Monday, August 29, 2016

Consumer Thoughts on Retail Privacy: Infographic


Sunday, August 28, 2016

Cybersecurity Vulnerability and Patch Report for the Week of August 28, 2016


 

CYBERSECURITY VULNERABILITY

AND PATCH REPORT

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP

 

Weekend Vulnerability and Patch Report, August 28, 2016


Important Security Updates

Apple iOS: Apple has released version 9.3.5 of its iOS to fix at least 3 vulnerabilities, some of which are highly critical, reported in previous versions. Updates are available through the device or through Apple’s website.
Avira Free Antivirus: Avira has released version 15.0.19.164 of its free Antivirus. Updates are available from Avira’s website.
Dropbox: Dropbox has released version 8.4.21 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]
Mozilla Firefox: Mozilla has released version 48.0.2. Updates are available within the browser or from Mozilla’s website.
Siber Systems RoboForm: Siber Systems has released version 7.9.21.5 of Roboform. Updates are available from within the program, look for the “Check New Version” button on the Options menu or download from the Roboform website.
Skype: Skype has released Skype 7.27.0.101. Updates are available from the program or Skype’s website.
TechSmith Corporation SnagIt: TechSmith has released version 13.0.2.6653 for SnagIt. Updates are available from TechSmith’s website.

Current Software Versions

Adobe Flash 22.0.0.209
Adobe Reader DC 2015.017.20050
Dropbox 8.4.21 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]
Firefox 48.0.2 [Windows]
Google Chrome 52.0.2743.116
Internet Explorer 11.0.10240.16384
Java SE 8 Update 101 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Microsoft Edge 38.14393
QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]
Safari 9.1 [Mac OS X Mavericks, Yosemite, El Capitan]
Skype 7.27.0.101

For Your IT Department

Cisco Multiple Products: Cisco reports patched vulnerabilities in its Cisco AnyConnect Secure Mobility Client earlier than the first fixed releases of 4.2.05015 and 4.3.02039. Apply updates.  Additional details are available at Cisco’s website.
McAfee Multiple Products: McAfee has released updates and partial fixes for its ePolicy Orchestrator and McAfee Web Gateway. Apply updates.  Additional details are available at McAfee’s website.
TeamViewer: TeamViewer has released version 11.0.65280. Updates are available from TeamViewer’s website.
VMware Multiple Products: VMWare has released updates for its Identity Manager and vRealize Automation. Additional details are available at VMWare’s website.
**********
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2016 Citadel Information Group. All rights reserved.

 

 

Jeff Snyder’s, SecurityRecruiter.comJeff Snyder CoachingSecurity Recruiter Blog, 719.686.8810



Cyber Security News of the Week, August 28, 2016


 

CYBERSECURITY NEWS

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Individuals at Risk

Cyber Privacy

Why you should think twice before posting that picture on social media: Posting and sharing photos online seems innocuous, but you could be inadvertently leaking sensitive business and personal information, according to experts. CNBC, August 15, 2016

Cyber Warning

Cyber thieves increasingly hack into consumer bank accounts through customers’ mobile phones: Cyberthieves have a new way to hack into consumer bank accounts: mobile phones. The Wall Street Journal, August 26, 2016
SpyNote malware another illustration why Android apps should only be installed from official store: On a semi-regular basis, I receive emails from users who have Android devices that show all the signs of being infected by malware. Without fail and without question, I quickly discover the user installed an application from a third-party, untrusted source. TechRepublic, August 25, 2016
Apple and Netflix customers are being targeted in a fake invoice e-mail scam duping them into handing over their bank details: Apple customers are being targeted in a series of new scams involving invoices containing fake iTunes, App Store or Netflix purchases. ThisIsMoney, August 23, 2016

Cyber Danger

Man dies after wife’s cell phone is highjacked preventing her from calling 911: Identity thieves have perfected a scam in which they impersonate existing customers at retail mobile phone stores, pay a small cash deposit on pricey new phones, and then charge the rest to the victim’s account. In most cases, switching on the new phones causes the victim account owner’s phone(s) to go dead. This is the story of a Pennsylvania man who allegedly died of a heart attack because his wife’s phone was switched off by ID thieves and she was temporarily unable to call for help. KrebsOnSecurity, August 23, 2016

Cyber Defense

How to opt out of WhatsApp sharing your phone number with Facebook: Nearly two and a half years after Facebook acquired WhatsApp, and despite Whatsapp CEO Jan Koum saying at the time of the acquisition that user privacy wouldn’t suffer, the services are about to get a little bit friendlier with their data sharing. NakedSecurity, August 26, 2016
United Airlines Sets Low Bar on Customer Access Security: United Airlines has rolled out a series of updates to its Web site that the company claims will help beef up the security of customer accounts. But at first glance, the core changes — moving from a 4-digit PINs to password and requiring customers to pick five different security questions and answers — may seem like a security playbook copied from Yahoo.com, circa 2009. Here’s a closer look at what’s changed in how United authenticates customers, and hopefully a bit of insight into what the nation’s fourth-largest airline is trying to accomplish with its new system. KrebsOnSecurity, August 24, 2016

Cyber Update

EMERGENCY IOS UPDATE PATCHES ZERO DAYS USED BY GOVERNMENT SPYWARE: Apple rushed an emergency iOS update today after the discovery of three zero-day vulnerabilities used by governments to spy on the activities of human rights activists and journalists. ThreatPost, August 25, 2016

Information Security Management in the Organization

Cyber Warning

Mandiant reports Asian businesses take 17 months to notice hacker in system vs 4 months in US: Organisations across the Asia Pacific are terrible at information security, a Mandiant report contests. TheRegister, August 25, 2016

Cyber Defense

The current state of privileged access management practices: There’s a widening gulf between organizations that adhere to best practices for privileged access management, according to BeyondTrust. HelpNetSecurity, August 26, 2016
Mozilla launches free website security scanning service: In order to help webmasters better protect their websites and users, Mozilla has built an online scanner that can check if web servers have the best security settings in place. CSO Online, August 26, 2016
Five account management practices to help deter cyber attacks: Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks. CIO, August 26, 2016
NSA Equation Group Hacking Tool Dump: 5 Lessons for Defenders: The recent dump of attack tools linked to the Equation Group, which is widely believed to be tied to the U.S. National Security Agency and its Tailored Access Operations team, has triggered despair in technology circles (see NSA Pwned Cisco VPNs for 11 Years). BankInfoSecurity, August 24, 2016

Cyber Update

Cisco Patches ASA Devices Against leaked Equation Group attack tools EXTRABACON: Cisco has begun releasing software updates for its Adaptive Security Appliance devices to patch a zero-day flaw that was revealed via leaked Equation Group attack tools. Cisco ASA devices provide anti-virus, firewall, intrusion prevention and virtual private network capabilities. BankInfoSecurity, August 24, 2016

Cyber Security in Society

Cyber Crime

Customer payment card data stolen as POS malware infects Millennium & Noble House hotel chains: Two hotel chains are warning that they’ve suffered point-of-sale malware infections that compromised customers’ payment card data. Both say they were alerted to related card fraud by the U.S. Secret Service and that they’re now assisting law enforcement agencies’ investigations. BankInfoSecurtiy, August 26, 2016
Hotel Data Breach: Credit and Debit Card Data Stolen From 20 Hotels: The criminals appear to have taken names, payment card account numbers, card expiration dates and verification codes. Westwood Patch, August 16, 2016

Cyber Privacy

Hackers attack site of Ghostbusters star Leslie Jones, post racist abuse: Leslie Jones, the black comedian who starred in the recent all-female remake of Ghostbusters, has been forced to take her website down after hackers seemingly took control, posted racist abuse, personal information, and what were apparently nude pictures stolen from the actor’s iCloud account. ars technica, August 25, 2016

Cyber Attack

Inside the March 2013 Attack That ‘Almost Broke the Internet’: In March 2013, a coalition of spammers and spam-friendly hosting firms pooled their resources to launch what would become the largest distributed denial-of-service (DDoS) attack the Internet had ever witnessed. The assault briefly knocked offline the world’s largest anti-spam organization, and caused a great deal of collateral damage to innocent bystanders in the process. Here’s a never-before-seen look at how that attack unfolded, and a rare glimpse into the shadowy cybercrime forces that orchestrated it. KrebsOnSecurity, August 26, 2016
FBI investigating Russian hack of New York Times reporters, others: (CNN)Hackers thought to be working for Russian intelligence have carried out a series of cyber breaches targeting reporters at The New York Times and other US news organizations, according to US officials briefed on the matter. CNN, August 23, 2016

Know Your Enemy

Failed attempt to hack iPhone of human rights lawyer exposes a secretive hacking group: What do we know about the curious, secretive NSO Group? Very little – but after this week, an awful lot more than we did before. BBC, August 26, 2016
Following Bitcoin ransoms reveals billion dollar cyber-crime: Are we about to witness a ransomware unicorn? According to Mikko Hypponen, chief research officer of Finnish F-Secure, we are. But there’s a caveat. SCMagazine, August 25, 2016

National Cyber Security

HackerOne helps Pentagon strengthen cybersecurity by helping hackers breach the Pentagon: It took a cohort of freelance hackers just 13 minutes to break into Pentagon websites, said Mårten Mickos, CEO of Silicon Valley-based bug bounty firm HackerOne, in a Reddit AMA on Thursday. Fedscoop, August 26, 2016
Massive cyber breach exposes 22,000 pages of top secret data about Indian submarine Scorpène: All hell broke loose for the Indian Navy and Defence Ministry on Wednesday when over 22,000 pages of top secret data on the capabilities of six highly advanced Scorpène submarines being built for the Indian Navy in Mumbai in collaboration with French company DCNS were leaked. FirstPost, August 25, 2016

Cyber Law

FRANCE, GERMANY CALL FOR EUROPEAN DECRYPTION LAW: The United States is months removed from this spring’s Apple vs. FBI debacle, but the debate around encryption is just beginning to play out in Europe. ThreatPost, August 25, 2016

Financial Cyber Security

25% of bank data breaches are caused by lost phones and laptops; only 20% by hacking: One in four breaches (25.3 per cent) in the US financial services sector over recent years were due to lost or stolen devices, according to a new study. TheRegister, August 25, 2016

HIPAA

Healthcare Hacker Attack Victim Tally Soars with 8 million new consumer victims in last few weeks: Hacker attacks recently added to the Department of Health and Human Services’ Office for Civil Rights “wall of shame” tally of major health data breaches affected a total of more than 8 million victims. HealthCareInfoSecurity, August 25, 2016

Internet of Things

The biggest threat facing connected autonomous vehicles is cybersecurity: Connected, autonomous vehicles are around the corner. Many of the most innovative and deep-pocketed companies in the world are racing to bring them to market — and for good reason: the economic and social gains they will generate will be tremendous. TechCrunch, August 25, 2016
Kudos to unusual IoT manufacturer for fixing security holes: In a shocking development, smart lock manufacturer August has been caught promptly patching security holes discovered in its product. TheRegister, August 25, 2016

Cyber Research

Apple files patent app enabling iPhones to grab a thief’s photo and fingerprint when stolen: Apple may be working on anti-theft technology to protect iPhones that would covertly snap a photo of (what the device assumes is potentially) the thief, capture their fingerprint, shoot some video and/or record audio. NakedSecurity, August 26, 2016
Keystroke Snooping with 97% Accuracy Using Only WiFi Router & Laptop: A group of academic researchers have figured out how to use off-the-shelf computer equipment and a standard Wi-Fi connection to sniff out keystrokes coming from someone typing on a keyboard nearby. The keystroke recognition technology, called WiKey, isn’t perfect, but is impressive with a reported 97.5 percent accuracy under a controlled environment. ThreatPost, August 25, 2016

Cyber Miscellany

Muddying the waters of infosec: Cyber upstart, investors short medical biz St. Jude – then reveal bugs: A team of security researchers tipped off an investment firm about software vulnerabilities in life-preserving medical equipment in order to profit from the fallout. TheRegister, August 26, 2016
St. Jude Denies Report Its Heart Devices Are Vulnerable to Cyberattacks: St. Jude Medical Inc. on Friday denied allegations made by a research firm that its pacemakers and other heart devices were vulnerable to hacking and other cybersecurity threats. The Wall Street Journal, August 26, 2016
Trading in stock of medical device paused after hackers team with short seller: Trading in the stock of medical device manufacturer St. Jude Medical was halted Friday afternoon after a dramatic drop in its value. That drop was triggered by news of alleged vulnerabilities in the company’s cardiac care devices. The vulnerability was disclosed not in a report by the company but by security researchers partnered with Muddy Waters Capital, an investment firm that had “shorted” St. Jude’s stock on the information in order to profit from a drop in the stock’s value. ars technica, August 26, 2016

Jeff Snyder’s, SecurityRecruiter.comJeff Snyder CoachingSecurity Recruiter Blog, 719.686.8810



Monday, August 22, 2016

Cybersecurity Vulnerability and Patch Report for the Week of August 21, 2016

CYBERSECURITY VULNERABILITY

AND PATCH REPORT

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP

 


Important Security Updates

Avast: Avast! Free Antivirus has released version 12.3.2279. Updates are available on Avast’s website.
Dropbox: Dropbox has released version 8.4.19 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]
Mozilla Firefox: Mozilla has released version 48.0.1. Updates are available within the browser or from Mozilla’s website.
Panda Free Antivirus: Panda Free Antivirus has released version 17.0.0. Updates are available on Panda Security’s website.
Piriform CCleaner: Piriform has released version 5.21.5700 for CCleaner. Updates are available from Piriform’s website.

Current Software Versions

Adobe Flash 22.0.0.209
Adobe Reader DC 2015.017.20050
Dropbox 8.4.19 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]
Firefox 48.0.1 [Windows]
Google Chrome 52.0.2743.116
Internet Explorer 11.0.10240.16384
Java SE 8 Update 101 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Microsoft Edge 38.14393
QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]
Safari 9.1 [Mac OS X Mavericks, Yosemite, El Capitan]
Skype 7.26.0.101

For Your IT Department

Cisco Multiple Products: Cisco reports patched vulnerabilities in its Cisco Aironet 1800, 2800 and 3800 Series Access Point, Firepower Management Center, ASA 5500-X Series with FirePOWER Services, IP Phone 8800 Series version 11.0(1), Identity Services Engine software release 1.3(0.876), Unified Communications Manager version 11.5, WebEx Meetings Server version 2.6, Adaptive Security Appliance (ASA) Software Releases earlier than 8.4(3), Connected Streaming Analytics version 1.1.1, APIC-EM software releases 1.0 and 1.1.  Apply updates.  Cisco also reports an unpatched vulnerability in its Cisco Adaptive Security Appliance Software SNMP Remote Code Execution Vulnerability. There are workarounds available for this vulnerability. Cisco also reports an unpatched vulnerability in its Cisco Smart Call Home Transport Gateway running Transport Gateway Installation Software version 4.1(4.0). There are no workarounds available. Additional details are available at Cisco’s website.
VMware Multiple Products: VMWare has released updates for its Photon OS OVA 1.0. Additional details are available at VMWare’s website.
WordPress: WordPress has released version 4.6 to address multiple vulnerabilities in previous versions. Update through the application.
**********
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2016 Citadel Information Group. All rights reserved.

 

Jeff Snyder’s, SecurityRecruiter.comJeff Snyder CoachingSecurity Recruiter Blog, 719.686.8810




Cyber Security News of the Week, August 21, 2016


CYBERSECURITY NEWS

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Individuals at Risk

Identity Theft

SocialSecurity Admin backtracks on txt msg requirement for e-acct: The U.S. Social Security Administration says it is reversing a newly enacted policy that required a cell phone number from all Americans who wished to manage their retirement benefits at ssa.gov. The move comes after a policy rollout marred by technical difficulties and criticism that the new requirement did little to prevent identity thieves from siphoning benefits from Americans who hadn’t yet created accounts at ssa.gov for themselves. KrebsOnSecurity, August 16, 2016

Cyber Danger

Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?): FACIAL RECOGNITION MAKES sense as a method for your computer to recognize you. After all, humans already use a powerful version of it to tell each other apart. But people can be fooled (disguises! twins!), so it’s no surprise that even as computer vision evolves, new attacks will trick facial recognition systems, too. Now researchers have demonstrated a particularly disturbing new method of stealing a face: one that’s based on 3-D rendering and some light Internet stalking. Wired, August 19, 2016
WikiLeaks hosts hundreds of malware files in email dumps: WikiLeaks is reportedly hosting over 300 malware samples among the website’s cache of leaked emails. ZDNet, August 19, 2016

Information Security Management in the Organization

Information Security Governance

Can Cloud Security Decrease Breach Containment Costs?: Are cloud security tools worth the investment? Determining if any security tool is worth the cost can be tough because proving return on security investments isn’t easy. While time-saving efficiencies, such as single sign-on tools, are relatively simple to quantify, it is far more challenging to calculate the amount of money saved by a preventative measure. SecurityIntellegence, August 18, 2016
Security Staff Shortages Incur Higher Breach Recovery Costs: The shortage of skilled IT security professionals is not a new topic. Multiple reports have shed light on the talent shortage and the type of security risks associated with an IT department that is short on security skills. But a report released this week by Kaspersky Lab and partner B2B International shows the potential financial impact of being short-staffed in the security department. DarkReading, August 18, 2016

Cyber Warning

Malwarebytes Researcher Finds New Scam Mac Malware: Although the Mac platform might once have been touted as one that’s devoid of all viruses and malware, that’s certainly not the case any more. While it never was 100 percent true, today Mac users face many more threats than they once did, and a new one doing the rounds is looking to trick you into installing Advanced Mac Cleaner. DigiTrends, August 19, 2016
Retooled Locky Ransomware Pummels Healthcare Sector: Cybercriminals wielding Locky crypto-locking ransomware are continuing to ramp up their assaults, especially in the healthcare sector, with attackers distributing less banking malware and more ransomware, according to new research. BankInfoSecurity, August 18, 2016
3 Takeaways From The HEI Hotels And Oracle MICROS Breaches: The recent data breach at HEI Hotels & Resorts and reports of malicious intrusions at Oracle MICROS and several other point-of-sale system makers are another reminder of the fragility of the US payment system to cyberattacks. DarkReading, August 16, 2016
Visa Alert and Update on the Oracle Breach: Credit card industry giant Visa on Friday issued a security alert warning companies using point-of-sale devices made by Oracle‘s MICROS retail unit to double-check the machines for malicious software or unusual network activity, and to change passwords on the devices. Visa also published a list of Internet addresses that may have been involved in the Oracle breach and are thought to be closely tied to an Eastern European organized cybercrime gang. KrebsOnSecurity, August 13, 2016
IRS Warns Tax Pros On Targeted Scams, Advises Regular PTIN Monitoring: We already know that tax professionals aren’t immune from those Internal Revenue Service (IRS) scams. Now, IRS is alerting tax professionals that they are a specific target in a new kind of phishing email scam. Forbes, August 12, 2016

Cyber Defense

Attacker’s Playbook Top 5 Is High On Passwords, Low On Malware: Report: Penetration testers’ five most reliable methods of compromising targets include four different ways to use stolen credentials, but zero ways to exploit software. DarkReading, August 18, 2016
NIST’s new password rules – what you need to know: It’s no secret. We’re really bad at passwords. Nevertheless, they aren’t going away any time soon. NakedSecurity, August 18, 2016
5 Strategies For Enhancing Targeted Security Monitoring: Crime scenes — in both the physical and digital sense — exist where investigators must work quickly to gather and process evidence before it is no longer available or has been modified. In both cases, investigators set up a large perimeter around the crime scene and work to narrow it down by establishing credible, evidence-based conclusions. DarkReading, August 18, 2016

Information Security Professional

UNSECURED DNSSEC EASILY WEAPONIZED, RESEARCHERS WARN: Researchers this week described how a DNSSEC-based flood attack could easily knock a website offline and allow for the insertion of malware or exfiltration of sensitive data. Threatpost, August 18, 2016
How do you securely exchange encrypted-decrypted-recrypted data? Ask Microsoft: Microsoft researchers are working to enable secure data exchange in the cloud for applications. TheRegister, August 12, 2016

Cyber Security in Society

Cyber Privacy

Russian sports doping whistleblower fears for safety after hack: Former Russian runner turned whistleblower in-hiding Yuliya Stepanova has had her World Anti-Doping Agency (WADA) account hacked, possibly revealing her physical location to attackers. TheRegister, August 15, 2016

Cyber Crime

Sage employee arrested at airport following data breach: A Sage employee has been arrested following a data breach which may have exposed information belonging to hundreds of business customers. ZDNet, August 18, 2016
Malware Infected All Eddie Bauer Stores in U.S., Canada: Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of 2016 may have been compromised in the breach. The acknowledgement comes nearly six weeks after KrebsOnSecurity first notified the clothier about a possible intrusion at stores nationwide. KrebsOnSecurity, August 18, 2016

Cyber Attack

Cybersecurity firm FireEye reportedly probing Clinton Foundation cyberattack by DNC hackers: The Clinton Foundation, a multi-million dollar charity group that receives hefty donations from governments, corporations and wealthy elites, has reportedly hired a top cybersecurity firm to investigate its computer systems amid mounting fears it was targeted by hackers. IBTimes, August 18, 2016
Massive Email Bombs Target .Gov Addresses: Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists. According to experts, the attack — designed to render the targeted inboxes useless for a period of time — was successful largely thanks to the staggering number of email newsletters that don’t take the basic step of validating new signup requests. KrebsOnSecurity, August 18, 2016

National Cyber Security

Confirmed: Leaked Equation Group Hacking Tools Are Real: The release of spying code authored by one of the most sophisticated hacking groups in the world has prompted questions about whether Russia may be taunting the United States in an unprecedented, public cyber stunt. BankInfoSecuriy, August 18, 2016
Cisco And Fortinet Confirm Flaws Exposed By Self-Proclaimed NSA Hackers: American firewall providers Cisco and Fortinet have issued warnings and fixes for bugs exposed by the Shadow Brokers, who claimed this weekend to have breached the Equation Group, believed to be an NSA operation. Forbes, August 17, 2016
NSA’s use of sw flaws to hack foreign targets posed cybersecurity risks : To penetrate the computers of foreign targets, the National Security Agency relies on software flaws that have gone undetected in the pipes of the Internet. For years, security experts have pressed the agency to disclose these bugs so they can be fixed, but the agency hackers have often been reluctant. The Washington Post, August 17, 2016
Confirmed: hacking tool leak came from “omnipotent” NSA-tied group: The leak over the weekend of advanced hacking tools contains digital signatures that are almost identical to those in software used by the state-sponsored Equation Group, according to a just-published report from security firm Kaspersky Lab. ars technica, August 16, 2016
‘Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked?: The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America’s own elite operatives have been hacked and their methods revealed. The New York Times, August 16, 2016
Powerful NSA hacking tools have been revealed online: Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers. The Washington Post, August 16, 2016

Cyber Politics

Experts compare Trump’s and Clinton’s cybersecurity policies: Cybersecurity is now a top national security problem — some officials even call it a bigger threat than terrorism. But both major presidential candidates have hit hurdles on the campaign trail that raised questions about how they would try to keep U.S. computers safe if elected. The Washington Post, August 17, 2016
Suspected Russian DNC hackers also hit GOP, researchers say: Hackers linked to Russian intelligence services may have targeted some prominent Republican lawmakers, in addition to their well-publicized spying on Democrats, based on research into leaked emails published on a little-noticed website. Politico, August 13, 2016
The Election Won’t Be Rigged. But It Could Be Hacked: In my old workplace, right next to the comfortable couches where we would take breaks, we kept a voting machine. Instead of using the screen to pick our preferred candidate, we played Pac-Man. We sent Pac-Man’s familiar yellow chomping face after digital ghosts with the same kind of machine that had been used in 2008 in more than 160 jurisdictions with about nine million registered voters. The New York Times, August 12, 2016

Financial Cyber Security

Banking system SWIFT was anything but on security, ex-boss claims: You’d think, with the amount of money the SWIFT inter-bank payment system transfers every day, that the group would be strong on security. Not so, says a former head of the organization. TheRegister, August 18, 2016
New FFIEC Mobile Financial Services Guidelines Services Put a Stake in the Ground: According to data from IDC, the worldwide smartphone market is in excess of 2 billion units. By 2017, the smartphone market share will reach 70.5 percent, up more than 10 percent compared to 2013. SecurityIntellegence, August 17, 2016
Wall Street’s Biggest Banks Are Banding Together Against Cybercrime: A team of eight banks, including J.P. Morgan, Goldman Sachs, and Bank of America, are reportedly forming a team to tackle the growing threat of cybersecurity. The group, currently in its early stages, will trade information about digital threats and potentially play out model hacking scenarios, the Wall Street Journal reported. Fortune, August 10, 2016

Critical Infrastructure

Feds to share supply chain threat reports with industry: The U.S. National Counterintelligence and Security Center will soon provide classified supply chain threat reports to critical U.S. telecommunications, energy and financial businesses. ComputerWorld, August 15, 2016

Internet of Things

Vulnerable smart home IoT sockets let hackers access your email account: Researchers have discovered critical security flaws in connected smart plugs which can give attackers access to a full home network — as well as your email account. ZDNet, August 18, 2016

Jeff Snyder’s, SecurityRecruiter.comJeff Snyder CoachingSecurity Recruiter Blog, 719.686.8810



SecurityRecruiter.com's Security Recruiter Blog