Infosecurity News

Operation Lotus Blossom Sets Sights on Asian Military
Long-running, state-sponsored campaign stole info from South China Sea nations

Cisco Set to Cull China Execs – Report
Recent sales slump could be due to Beijing’s security concerns

China Launches Watering Hole Attacks on Political Dissidents
China is said to be using a new watering hole attack technique to monitor political dissidents.

Connected Home Threatens Service Provider Data
Energy management, interactive home devices, connected appliances and real time security allows unprecedented access to a variety of service providers.

Bank of England Disables Auto-Complete After Email Blunder
Comms boss accidentally sent sensitive info to a journalist last month

Stegoloader Malware Hides in Images on Legit Sites
Dell SecureWorks warns of stealthy info-stealing malware family

Confusion, Lack of Visibility Plague Security Policy
Less than a third of all respondents, 32%, claim they have full visibility into their global network.

Microsoft Kills the Ask Toolbar
Microsoft security tools will automatically detect and remove almost all versions of the ubiquitous bar from PCs.

Snapchat Adds Two-Factor Authentication for Extra Safe Sexting
Popular messaging app in bid to improve security

Wikipedia to Switch on HTTPS to Counter Surveillance Threat
Encrypted traffic will help protect users from censors and spies, says Wikimedia Foundation

Most Security Depts Blindly Trust Certificates and Keys
Most IT security professionals don’t know how to detect or remediate quickly compromised cryptographic keys and digital certificates.

OpenSSL Patches Logjam Flaw to Foil NSA Snoopers
Update will reject handshakes with DH parameters shorter than 768 bits

Big Data Installs Spark Security Concerns
The primary data types managed in big data systems include personally identifiable information, payment card info and national security intelligence data.

Europol Busts Operation Triangle in Six-Nation Raid
Major international cyber-ring pilfered $6 million in a complex phishing-man-in-the-middle-malware-money laundering scheme.

Anderson Report: UK Snooper's Charter 'Unnecessary'
Britain’s electronic surveillance laws are “incomprehensible to all but a tiny band of initiates,” and wholly “without statutory safeguards.”

CISOs Face 38% Increase in Security Costs Over Next Decade – Report
RAND Corporation claims investments in wrong areas could hinder teams

Big Data Could be Reason for Large-Scale Nation State Attacks
Sophisticated analytics could single out vulnerable individuals to spies, says Context

DDoS-for-Hire Costs Just $38 per Hour
It's cheaper and easier than ever to mount distributed denial-of-service (DDoS) attacks, and to great effect: They cost the victim $40,000 per hour.

Sophos Acquires Reflexion to Boost Email Security
The tie-up will add cloud-based email security to Sophos Cloud, and widen its customer footprint to include SMBs and more US accounts.

Russia Pegged for ‘Cyber Caliphate’ Attack on TV5Monde
Massive targeted attack pushed channels off air for several hours



