Months After Federal Warnings About Russian Software, Local Governments Respond
Local governments do not have federal secrets of importance to the Russians.” Hamilton says he is much more concerned with cyberthreats to critical infrastructure like water, gas and electricity. […] “Local governments manage traffic; they manage stormwater; they conduct emergency management. The impact of a disruption there is loss of life,” Hamilton says.
Kaspersky to appeal DHS ban in federal court
DHS issued a binding directive in September banning federal agencies from using Kaspersky Lab products, citing the potential security threat that could come from working with the Moscow-based firm. The agency claimed the decision was based on “open source” data — information already in the public view, like newspaper accounts and congressional hearings.
The C-Suite Needs Cyber Bootcamp
Not only are financial executives highly likely to become a target, the risk associated is greater. Financial executives in particular have access to the bank account as well as critical business intelligence about pending deals and that could easily be leveraged from an extortion perspective. […] Despite the fact that c-suite executives are frequent targets, organizations often exclude them from cyber security training or under-prepare them for an attack.
The Financial Cost of a Data Breach to Your Business
Although it may not hit you right away, your company’s damaged reputation is likely to cost you the most in the long run. According to Security Metrics, many businesses have documented losing up to 40% of their revenue from customers after a breach. Whichever way you look at it, customers losing faith in your brand will cost you financially, and it may take years to rebuild their trust.
Why incident response is the best cybersecurity ROI
Most organizations will suffer one or more major security incidents in which an attacker has administrative control over the IT systems that enable business processes and storing critical data, according to the Microsoft Incident Response Reference Guide. Business leaders and IT executives aren’t expected to entirely prevent cyber attacks, but they’re expected to react immediately and manage the fallout.
Black Book: 84% of hospitals lack a dedicated security leader
“These results may not be all that surprising, however, considering some of the new solution providers are offering passive monitoring for their networks and the upfront costs have been dramatically slashed,” Brown said. Still, a whopping 92 percent of the C-suite executives surveyed said cybersecurity and the threat of data breach are not major talking points with their board of directors.
AI in 2018: Doctors, defence and decision-making
Adam Hunt, Chief Data Scientist, RiskIQ, said: “Threat actors will increase their adoption of Adversarial Machine Learning to evade detection by infrequently trained machine learning models. Machine learning models will need to evolve quickly to keep up with these threats by incorporating instance based approaches.”
Global Managed Cyber Security Services Market to touch US$ 63,524.5 Million revenue by 2026 – TMR
Increasing enterprise mobility, adoption of Internet of Things (IoT) and the rise in Bring Your Own Device (BYOD) trend is driving the need for managed cyber security solutions as well as information security solutions. However, handling of sensitive and critical information of the company by the outsourced cyber security service provider can lead to the risk of important information or confidential documents getting leaked. This is one of the factors hampering the growth of the global market for managed cyber security services.
Twitter begins enforcing new anti-hate speech rules
In particular, the new rules ban violent threats or even “wishing for serious physical harm.” For now, the most prominent accounts that have been removed for running afoul of these rules were three affiliated with a far-right United Kingdom group known as “Britain First.” […] “Our hateful conduct policy and rules against abusive behavior prohibit promoting violence against or directly attacking or threatening other people on the basis of their group characteristics, as well as engaging in abusive behavior that harasses, intimidates, or uses fear to silence another person’s voice,” the company wrote in a Monday blog post.
Uber Used CIA-Trained Staff to Spy on Rivals
A 37-page letter made public by a federal court as part of a trade secrets case reveals that Uber assembled an intelligence team in the summer of 2016. […] But it suggests that Uber’s own spies, some of whom were trained by the CIA, were busy intercepting phone calls between rivals and lawmakers, and hacking other firms for details about drivers. The BBC notes that Uber says it hasn’t substantiated all the allegations, but the claims could bring criminal probes in 2018.
More evidence emerges of North Korea targeting cryptocurrency industry
One report, from Dell Technologies’ SecureWorks, describes a spear phishing campaign whose lure emails feature a fake job opening at a cryptocurrency company. Meanwhile, Korean and global news outlets have reported that South Korea’s National Intelligence Service spy agency suspects that North Korea is responsible for hacking attacks on one of its country’s cryptocurrency exchanges.
Kremlin’s New Cyber Weapons Spark Fears and Fantasies
Panic has spread across the Western world: Madrid is worried about Russian-controlled “manipulation” of the Catalan crisis, while British analysts see signs of Russian influence in the Brexit vote and concerns are growing in Germany and France over possible interference in various polls. The Kremlin, meanwhile, has dismissed the accusations as “hysterical” and “Russophobic,” insisting there is no hard evidence for any of the charges.
UK sees growing threat from Russian propaganda, cyber-attacks
[Threats] from Russia included from unconventional warfare such as disinformation campaigns to the dangers posed from an increase in its military capability in the North Atlantic and in Eastern Europe. “We know that the Russian threat is definitely intensifying and diversifying,” Sedwill said. “The Russian attitude has worsened more generally towards the West and that seems set to continue.”
The Palestinian Authority Is Using a New Cyber-Crimes Law to Crack Down on Dissent
“They were much, much more concerned about my YAS activities and my relationships” with other activists, a weary Amro said about his interrogators from the Palestinian intelligence and the Orwellian-named Preventive Security Forces. “They accused me of activities that gave the Israelis an excuse to close areas and of provoking settlers.”
No hack needed: Anonymisation beaten with a dash of SQL
Governments should not release anonymised data that refers to individuals, because re-identification is inevitable. That’s the conclusion from Melbourne University’s Dr Chris Culnane, Dr Benjamin Rubinstein and Dr Vanessa Teague, who have shown that the Medicare data the Australian government briefly published last year can be re-identified – trivially. […] The researchers explained that there are simply too many facts in a data release to properly protect individuals’ data.
“There will be a [Senate] vote” to reinstate net neutrality, Schumer says
Legislation to reverse the repeal “doesn’t need the support of the majority leader,” Schumer said during a press conference Friday, according to The Hill. “We can bring it to the floor and force a vote. So, there will be a vote to repeal the rule that the FCC passed.” […] A CRA vote lets Congress “undo regulations with a simple majority,” without the possibility of a filibuster, as a Washington Post story said in February. Sen. Ed Markey (D-Mass.) announced a plan to file the CRA resolution last week.
Canada’s spies are on the verge of new offensive powers for cyber attacks
The Communications Security Establishment (CSE) relies on secretive legal interpretations that legitimize bulk data collection and mass surveillance activities, and those powers will be dramatically expanded if the government passes bill C-59, the report said. The bill would mark the first time the agency would be legally authorized to launch offensive cyberattacks and sabotage since its creation in 1946[.]
The evolution of extortive crime
Like businesses, criminals have long had the ability to diversify and adapt to changes in their operating environments. They continually learn new techniques and acquire new tools to minimise the risks they face while maximising their potential rewards. Innovation and evolution have accelerated as digitalisation and increased connectivity have created myriad tools and opportunities for tech-savvy criminals.
Threat Modeling the Internet of Things: Modeling Reaper
Researchers are tracking Reaper, even though it hasn’t launched any attacks yet. Let’s hope it’s like Conficker—an original virus/botnet that at its peak enslaved 10 million Windows boxes, but was never activated. The discovery of Reaper in September 2017, in between the fourth and fifth installments of this series on Threat Modeling IoT, allows us to conduct an interesting thought experiment. Could threat model have prevented Reaper?
Ajit Varadaraj Pai of the #FCC has been #DOXED! #OpNetNeutrality #OpDefendTheNet
The full text was on Pastebin, but has since been removed. The hack was a part of #OpNetNeutrality / #OpDefendTheNet and was done by Anonymous Intel Sec on Facebook and Twitter; an Anonymous sec as part of a bigger Anonymous Belgium and Europe on social media platforms. Included in the hack with personal information about the 44 Chairman of the United States FCC, are 33 street addresses, 10 phone numbers, emails, social media accounts, and 42 family members or associates.
Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners. © 2017 Critical Informatics, Inc. All rights reserved.