Infosecurity News

NCA Warns £20 Million Dridex May Have Infected Thousands
Crime agency says it has already made one ‘significant arrest’

Governments See Cyber as a Confusing Weapon of War
Post-Stuxnet, cybersecurity has become a common weapon of war—but big obstacles remain when it comes to determining the rules of engagement.

Inside the City of LA's ISOC Project
The $1.86 million project is focused on centralizing and sharing threat intelligence and situation awareness.

Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm
Military-grade cyber-attacks have become the norm, necessitating a transition to better global cooperation by government.

Japan’s Cybercriminals Request Payment in Gift Cards
Trend Micro report highlights a criminal underground in its infancy

Cyber-Insurance Premiums Rocket
Insurers are also raising deductibles and limiting the amount of coverage to $100 million for high-risk industries, like retail and health insurance.

Blue Coat Expands Encryption Consortium
New members include eSentire, Gigamon, LogRhythm, ManagedMethods, Symantec, TopSpin Security and Trend Micro.

China Cuffs Hackers at Request of US Officials
Signs of greater co-operation between superpowers

Lyft Denies CTO Involvement in Uber Data Breach
Rival companies in legal tussle

Dow Jones Hacked, Affecting Thousands
Hackers manipulated a subscription system to steal personal contact information from August 2012 until at least July 2015.

Quarter of USPS Staff Clicked on Phishing Link in Audit
Exercise highlights importance of training and awareness programs

Webcam Voyeur Spied on Friends via RAT
Leeds man gets 20-week suspended sentence

UK Doctors Routinely Send Sensitive Patient Info by Text
Privacy fears after BMJ survey reveals dangers of BYOD

Moker RAT Has Unusual Characteristics
It can operate as a local access trojan, without a command & control server, receiving its commands locally, through a hidden control panel.

Samsung Pay Provider Hacked Secretly for Months
China suspected of grabbing IP from LoopPay

Malicious Android Adware Kemoge Roots Victim Devices
FireEye warns users not to click on suspicious links

Iran Threat Group Uses Fake LinkedIn Network to Target Victims
A network of fake LinkedIn profiles has been created to help the threat actors target potential victims through social engineering.

Cisco Snares Angler Cybercrime Group Worth $30m Annually
Talos group disrupts proxy network making a fortune from ransomware

VASCO to Acquire Silanis
Silanis provides electronic signature (e-signature) and digital transaction solutions used to sign, send and manage documents.

ID Theft Victims Remain Vulnerable Long After A Hack
Over a long-term period compromised identities are seen moving industries, likely in an attempt to defeat traditional fraud detection tools.



