MCySec Newsfeed Archive

June 2014:

6/24/14
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

6/22/14
Hedge-Fund Hack Is Part of Bigger Siege, Cyber-Experts Warn

6/17/14
Shortage of Cybersecurity Professionals Poses Risk to National Security

6/17/14
Report: Chinese phone comes preloaded with spyware

6/16/14
How ISIS Games Twitter

6/16/2014
Hackers ransom Domino’s customer data (including favourite toppings) for €30,000

6/11/2014
Cyber terrorism: Danger of strategic attacks increasing

6/11/2014
Hagel authorized release of cyber warfare plans to China

6/10/2014
Chinese wireless gear in South Korea telecom network boosts cyber attack threat for U.S. troops

6/10/2014
The Emerging Science of Computational Anthropology

6/10/2014
US national agency computers misused to mine bitcoins

6/9/2014
14-Year-Old Kids “Hack” Into ATM Using Default Security Code

6/8/2014
Computer passes ‘Turing Test’ for the first time after convincing users it is human

6/7/2014
How Bitcoin Helps Afghan Girls Achieve Financial Freedom

6/5/2014
PayPal Getting Bitcoin? eBay CEO Says Digital Currency Integration Coming ‘Very Soon’

6/3/2014
How Bitcoin could become a super-sized Wayback Machine

6/3/2014
Is hacking the future of finance?

6/2/2014
Powerful computer virus could start emptying bank accounts in a fortnight unless Australians protect against attack now, warns Australian Federal Police

6/2/2014
U.S. indicts notorious Russian hacker

May 2014

5/29/2014
Iranian hackers ‘friended’ four-star U.S. admiral on Facebook to steal data using social media espionage

5/29/2014
We Just Got 100 Million Times Better at Teleporting Data

5/29/2014
Rush a Light Wave and You’ll Break Its Data, say NIST Scientists

5/28/2014
SENATE DEFENSE BILL UNEARTHS NSA ‘SHARKSEER’ PROGRAM

5/27/2014
Privacy under attack: the NSA files revealed new threats to democracy

5/27/2014
The High-Tech—and Very Low-Tech—Tactics of Corporate Espionage

5/26/2014
Congress divorces NIST and NSA

5/23/2014
Sophisticated Google Drive Phishing Scam is becoming popular

5/23/2014
Darpa Turns Oculus Into a Weapon for Cyberwar

5/23/2014
No New Cybersecurity Regs Coming from Feds

5/23/2014
Robert Gates: Most Countries Conduct Economic Espionage

5/21/2014
Ebay user database breached, requiring password reset

5/20/2014
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana

5/20/2014
U.S. utility’s control system was hacked, says Homeland Security

5/19/2014
5 in China Army Face U.S. Charges of Cyberattacks

5/19/2014
Caught Red-Handed

5/19/2014
U.S. accuses China of cyber spying on American companies

5/19/2014
US charges Chinese cyberespionage operators, inspiring retaliatory actions

5/19/2014
NIST launches external review in wake of NSA scandal

5/17/2014
FBI Wary Of Possible Russian Spies Lurking In U.S. Tech Sector

5/15/2014
How the Elderwood Platform is Fueling 2014’s Zero-Day Attacks

5/15/2014
Anti-gangster law invoked to score stiff sentence against two-bit cyberthief

5/14/2014
US Navy funds morality lessons for robots

5/14/2014
$10 Of Free Bitcoin For College Students

5/13/2014
Iranian Hackers Targeted Defense Workers and Political Dissidents

5/13/2014
Iranian Hackers Target US Defense Contractors

5/12/2014
DHS: Watch out for Introverts, Egotists, Passive Aggressive Colleagues

5/12/2014
Can big data predict the next cyber attack?

5/11/2014
Ex-FBI official: Intel agencies don’t share cyber threats that endanger companies

5/9/2014
Tor Is Being Used as a Safe Haven for Victims of Cyberstalking

5/8/2014
How Al-Qaeda Uses Encryption Post-Snowden (Part 1)

5/5/2014
New Chinese Supercomputer Goes Beta (Tianhe 2 Ahead Of Schedule And On Budget)

5/3/2014
As NSA builds arsenal, funding for cybermilitary goes up

5/2/2014
Be aware, Apple iOS Data protection doesn’t protect email attachments

5/1/2014
White House big-data panel wants privacy protections, ignores NSA debate

5/1/2014
“Operation Clandestine Fox” Now Attacking Windows XP Using Recently Discovered IE Vulnerability

April 2014

4/30/2014
US State Department adopting social media to counter Al-Qaeda propaganda

4/30/2014
Senate Cybersecurity Bill in the Works

4/30/2014
Bitcoin 101: Experiment Will Give MIT Undergrads $100 of Cryptocurrency

4/29/2014
Tracking the Clandestine Fox

4/29/2014
Report: Cyber Spying Bug, Attack Plans Found in Lithuania

4/28/2014
Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks

4/27/2014
Cyber firms look to move the electrical grid

4/26/2014
How One Woman Hid Her Pregnancy From Big Data

4/24/2014
Taking Down the Underground Economy

4/24/2014
Inside the ‘DarkMarket’ Prototype, a Silk Road the FBI Can Never Seize

4/24/2014
Before Silicon Valley got nasty, the Pirates of Analog Alley fought it out

4/24/2014
The Blue Screen of Death at 30,000 Feet

4/22/2014
Maybe I’ll go to Hell, but I think it’s a good thing’ says plastic Liberator gunsmith Cody Wilson

4/22/2014
Keeping the NSA in Perspective

4/22/2014
China plays ‘victim’ of global cyber attacks

4/21/2014
Heartbleed as Metaphor

4/21/2014
“Unflod Baby Panda” Exploit Targets Jailbroken Iphones

4/21/2014
Four of the newest (and lowest) Social Engineering scams

4/21/2014
Unflod Baby Panda” Exploit Targets Jailbroken Iphones

4/20/2014
U.S. Promotes Network to Foil Digital Spying

4/19/2014
Unflod Baby Panda, the Chinese malware hit jailbroken iphone

4/17/2014
Phishing boom in China bucks global trends

4/17/2014
Satellite Communication (SATCOM) Devices Vulnerable to Hackers

4/17/2014
New ‘Google’ for the Dark Web Makes Buying Dope and Guns Easy

4/15/2014
The U.S. Government Wants 6,000 New ‘Cyberwarriors’ by 2016

4/15/2014
Crimeware or APT? Malware’s “Fifty Shades of Grey”

4/15/2014
The security of the most popular programming languages

4/15/2014
The US Government wants 6000 new “Cyberwarriors” by 2016

4/14/2014
How to Detect Criminal Gangs Using Mobile Phone Data

4/14/2014
The Major Cyber Events You Might Have Missed

4/13/2014
China’s defense chief mentions military cyber war program for first time

4/13/2014
Obama lets NSA use zero-day flaws given “clear national security” need

4/12/2014
Private crypto keys are accessible to Heartbleed hackers, new data shows

4/11/2014
Why Every Website Should Use Always On SSL (AOSSL)

4/11/2014
NSA Said to Exploit Heartbleed Bug for Intelligence for Years

4/10/2014
Heartbleed Bug

4/10/2014
Heartbleed Bug hits at heart of many Cisco, Juniper products

4/10/2014
Building A Raspberry Pi VPN Part One: How And Why To Build A Server

4/9/2014
How Heartbleed Works: The Code Behind the Internet’s Security Nightmare

4/8/2014
Experts Find a Door Ajar in an Internet Security Method Thought Safe

4/7/2014
Hackers Lurking in Vents and Soda Machines

4/7/2014
REPORT: Russian Cyber Crime Syndicate Linked To Neiman Marcus Theft

4/4/2014
How the Internet Is Taking Away America’s Religion

4/3/2014
One of World’s Largest Websites Hacked: Turns Visitors into “DDoS Zombies”

4/3/2014
Unbreakable’ security codes inspired by nature

4/2/2014
Windows XPocalypse and the Spread of ATM Malware

4/2/2014
UK Launches First National CERT

4/1/2014
Wickr Spreads Its ‘Leave No Trace’ Messaging

March 2014

3/31/2014
Popular Remote access Trojan njRAT fuels Middle East Cyber Crime

3/31/2014
Study Shows Flawed U.S. Encryption Standard Could Be Broken in Seconds

3/29/2014
White House cyber chief: future cyber attack to wipe out critical infrastructure

3/28/2014
U.S. cyberwarfare force to grow significantly, defense secretary says

3/28/2014
Big data: are we making a big mistake?

3/27/2014
Why Congress Can’t Pass Cyber Law

3/27/2014
Stoners Now Have Their Own Cryptocurrency: PotCoin

3/27/2014
Young MIT researcher develops NSA-proof encryption service

3/25/2014
Hackers Breached Israeli Defence Forum, gathered info, sent threatening SMS to Israeli journalists

3/24/2014
Zero-day vulnerability in Microsoft Word under active attack

3/24/2014
Malicious apps can hose Android phones, erase data, researchers warn

3/24/2014
Hacking for Jesus: Top projects from ‘Code for the Kingdom,’ a faith-based hackathon for spiritual geeks

3/23/2014
Hacked Emails Show How Much Microsoft Charges FBI for Selling Your Personal Data

3/22/2014
Turkish Finance Minister Simsek defends Twitter ban

3/22/2014
N.S.A. Breached Chinese Servers Seen as Security Threat

3/21/2014
Meet SSNDOB: Online Identity Theft Store lead by Cyclosa Gang

3/20/2014
Hackers develop drone that can steal the info on your phone

3/19/2014
Making Their Mark: How Women Are Finding their Place in the Field of Cybersecurity

3/19/2014
A Few Thoughts on Cryptographic Engineering

3/18/2014
Flight 370 ‘Cyber Hijack’ Theory Emerges

3/17/2014
Navigating the Cyber Threat Landscape: Overview and Forecast

3/16/2014
NATO websites hit in cyber attack linked to Crimea tension

3/16/2014
Cyber attacks in Europe highlight the new face of modern warfare

3/15/2014
LightOut is Latest Cyber Threat to Target Energy Sector

3/14/2014
Syrian Electronic Army hacks U.S Central Command & threatens to leak Secret Documents

3/12/2014
How the NSA Plans to Infect ‘Millions’ of Computers with Malware

3/12/2014
Happy Birthday World Wide Web

3/11/2014
Site lets people search satellite images for lost Malaysian plane

3/8/2014
Suspicion Falls on Russia as ‘Snake’ Cyberattacks Target Ukraine’s Government

3/8/2014
Ukraine suffers new cyber attacks

3/7/2014
The Russia-Ukraine Cyber Front Takes Shape

3/6/2014
The Face Behind Bitcoin

3/5/2014
Jail Sentence in France Over ‘Cyber Jihad’

3/4/2014
Cyber battle apparently under way in Russia-Ukraine conflict

3/4/2014
The Doomsday Cult of Bitcoin

3/4/2014
Watching for a Crimean Cyberwar Crisis

3/4/2014
Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign

3/3/2014
Is This Russia’s Stuxnet? Security Firm Spots Suspicious ‘Uroburos’ Rootkit

3/1/2014
Foreign Affairs: Networking Nature

3/1/2014
Foreign Affairs: The Mobile Finance Revolution

3/1/2014
Foreign Affairs: The Key to Successful Tech Management

February 2014

2/28/2014
Bitcoin Derivatives Sprout as Regulators Play Catch-Up

2/27/2014
Thieves Break Into Cars Using Mysterious ‘Black Box’

2/27/2014
Apple Explains Exactly How Secure iMessage Really Is

2/25/2014
Why Telegram has become the hottest messaging app in the world

2/24/2014
Q&A With a Deep Web Arms Dealer

2/24/2014
New attack completely bypasses Microsoft zero-day protection app

2/24/2014
The HP Security Research group details Iranian cyber capabilities

2/24/2014
Hagel says defense shifting from counterterrorism to battling cyber attacks from China

2/20/2014
Released a Metasploit module to hack 70% Android devices

2/18/2014
Iranian Hacking to Test NSA Nominee Michael Rogers

2/18/2014
Detected new Zeus variant which makes use of steganography

2/18/2014
Forget China: Iran’s Hackers Are America’s Newest Cyber Threat

2/17/2014
Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw

2/17/2014
Russian cybercrooks shun real currencies, develop private altcoins

2/17/2014
Mapping Hacking Team’s “Untraceable” Spyware

2/13/2014
OK, Mr. President, those cybersecurity guidelines you ordered are HERE

2/13/2014
Magento vulnerability allows an attacker to create administrative user

2/13/2014
Prepare for cyber war, Iran’s supreme leader tells students

2/12/2014
How Big Data Could Help the U.S. Predict the Next Snowden

2/10/2014
Meet Mask, possibly the most sophisticated malware campaign ever seen

2/10/2014
Researchers uncover cyber spying campaign dubbed ‘The Mask’

2/9/2014
CAN Hacking Tools, 20 USD to hack a car remotely

2/8/2014
Inside the world’s first-ever Dogecoin party

2/6/2014
Bitcoins cannot be used in Russia – Prosecutor General’s Office

2/6/2014
Army Units in Afghanistan Slam Intel System

2/5/2014
NullCrew FTS hacks Comcast servers, post exploit and passwords

2/3/2014
A Hacker Found GPS Data in the Audio of This Police Chase Video

2/3/2014
Cryptography Breakthrough Could Make Software Unhackable

2/3/2014
Law Library of Congress releases report on Bitcoin’s legal status around the world

January 2014

1/28/2014
Slang Used in the Russian Underground

1/27/2014
DEVELOPING YOUR CYBER INTELLIGENCE ANALYST SKILLS

1/26/2014
Spear Phishing Attack Was Used in CNN Blogs Hack

1/25/2014
Cyber Command doubles budget in $1.1 trillion funding bill as U.S. gears up for cyber warfare

1/24/2014
The True Forever War

1/24/2014
Lessons from the World’s Most Tech-Savvy Government

1/24/2014
A million Neiman customer cards hit

1/22/2014
Sefnit botnet-Microsoft has silently uprooted Tor Browser from more than 2 Million PC

1/22/2014
Russia hacked hundreds of Western, Asian companies: security firm

1/22/2014
Modems, wArEz, and ANSI art: Remembering BBS life at 2400bps

1/21/2014
US Budget Identifies China as ‘Cyber Threat’

1/17/2014
IntelCrawler: “The teenager is the author of BlackPOS/Kaptoxa malware (Target), several other breaches may be revealed soon”

1/16/2014
Ivory Coast cracks down on cyber crime

1/16/2014
AN INTRODUCTION TO CYBER INTELLIGENCE

1/15/2014
Cult of the Cyber Offensive

1/15/2014
Silent Circle & Geeksphone Join Forces To Build Blackphone: A Pro-Privacy Android-Based Smartphone

1/15/2014
We Hacked North Korea With Balloons and USB Drives

1/14/2014
N.S.A. Devises Radio Pathway Into Computers

1/14/2014
Three Must Watch Videos to Understand Why Bitcoin is Disruptive

1/10/2014
How data are HACKED and how you can keep yours SAFE, in one chart

1/10/2014
How Scared Should You Be of a Cyberwar?

1/8/2014
What It’s Like When The FBI Asks You To Backdoor Your Software

1/2/2014
Snapchat Breach Exposes Weak Security

December 2013

12/30/2013
Don’t Want Your Laptop Tampered With? Just Add Glitter Nail Polish

12/28/2013
A few more notes on NSA random number generators

12/19/2013
The sound made by your computer could give away your encryption keys…

12/18/2013
NSA review panel findings: Liberty and Security in a Changing World – read the full report

12/15/2013
Self-censorship – Facebook monitors everything users type and not publish

12/11/2013
NASA’s Valkyrie robot is a 6-foot ‘superhero’ designed to save you from disasters

12/11/2013
Play This Harmless-Looking Web Game, and You’re Helping the Pentagon

12/6/2013
Hour of Code Offers Coding Tutorials from Bill Gates, Zuckerberg, Etc

12/5/2013
Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

12/4/2013
Stolen Facebook and Yahoo passwords dumped online

12/3/2013
Kaspersky Security Bulletin 2013. Malware Evolution

12/3/2013
Flying hacker contraption hunts other drones, turns them into zombies

12/2/2013
Scientist-developed malware prototype covertly jumps air gaps using inaudible sound

12/2/2013
Is the Future of the Internet in Iceland?

12/1/2013
The Insidiousness of Facebook Messenger’s Mobile App Terms of Service

November 2013

11/27/2013
It’s Time to Write the Rules of Cyberwar

11/25/2013
The internet mystery that has the world baffled

11/23/2013
Hacking Google Gmail accounts exploiting password reset system flaw

11/23/2013
Facebook vulnerability allows to view hidden Facebook Friend List

11/23/2013
NSA Document: Cyber attacks are asymmetric weapons and significant future threat to U.S.

11/23/2013
NSA infected 50,000 computer networks with malicious software

11/20/2013
Repeated attacks hijack huge chunks of Internet traffic, researchers warn

11/20/2013
Where do cyber-weapons come from? Try a cyber arms dealer

11/19/2013
How License-Plate Scanners Are Eroding Our Privacy

11/19/2013
FireEye Links Chinese Cyberattacks to Single Source

11/17/2013
Disruptions: A Digital Underworld Cloaked in Anonymity

11/17/2013
FBI warns that Anonymous Hackers has been hacking US Government for almost a year

11/14/2013
3 Malware Trends You Need to Know About

11/13/2013
MIT’s shapeshifting display lets you reach out and touch someone

11/13/2013
Stuxnet’s Secret Twin

11/12/2013
Navy, Marines to Analyze Pentagon’s Cloud Email System

11/11/2013
Stuxnet infected Russian nuke power plant – Kaspersky

11/8/2013
The Silk Road black market reloaded … 2.0 is out!

11/8/2013
Critical infrastructure not prepared for GPS disruption

11/6/2013
IG: Government Has No Digital Cyber Warning System

11/6/2013
VICEROY TIGER Delivers New Zero-Day Exploit

11/6/2013
Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

11/6/2013
Mobile devices and cyber espionage, principal concerns for governments

11/5/2013
Have you seen these “cyber” fugitives? FBI offers up to $100,000 bounty

11/4/2013
Biohacker’ implants chip in arm

11/4/2013
MESSAGE SECURITY ‘UNCONDITIONALLY GUARANTEED’ AFTER QUANTUM CRYPTOGRAPHY BREAKTHROUGH

11/3/2013
Fake femme fatale dupes IT guys at US government agency

11/2/2013
Going Viral: How Two Pakistani Brothers Created the First PC Virus

11/2/2013
No Morsel Too Minuscule for All-Consuming N.S.A

October 2014

10/31/2013
#badBIOS features explained

10/31/2013
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

10/31/2013
Finland says government’s data network hit by severe hacking

10/30/2013
Russia Claims China Bugged Tea Kettles With Freaky WiFi-Exploiting Microchips

10/29/2013
Social media and digital identity. Prevention and incident response

10/23/2013
Irony of Ironies, Chinese Telecom Equipment Company Is Pushing Global Cybersecurity Standards

10/23/2013
Former NSA chief: NSA and U.S. Cyber Command are now ‘indistinguishable’

10/22/2013
Mapped: What Global Cyberwar Looks Like in Real Time

10/22/2013
They Spy on Us to Protect Us/How Dare They Spy on Us? The Pendulum Swings On

10/16/2013
How to Design — And Defend Against — The Perfect Security Backdoor

10/14/2013
Stealthy technique fingerprints smartphones by measuring users’ movements

10/11/2013
Air Gaps

10/10/2013
Ultrasound chip offers gesture control for mobiles

10/8/2013
How the Bible and YouTube are fueling the next frontier of password cracking

10/7/2013
Khaan Quest: Chinese Cyber Espionage Targeting Mongolia

10/4/2013
A Smartphone Charger That Sniffs for Malware

10/3/2013
How Snowden’s Email Provider Tried To Foil The FBI Using Tiny Font

September 2014

9/26/2013
Finding the best cyber innovations

9/25/2013
Icefog: The Hacker Crew Trying to Break Into Your Weapons

9/24/2013
How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA

9/23/2013
Anonymous in Context: The Politics and Power behind the Mask

9/17/2013
Intel’s Anthropologist Genevieve Bell Questions the Smart Watch

9/6/2013
On Backdoors and Encryption

9/5/2013
Follow The Bitcoins: How We Got Busted Buying Drugs On Silk Road’s Black Market

9/3/2013
Syrian Electronic Army revealed: Anonymous hacks SEA website, dumps data

July 2013

7/2/2013
Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance

7/2/2013
Infographic: Finding Big Benefits in Big Data

June 2013

6/14/2013
Secretive US cyber unit has been spying on China for 15 years

6/11/2013
Use With Caution: The Value and Limits of Deterrence Against Asymmetric Threats

May 2013

5/19/2013
North Korea may have secretly engineered computer games to launch mass cyber attack

5/8/2013
iPhone-Operated Digital Lock Makes House Keys a Thing of the Past

5/2/2013
No Clearance Required: Using Commercial Threat Intelligence in the Federal Space

5/1/2013
Google Glass security failings may threaten owner’s privacy

April 2013

4/22/2013
How to explain Bitcoin to your grandmother

3/12/2013
China hacker’s angst opens a window onto cyber-espionage

November 2012

11/12/2012
Stomping cognitive bias

11/7/2012
ME.GA HACKERS: WE’RE REAL PIRATES & WE’LL SELL DOTCOM’S DOMAIN TO UNIVERSAL

July 2012

7/19/2012
Taking the Cyberattack Threat Seriously

7/2/2012
When His Project Was Canceled, an Unemployed Programmer Kept Sneaking Into Apple to Finish the Job

June 2012

6/19/2012
Mapping and Monitoring Cyber Threats

February 2012

2/16/2012
How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did

Leave a Reply

Your email address will not be published. Required fields are marked *