Infosecurity News

#BlackHat:Critical ZigBee Flaw Compromises Smart Homes
Hackers could take control of all connected devices on the network, including door locks, motion sensors, HVAC and smart light bulbs/switches.

#BlackHat:Tesla S Gets the Hacking Treatment
Researchers could remotely turn the car on and off remotely, hit the brakes if the car is moving under 5 MPH, and shift it into neutral.

ICO hits Money Lender with £180K Privacy Fine
The Money Shop lost two servers full of customer data

Malicious Insider Threat Flagged Thanks to Windows Update Flaw
Context researchers claim config error is to blame

#BlackHat: Flash Zero-Day Weaponized in Record Time
Exploit kits integrated Hacking Team zero-days into their digital weapons in half the usual time.

#BlackHat: Smartwatches Present Varying Security Risks
Various brands of smartwatches present differing risks for data loss.

Accenture Acquires FusionX
The buy will help Accenture beef up its security consulting business.

#BlackHat: China's Terracotta VPN Used for Advanced Threat Anonymity
Terracotta is being used as a launch platform for APT actors, including the well-known Shell_Crew/DeepPanda group.

Macs Face Zero-Day Exploit and Firmware Worm
Thunderstrike 2 is a proof-of-concept firmware worm that’s the first to attack Macs.

39% of Companies Use Password-Only Authentication
62% view employees as their biggest threat.

FBI Skills Gaps Leave Field Offices Understaffed with Cyber Experts
Next Generation Cyber Initiative has problems, says OGI

Fresh Attack Vectors Found for Stagefright Android Flaw
In addition to MMS, devices can be infected using malicious video files that auto-play when opening a website, or via malicious apps or MP4 files.

1.5Mn Affected In Medical Information Engineering Hack
Several healthcare providers were affected by the attack, including local companies and national outlets, and the federal government.

SANS Announces Recruitment Fair for Top Infosec Candidates
Institute will train up 40 applicants ready to step into a job

Potao Trojan Served Up by Russian TrueCrypt Site
ESET report reveals five-year targeted attack campaign

Russian Cyber Underground Goes From Strength to Strength
Trend Micro report highlights increasing sophistication and professionalism

Russian APT Group Tosses a Hammer Around
Ingenious Hammertoss uses social media and steganography to hide Russian state-sponsored attackers' activities.

Anthem Breach: Symantec Points Finger at ‘Black Vine’ Group
Cyber-espionage group likely operates from China

Researchers Jump the Security Air Gap With a Feature Phone
Hack requires just a lightweight piece of malware

Google Debuts 'Bring Your Own Encryption'
Users can create and hold keys and prevent anyone, including Google, from accessing their at-rest data within the Google Cloud Platform.



