Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 19 February 2015

Written by SRM

19th February 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Meet Babar, a New Malware Almost Certainly Created by France –

Tens of thousands of home routers at risk with duplicate SSH keys –

Cyber Espionage group attacking thousands of victims globally –

Lenovo sold laptop with pre-installed Superfish malware –

Got a Netgear wireless router? You’ve got a security problem –

Morgan Stanley breach probe shifts to hacker from fired employee: WSJ –

Bitcoin exchange shuts down after suspected password breach –

Update On Morgan Stanley Breach Probe –

Babar the Elephant: Another malware plague with a cute name –

25 billion Cyberattacks hit systems in Japan during 2014 –

Cisco – New Malware-Laced Spam Campaign Hits Corporate Users –

UMaine Data Breach Exposes Information on Hundreds of Students –

RedTube porn website spreads malware, via iFrame invisible to the naked eye –

Scammers using obituary notices to acquire new victims –

Malicious Emails Can Cause Android Email App to Crash: Researcher –

Vawtrak Banking Trojan Uses Windows PowerShell, Macros in Infection Routines –


Miscellaneous Infosec stories:

Swedish man pleads guilty to peddling Blackshades malware –

Banking Malware Redefined –

iBank: RBS, NatWest first UK banks to allow Apple Touch ID logins –

Vawtrack malware peddlers turn to malicious macros –

Software Advice: More than half of SMBs don’t have data breach plan –

End Users Causing Bulk Of Infosec Headaches –

The Average Face of a Hacker is Revealed by the Team at Secure Thoughts –

Hurd: Cyber security most pressing issues in U.S. ––cyber-security-most-pressing-issues-in-u-s-.html

Lawsuit: Anthem Was Warned Of Cyber Threat To Health Care Providers –

Kaspersky says his warnings about cyber threats have come true –

An Internet of Things that do what they’re told –

Social engineering the new norm for hackers, nation-states –

Cars Are Delivering Tons Of Driving Data To Manufacturers With Minimal Security And Even Less Transparency –

Carbanak Cybersecurity Threat Is Overhyped, Banking Groups Say –

Security In The Year 2020 –

Hey, does anyone know if Dilbert has upset Kim Jong Un recently? –

Visual hacking exposed –

Boards Not Regularly Briefed on Cyber-Security: Survey –

Upgraded version of encryptors spreading with help of social engineering –

Secure Domains: The DNS Security Debate –

Kaspersky says his warnings about cyber threats have come true –

Banking Malware Redefined –


Tools, Tips and How it’s done:

3 P’s to practice safe cyber security habits –

Intel Security: social engineering hacking the human OS –

Protect Yourself From Cyber Attacks –

Time for an Updated Cyber Risk Approach; BPI Data Breach –

Five Cyber Attacks that Made CISOs Rethink Security –

5 Ways Companies Can Avoid a Data Breach in 2015 –

Three Keys to a Successful Cybersecurity Defense Program –

The Web Application Stack – A Growing Threat Vector –

Protecting Your Personal Information and Identity After a Breach –


Android malware hijacks power button, empties wallet while you sleep –

Expert Advice: How to Up Your Cyber Security –

Anti-Virus: Applied Incorrectly? –

Preparing for a Data Security Breach –


Miscellaneous Privacy stories

It’s not just Samsung TVs — lots of other gadgets are spying on you –

Yet Another Report Showing ‘Anonymous’ Data Not At All Anonymous –

UK Police Forces Have Secret Facial Recognition Database Of 18 Million People, Many Innocent –


If you would like this report sent to your inbox each morning, email me at

You can see all previous issues of this blog at


My Linkedin Profile is