Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Information Security Breach Report – 28 May 2015

Written by SRM

28th May 2015

Share this article

A round up of the most recent reports of information security breaches, infosec and privacy stories from around the world.


Breaches, Incidents and Alerts:

Banks’ Cyber Risks Compounded by ‘Commjacking’ of Wi-Fi Networks –

Hospital Data Breach Affects Thousands of Patients –

There’s a Moose loose aboot this hoose: Linux worm hijacks Twitter feeds for spam slinging –

Researchers Exploit Patched Windows Group Policy Bug –

POS Malware Nitlove Seen Spreading Through Spam Campaign –

Anon Coders take control of Kentucky GOP’s site; says expect more –

Florida releases personal data on 13,000 people, issues ‘fraud’ alert –

Thousands of UK Government PCs Exposed –

Update on Sterne Agee Group laptop breach –

Synology Fixes XSS, Command Injection Vulnerabilities in NAS Software –

Attackers Use Exploit Kit to Hijack Routers: Researcher –

Recent Breaches a Boon to Extortionists –

Beacon Health System notifies patients after phishing attack –

Scam alert: New Facebook scam wants to steal your login and your money –

Large-scale attack uses browsers to hijack routers –

Cybercriminals Use SVG Files to Distribute Ransomware –

Emerson Patches SQL Injection Vulnerability in ICS Product –


Password reset sites expose crackable PeopleSoft creds –

Unauthorized Access Vulnerability Fixed in Symfony –

LogJam flaw leaves 1,006 cloud applications vulnerable to attack –


Miscellaneous Infosec stories:

Hacker’s List leaks its secrets, revealing true identities of those wanting to hack –

INFOGRAPHIC: 8 Vulnerable Software Apps Exposing Your Computer to Cyber Attacks –

One More Reason for Companies to Report Data Breaches –

Five Takeaways from the First Cyber Insurance Case –

Number of identity theft victims ‘rises by a third’ –

CISOs turn to security awareness solutions to change poor employee behaviors –

2014 marked by rise in spear-phishing, social engineering – Federal Times –

Why insider threats are succeeding –

How your old cell phone can leak your company’s confidential info –

WordPress malware: Don’t let too-good-to-be-true deals infest your site –

PCI Council Launches Group to Help Improve SME Compliance –

Why The World’s Top Security Pros Are Furious About Exploit Export Rules –

Who and why is attacking companies in the Nordic Countries? –

Expert issues cyber-attack warning –

Data Centre Consolidation – A Cyber Security perspective –

Threat Intelligence Sharing Valued, But Many Not Doing it: Survey –

Bad Bots’ Impact on Mobile Web Traffic Rose in 2014: Research –

5 hackers who came over from the dark side –

Threat Intelligence –

The cost of a data breach has jumped 23 percent in two years –

Cyber-Attacks in 2015 Reveal Unknown Flaws in Flash, Windows –

Cyber attacks leave businesses wide open to lawsuits –


Tools, Tips and How it’s done:

Windows Functions in Malware Analysis – Cheat Sheet – Part 1 –

How to monitor XSS attacks and other security threats on your website, in real-time –

A primer on cyber security for online retailers –

Is your “secret answer” hard to guess? –

The Samaritan and The Smartphone – 7 Tips to Secure and Help Your Cell Phone Get Home –

Profile Of A Cybercrime Petty Thief –

In Pictures: Seven best practices for cloud security –

The Internet of Buggy Things –

Sniffing and tracking wearable tech and smartphones –

Tox, how to create your ransomware in 3 steps –


Miscellaneous Privacy stories:

Tracking Human Mobility using WiFi signals –

Subway riders’ smartphones could carry tracking malware –

A reminder that your Instagram photos aren’t really yours: Someone else can sell them for $90,000 –

Google’s Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky –

iPhone users’ privacy at risk due to leaky Bluetooth technology –


Safeguarding Children and School E-Safety stories:

Cyber bullying: Nip it in the bud –

Google Play revamps its Android apps’ age ratings –

Traditional Schoolyard Bullies Likely to Engage in Cyber-Bullying as Well –

Why hackers want kids’ personal information –

Child sex abuse live streams loophole to be closed –

Influence of Social Media on Teenagers –


If you would like this report sent to your inbox each morning, email me at

You can see all previous issues of this blog at


My Linkedin Profile is