Infosecurity News
Email Attackers Switch to ‘Blitzkrieg’ Tactics to Maximize Impact
Agari TrustIndex reports cyber gangs are increasingly 'weaponizing' their malicious emails with sophisticated threats

Iran's Operation Saffron Rose Points to Increasing Cyber-espionage Sophistication
FireEye has identified a hacking group inside Iran that is behind Operation Saffron Rose, one of the first espionage campaigns from Iran that went after US aerospace companies and Iranian opposition inside and outside of the country.

NSA Accused of Installing Backdoors on US Tech Exports
Latest Snowden revelations hit new spy agency head Mike Rogers’ attempts to promote greater transparency

Fresh Phishing Scam Aims at Google Account Passwords
Hackers have been stealing Google account passwords in a new and better crafted phishing attack that is hard to catch with traditional heuristic detection, warns Bitdefender. A particularity in how Google Chrome displays data using Uniform Resource Identifiers (URIs) makes Chrome users most vulnerable, however the phishing attack also targets Mozilla Firefox users.

HMRC Acted Unlawfully in Hiding Details of Spyware Investigation
Judge rules in favor of Privacy International after criticizing HMRC department for failing to reveal details of an investigation into British business Gamma International. The Andover-based firm was accused of breaking export restrictions.

Point-of-Sale Malware Has Become Highly Sophisticated
Point-of-sale (PoS) systems that process debit and credit cards for retail stores and restaurants are in the dubious limelight these days thanks to high-profile hacks at Target and elsewhere. But PoS malware has been lurking around for a very long time, evolving and getting smarter.
Interview: Trey Ford, Global Security Strategist, Rapid7
If you know of Trey Ford, it will probably be as former General Manager at Black Hat. But as of January 2014, he became global security strategist at Rapid7. At Infosecurity Europe, Infosecurity editor Eleanor Dallaway sat down with him to talk about the current threat landscape and the pros and cons of the information security industry.

Cybercrime Boss Offers Ferrari Prize for Most Lucrative Online Attack
New video highlights the problem legitimate organizations have in recruiting the best talent

Heartbleed Bug Hits Industrial Control Systems
The Heartbleed saga continues, this time with an industrial control element. ICS vendor Digi International has identified five products that are vulnerable to the bug, where attackers could obtain user credentials and cryptographic keys used to access the devices.

Bitly Compromised; Users Warned to Reset Accounts
Cyber-danger can be found in many places, including, apparently, basic social networking utilities. Link-shortening service Bitly has warned its users that their account credentials may have been compromised; specifically, users’ email addresses, encrypted passwords, API keys and OAuth tokens.

Mobile Ransomware Gives Android Porn Fans the Willies
Reveton-like malware tricks users into downloading from insalubrious sites. Experts say it could presage a more sophisticated campaign targeted at mobile users.

Spammers Target Mobile Messaging Users in New Malware Blitz
Kaspersky Lab reports increase in spam aimed at Whatsapp, Viber and Google Hangouts users

Saudi Aramco Cyber Attacks a ‘wake-up call’, Says Former NSA Boss
Gen. Keith Alexander warns of threat to CNI systems, but experts question whether 2012 incident was a game changer.

World’s Most Advanced Hackers are in Russia and Eastern Europe
At Infosecurity Europe 2014, Eleanor Dallaway caught up with Ross Brewer, vice president and managing director for international markets, and Mike Reagan, CMO at LogRhythm to talk insider threats, and the global threat landscape…

Japan and EU Shake Hands on Cyber Security Agreement
Leaders met in Brussels this week, agreeing to a formal cyber dialogue and to share knowledge going forward

Cloudy with a Chance of Data Leakage: Dropbox Cops to Shared Links Flaw
Using file sync and share applications can put sensitive personal information, and potentially sensitive corporate information, at risk should a vulnerability be found. Unfortunately, Dropbox has just admitted such a flaw.

ISF: Companies Should Promote Secure Behavior, Rather than Awareness Alone
Organizations have spent millions over recent decades on information security awareness activities, but a recent report asserts that such an approach has flaws.

MI5: Spies and Thieves are Targeting & Grooming Insiders
MI5 has warned British corporate chiefs that foreign intelligence agencies are targeting IT workers within big organisations in a bid to gain privileged access to sensitive data.

Big AOL Data Breach to Blame for Spam Spike
AOL has been hacked, resulting in the compromise of “information regarding a significant number of user accounts.” The data breach is to blame for a large spam/spoofing spike targeting its users.

Infosecurity Europe 2014 > Case Study: Defending Data in the Public Eye
David Jones, head of information security at the BBC, explains how the Corporation protected its data from adversaries including the Syrian Electronic Army.



