Infosecurity News

Amazon Follows Apple in Complying with China's Internet Crackdown
AWS users asked to cease any and all use of VPNs and other anonymization and encryption technologies.

Home Secretary Jets to Silicon Valley for Terror Talks
Rudd wants social media companies to step up action on terrorist content

Anthem Medicare Patients Hit with Breach
Medicare patients on its insurance roster may be affected by identity theft, thanks to a potentially malicious employee at a third-party company.

International Threat Intelligence and Info-Sharing Surges in 2017
Translations surge by triple digits, indicating robust information-sharing practices amid notable cybercrime incidents.

FireEye Dismisses Compromise Claims over #LeakTheAnalyst Operation
FireEye has refuted claims about compromise of its systems after an employee’s social media accounts were defaced.

Apple Removes VPNs from China App Store
Tech firm in a bind following government crackdown

Verticals Vary Widely When it Comes to Prioritizing Cyber
About 60% of finance/insurance execs consider cybersecurity a very high priority, vs 15% in hospitality and food.

Emotet Crimeware Adds Self-Propagation to the Mix
It can now pivot within a network to brute-force server accounts, and it harvests Outlook credential info to expand phishing net.

German Police to Bypass Encryption by Hacking Devices
Strategy would circumvent need to request encryption backdoors from providers

Global Operation Ends in Arrest of US DDoS Suspect
Australian, Canadian and US law enforcers worked on case for over two years

Tech Industry Calls for Open Immigration to Ease Skills Crisis
Cybersecurity sector already has big problems recruiting enough workers

#BHUSA: You’re Dealing with Supply Chain Security Whether You Like it or Not
Improving the standard of security best practices across your supply chain is very difficult

Majority of Global Orgs Lack Security Best Practices
For instance, four out of five companies don’t know where their sensitive data is located, or how to secure it.

Iranian Espionage Campaign Hinges on Beautiful (But Fake) Woman
A well-established collection of fake social media profiles for 'Mia Ash' build trust and rapport with potential victims.

Microsoft Turns Up $250,000 Bug Bounty for Windows
The program will pay out for remote code execution, elevation of privilege, or design flaws that compromise privacy or security.

#BHUSA: Panel – Fad or Future? Getting Past the Bug Bounty Hype
At Black Hat 2017 a panel of experts gathered to discuss the concept of bug bounty programs and share their experiences with running these within their respective companies

#BHUSA: Ransomware Profits Worth More than $25 Million (At Least)
Researchers say 2016 was "turning point" for ransomware and a year in which it became a multi-million dollar business

Google Uncovers Highly Targeted Spyware "Lipizzan"
Israeli firm pegged for developing tool, possibly for state use

Consumers Don't Trust Governments to Protect Data or Fight Cybercrime
Venafi study says majority disagree with encryption backdoors

#BHUSA: Phishing Psychology: Why Training Fails & Attacks Prevail
Karla Burnett, security engineer at Stripe, explored ‘phishing as a science’, shining a light on the psychology of phishing and why attacks continue to be successful



