Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

23 hours ago How Cell Phones Can Map The CIA: Is Location Secrecy Dead?

Forbes View Synopsis+1
In this mobile-drenched world the locations of the government's intelligence workforce can be mapped in realtime and the nation's most sensitive and classified facilities cataloged by private companies

1 day ago Hacked hookup site Ashley Madison's security was laughable

The Register View Synopsis+1
Canadian and Australian privacy watchdogs bite, hard

Ruby Corp, the rebranded parent company of illicit-affair-arranging outfit Ashley Madison, has had to enter into court-enforceable orders with privacy authorities in Canada and Australia, following the findings of a joint investigation in the two countries.

22 hours ago Intel douses Wildfire ransomware as-a-service Euro menace

The Register View Synopsis+1
Group scored $79k a month with infect-o-tronic rent-a-bot

An alliance of cops and anti-malware experts have doused the Wildfire ransomware that plagued users in Belgium and the Netherlands.

19 hours ago Source of submarine document leak 'from overseas': Indian defense ministry

Yahoo Security View Synopsis+1
India's defense ministry said on Wednesday that the source of secret documents detailing the capabilities of the French-designed Scorpene submarine being built for the Indian navy appeared to be "from overseas and not from India". Defence Minister Manohar Parrikar said earlier the security breach appeared to have been the work of hackers. The leak, first reported in The Australian newspaper, contains more than 22,000 pages outlining the secret combat capability of six submarines that DCNS of France has designed for the Indian Navy.

14 hours ago New York Times Reportedly Targeted by Russian Hackers

InfoRiskToday View Synopsis+1
As FBI Investigates, Publisher Sees 'No Evidence' Systems Were BreachedThe New York Times says suspected Russian hackers unsuccessfully attempted to breach the newspaper's network. It's one of several U.S. news organizations that have been targeted, according to CNN.

Top News

35 minutes ago Google just made public Wi-Fi suck a little bit less

Yahoo Security View Synopsis+1
Wi-Fi Assistant is a feature that Google has been offering to Project Fi users for a year. The optional setting will connect your device to over a million public Wi-Fi hotspots that Google has verified as being fast and reliable, giving you more seamless connections in places where the cell service is lacking. Starting today, the option is rolling out to anyone using a Nexus device in the United States, Canada, Mexico, UK and Nordic countries. For anyone eligible, this is an upgrade well worth taking. DON'T MISS:  How I get a new iPhone for $125 a year There's obvious privacy concerns about auto-connecting to public Wi-Fi, however. Previous studies by researchers have shown that people will connect to basically any Wi-Fi network, and if Google is programmed to trust a network with a specific name, hackers could build a similar-looking network that your device would connect to automatically. But Google does have one trick up its sleeve: when you connect to a public Wi-Fi hotspot, Google will establish a VPN connection with its own servers, which should protect your data. It's likely not foolproof, as there's other attacks that can be done on public Wi-Fi other than sniffing packets, but it's far more secure that most public Wi-Fi, which mostly involves praying no-one can be bothered to hack you. So, if you regularly do online banking or send nuclear launch codes from your mobile device, you'll want to use a VPN, or disable Wi-Fi Assistant outright. But for anyone who struggles for cell signal, Wi-Fi Assistant is a decent way to save a little time every day.

13 hours ago Wildfire ransomware code cracked: Victims can now unlock encrypted files for free

ZDNet View Synopsis+1
Victims of a ransomware campaign aimed at Dutch speakers don't have to pay hackers after the No More Ransom project cracked its cipher.

11 hours ago Linux Trojan Brute Forces Routers to Install Backdoors

SecurityWeek View Synopsis+1

A Linux Trojan that emerged more than a year ago is once again actively targeting routers in an attempt to install backdoors on them.

10 hours ago Chronicled releases open registry for IoT built on blockchain

TechRepublic View Synopsis+1
San Francisco's Chronicled announced that it has partnered with Ethereum to provide a registry for connected devices built on blockchain technology.

9 hours ago Military submarine maker springs leak after "hack" - India, Oz hit dive alarm

ArsTechnica View Synopsis+1
Massive leak of French shipbuilder's documents reveal detailed defense plans.

22 hours ago Hunting with Prevention

SANS Reading Room View Synopsis+1
Traditional endpoint protection such as antivirus, while effective in some cases, is no match for the ever-changing techniques that attackers use to get past defenses, according to multiple SANS surveys.

1 day ago NASA CIO Lets Network Cybersecurity Authorization Expire (August 22, 2016)

SANS Newsbites View Synopsis+1

NASA's CIO has allowed cybersecurity authorization for one of the agency's main networks to expire.......

Latest News

4 hours ago French and German ministers demand new encryption backdoor law

The Register View Synopsis+1
But is it just a matter of looking tough with elections around the corner?

A meeting this week between the interior ministers of France and Germany has focused on the issue of encryption and its potential impact on security.

5 hours ago Provider Treating Nightclub Shooting Victims Reports Breach

InfoRiskToday View Synopsis+1
Orlando Health Notifies Patients of Records SnoopingA Florida healthcare provider that treated victims of the Pulse nightclub massacre in June is notifying patients impacted by a breach involving record snooping. The incident spotlights common privacy and security challenges.

8 hours ago Rio Olympics 2016: How hackers are still using the games to scam businesses

TechRepublic View Synopsis+1
Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.

8 hours ago HTTPS and OpenVPN face new attack that can decrypt secret cookies

ArsTechnica View Synopsis+1
More than 600 sites found to be vulnerable to demanding exploit called Sweet32.

1 hour ago "‹APAC unprepared for security breaches: FireEye's Mandiant

ZDNet View Synopsis+1
Cyberforensics firm Mandiant has reported that APAC organisations are frequently unprepared to identify and respond to breaches, with a median response time of 374 days over that of the global median.

1 hour ago The Maturing of the InfoSec Workforce

InfoRiskToday View Synopsis+1
Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.

2 hours ago French, German ministers demand new encryption backdoor law

The Register View Synopsis+1
But is it just a matter of looking tough with elections around the corner?

A meeting this week between the interior ministers of France and Germany has focused on the issue of encryption and its potential impact on security.

2 hours ago Jury deliberates case of Russian man charged with hacking

Yahoo Security View Synopsis+1
SEATTLE (AP) - Roman Seleznev, the son of a Russian lawmaker, made millions by hacking into U.S. businesses to steal credit card information and selling that data to other criminals, a federal prosecutor told the jury during his closing argument on Wednesday.

3 hours ago France and Germany latest countries to want magical backdoors in encryption

Yahoo Security View Synopsis+1
The recent NSA hack just proved to the world that no system is hack-proof if attackers have what it takes to break the access door. Regardless of whatever protections guarded that NSA server, hackers found a security hole to get in and steal critical documents. The same thing could happen to encrypted services that would feature a backdoor for law enforcement. But governments around the world still think they'd be able to handle such terrifying scenarios, with France and Germany being the latest nations looking to gain access to private encrypted messages exchanged over the internet by terror plot suspects. DON'T MISS: Steve Wozniak has free advice for Apple on how to fix the iPhone 7's major issue It's understandable why France and German are interested in heightened digital security, considering the many terrorist attacks that have hit the European region. "Messages exchanged through certain apps such as Telegram must be decrypted and used as evidence by magistrates and investigators as part of legal proceedings," French Interior Minister Bernard Cazeneuve said during a joint press conference with his German counterpart German Interior Minister Thomas de Maizière. As The Wall Street Journal reports , the two countries are seeking new legislation that would allow spy agencies to demand access to a suspect's communications, and impose "obligations" on operators unwilling to help. The proposed laws would force companies including Apple, WhatsApp, Telegram, and many others, to build backdoors into their messaging systems, something that's highly unlikely to happen. "Some terrorists and criminals are ahead of us on the technology front. That's not right," de Maizière said. But breaking encryption isn't right either. The Computer & Communications Industry Association, representing Amazon, Facebook, Google, eBay, and others already took notice of the matter. "It is certainly understandable that some would respond to recent tragedies with back doors and more government access," the director for Europe of the association, Christian Borggreen, said. "But weakened security ultimately leaves online systems more vulnerable to all types of attacks from terrorists to hackers." This fall, the European Commission is expected to come up with new rules on privacy and security for telecom operators to include third-party services such as WhatsApp or Telegram.

4 hours ago Lottery scandal prosecutor seeks to subpoena Texas attorneys

Yahoo Security View Synopsis+1
DES MOINES, Iowa (AP) - An Iowa prosecutor wants a judge to issue subpoenas for telephone and bank records of two Texas attorneys who he believes are connected to a former lottery computer security administrator who fixed lottery games in several states.

6 hours ago Top Trends in Cybercrime; 411 Million Attacks Detected in Just 3 Months

InfoRiskToday View Synopsis+1

Attend this webinar as we reveal the latest trends and attack vectors that we've found in the ThreatMetrix Digital Identity Network, as detailed in the ThreatMetrix Cybercrime Report Q1, 2016. The Network analyzes close to 2 billion transactions per month, more than a third of which originate from mobile devices.

In this webinar, you will also learn:

  • Key cybercrime trends for 2016;
  • Top attacking nations, and their main attack destinations;
  • Industry deep dive for financial services transactions and attacks.

6 hours ago Android Botnet Uses Twitter for Receiving Commands

SecurityWeek View Synopsis+1

A newly discovered Android backdoor is using an innovative method of receiving commands: it connects to a Twitter account instead of a command and control (C&C) server, ESET researchers say.

8 hours ago Flaws Allow Attackers to Hijack VMware vRA Appliances

SecurityWeek View Synopsis+1

VMware informed customers on Tuesday that it has addressed a couple of vulnerabilities that can be chained together and exploited by attackers to take complete control of vRealize Automation (vRA) appliances.

8 hours ago Over 25 million accounts stolen after Mail.ru forums hacked

ZDNet View Synopsis+1
Two hackers were able to steal email addresses and easily crackable passwords from three separate forums in this latest hack.

9 hours ago How to increase your DKIM key to 2048 bits for Google Apps

TechRepublic View Synopsis+1
Checking the length of your DKIM key and generating a new, 2048-bit one could help prevent spoofing and spam. Here's the process for Google Apps admins.

9 hours ago Dragos Raises $1.2 Million to Counter ICS Cyber Threats

SecurityWeek View Synopsis+1

Dragos, a startup focused on protecting industrial control systems (ICS) from cyber threats, has raised $1.2 million from startup studio DataTribe.

10 hours ago The Big Data Era of Mosaicked Deidentification: Can We Anonymize Data Anymore?

Forbes View Synopsis+1
Current approaches to generating the anonymized data that is the lifeblood of the big data era are failing us, but how big of a problem is this?

11 hours ago Building a Forensically Capable Network Infrastructure

SANS Reading Room View Synopsis+1
The number of computer related security incidents continue to grow yearly, resulting in the need for ensuring network infrastructures are built to be forensically capable. During the period January 2011 to December 2015, the number of reported computer security incidents grew over this four-year period from 1,281 to 3,930. Similar to the increased number of reported computer security incidents, was the increased number of exposed records. During this same period, the number of exposed records jumped from 413 million to 736 million, with 2013 and 2014 having over 2 billion records exposed. Some challenges with becoming forensically capable, relates to understanding the business needs, identifying the people to support that need and ultimately the technology or tools to support business needs.