10 July 2014 MIT Technology Review
Cyber Attacks analysed by Mikko Hypponen
Category Archives: Incident Response
37% of Canadian Justice Department Fail Phishing Awareness Test- 25 June 2014
25 June 2014- Sophos Naked Security
37% of Canadian Justice Department fail phishing awareness test
Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records- August 19 2014
August 19 2014- SecurityWeek
Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records: Report
Ex-FBI Official: Intel Agencies Don’t Share Cyber Threats that Endanger Companies- 11 May 2014
11 May 2014- Washington Times
Ex-FBI official: Intel agencies don’t share cyber threats that endanger companies
“Operation Clandestine Fox” Now Attacking Windows XP Using Recently Discovered IE Vulnerability- 1 May 2014
Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks- 28 April 2014
28 April 2014- Foreign Policy
Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks
Cyber Firms Look to Move the Electrical Grid- 27 April 2014
27 April 2014- Washington Post
Cyber firms look to move the electrical grid
Taking Down the Underground Economy- 24 April 2014
24 April 2014- Data Breach Today
Taking Down the Underground Economy
Heartbleed as Metaphor- 21 April 2014
21 April 2014
Heartbleed as Metaphor
Private crypto keys are accessible to Heartbleed hackers, new data shows- 12 April 2014
12 April 2014- Ars Technica
Private crypto keys are accessible to Heartbleed hackers, new data shows
Why Every Website Should Use Always On SSL (AOSSL)- 11 April 2014
11 April 2014- SecBrief
Why Every Website Should Use Always On SSL (AOSSL)
NSA Said to Exploit Heartbleed Bug for Intelligence for Years- 11 April 2014
11 April 2014- Bloomberg
NSA Said to Exploit Heartbleed Bug for Intelligence for Years
Heartbleed Bug- 10 April 2014
10 April 2014- Secbrief
Heartbleed Bug
Heartbleed Bug hits at heart of many Cisco, Juniper products- 10 April 2014
10 April 2014- NetworkWorld
Heartbleed Bug hits at heart of many Cisco, Juniper products
Flight 370 ‘Cyber Hijack’ Theory Emerges- 18 March 2014
18 March 2014- Trove.com
Flight 370 ‘Cyber Hijack’ Theory Emerges
Have you seen these “cyber” fugitives? FBI offers up to $100,000 bounty – November 5, 2013
11/5/2013 – Arstechnica
Have you seen these “cyber” fugitives? FBI offers up to $100,000 bounty
Air Gaps – October 11, 2013
10/11/2013- Schneier on Security
Air Gaps
How the Bible and YouTube are fueling the next frontier of password cracking – October 8, 2013
10/8/2013 – Arstechnica
How the Bible and YouTube are fueling the next frontier of password cracking
Summary of 2013 Malware Development
HackSurfer just released a summary on malware development for 2013 based on the formal report from Panda Labs. Here are some of the key points from the summary:
- Almost 32% of computers across the world found infected with malware.
- There were 82,000 different malware strains that emerged in 2013.
- Android Platforms remained the primary target for cyber criminals with nearly two million android based malware being created in the year of 2013.
- Trojans were the biggest contributor in 2013 with 71.11% of all new malware.
- The growth of new malware strains rose to 13.3% versus 9.67% in 2012 year.
- China remained the most infected country in 2013 with 54.0% ratio.
- Sweden was on the last position with least malware-infected countries.
- 20% of all malware were created in the year of 2013.
- The most popular virus families were Sality and Xpiro.
- 30 million new malware variants were created in 2013.
2014 Prediction about Imminent Threats:
- New malware variants can hit the market in 2014 that will compel to implement strong security parameters in organizations.
- Java vulnerability will remain in 2014 due to countless security flaws and its high usage in the world.
- Users will fall victim to cyber culprits due to social engineering techniques.
- Android platform will remain on the top in malware spreading.
- Ransomware malware will be on the top position in 2014 than Trojans and Botnets.
- Corporate culture has to think beyond traditional antivirus product.
- Hackers can target internet-connected device (Internet of Things) for attack purpose.
Hotels May Become New Data Breach Point
A data breach appears to have hit White Lodging, a firm which manages hotel franchises for the Marriott, Hilton and Starwood Hotel chains. As reported by Brian Krebs, The breach appears to have struck computers in the restaurants and gift shops of a number of hotels managed by the company over a time period extending from March 2013 until the end of the year, collecting credit card information. Krebs was alerted to the breach by a number of fraud specialists working in banking who were dealing with the fallout of the credit card frauds.