Infosecurity News

FireEye: Over a Quarter of Attacks Bypassing Filters are APTs
Organizations in multiple sectors compromised in new tests

Malvertising Campaign Affects 1.8 Billion
Huffington Post, Yahoo News, AOL, TMZ and many others are affected by the infection, which makes use of the legitimate AOL ad network.

FBI: Sony Hacker IP Addresses Used ‘Exclusively’ By North Korea
Attackers got sloppy and revealed their true location, Comey claims

Chinese Police Buy Mobile Trojan to Spy on Locals
Wenzhou PSB blunder reveals $24,000 purchase

Bitstamp Hackers Steal $5 Million in Bitcoins
Operational wallets compromised as crypto-currency suffers first blow of 2015

Morgan Stanley Fires Employee After Data Leaked Online
Insider breach suspected after Pastebin post offers client log-ins for cash

Moonpig Flaw Leaves User Info Exposed for Over a Year
Researcher told card maker about problem in August 2013

Wifiphisher Cleverly Captures WPA Credentials
The automated tool mounts a social engineering campaign and a man-in-the-middle attack to capture credentials.

'Muslim Hackers' Strike Little-Known Bus and Train Timetable Site
Bristolians miffed by incongruous web defacement

South Korea Plays Down Worm Infection at Nuke Plant
USBs likely to have introduced “low risk” worm, says energy minister

Google Slammed for Disclosing Windows 8.1 Flaw
Project Zero’s strict 90-day deadline branded ‘irresponsible'

Hackers Gain Admin Rights with Windows 8.1 Flaw
An unpatched privilege escalation flaw in Windows 8.1 opens the door for network infiltration.

WTF????? Steam Chat Spreads Malware
The popular online gaming outlet has been infiltrated to push credential-stealing malware.

China Blocks Gmail as Censorship Noose Tightens
Activists urge tech giants to revoke certificates.

FBI on the Hunt for Cyber Special Agents
Feds want more tech experts in their crime-fighting ranks.

Backoff POS Malware Vets Targets via Surveillance Cameras
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.

Thunderstrike Mac Attack Achieves Persistence
The attack makes use of the laptops’ physical Thunderbolt interface to achieve persistent boot rootkits.

China Blamed for Operation Poisoned Helmand Attack on Afghan Sites
War torn country sucked into Beijing’s South Asian strategy

Anunak APT Gang Makes Off With $18 Million
Russian cyber-criminals target internal banking systems

(ISC)² Security Congress Opens Call for Speakers
Hot topics will include cloud security and mobility—and the intersection between them.



