incognito in a world filled with facial recognition software –


Safeguarding Children and School E-Safety stories:

Outlawing cyberbullying: Bill would prohibit online mischief by students –

16pc of children victims of cyber bullying –

5 Reasons You Should Never Cyber-Shame Your Kids –

Teacher Accused Of Using Social Media To Cyberbully A Student –

Pupils’ personal data shared online in “serious breach” of data protection –


If you would like this report sent to your inbox each morning, email me at

You can see all previous issues of this blog at


My Linkedin Profile is