CYBER NEWS TIDBITS FOR U - DECEMBER 2014

Welcome to Cyber News Tidbits 4​U​ !

Here are updated news compilations from the Cyber Security Community

Topic headers (+++):

1 – Security news you can likely use (re: management / opportunity items)

2 – Other items of general FYI / FYSA level interest

3 – Threats / bad news stuff / etc.. 

and…

4 – SD/SoCAL items of interest / opportunities   (send me your SD meetings!) 


A couple of Highlights  (A couple of items of potentially notable interest / high utility &  value… your mileage will vary….)

(Lots happening,  so LOTs to be aware of. Takes 5 min to skim…then pick out a topic or two..)

 ( some great topics / meetings here in SD … scroll to bottom and get engaged) 

++++  Some  highlights of the week +++

DEC 30

Since it’s New Year’s… got to have predictions…

+ Cybersecurity hindsight and a look ahead at 2015

This year we witnessed a series of high-profile security breaches, from the aftermath of the Target and Home Depot fiascos, to a number of attacks on other national retailers, including Michaels, Goodwill and Neiman Marcus. Then there was the massive breach at JP Morgan Chase, which compromised personal information of more than 83 million households and businesses, and finally over 100 terabytes of internal files and films recently stolen from Sony. Nobody was safe in 2014. In addition to large retailers, media companies and financial institutions, technology companies like eBay and Snapchat were hacked, too, and so were government organizations and healthcare institutions. Also this year, massive Internet infrastructure vulnerabilities were discovered, including Shellshock, Heartbleed and POODLE.

http://techcrunch.com/2014/12/28/cyber-security-hindsight-2020-and-a-look-ahead-at-2015/

AND another – Proofpoint cybersecurity predictions for 2015 – Let’s just FIX what we know is broken!!

http://www.vigilance-securitymagazine.com/industry-news/cyber-security-and-e-crime/6047-proofpoint-cybersecurity-predictions-for-2015?utm_medium=twitter&utm_source=twitterfeed

 

 

+ Top Data Breaches of 2014 – SONY is but ONE (and a call to cyber arms…)

If the top breaches of 2014 taught the security world anything, it’s that size and sector don’t matter – all organizations are vulnerable. infographic looks at the top incidents and the lessons security leaders took away from them.

http://www.databreachtoday.com/top-data-breaches-2014-a-7736?rf=2014-12-30-edbt&utm_source=SilverpopMailing&utm_medium=email&utm_campaign=enews-dbt-20141230%20%281%29&utm_content=&spMailingID=7391869&spUserID=NTQ5MzQyNjI3MTkS1&spJobID=583816318&spReportId=NTgzODE2MzE4S0

+  Lessons Learned from Data Breaches – BUT did we – really???

http://www.riskmanagementmonitor.com/lessons-learned-from-data-breaches/

Timeline of cyber attacks and data breaches in 2014

http://www.itgovernance.co.uk/blog/list-of-the-hacks-and-breaches-in-2014/?utm_source=social&utm_medium=linkedin

 

 

+ Sony’s Wake Up Call for Cybersecurity  –  MAYBE???

How corporate executives may respond to the Sony Hack.  . if they actually get the gravity now…

http://fortune.com/2014/12/29/is-the-sony-hack-corporate-americas-cybersecurity-wakeup-call/

 

 

+ Cyber and Privacy turmoil abounds… WHAT TO DO – the CISO Fundamentals

All these hacks, leaks, breaches – more ‘admiring the problem / threat’ – spreading more “FUD” and not so much DOING cyber – so where are the affordable mitigation recommendations?    With breaches continuing to increase as well as cybercrime overall, thus financial and business loses increasing too, organizations need to take a more effective enterprise risk management approach to cyber security and protecting privacy.  So what are the ‘due diligence’ cyber steps needed, that we can afford? Gary and I developed a two-page “CISO Fundamentals” paper to help quantify what that entails. Take a quick peek and let us know what else you think is needed.

http://www.sciap.org/blog1/wp-content/uploads/CISO-Fundamentals.pdf

 

 

+ The first polymorphic ransomware emerges, spreads on its own – SCARY STUFF!!

A new step in the evolution of ransomware has been documented by security researchers who discovered a sample that encrypts the files on the storage unit and creates unique instances of itself due to its polymorphic feature. This threat has been named VirRansom and VirLock by researchers from Sophos and ESET, respectively, in order to relay both its virus and desktop locking and ransomware sides. However, unlike the usual crypto-malware, this one allows decryption of the files, but it won’t stop locking the screen, thus forcing the victim to pay.

http://news.softpedia.com/news/The-First-Polymorphic-Ransomware-Emerges-Spreads-On-Its-Own-468232.shtml

 

 

+ And the Winner for the Most Hacked Sector for 2014 is … Health and Medical

http://workplacetablet.com/2014/12/29/and-the-winner-for-the-most-hacked-sector-for-2014-is-health-and-medical/

How much does that cost???  Data Breach Cost Calculator

http://www.hubinternational.com/data-breach-cost-calculator/

 

 

+ 2014 is ending, but this wave of technology disruptions is just beginning

Changes in technology are happening at a scale which was unimaginable before and will cause disruption in industry after industry. This has really begun to worry me, because we are not ready for this change and most of our leading companies won’t exist 15–20 years from now. Here are five sectors to keep an eye on

https://www.linkedin.com/pulse/2014-ending-wave-technology-disruptions-just-beginning-vivek-wadhwa?trk=tod-home-art-list-large_0

 

 

+ DARPA’s Autonomous Microdrones Designed to Enter Houses

And you thought those pesky quad-copters were an invasion of privacy, a perfect terrorists tool…;-((

http://www.activistpost.com/2014/12/darpas-autonomous-microdrones-designed.html

 

 

+ IoT & Marketing in 2015: 3 Ways Marketers Will Rethink Big Data

https://www.linkedin.com/pulse/iot-marketing-2015-3-ways-marketers-rethink-data-cheryl-metzger?trk=nus-cha-roll-art-title

 

 

+ What 2015 Holds for Cybersecurity Stocks — HD, JPM, EBAY, SNE, CSCO

http://www.investingdaily.com/21804/what-2015-holds-for-cybersecurity-stocks/

 

 

 

 

++++  Cyber Security News you can use  +++

 

 

+ Apple Issues First Automatic Update (what does this tell you… on several fronts!!!)

Apple has pushed out its first automated update. The fix aims to address flaws in the Mac OS X network time protocol (NTP) segment. Apple has had the capability to push out fixes for several years, but this is the first time it has actually used the service. The vulnerability fixed in this patch lies in the NTP in OS X clock systems.

http://www.scmagazine.com/apple-premiers-automatic-update-for-security-flaw/article/389804/

 

 

+ Will CDM finally be ‘the realization of IT security’?

For more than a decade, the federal government has been moving from a periodic, compliance-based approach to IT security to real-time awareness based on the continuous monitoring of IT systems and networks. While progress has been spotty so far, some security watchers say Phase 2 of the Homeland Security Department’s Continuous Diagnostics and Mitigation program, expected to be implemented in 2015, could be a major step forward. Jeff Wagner, director of security operations for the Office of Personnel Management, said Phase 2 could be “the realization of IT security.”

http://gcn.com/articles/2014/12/17/cdm-phase-2.aspx

 

 

+ NSA Releases 12 Years Worth of Internal Reports

US National Security Agency (NSA) made public 12 years worth of internal reports for the President’s Intelligence Oversight Board. Even so, the reports indicate that the NSA conducted illegal surveillance with mild or no consequences. The reports, which are heavily redacted, were released in response to a Freedom of Information Act (FOIA) lawsuit brought by the American Civil Liberties Union (ACLU).

http://arstechnica.com/tech-policy/2014/12/on-christmas-eve-nsa-quietly-releases-12-years-worth-of-internal-reports/

 

 

+ Cybersecurity Firm Identifies Six In Sony Hack

One A Former employee – do you have a tight process to delete ALL the terminated employee’s access???

http://news.yahoo.com/cybersecurity-firm-identifies-six-sony-hack-one-former-194123498.html

 

 

+ Security in 2015: Will you care about the next big breach?

http://www.cnet.com/news/security-in-2015-will-you-care-about-the-next-big-breach/#ftag=CAD590a51e

 

 

+  Breaches should reignite push for better cyber hygiene  — YES!!!

While it is debatable as to whether or not companies like USIS or Keypoint had sufficient internal cybersecurity controls in place to mitigate the breaches, what’s clear is that most contracting vehicles are outdated and ill-suited for the cyber challenges of today.

http://www.federaltimes.com/story/government/dhs/blog/2014/12/24/data-breach-security-clearance/20859009/

 

 

+ Congress is urged to make key decisions on commercial drones

The Obama administration is on the verge of proposing long-awaited rules for commercial drone operations in U.S. skies, but key decisions on how much access to grant drones are likely to come from Congress next year http://www.stripes.com/news/us/congress-is-urged-to-make-key-decisions-on-commercial-drones-1.321347

 

 

+  Insider Threats a Major Concern for Businesses (this should be obvious to all by now)

http://mobile.eweek.com/small-business/insider-threats-a-major-concern-for-businesses.html

 

 

+ NIST Cybersecurity Framework infographic… how it all integrates..

http://www.slideshare.net/mobile/markb677/my-nist-cybersecurity-reference-model-v01r01-draft

 

 

+ Snowden Documents Show How Well NSA Codebreakers Can Pry

http://www.slideshare.net/mobile/markb677/my-nist-cybersecurity-reference-model-v01r01-draft

 

 

+ Security and the Rise of Machine-to-Machine (M2M) Communications  (IoE & IoT)

http://www.techrepublic.com/resource-library/whitepapers/security-and-the-rise-of-machine-to-machine-m2m-communications/?promo=550&trial=25842501&ftag=&ftag=&ftag=TREe9f9a2b&tag=wpzd&ttag=e550&s_cid=e550&cval=dms-docid-list-zd&tag=nl.e550

 

 

+ 10 Top Challenges Industrial IoT Must Overcome in 2015

http://www.eetimes.com/document.asp?doc_id=1325067

 

 

+ 2015 CISO Wish List and New Year Resolutions

https://www.linkedin.com/today/post/article/2015-ciso-wish-list-new-year-resolutions-jonathan-trull

AND

http://www.techweekeurope.co.uk/security/firewall/chief-security-officers-ask-santa-christmas-158135

SO.. quit wishing for stuff and DO the CISO fundamentals!!!

 

 

+ Smartwatch Hacked, how to access data exchanged with Smartphone

http://securityaffairs.co/wordpress/31007/intelligence/smartwatch-hacked.html

 

 

‘+ Farcing’ overtaking ‘phishing’ as online identity theft threat

http://www.consumeraffairs.com/news/farcing-overtaking-phishing-as-online-identity-theft-threat-080614.html

 

 

+ Pew Research VCenter: The future of privacy – VERY IN-DEPTH review!!

http://www.pewinternet.org/files/2014/12/PI_FutureofPrivacy_121814_pdf1.pdf

 

 

 

 

 

++++  FYI / FYSA   +++

 

 

+ Sony hack: Is Congress next?

Government agencies and congressional offices are vulnerable to the same kind of cyberattack that hit Sony Pictures, experts say. Lawmakers on Capitol Hill are well aware of the growing threat online, and many tell staff to act as if everything they write in email could one day become public. “I try to inspire my staff often that when they write an email, they write it as if it should be right on the front page of your newspaper,” said Rep. Brad Sherman (D-Calif.), whose district includes Hollywood, in an interview with The Hill.

http://thehill.com/policy/cybersecurity/228054-sony-hack-could-congress-be-next

 

 

+ Obama signs 5 cybersecurity bills

Without ceremony, President Obama on Dec. 18 signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the law that governs federal government IT security. It’s the first time in 12 years that significant cybersecurity legislation has become law. The last major piece of cybersecurity law to be passed by Congress and signed by a president was the E-Government Act of 2002, which included FISMA.

http://www.govinfosecurity.com/obama-signs-5-cybersecurity-bills-a-7697/op-1

 

 

+ German researchers discover a flaw that could let anyone listen to your cell calls

German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts and other services to each other. Experts say it’s increasingly clear that SS7, first designed in the 1980s, is riddled with serious vulnerabilities that undermine the privacy of the world’s billions of cellular customers.

http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/

 

 

+ Attack on German Steel Factory System Caused “Massive Damage”

Attackers breached security of a German steel mill’s network and caused considerable damage by manipulating the controls of a blast furnace. The attackers gained initial foothold in the network through a phishing email, and from there were able to make their way into the plant’s production network. The attack was disclosed in the annual report of the German Federal Office for Information Security.

http://www.bbc.com/news/technology-30575104

http://www.computerworld.com/article/2861531/cyberwarfare-digital-weapons-causing-physical-damage.html

[Note: Another bad example of weak reusable passwords used for very sensitive access. Many other security failures here, but the root cause of so many breaches traces back to the use of reusable passwords and the ease of compromise, whether via phishing or eavesdropping or keystroke capture malware….   This is a classic example of the air-gap mythology that endures in industrial control system environments.  Most companies in these historically non-technology based critical infrastructure industries continue to operate as if they don’t need to be concerned about cybersecurity when in fact they should be more concerned than the companies whose greatest fear is simply losing data.  And – they need to re-evaluate their architecture to ensure physical separation of IT and OT.]

 

 

+ FIRST LOOK at Australian Signals Directorate Cloud Computing Security for Tenants guidelines:

http://www.asd.gov.au/infosec/cloudsecurity.htm

In general, the Australian Cyber Security Center has put together a “Critical Security Controls”-like look at the most important security processes to examine when considering a cloud service provider. There are several recommendations that are meaningful/doable and rightly prioritized (like “choose a CSP that has been assessed, yearly test incident response, protection authentication credentials, tokenize data, etc.). There is a sensible differentiation between what security issues are most relevant to Software as a Service vs. Infrastructure as a Service, etc. The CSP version is pretty much just the Tenant document with the syntax changed such that an auditor looks to see that the Tenant recommendations were followed.

 

 

+ Watchdog says Secret Services misses the bar on cybersecurity

The Secret Service, no stranger to security lapses, is being dinged by an internal auditor for not requiring two-step verification to access agency networks and for ignoring government-wide rules for continuously monitoring network security. For the past year, the Department of Homeland Security subdivision has refused to digitally report data about cyber defenses, according to a new inspector general report. DHS, which Congress last week designated the point-agency on cybersecurity, is in charge of the federal continuous monitoring initiative. The department’s inability to get its own agency to fall in line could raise questions about the enlargement of Homeland Security’s cyber authorities.

http://www.nextgov.com/cybersecurity/2014/12/secret-service-misses-bar-cybersecurity/101979/

 

 

+ Chinese Android phone maker hides secret backdoor in its devices

Chinese smartphone maker Coolpad has built an extensive “backdoor” into its Android devices that can track users, serve them unwanted advertisements and install unauthorized apps, a U.S. security firm alleged today. In a research paper released today, Palo Alto Networks detailed its investigation of the backdoor, which it dubbed “CoolReaper.” “Coolpad has built a backdoor that goes beyond the usual data collection,” said Ryan Olson, director of intelligence at Palo Alto’s Unit 42. “This is way beyond what one malicious insider could have done.”

http://www.computerworld.com/article/2860742/chinese-android-phone-maker-hides-secret-backdoor-on-its-devices.html

 

 

+ China is reportedly blocking access to Gmail inside the country.

China began blocking various Google services in 2009 and started blocking Gmail access earlier this year. Users have been seeking third party email clients to access their accounts, and now those have been blocked as well. The only way to access Gmail in China now is through virtual private networks (VPNs).

http://www.csmonitor.com/Innovation/2014/1229/Gmail-gets-burned-by-China-s-Great-Firewall

http://www.zdnet.com/article/gmail-reportedly-booted-out-by-chinas-great-firewall/

 

 

+ 2014: The year cyber danger doubled

As we look back at cyber topics in 2014, don’t be surprised if you are seeing double.

This has been a year when cybersecurity stories doubled in breadth, depth and width of societal influence. As the Internet has expanded into every area of life, the opportunities have grown dramatically – but so have the challenges with the ‘dark side’ of the Internet.

http://www.govtech.com/blogs/lohrmann-on-cybersecurity/2014-The-year-cyber-danger-doubled.html

 

 

+ Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014

The security of the web itself was tested in unprecedented ways in 2014–but the news isn’t all bad.

http://www.csoonline.com/article/2860838/data-protection/heartbleed-shellshock-and-tor-the-13-biggest-security-stories-of-2014.html

 

 

+ US Justice Dept. Establishes New Cyber Security

A new unit operating under the US Department of Justice’s (DoJ’s) Computer Crime and Intellectual Property division will provide legal advice for cyber crime investigations worldwide. The unit will concentrate on proactive considerations to help reduce the likelihood of attacks.

http://www.federalnewsradio.com/489/3769859/DoJs-new-cybersecurity-office-to-aid-in-worldwide-investigations

 

 

+   ‘Data Integration for Dummies’  (eBook)

http://go.informatica.com/dc/fU5fqujQHqvxhJCjRioU91zx-bkAZt9GsptCZbITYQoPYQIk-8W_gDo46O-DYcwWPhZ0JLdg23b03s9SveAC1Q==/Y0Nj80anB00vF000cHZ2gZF

 

 

+ Making Security Measurable – Application Security

http://measurablesecurity.mitre.org/directory/areas/applicationsecurity.html

Making Security Measurable – Software Assurance

http://measurablesecurity.mitre.org/directory/areas/softwareassurance.html

 

 

+ 8 ways mobile will get your attention in 2015

http://www.cnet.com/news/eight-ways-mobile-will-get-your-attention-in-2015/?tag=nl.e703&s_cid=e703&ttag=e703&ftag=CAD090e536

 

 

+ Hackers hit a poorly configured server to breach JPMorgan

Weak hygiene and access control…   THE cause of 95% of all security incidents…;-((

So when will folks make this job one???

http://securityaffairs.co/wordpress/31450/cyber-crime/update-on-breach-jpmorgan.html

 

 

+ An ‘Hour of Code’? How About 5 Minutes for Security?

http://www.techzone360.com/topics/techzone/articles/2014/12/12/395123-an-hour-code-how-5-minutes-security.htm

 

 

+ The Future of Cybersecurity Jobs

http://www.monster.com/technology/a/Future-of-Cybersecurity-Jobs?wt.mc_n=CRM_US_B2C_LC_TWOM_TechC1_141226

 

 

+  Tracking Moving Targets: Exploit Kits and CVEs

https://www.recordedfuture.com/tracking-exploit-kits/

 

 

+ FBI: The Top 3 Ways Congress Could Help Fight Tenacious Cyber Threats

Demarest suggested three ways Congress could help evolve with cyber threats.

http://www.networkworld.com/article/2858651/malware-cybercrime/fbi-the-top-3-ways-congress-could-help-fight-tenacious-cyber-threats.html

 

 

 

 

++++  THREATs  / bad news stuff / etc  +++

 

 

+ The Coolest Hacks Of 2014

TSA baggage scanners, evil USB sticks, and smart homes were among the targets in some of the most creative — and yes, scary — hacks this year by security researchers.  A weaponized PLC…. Cheating TSA’s carry-on baggage scanners… Hacking satellite ground terminals by air, sea, land…   Smart home devices not so savvy…   Crashing the vehicle traffic control system…  One bad-ass USB….    A worm in your NAS…

http://www.darkreading.com/vulnerabilities—threats/the-coolest-hacks-of-2014/d/d-id/1318348?_mc=NL_DR_EDT_DR_daily_20141229&cid=NL_DR_EDT_DR_daily_20141229&elq=aca7e6bc6d844d199bda56e5dc95c3cb&elqCampaignId=11806

 

 

+ U.S. puts new focus on fortifying cyber defenses

The Obama administration is increasingly concerned about a wave of digital extortion copycats in the aftermath of the cyberattack on Sony Pictures Entertainment, as the government and companies try to navigate unfamiliar territory to fortify defenses against further breaches. About 300 theaters on Thursday screened the movie that apparently triggered the hacking attack, a comedy about the assassination of North Korean leader Kim Jong Un, after Sony reversed its initial decision to acquiesce to hacker demands that the film be shelved.

http://www.wsj.com/articles/u-s-puts-new-focus-on-fortifying-cyber-defenses-1419553122

 

 

+ For North Korea’s cyber army, long-term target may be telecoms, utility grids

The hacking attack on Sony Pictures may have been a practice run for North Korea’s elite cyber-army in a long-term goal of being able to cripple telecoms and energy grids in rival nations, defectors from the isolated state said. Non-conventional capabilities like cyber-warfare and nuclear technology are the weapons of choice for the impoverished North to match its main enemies, they said. Obsessed by fears that it will be over-run by South Korea and the United States, North Korea has been working for years on the ability to disrupt or destroy computer systems that control vital public services such as telecoms and energy utilities, according to one defector.

http://www.reuters.com/article/2014/12/19/us-sony-cybersecurity-northkorea-idUSKBN0JX0JW20141219

 

 

+ Misfortune Cookie flaw puts 12 million routers at risk

Researchers at the security software company Check Point say they’ve discovered a serious vulnerability lurking inside the routers and modems used to deliver Internet connectivity to 12 million homes and small businesses around the world, and it’s going to be a complicated matter to fix it. Dubbed the Misfortune Cookie, the weakness is present in cable and DSL modems from well-known manufacturers like D-Link, Huawei and ZTE, and could allow a malicious hacker to hijack them and attack connected computers, phones and tablets. An attacker exploiting Misfortune Cookie could also monitor a vulnerable Internet connection, stealing passwords, business data or other information.

http://recode.net/2014/12/18/misfortune-cookie-flaw-puts-12-million-routers-at-risk/

 

 

+ ICANN e-mail accounts, zone database breached in spearphishing attack

Unknown attackers used a spearphishing campaign to compromise sensitive systems operated by the Internet Corporation for Assigned Names and Numbers (ICANN), a coup that allowed them to take control of employee e-mail accounts and access personal information of people doing business with the group. ICANN, which oversees the Internet’s address system, said in a release published Tuesday that the breach also gave attackers administrative access to all files stored in its centralized zone data system, as well as the names, postal addresses, e-mail addresses, fax and phone numbers, user names, and cryptographically hashed passwords of account holders who used the system.

http://arstechnica.com/security/2014/12/icann-e-mail-accounts-zone-database-breached-in-spearphishing-attack/

 

 

+ Russian Group Stole Millions from Banks

A cyber crime group has been targeting banks, payment systems, and retail companies in Russia and countries that were once part of the Soviet Union. Known as Anunak, the group stole funds, credit card data, and intellectual property. They stole from cash machine networks, which means the finds are being stolen from the banks and not customers’ accounts. In all, the group has stolen more than US $25 million.

http://www.computerworld.com/article/2861449/cybercrime-group-steals-millions-from-russian-banks-targets-us-and-european-retailers.html

http://krebsonsecurity.com/2014/12/gang-hacked-atms-from-inside-banks/

 

 

+ Xbox Live, PlayStation Network Target of DDoS Attacks

Last week, users found they were unable to log into the PlayStation Network and Xbox Live; Sony says the problems were caused by distributed denial-of-service (DDoS) attacks. The trouble began on the evening of December 24. As of Sunday, December 28, the PlayStation network is back online. The FBI is reportedly investigating the attacks.

http://www.computerworld.com/article/2863446/sony-says-playstation-network-is-back-online-now-really.html

http://arstechnica.com/security/2014/12/grinches-steal-christmas-for-xbox-live-playstation-network-users/

 

 

+ Security boot kits past present future (eBOOK)

A history of these malware tools, and why might the future bring…

https://www.virusbtn.com/pdf/conference/vb2014/VB2014-RodionovMatrosovHarley.pdf

 

 

+ 10 deadliest differences of state-sponsored attacks

http://www.csoonline.com/article/2852855/advanced-persistent-threats/10-deadliest-differences-of-state-sponsored-attacks.html

 

 

 

++++   SD/SoCAL security events / opportunities +++

 

+ CyberTECH events / networking / startups / etc  —  THE cyber happening place in SD!!! 

Join their Meetup Group for the latest event information!   The definition of “Cyber KEWEL

http://www.meetup.com/cybertech/

 

+ Webster University’s  new SD cyber security program – check it out..

http://www.webster.edu/sandiego/academic-programs/cybersecurity.html

 

 

JAN

 

15 – OWASP – Running InfoSec for America’s Finest City..   Gary Hayslip, CISO for the city of San Diego,

http://www.meetup.com/Open-Web-Application-Security-Project-San-Diego-OWASP-SD/events/218878976/?a=md1_evn&rv=md1&_af_eid=218878976&_af=event

 

15 – IoT Startup Table Breakfast

http://www.meetup.com/CyberTECH/events/204340262/

 

28 – International Data privacy day

A – “Securing the IoT Privacy masters” by  CyberTECH, SOeC, others – all day event –

http://cyberhivesandiego.org/siot-forum-2014/

 

B –   Data Privacy Day–   NCSA and Morrison & Foerster LLP  – all day event –

http://www.laresinstitute.com/archives/4514

 

 

30  – Cross Border cyber opportunities – MX/TJ and CA/SD collaboration event, all day Friday!!! (Hosted at Coleman University) – Contact me to join in…  introduction email and agenda at:

http://www.sciap.org/blog1/?page_id=1586

 

 

31 – BigDataDay 4 SD”  all-day event SAT – free –   Jump in and help us – speak and make it great for all!

WE went to the one in LA and it was great…   our three tracks will be:

(1)  Technical =  Hadoop / Hbase / NoSQL;

(2)  Data science = predictive analytics, parallel algorithms, statistical modeling, algorithms for data mining, etc and

(3)  Applications =  key use cases…  Privacy by Design / data security,  data start-ups / incubators, novel products,

Contact me to join in…  introduction email and agenda at:

http://www.sciap.org/blog1/?page_id=1256

 

 

FEB

 

8-11 – NDSS Symposium 2015

http://www.internetsociety.org/events/ndss-symposium-2015

 

10-12 –  AFCEA West –  Focused on Operations in the Asia-Pacific Region

http://events.jspargo.com/West15/public/enter.aspx

 

 

 

+++  Future events in planning  FYI:

 

25-26 Apr – CYBERWEST: The Southwest Cybersecurity Summit (Phoenix AZ)

http://www.afei.org/events/5A06/Pages/default.aspx

 

4-12 May SANS Security West 2015

http://www.sans.org/event/sans-security-west-2015

 

18-21 Jul  Esri National Security summit

http://www.esri.com/events/homeland

 

 

TBD  – Provided by IEEE Cyber SIG / Various Security groups – all day

Privacy by design workshop – a cyber model & why you must be part of this initiative!  (at Coleman University –  AM Technical approach… PM public discussions)     Help move SD forward in cyber – DOING security vs admiring the problem…. SO engage and help out on cyber 4 PbD!!!

+++  Join our PbD / data security meetup, stay tuned into what’s happened..

http://www.meetup.com/San-Diego-Privacy-by-Design-Data-Security-Meetup/

See our over Cyber for PbD brief at

http://www.sciap.org/blog1/wp-content/uploads/Privacy-PAYS-cyber-message.pdf

AND Our more detailed technical paper on our Cyber 4 PbD approach, including an executable, proposed open privacy framework within an enterprise architecture is at (this rough draft was  published in a major IEEE magazine this month):

http://www.sciap.org/blog1/wp-content/uploads/Cyber-4-PbD_IEEE-CE-mag-article.pdf

————————————————————————————

DEC 21

+ YES, the SONY hack (security and IP disaster) is all over the news, with even the president getting engaged.  One might think this will motivate companies to finally get serious on Cyber security… MAYBE.. a few links to that:

+ Hackers’ threats prompt Sony Pictures to shelve Christmas release of ‘The Interview’

Sony Pictures Entertainment on Wednesday canceled the Christmas Day release of “The Interview,” bowing to threats of a wide-scale attack from hackers who U.S. intelligence officials have concluded were working for North Korea. U.S. officials, though, were not prepared to publicly accuse the reclusive government, in large part because the Obama administration has not determined what, if any, action it could take. Intelligence officials believe with “99 percent certainty” that hackers working for the North Korean government carried out the attack,

http://www.washingtonpost.com/business/economy/top-movie-theater-chains-cancel-premiere-showings-of-the-interview/2014/12/17/dd1bdb2a-8608-11e4-9534-f79a23c40e6c_story.html?wprss=rss_business

+ Guardians of Peace claiming responsibility for the devastating hacking attack against Sony offered to selectively hold back on releasing email correspondence of its employees, provided that they write in and ask.

http://recode.net/2014/12/14/sony-hackers-offer-to-withhold-stolen-data-from-promised-leak/

+ Not everyone agrees that the Sony Pictures attack emanated from North Korea. Attribution for cyber attacks is difficult. Attackers can use proxies and phony IP addresses, and they can plant false clues inside the code of their malware. The initial attack appears to have been financially motivated. The film was not mentioned until later in the chain of events.

http://www.wired.com/2014/12/north-korea-did-not-hack-sony-probs/

+ How Much Will Scrapping ‘The Interview’ Cost Sony?  estimated $90 million financial hit

https://www.linkedin.com/pulse/how-much-scrapping-interview-sharon-waxman

 

 

+ Some GREAT events in late January in SD..

With four all-day venues for national privacy day (2), big data / predictive analytics, and a very cool cross border cyber opportunities (see details at the end of the email)

 

 

+ The Top 10 Privacy Law Stories of 2014

From China to California to the EU; starring giants of the leisure industry, the tech industry and global governments, and encompassing battles over personal freedoms and government overreach-these are the Privacy Tracker stories that made sure nobody in privacy could nap on the job

https://privacyassociation.org/news/a/the-years-best-in-privacy-opinion/

and

https://privacyassociation.org/news/a/tracking-the-top-ten-in-privacy-legislation/

 

 

+ Cloud Predictions For 2015

http://www.rackspace.com/blog/cloud-predictions-for-2015/

 

 

+ Cisco sees a data analytics fortune at the edge of the network

http://www.pcworld.com/article/2858932/cisco-sees-a-data-analytics-fortune-at-the-edge-of-the-network.html

 

 

+ Agencies Mold Regulations around ‘Voluntary’ Cyber Standards

http://www.nextgov.com/cybersecurity/2014/12/agencies-mold-regulations-around-voluntary-cyber-standards/101217/

 

 

SANS 20 Critical Controls for Effective Cyber Defense Helper Kit  (EXCELLENT TOOL / spreadsheet!!!)  (note 10 MB)

https://www.amazon.com/clouddrive/share/Zcuu3z2MEE5K_2JbLI2Bkihc3i2lYf2ZYompuqznuDY

 

 

+ One Simple Presentation Shows How Public Is Your Private Information

http://hackread.com/how-public-is-you-private-information/

 

 

+ Top Treasury Official’s Speech Urges Adoption of Cyber Risk Insurance

http://www.dandodiary.com/2014/12/articles/cyber-liability/top-treasury-officials-speech-urges-adoption-of-cyber-risk-insurance/#.VIY_-UA-kDE.twitter

 

 

+ Big Data Market Projected to Reach $76 Billion by 2020

http://www.information-management.com/news/Big-Data-Market-Forecast-Spending-2020-10026306-1.html?adbpl=tw&adbsc=social_bigdata36757717

 

 

+ U.S. Federal Cybersecurity Market Forecast 2015-2020

With a cumulative market valued at $65.5 billion (2015 – 2020), the U.S. Federal Cybersecurity market will grow steadily at about 6.2% CAGR

http://www.marketresearchmedia.com/?p=206

 

 

+ SIX technologies that will change PCs in 2015

http://www.computerworld.com/article/2860098/6-technologies-that-will-change-pcs-in-2015.html

 

 

 

 

 

++++  Cyber Security News you can use  +++

 

 

+ FireEye predictions for cybersecurity in 2015

Sony is still smarting over a cataclysmic cyberattack, US banks, Target and Staples have all been targeted, and it seems hackers are always one step ahead. But what can we expect from next year? Security flaws Heartbleed, Cryptolocker and Shellshock have all had their time in the media spotlight, companies are reviewing their risk management and damage control processes, and investment is being pumped into training the next generation of cybersecurity experts in an attempt to keep corporate network intrusion to a minimum. Mobile and Web-based viruses remain a scourge, and hardly a week goes by without hearing of another data breach or a new strain of malware being discovered in the wild. According to Greg Day, CTO of the EMEA region at security firm FireEye, these situations are likely to deepen and worsen over the coming year and into 2015.

http://www.zdnet.com/article/fireeye-predictions-for-cybersecurity-in-2015/

 

 

+ Cyber-espionage expected to surge in 2015:

McAfee Labs’ annual threats predictions report for the coming new year.

http://www.zdnet.com/article/cyber-espionage-expected-to-surge-in-2015-mcafee-labs/

 

+ Annual Cybercrimes Report of 2014 – Stats & Top 15 Hack Cases

http://www.vpnranks.com/annual-cybercrimes-report-of-2014/

 

+ 2014 in security: The biggest hacks, leaks, and data breaches

http://www.zdnet.com/pictures/2014-in-security-the-biggest-hacks-leaks-and-data-breaches/?tag=nl.e539&s_cid=e539&ttag=e539&ftag=TRE17cfd61

 

+ Employees Remain the Biggest Risk for Critical Data Loss

http://blog.norsecorp.com/2014/12/16/employees-remain-the-biggest-risk-for-critical-data-loss/

 

+ 10 Top Information Security Threats for the Next Two Years

http://www.cio.com/article/2368648/security0/149359-10-Top-Information-Security-Threats-for-the-Next-Two-Years.html

 

+ Expert Internet Security Predictions for 2015

http://blog.kaspersky.com/ksb2014-predictions/

 

+ 2015 Predictions: The Year of Alternatives

https://www.linkedin.com/pulse/20141208153817-441329-2015-predictions-the-year-of-alternatives

 

+ Global Information Security Survey 2014 (infograph)

http://www.ey.com/GL/en/Services/Advisory/EY-global-information-security-survey-2014-infographics?utm_source=LinkedIn&utm_medium=SU&utm_content=who_is_out_there&utm_campaign=GISS_EN

 

 

+ Apps, not malware, should be your biggest mobile concern

Network security would be relatively simple if it weren’t for end users.  But just when IT staff are feeling like they are getting network security somewhat under control, employees and bosses alike are demanding access from a dizzying array mobile devices running on a variety of operating systems. NowSecure, until recently known as viaForensics, is taking an unusual two-pronged strategy to mobile security that focuses on enforcing security from the center while informing users about security risks at the end points of their mobile devices.

http://gcn.com/blogs/emerging-tech/2014/12/mobile-app-security.aspx

 

 

+ Hackers are getting personal information easier than before

In the mobile app world, when hackers want access to personal information, they need simply ask. This is one of several key findings Symantec Corp. released today as part of the company’s “Mobile App Security” study. The study found that many are willing to forego privacy in exchange for free entertainment.

http://www.computerdealernews.com/news/those-most-concerned-with-privacy-are-giving-it-away-symantec/38454

 

 

+ New York Financial Institutions Will be Evaluated on Cyber Security  (MORE will follow suit!!!)

The Superintendent of New York’s Department of Financial Services has asked member organizations to consider cyber security “an integral aspect of their overall risk management strategy” instead of an issue for just information technology. Banks and other financial institutions in New York will be evaluated on their cyber security, including their use of multi-factor authentication and identity and access management. The requirements affect all financial institutions operating with a New York state charter or license.

http://www.zdnet.com/article/ny-bank-regulators-cybersecurity-plan-includes-strong-authentication-identity/

 

 

+Agencies Encourage Adoption of Cyber Security Standards

Government agencies have begun encouraging industries that they oversee to adopt applicable cyber security guidelines from the US National Institute of Standards and Technology (NIST). While the standards in the guidelines are voluntary, there is a possibility that they could become mandatory. NIST published the voluntary standards as part of the Framework for Improving Critical Infrastructure Cybersecurity.

http://www.nextgov.com/cybersecurity/2014/12/agencies-mold-regulations-around-voluntary-cyber-standards/101217/?oref=ng-channeltopstory

 

 

+ Dude, Where’s My Security ROI?

Great stab at quantifying cyber worth..  Yet the ALE… etc.. still have fuzzy math.. rare events with possibly huge impacts.. (rather like dividing by zero.  )… so the model must be explained to none technical folks..  And of course improving cyber hygiene and access control is essentially free..  Also. . Need to transfer risk.. cyber insurance..  might be a better buy..

http://blog.norsecorp.com/2014/12/17/dude-wheres-my-security-roi/

 

 

+ IT Security is NOT Rocket Science

He re-states many good points.  90+% of all security incidents are from lack of cyber hygiene and weak access control.. period!!!  All items you must do anyway.. thus little to no added cost.. Yet few DO the security basics..

https://www.linkedin.com/today/post/article/security-rocket-science-steven-olson

 

 

+ The SONY cyber attack was a sophisticated operation

so sophisticated, officials say, that the same attack could have made it through the defenses of almost any large organization, including the ones currently deployed by federal agencies

http://www.federalnewsradio.com/533/3760848/FBI-Cyber-attack-against-Sony-would-have-bested-most-federal-defenses-too

 

+ YET –  The malware used was unsophisticated and riddled with bugs. However, it did what it was supposed to do; the malware’s purpose did not require complex code. However, the malware’s construction indicates a familiarity with the Sony Pictures network.

http://arstechnica.com/security/2014/12/state-sponsored-or-not-sony-pictures-malware-bomb-used-slapdash-code/

http://www.usatoday.com/story/tech/2014/12/06/sony-attack-new-era-nuclear-option/19963063/

 

+ Former NSA Insider: More Sony-Like Hacks A Given As Corporations Still Weak On Cybersecurity

http://m.ibtimes.com/former-nsa-insider-more-sony-hacks-given-corporations-still-weak-cybersecurity-1763116#%2EVJTdAujPxEI%2Elinkedin

Sony hack: How cybercrime just got even more complicated

http://www.zdnet.com/article/sony-hack-how-cybercrime-just-got-even-more-complicated/

 

+ BitTorrent’s Offer To Sony: Release “The Interview” Safely Online With Us And Make Money

http://m.fastcompany.com/3040247/bittorrents-offer-to-sony-release-the-interview-safely-online-with-us-to-make-serious-cash?partner=rss

 

+ Breach insurance might not cover losses at Sony Pictures

http://www.csoonline.com/article/2859535/business-continuity/breach-insurance-might-not-cover-losses-at-sony-pictures.html

 

 

+ This Little USB Necklace Hacks Your Computer In No Time Flat

http://techcrunch.com/2014/12/18/this-little-usb-necklace-hacks-your-computer-in-no-time-flat/?ncid=rss&cps=gravity_1462_-8009201076139547858

 

 

+ DoD allows vetted commercial cloud services for sensitive unclassified data, updated guidance

http://www.fiercegovernmentit.com/story/dod-allows-vetted-commercial-cloud-services-sensitive-unclassified-data-upd/2014-12-17?utm_campaign=SocialMedia

 

 

+ CISO Assessment: For Security Leaders, a Stronger Voice

http://securityintelligence.com/ciso-assessment-for-security-leaders-a-stronger-voice/

 

 

+ Cybersecurity & Cyber Defense

Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Don’t Worry About It!

http://cyber-defense.sans.org/blog/2014/12/18/implementing-the-20-critical-controls-on-a-low-cost-budget-do-it-dont-worry-about-it#.VJIptgIxXVo.twitter

 

 

+ Demand for cyber security professionals higher than ever before :

http://www.contractoruk.com/news/0011848demand_cyber_security_professionals_higher_ever.html

 

 

+ NSA aurora gold spies on any wireless network, anywhere

http://www.techtimes.com/articles/21698/20141209/nsa-auroragold-program-designed-to-spy-on-any-wireless-network-anywhere.htm

 

 

+ Ready Technology Trends

http://www.ittoday.info/ITPerformanceImprovement/Articles/2014-12Andriole.html

 

+ Trends to Watch in 2015: From Algorithmic Accountability to the Uber of X

http://www.wsj.com/articles/BL-DGB-39267

 

 

 

 

++++  FYI / FYSA   +++

 

 

+ NIST revises guide on security controls

New guidance published by the National Institute of Standards and Technology is aimed at helping federal agencies and other organizations in and out of government assess proper security and privacy controls, especially those tied to the continuous monitoring of IT systems for vulnerabilities. NIST unveiled on Dec. 15 Special Publication 800-53A Revision 4, “Assessing Security and Privacy Controls in Federal Information Systems and Organizations,” which supplements SP 800-53 Rev 4, “Security and Privacy Controls for Federal Information Systems and Organizations,” published in April 2013.

http://www.govinfosecurity.com/nist-revises-guide-on-security-controls-a-7679

 

 

+ Price tag rises for stolen identities sold in the underground

One year after the cybercrime underground slashed the price of a stolen identity by as much as 37% due to a glut in the black market, the price tag for a pilfered ID has inched upward again. Researchers at Dell SecureWorks published their latest report on the underground hacker market today. Counterfeit identities are the new hot product to support fraud — new fake identity kits, passports, Social Security numbers, utility bills, and driver’s licenses. A new identity, including a working SSN, name, and address, goes for $250, and for an additional $100, you can get a utility bill for ID verification purposes when perpetrating fraud, the researchers found

http://www.darkreading.com/attacks-breaches/price-tag-rises-for-stolen-identities-sold-in-the-underground/d/d-id/1318165?_mc=RSS_DR_EDT

 

 

+Cybersecurity codes now attached to jobs government-wide

Every position in the federal workforce now has a cybersecurity job code listed in its description for more effective tracking of the lagging cyber workforce, even if the job isn’t cybersecurity-related.

http://fedscoop.com/cybersecurity-codes-opm/

 

 

+ Cyberattacks longer, more continuous than before

Companies hit with cyberattacks this year spent a longer time on average mitigating the threat than at any time previously, highlighting the growing sophistication and complexity of the threat landscape.

http://www.darkreading.com/perimeter/cyberattacks-longer-more-continuous-than-before-/d/d-id/1318109?_mc=RSS_DR_EDT

 

 

+ Real-life ‘Criminal Minds’ team tries to root out rogue federal employees

The term ‘insider threat’ describes everything from government employees who snap on the job and commit violence to those who leak national secrets. But researchers say using technology to detect otherwise hidden behavioral patterns could help federal managers screen out mischief-makers of all stripes. Moreover, they could do so within the bounds of privacy.

http://www.nextgov.com/cybersecurity/2014/12/real-life-criminal-minds-team-tries-root-out-rogue-federal-employees/100998/?oref=ng-channeltopstory

 

 

+ Dutch Privacy Watchdog Hounds Google and Facebook

The Dutch data protection authority College Bescherming Persoonsgegevens (CBP) has ordered Google to abide by that country’s privacy rules or be subject to penalties of as much as 15 million euros (US $18.4 million).

Google has been using user data to offer targeted advertising. The watchdog group has also turned its attention to Facebook, launching an investigation into that company’s new privacy policy, which is scheduled to take effect on January 1, 2015.

http://www.zdnet.com/article/facebook-to-dutch-regulators-whats-the-privacy-problem-nothings-changed/

 

 

+ 2014 FISMA reduces paperwork, codifies management structure

Agencies won’t have to complete huge three-year reports but will have to submit information on security incidents http://www.federaltimes.com/article/20141216/FEDIT03/312160019/2014-FISMA-reduces-paperwork-codifies-management-structure

 

 

+ Week to Weak: The Weaponization of Cyber Vulnerabilities

http://go.recordedfuture.com/week-to-weak-report?utm_campaign=WTW-RT&utm_medium=social&utm_source=linkedin

 

 

+ Schneier on Security: Over 700 Million People Taking Steps to Avoid NSA Surveillance

https://www.schneier.com/blog/archives/2014/12/over_700_millio.html

 

 

+ Hired Guns: The Consultants – The Chronicle of Higher Education – more opportunities

http://m.chronicle.com/article/Hired-Guns-The-Consultants/150843/?cid=at&utm_source=at&utm_medium=en

 

 

+ Is there a missing generation of cyber security professionals?

https://www.linkedin.com/today/post/article/missing-generation-cyber-james-bier

 

 

+ Most Organizations Don’t Properly Secure Sensitive Data, Report Finds

http://mobile.eweek.com/security/most-organizations-dont-properly-secure-sensitive-data-report-finds.html

 

 

+ Top 5 Data Breaches of 2014   and why “Privacy PAYS”

https://www.linkedin.com/today/post/article/top-5-data-breaches-2014-emily-maxie

 

 

+ Counting the real cost of cyber attacks

http://m.smh.com.au/it-pro/security-it/counting-the-real-cost-of-cyber-attacks-20141216-128ehk.html

 

 

+ Worried About a Data Breach? Here’s How to Respond to the Threat

http://www.datasurer.com/worried-about-a-data-breach/

 

 

+ Data Breaches to Continue to Plague Healthcare in 2015

http://www.healthdatamanagement.com/news/Data-Breaches-to-Continue-to-Plague-Healthcare-in-2015-49395-1.html

 

 

+ The Sleeping Giant: How Wearables Will Revolutionize Healthcare

http://wearables.reviewed.com/features/how-wearables-will-revolutionize-healthcare?sf34378236=1

 

 

+ Too Much Insider Access To Critical Data Is A Growing Risk

http://www.forbes.com/sites/dinamedland/2014/12/09/too-much-insider-access-to-critical-data-is-a-growing-risk/

 

 

+ IBM: CISO’s outgunned in the cybercrime corral

http://www.networkworld.com/article/2857128/security0/ibm-ciso-s-outgunned-in-the-cybercrime-coral.html#linkedin

 

 

+ Chief information security officers hard to find — and harder to keep

http://www.usatoday.com/story/tech/2014/12/02/sony-hack-attack-chief-information-security-officer-philip-reitinger/19776929/

 

 

 

+ Infograph – Ponemon  Top Enterprise Threats to Data Security

http://www.informatica.com/Images/informatica-the-state-of-data-centric-security.pdf

AND the actual Ponemon data security report

http://www.experian.com/assets/data-breach/brochures/2014-ponemon-2nd-annual-preparedness.pdf

and their web page on it..

http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis

data centric security  (DCS) eBook

http://www.nascio.org/events/sponsors/vrc/Data-Centric%20Security%20eBook.pdf

 

 

 

 

 

++++  THREATs  / bad news stuff / etc  +++

 

 

+ Iran hackers may target U.S. energy, defense firms, FBI warns

The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency document. The operation is the same as one flagged last week by cyber security firm Cylance Inc as targeting critical infrastructure organizations worldwide, cyber security experts said. Cylance has said it uncovered more than 50 victims from what it dubbed Operation Cleaver, in 16 countries, including the United States.

http://www.reuters.com/article/2014/12/13/us-cybersecurity-iran-fbi-idUSKBN0JQ28Z20141213

 

 

+ China responsible for 85% of global phishing domains

Chinese cyber-criminals are driving an uptick in malicious domain registration and account for the vast majority of the world’s phishing attacks, according to new stats from an industry body. Chinese phishers were responsible for a massive 85% of domains registered for the sole purpose of lifting user credentials and PII, and are the main cause of “historically high levels” of malicious domain and subdomain registrations, according to the Global Phishing Survey: Trends and Domain Name Use report from The Anti Phishing Working Group.

http://www.infosecurity-magazine.com/news/china-85-of-global-phishing/

 

 

+ Worm exploits nasty Shellshock bug to commandeer network storage systems

Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned

http://arstechnica.com/security/2014/12/worm-exploits-nasty-shellshock-bug-to-commandeer-network-storage-systems/

 

 

+ Nation-backed malware targets diplomats’ iPhones, Androids, and PCs

Researchers have uncovered yet another international espionage campaign that’s so sophisticated and comprehensive that it could only have been developed with the backing of a well resourced country. Inception, as the malware is dubbed in a report published Tuesday by Blue Coat Labs, targets devices running Windows, Android, BlackBerry, and iOS

http://arstechnica.com/security/2014/12/nation-backed-malware-targets-diplomats-iphones-androids-and-pcs/

 

 

+ US Government Personnel Data May Have Been Compromised in Breach

A breach at KeyPoint Government Solutions may have left personally identifiable information about nearly 50,000 US government employees exposed to possible theft. KeyPoint conducts federal employee background checks for security clearances. The Office of Personnel Management has notified people whose information may have been compromised. This is not the first time that a company providing background checks for government employees has suffered a breach. Earlier this year, a breach at USIS exposed personally identifiable information of 25,000 people.

http://www.nextgov.com/cybersecurity/2014/12/opm-alerts-feds-second-background-check-breach/101622/?oref=ng-HPtopstory

 

 

+ Office supply chain Staples Inc. today finally acknowledged that a malware intrusion

this year at some of its stores resulted in a credit card breach. The company now says some 119 stores were impacted between April and September 2014, and that as many as 1.16 million customer credit and debit cards may have been stolen as a result.

http://krebsonsecurity.com/2014/12/staples-6-month-breach-1-16-million-cards/

 

 

+ Serious NTP security holes have appeared and are being exploited

A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being exploited.

http://www.zdnet.com/article/major-ntp-security-holes-appears-and-are-being-exploited/?tag=nl.e589&s_cid=e589&ttag=e589&ftag=TREc64629f

 

 

+ TorrentLocker: Ransomware under the microscope

http://www.welivesecurity.com/2014/12/16/torrentlocker-racketeering-ransomware-disassembled-by-eset-experts/

 

 

+ Selling Smartphone Security: Get Worried, Fast

https://www.linkedin.com/today/post/article/selling-smartphone-security-get-john-c-abell

Striking a balance with mobile device security

http://fcw.com/articles/2014/12/08/striking-a-balance-with-mobile-device-security.aspx?m=1

 

 

 

++++   SD/SoCAL security events / opportunities +++

 

+ CyberTECH events / networking / startups / etc  —  THE cyber happening place in SD!!! 

Join their Meetup Group for the latest event information!   The definition of “Cyber KEWEL

http://www.meetup.com/cybertech/

 

 

+ Webster University’s  new SD cyber security program – check it out..

http://www.webster.edu/sandiego/academic-programs/cybersecurity.html

 

 

JAN

 

15 – OWASP – Running InfoSec for America’s Finest City..   Gary Hayslip, CISO for the city of San Diego,

http://www.meetup.com/Open-Web-Application-Security-Project-San-Diego-OWASP-SD/events/218878976/?a=md1_evn&rv=md1&_af_eid=218878976&_af=event

 

15 – IoT Startup Table Breakfast

http://www.meetup.com/CyberTECH/events/204340262/

 

28 – International Data privacy day

A – “Securing the IoT Privacy masters” by  CyberTECH, SOeC, others – all day event –

http://cyberhivesandiego.org/siot-forum-2014/

 

B –   Data Privacy Day–   NCSA and Morrison & Foerster LLP  – all day event –

http://www.laresinstitute.com/archives/4514

 

 

30  – Cross Border cyber opportunities – MX/TJ and CA/SD collaboration event, all day Friday!!! (Hosted at Coleman University) – Contact me to join in…  introduction email and agenda at:

http://www.sciap.org/blog1/?page_id=1586

 

 

31 – BigDataDay 4 SD”  all-day event SAT – free –   Jump in and help us – speak and make it great for all!

WE went to the one in LA and it was great…   our three tracks will be:

(1)  Technical =  Hadoop / Hbase / NoSQL;

(2)  Data science = predictive analytics, parallel algorithms, statistical modeling, algorithms for data mining, etc and

(3)  Applications =  key use cases…  Privacy by Design / data security,  data start-ups / incubators, novel products,

Contact me to join in…  introduction email and agenda at:

http://www.sciap.org/blog1/?page_id=1256

 

 

FEB

 

8-11 – NDSS Symposium 2015

http://www.internetsociety.org/events/ndss-symposium-2015

 

10-12 –  AFCEA West –  Focused on Operations in the Asia-Pacific Region

http://events.jspargo.com/West15/public/enter.aspx

 

 

 

+++  Future events in planning  FYI:

 

25-26 Apr – CYBERWEST: The Southwest Cybersecurity Summit

http://www.afei.org/events/5A06/Pages/default.aspx

 

4-12 May SANS Security West 2015

http://www.sans.org/event/sans-security-west-2015

 

18-21 Jul  Esri National Security summit

http://www.esri.com/events/homeland

 

 

TBD  – Provided by IEEE Cyber SIG / Various Security groups – all day – – Privacy by design workshop – a cyber model & why you must be part of this initiative!  (at Coleman University –  AM Technical approach… PM public discussions)     Help move SD forward in cyber –  DOING security vs admiring the problem…. SO engage and help out on cyber 4 PbD!!!

+++  Join our PbD / data security meetup, stay tuned into what’s happened..

http://www.meetup.com/San-Diego-Privacy-by-Design-Data-Security-Meetup/

See our over Cyber for PbD brief at

http://www.sciap.org/blog1/wp-content/uploads/Privacy-PAYS-_cyber-message.pdf

AND Our more detailed technical paper on our Cyber 4 PbD approach, including an executable, proposed open privacy framework within an enterprise architecture is at (this rough draft was  published in a major IEEE magazine this month):

http://www.sciap.org/blog1/wp-content/uploads/Cyber-4-PbD_IEEE-CE-mag-article.pdf

​——————————————————————————————————

DEC 7

+ Appeals Court to Hear Oral Arguments in Idaho Woman’s Case Against NSA Spying

EFF, ACLU Support Smith in Fighting Mass Surveillance Before Ninth Circuit

https://www.eff.org/press/releases/appeals-court-hear-oral-arguments-idaho-womans-case-against-nsa-spying

 

+ Cyber security is one of six new industries of the future,

Cyber security will excel at as long as it makes the necessary investment in its education and engineering base, the Institution of Engineering and Technology (IET) has argued in a new report. In addition to cyber security, Ones to Watch lists space, new power networks, 3D printing (‘additive manufacturing’), food security, and robotics as making up the half dozen industries in which the UK is already considered a world leader. The inclusion of cyber security among these might surprise some. Security is still seen in some quarters as a short-term function, secondary to others and essentially a drain on the bottom line. The idea that it might be a competitive advantage in a world built on increasingly complex automated systems is only now starting to become apparent.

http://www.cso.com.au/article/560853/cyber-security-one-six-new-industries-future-says-iet-report/

 

 

+ How to defend against a Sony hack

So… the usual pitch.. okay..    Better tools… “multipart” authentication (yes…better access control! ) ..analytics. .. better Malware detection (a data deleting one here). . Insider threat detection. Etc..   Yes… all good…yet..

No mention of THE NO. ONE issue…10 times worse than the next worst thing

*** poor cyber hygiene… causes 85+% of all security incidents… (just ask NMCI about that…:-((

And also use SCM / SIEM (monitor for bad behavior) and a little DLP too.. (how do you exfiltrate all those movies/data and not get noticed?)

It is of course not about any one thing.. rather a risk prioritized, balanced and integrated, security posture.

Continuing to sell one capability while dismissing others does a disservice to all

http://m.utsandiego.com/news/2014/dec/03/Sony-cyber-hack-security-movies/2/

 

 

+ Defense Industrial Base ISAC to Launch in February 2015

The Defense Industrial Base Information Sharing and Analysis Center

(DIB-ISAC) is scheduled to open in February 2015. The center will allow member organizations to share information about threats and mitigations. The DIB-ISAC will be based in Huntsville, Alabama and will support chapters all over the US. Membership fees are based on the size of the company.

http://www.al.com/business/index.ssf/2014/12/defense_contractors_fighting_c.html

http://www.dibisac.net

 

 

+ The Cybersecurity Myths That Small Companies Still Believe

http://mobile.businessweek.com/articles/2014-11-24/the-cyber-security-myths-that-small-companies-still-believe

 

 

+ GSA’s short list of emerging technologies

An Alliant II RFI specifies 18 “Leading Edge Technologies” the agency is watching with interest.

http://fcw.com/blogs/the-spec/2014/12/alliant-let-list.aspx?s=fcwdaily_051214

 

 

+ New virtual assistant helps stop breaches:

Personal information safeguard tool scheduled for rollout

http://www.robins.af.mil/news/story.asp?id=123433420

 

 

+ CIOs and CISOs Can Learn From the Massive Sony Data Breach

http://mobile.blogs.wsj.com/cio/2014/12/05/cios-and-cisos-can-learn-from-the-massive-sony-data-breach/

 

 

+ Top Chinese hackers recruited for Google’s Project Zero team

http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20141205000132&cid=1204

 

 

+++ Join our PbD / data security meetup, stay tuned into what’s happened..

http://www.meetup.com/San-Diego-Privacy-by-Design-Data-Security-Meetup/

 

 

+ Good Morning, San Diego!   Nice aerial view of SD… quad-copter and go-pro camera

http://vimeo.com/113168936

 

 

 

 

++++  Cyber Security News you can use  +++

 

 

+_ Pro-Iranian hackers have penetrated some of the world’s most sensitive networks,

A sustained cyber attack campaign dubbed Operation Cleaver has compromised computer networks at several high profile organizations, including governments and companies supporting elements of critical infrastructure, over the past two years. There are 50 known compromised targets in 16 countries worldwide and it is likely that there are many more that have not been detected. For more than two years … including those operated by a US-based airline, auto maker, natural gas producer, defense contractor, and military installation, security researchers said. In many cases, “Operation Cleaver,” as the sustained hacking campaign is being dubbed, has attained the highest levels of system access of targets located in 16 countries total, according to a report published Tuesday by security firm Cylance. Compromised systems in the ongoing attacks include Active Directory domain controllers that store employee login credentials, servers running Microsoft Windows and Linux, routers, switches, and virtual private networks. With more than 50 victims that include airports, hospitals, telecommunications providers, chemical companies, and governments, the Iranian-backed hackers are reported to have extraordinary control over much of the world’s critical infrastructure.

http://arstechnica.com/security/2014/12/critical-networks-in-us-15-nations-completely-owned-by-iran-backed-hackers/

For instance, among the targets is a company specializing in natural gas production, unclassified computers in the San Diego Navy Marine Corps Intranet (NMCI) and airlines and airports in Saudi Arabia, Pakistan and South Kore

http://www.scmagazine.com/cylance-report-details-operation-cleaver-attacks-on-companies-in-multiple-countries/article/386280/

 

 

+ Obama’s pick to lead the Pentagon is big on cybersecurity

President Obama’s pick to lead the Pentagon, former deputy secretary of defense Ashton “Ash” Carter, has been a big supporter of increasing the country’s cybersecurity capabilities. His nomination signals that the administration is likely to continue to aggressively build out its ability to fight adversaries in the digital world. Carter served as the deputy secretary of defense from October 2011 to December 2013 — and before that spent two years as the Defense Department’s chief weapon and technology buyer. He first joined the Pentagon as a civilian program and technical analyst in 1981, working on missile defense.

http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/02/obamas-pick-to-lead-the-pentagon-is-big-on-cybersecurity/

 

 

+ How the Pentagon plans to bolster cloud security

The latest installment in the Defense Department’s quest to find the right blend of security and affordability in the commercial cloud came in the form of a report released by the DOD CIO’s office. The report offers “cradle-to-grave” guidance for commercial cloud providers and DOD customers, acting DOD CIO Terry Halvorsen wrote in a prefacing memo. The report, “DOD Cloud Way Forward,” is the product of a 45-day study by Halvorsen’s office, the Defense Information Systems Agency and the National Security Agency. It contains three main proposals to help DOD customers evaluate cloud security, with a central goal of cutting out unnecessary requirements for less-sensitive information and systems.

http://fcw.com/articles/2014/12/01/pentagon-bolsters-cloud-security.aspx

 

 

+ AHA to FDA: Hold med device makers responsible for cybersecurity

Medical device cybersecurity should be the responsibility of device makers, according to the American Hospital Association. In a recent letter to the U.S. Food and Drug Administration, AHA Senior Vice President of Public Policy Analysis and Development Linda Fishman called on the agency to “hold device manufacturers accountable” for ensuring the safety of medical devices from cyberthreats. The letter was in response to a request for comments published by the FDA in late September on collaborative approaches for medical device and healthcare cybersecurity.

http://www.fiercehealthit.com/story/aha-fda-hold-med-device-makers-responsible-cybersecurity/2014-12-01

 

 

+ More on Sony Pictures Attackers Release Sensitive Data

The attackers responsible for infiltrating the Sony Pictures computer network have leaked more than 40 gigabytes of stolen data, including compensation details for top executives, and a slew of passwords for computers, social media accounts and web services. The attackers claim to have stolen more than 100 terabytes of data. Despite speculation that North Korea was involved in the attacks, a more likely scenario is that they are the result of activists or disgruntled former employees.   Sony was in the midst of a changeover of chief information security officers when the company was hit with a crippling attack on its computer network ..

http://www.csmonitor.com/Innovation/2014/1204/Trove-of-Sony-financial-data-passwords-movies-leaked-online

http://www.wired.com/2014/12/sony-hack-what-we-know/

[Note : From the wide range of data compromised, we may fairly conclude that Sony had NOT YET had the intent, design, time, or resources to apply the lessons that might have, should have, been taken from their own earlier breaches and those of others reported in 2014 but dating from months to years earlier.  The rest of us have little enough time to apply those lessons.  They include, but are not limited to, more compartmentation, true end to true end encryption on the enterprise network, fewer privileged users and more multi-party controls, more structured data stored only on enterprise servers, controls (Active Directory) to resist access and gratuitous copies, and timely egress and other anomaly detection and mitigation….]

The malware used in the attack against the Sony Pictures network can spread over network file shares and is capable of destroying data on Windows computers it infects. The FBI has sent confidential notifications to certain businesses, urging them to be vigilant about malware like that used in the Sony attack.

http://www.pcmag.com/article2/0,2817,2472989,00.asp

 

 

+ DOJ Establishing Cybersecurity Unit

The US Justice Department (DOJ) is creating a new unit in its criminal division that will be focused on fighting cyber crime. “Prosecutors from the Cybersecurity Unit will provide a central hub for expert advice and legal guidance,” according to Assistant Attorney general Leslie Caldwell.

http://thehill.com/policy/cybersecurity/226028-doj-forms-dedicated-cyber-unit

http://www.npr.org/2014/12/04/368351872/justice-department-plans-new-cybercrime-team

 

 

+Always good to step back and see what others recommend as the best cyber posture.. 

These are a couple worth reviewing and implement, especially the third – reduce security incidents by 85%with no added resources.

DoD strategy for defending networks and data

http://iac.dtic.mil/csiac/download/DDNSD_Public_Releasable_11132014.pdf

NIST SP 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems

http://csrc.nist.gov/publications/drafts/800-160/sp800_160_draft.pdf

— National campaign to improve cyber hygiene  – with tool kits now

https://www.cisecurity.org/about/CHToolkits.cfm

 

 

Navy’s information networks must be available, secure and capable of serving as warfighting platforms,    said the  head of Navy Cyber Command during a Dec. 2 event hosted by the Center for Strategic and International Studies.

http://www.fiercegovernmentit.com/node/34656/print

 

 

+ Internet of Things on docket for new Congress

The incoming GOP Senate majority is likely to focus on how the government regulates the growing universe of networks and connected devices.

http://fcw.com/articles/2014/12/04/internet-of-things-docket.aspx?s=fcwdaily_051214

 

 

+ No More FOUO: Government Plans to Simplify Labeling of Sensitive Information

http://www.nextgov.com/cio-briefing/2014/12/government-stamp-out-fouo/100605/

 

 

+ ONE  comprehensive defense mobility strategy & policy

http://defensesystems.com/~/media/19749A129B514E45B6AFBE511934BC63.pdf

 

 

+ 2015 Security predictions – websense

http://www.websense.com/assets/reports/report-2015-security-predictions-en.pdf

What don’t we just FIX what we know needs it first…quit admiring the problem and DO CYBER!

 

 

+ Information Security Salary Survey

https://www.checkmarx.com/wp-content/uploads/2014/02/InfoSec_Salary_Survey_Report-FINAL.pdf

only 150 respondents, but…  CISO… well over 70% made over $161,000.. and climbing..

 

 

+ What Does All That Healthcare Data Really Mean?

http://www.cio.com/article/2854599/data-analytics/what-does-all-that-healthcare-data-really-mean.html?utm_campaign=sflow_tweet#tk.rss_all

 

 

+ Payouts average $2.9M per cyber loss claim for large companies

http://businessinsurance.com/article/20141203/NEWS07/141209913?template=smartphoneart

 

 

+ DOD CISO rattled off technologies he wants to help secure an Internet of stuff.

http://www.nextgov.com/cybersecurity/2014/12/what-pentagon-cyber-chiefs-holiday-shopping-list/100539/?oref=nextgov_today_nl

 

 

A new DARPA program wants to throw light on the dark alleys in computer systems where Advanced Persistent Threats and other attacks hide.

http://defensesystems.com/articles/2014/12/04/darpa-transparent-computing-apts.aspx

 

 

+ Google cloud remains price leader,

https://gigaom.com/2014/12/03/google-cloud-remains-price-leader-says-rightscale/

 

 

 

 

++++  FYI / FYSA   +++

 

 

Whitelisting project helps ICS owners find suspicious files – YES, & MORE – SO DO IT!!!

Industrial control systems have been at the center of some scary security stories recently, but investigating malware infections in such environments isn’t easy because analysts often having a hard time telling good files from suspicious ones. Security researchers have identified two malware campaigns this year that targeted SCADA (supervisory control and data acquisition) systems — Havex and BlackEnergy. Such attacks are expected to grow in number, as new reports show that state-sponsored hackers are increasingly interested in critical infrastructure companies. A newly launched service called WhiteScope provides industrial control system owners and investigators with a list of good files from SCADA products and related software. The “whitelist” can be used to pin down potentially suspicious files when investigating possible compromises.

http://www.computerworld.com/article/2854434/whitelisting-project-helps-industrial-control-systems-owners-find-suspicious-files.html#tk.rss_news

 

 

+ Cheap IT, dwindling maintenance leave Navy vulnerable to cyber threats

The military has plenty of cybersecurity challenges on its plate as it is trying to ward off threats from unfriendly governments, unaligned hackers and criminal syndicates. But it’s not doing itself any favors by insisting on buying the cheapest possible equipment it can find to build and defend its own networks, the Navy’s top cyber officer said Tuesday. Vice Adm. Jan Tighe, who became commander of the Navy’s Fleet Cyber Command earlier this year, said that despite pressures on the overall budget, her service needs to reexamine the calculus it has tended to use up until now when weighing costs against security within its cyber systems. She framed the refocus as in- line with official military doctrine, which now stipulates that cyberspace is truly a warfighting domain, on par with and interdependent with the old-fashioned ones: land, sea, air and space.

http://www.federalnewsradio.com/412/3755042/Cheap-IT-dwindling-maintenance-leave-Navy-vulnerable-to-cyber-threats

 

 

+ Hardware secured mobile devices toughen first line of defense

It’s been 10 years since the federal government introduced measures to standardize identity and credentials across all agencies. Since then, almost 5 million smart card-based Personal Identity Verification (PIV) credentials have been issued to government employees and contractors for secure access to government buildings and IT systems. Standards have also been widened for non-federal and commercial use to include millions more through Personal Identity Verification Interoperable (PIV-I) and Commercial Identity Verification (CIV) cards. Aware of the potential offered by mobile devices, the federal government is now expanding the HSPD-12 standard in the form of FIPS 201-2, which enables credentials derived from PIV to be provisioned onto mobile devices so users can access applications and networks securely, quickly and easily.

http://gcn.com/articles/2014/12/01/hardware-secured-mobile-devices.aspx

 

 

+ Commerce takes bigger oversight role in tis bureaus’ cybersecurity

For the first time ever, the Commerce Department is building a real-time view of its overall cybersecurity posture. And with that information, it’s taking on a greater oversight role over the 14 different agencies within its purview. Commerce officials emphasized that the establishment of a new Enterprise Security Oversight Center (ESOC) is not meant to be a takeover of the IT functions that have traditionally been managed by bureaus with disparate missions, ranging from the Census Bureau to the National Weather Service to the Patent and Trademark Office. Rather, it’s a recognition that the push toward continuous diagnostics and mitigation in the government only works if everyone’s sharing information – and if each agency is on basically the same cybersecurity footing.

http://www.federalnewsradio.com/93/3753468/Commerce-takes-bigger-oversight-role-in-its-bureaus-cybersecurity

 

 

+ Thoughts on NIST Draft Guide to Cyber Threat Information Sharing (SP 800-150)

http://www.isightpartners.com/2014/11/thoughts-nist-draft-guide-cyber-threat-information-sharing-sp-800-150/?utm_content=10062887&utm_medium=social&utm_source=linkedin

 

 

+ Leveraging The Kill Chain For Awesome

There are good reasons why the Kill Chain is being used by some of the most successful information security teams around. Here are three.

http://www.darkreading.com/attacks-breaches/leveraging-the-kill-chain-for-awesome/a/d-id/1317810?_mc=NL_DR_EDT_DR_daily_20141203&cid=NL_DR_EDT_DR_daily_20141203&elq=726b1a5f204541c2bf27cea611a9888a&elqCampaignId=11225

 

 

+ Why We Need Better Cyber Security: A Graphical Snapshot

By 2022, demand for security industry professionals will grow 37%.   Also a great crime statistic infographic

http://www.darkreading.com/operations/why-we-need-better-cyber-security-a-graphical-snapshot-/d/d-id/1317398?_mc=NL_DR_EDT_DR_daily_20141203&cid=NL_DR_EDT_DR_daily_20141203&elq=726b1a5f204541c2bf27cea611a9888a&elqCampaignId=11225

 

 

+ The Real Cost of Cyber Incidents, According To Insurers

Healthcare is hit by the most malicious insiders and the highest legal costs, according to a NetDiligence report.

n August, the Ponemon Institute reported that security exploits and data breaches had cost survey respondents (some of which experienced multiple incidents), on average, $9.4 million over a year. Yet, according to research released today by NetDiligence, the average payout of a cyber insurance claim is only $733,109.

http://www.darkreading.com/the-real-cost-of-cyber-incidents-according-to-insurers/d/d-id/1317851

full report

http://www.netdiligence.com/NetDiligence_2014CyberClaimsStudy.pdf

 

 

+  DISA takes on defense of DOD networks

The initiative will create a Joint Force Headquarters for DOD Information Networks

http://defensesystems.com/articles/2014/12/03/disa-cyber-command-joint-force.aspx

 

 

+ POS Security Essentials: How to minimize Payment Card Breaches

http://www.sans.org/reading-room/whitepapers/bestprac/point-sale-pos-systems-security-35357

 

 

+ Not Just the NSA: Privacy Breaches Closer to Home – In Short: Negligence and Privacy

http://greplinux.com/blog/2014/02/03/not-just-the-nsa-privacy-breaches-close-to-home/

 

 

+ Destructive Cyber Attacks on the Rise

https://www.linkedin.com/today/post/article/20141203225508-156493-ddestructive-cyber-attacks-on-the-rise

 

 

+ The Millennium Falcon And Breach Responsibility

http://blogs.forrester.com/rick_holland/14-12-04-the_millennium_falcon_and_breach_responsibility

 

 

+ DoD To Silicon Valley, VCs: How ‘Bout Some Help!

http://breakingdefense.com/2014/12/dod-to-silicon-valley-vcs-how-bout-some-help/

 

 

+ Hiring R2D2 to Protect Your Mall or Campus, All for $6.25 Per Hour

http://www.nbcnews.com/tech/innovation/hiring-r2d2-protect-your-mall-or-campus-all-6-25-n262796

 

 

+ Stopping Zero-Day Attacks With Secure Configuration Management (SCM / SIEM is essential – got one?)

http://www.tripwire.com/state-of-security/incident-detection/stopping-zero-day-attacks-with-secure-configuration-management/#%2EVH8PRVG0PnU%2Elinkedin

 

 

+ Cyber liability: how can businesses protect themselves against underestimated cyber risks?

http://www.lexology.com/library/detail.aspx?g=c2133d6f-a384-442c-943b-3f7b4db57a20

 

 

+ Penetration Testing: 5 Common Myths Explained

http://networkingexchangeblog.att.com/enterprise-business/penetration-testing-5-common-myths-explained/?source=EENTOUTB11181422N#fbid=JTwiTd4_Qjd

 

 

+ Advanced Cyber Defense Methods – eBook

http://assets.teradata.com/resources/ebooks/102914-CyberSecurity-eBook/FLASH/index.html

 

 

+ the actual cost of failed trust..

https://www.venafi.com/assets/pdf/wp/Ponemon_Cost_of_Failed_Trust_Report.pdf

 

 

+  4th annual benchmark study on Patient Privacy and Data Security. 2014

https://www.privacyrights.org/sites/privacyrights.org/files/ID%20Experts%204th%20Annual%20Patient%20Privacy%20&%20Data%20Security%20Report%20FINAL.pdf

 

 

+ Privileged use abuse and insider threat

http://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf

 

 

+ State of endpoint RISK

https://www.lumension.com/Lumension/media/graphics/Resources/2014-state-of-the-endpoint/2014-State-of-the-Endpoint-Whitepaper-Lumension.pdf

 

 

 

 

 

++++  THREATs  / bad news stuff / etc  +++

 

 

+ SSH and Next-generation vulnerabilities

https://www.venafi.com/assets/pdf/Ponemon_2014_SSH_Security_Vulnerability_Report.pdf

 

 

+ Computing goes to the cloud. So does crime.

As more of our world, from family photos to financial information, moves into the cloud, malicious hackers are following. It is easy to see why: Cloud computing systems contain lots of critical information, from sensitive corporate and personal financial data to government secrets and even nude photographs never meant to be shared. All of it has been targeted by hackers, and in many cases stolen. In 2009, a password-stealing “botnet,” or collection of malevolent software, was found inside Amazon Web Services, perhaps the world’s largest cloud-computing system. More recently, celebrities’ private photos were stolen from Apple’s iCloud storage system. IBM says its researchers regularly receive taunts from Russian hackers who leave them mocking messages in software aimed at stealing from the 300 banks IBM serves.

http://bits.blogs.nytimes.com/2014/12/02/computing-goes-to-the-cloud-so-does-crime/

 

 

+ China, a fish barrel for cybercriminals

In China, some of the most successful cyberthreats are frighteningly simple. One recent viral mobile message offered free Golden Retriever puppies to lure users into giving away personal information. Another online scam took thousands from a woman who wired money to an impostor she thought was her son’s teacher. A current favorite of Chinese cybercriminals, according to Pei Zhiyong, the senior security researcher of the antivirus company Qihoo 360 Technology, is to simply program malicious code that asks users to disable their antivirus software. “It will say their security program is incompatible with whatever they’re trying to do,” he said. “We call it a ‘Candy Trojan Horse,’ and 30 percent of users will actually respond by turning off their antivirus system.”

http://bits.blogs.nytimes.com/2014/12/02/china-a-fish-barrel-for-cybercriminals/?ref=technology&_r=1

 

 

+ FBI warns of ‘destructive’ malware in wake of Sony attack

The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment. Cybersecurity experts said the malicious software described in the alert appeared to describe the one that affected Sony, which would mark first major destructive cyber attack waged against a company on U.S. soil. Such attacks have been launched in Asia and the Middle East, but none have been reported in the United States. The FBI report did not say how many companies had been victims of destructive attacks.

http://www.reuters.com/article/2014/12/02/us-sony-cybersecurity-malware-idUSKCN0JF3FE20141202

 

 

+ Malware Targets Password Managers

http://www.bankinfosecurity.com/malware-targets-password-managers-a-7602

 

 

+ Mobiles to be among top targets of hackers in 2015

http://m.timesofindia.com/tech/tech-news/Mobiles-to-be-among-top-targets-of-hackers-in-2015-Study/articleshow/45297905.cms

 

 

+ Tor secret comms – blocking reduces bank account takeover.

A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyberthieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor, a global communications network that helps users maintain anonymity by obfuscating their true location online.

http://krebsonsecurity.com/2014/12/treasury-dept-tor-a-big-source-of-bank-fraud/

 

 

+ Most U.S. Companies Under Cyberattack

—–  Browser vulnerabilities are the most pressing security issue, study finds.

http://readwrite.com/2014/12/04/cybersecurity-corporate-networks-ransomware-cyberattack

 

 

+ New POS Malware Discovered Just in Time for the Holiday Shopping Season

http://www.pcrisk.com/internet-threat-news/8490-new-pos-malware-discovered-just-in-time-for-the-holiday-shopping-season

 

 

 

 

++++   SD/SoCAL security events / opportunities +++

 

+ CyberTECH events / networking / startups / etc  —  THE cyber happening place in SD!!!  Join their Meetup Group for the latest event information!   The definition of “Cyber KEWEL

http://www.meetup.com/cybertech/

 

 

+ Webster University’s  new SD cyber security program – check it out..

http://www.webster.edu/sandiego/academic-programs/cybersecurity.html

 

 

DEC

 

16 – ISSA Annual elections and BIG prize raffle!!   AND Ira Winkler, President ISSA International

https://www.eventbrite.com/e/december-2014-san-diego-issa-chapter-annual-membership-meeting-holiday-raffle-sponsored-by-tickets-12875526045

 

 

18 – ISACA chapter meeting –  (FREE!) Leveraging a Strong IT Audit and Information Security Partnership… BY Alex Branisteanu, Director Information Security, Scripps Health..  NEW LOCATION – Coleman University.

https://www.eventbrite.com/e/december-2014-isaca-san-diego-chapter-meeting-tickets-14512514321

 

 

JAN

 

15 – OWASP – Running InfoSec for America’s Finest City..   Gary Hayslip, CISO for the city of San Diego,

http://www.meetup.com/Open-Web-Application-Security-Project-San-Diego-OWASP-SD/events/218878976/?a=md1_evn&rv=md1&_af_eid=218878976&_af=event

 

28 – International Data privacy day –   all day event – “Securing the IoT Privacy masters”  CyberTECH, SOeC, others)

 

30  – Cross Border cyber opportunities – MX/TJ and CA/SD collaboration event, all day Friday!!! (Hosted at Coleman University) – Contact me to join in…

 

31 Jan – Tentative    Started planning “BigDataDay 4 SD”  all-day event – free –   Jump in and help us!

WE went to the one in LA and it was great…   likely our three tracks will be:

(1)  Technical =  Hadoop / Hbase / NoSQL;

(2)  Data science = predictive analytics, parallel algorithms, statistical modeling, algorithms for data mining, etc and

(3)  Applications =  key use cases…  Privacy by Design / data security,  data start-ups / incubators, novel products,

 

 

 

 

+++  Future events in planning  FYI:

 

TBD  – Provided by IEEE Cyber SIG / Various Security groups – all day – – Privacy by design workshop – a cyber model & why you must be part of this initiative!  (at Coleman University –  AM Technical approach… PM public discussions)

Help move SD forward in cyber –  DOING security vs admiring the problem…. SO engage and help out on cyber 4 PbD!!!

+++  Join our PbD / data security meetup, stay tuned into what’s happened..

http://www.meetup.com/San-Diego-Privacy-by-Design-Data-Security-Meetup/

See our over Cyber for PbD brief at

http://www.sciap.org/blog1/wp-content/uploads/Privacy-by-Design-cyber-security.pdf

AND Our more detailed technical paper on our Cyber 4 PbD approach, including an executable, proposed open privacy framework within an enterprise architecture is at (this rough draft is also getting ready to be published in a major IEEE magazine in Jan 2014):

http://www.sciap.org/blog1/wp-content/uploads/Cyber-security-enable-privacy-design.pdf

 

 

—————————————————————————–

DEC 2

+ The 10 Most Profitable Industries According To Big Data

http://www.forbes.com/sites/frankbi/2014/11/18/the-10-most-profitable-industries-according-to-big-data/?linkId=10616826

 

 

+ Security performance of S&P 500 companies

in four key industry sectors: Finance, Utilities, Retail and Healthcare

http://www.bitsighttech.com/sites/default/files/downloads/BitSight%20Insights%20Industry%20Security%20Ratings%20Vol4.pdf

 

 

+ Government types – Updated SPAWAR Acquisition Forecast can be found at

http://www.public.navy.mil/spawar/Pages/SmallBusiness.aspx

 

 

+ 10 top security threats of 2014 (so far)

The top security threats of 2014 include equal parts old mistakes, new adversaries, innocent human nature and the evils that people do.

http://www.zdnet.com/10-top-security-threats-of-2014_p2-7000035947/

for 2015.. more of same…poor cyber hygiene (poor patching, weak procedures, etc)   weak access control (not enforcing least privilege), as always –  people / users,  applications w/o security, retailers lax security controls, android security, IoT, et al..

Websense 2015 Security Predictions Report

http://www.websense.com/assets/reports/report-2015-security-predictions-en.pdf

 

 

+ Top 100+ Cyber Security Blogs & Infosec Resources

http://ddosattackprotection.org/blog/cyber-security-blogs/

 

 

+ SANS 2014 Security Analytics & Intelligence Survey

Good overview of security and data…

http://www.sans.org/reading-room/whitepapers/analyst/analytics-intelligence-survey-2014-35507

 

 

+ Infographic of 200+ Startup Resources in San Diego

http://fi.co/posts/11621

 

 

+ Very useful list of URL web site addresses supporting  the SBIR/STTR program  

Forms, audit, OCI, grants, etc…

http://grants.nih.gov/grants/funding/sbirsttr_sites.doc

 

 

 

 

++++  Cyber Security News you can use  +++

 

+ FedRAMP developing a FISMA high baseline in 2015

Demand is finally pushing the cloud services cybersecurity program known as FedRAMP to develop standards for high impact systems. The Federal Risk Authorization and Management Program will send a draft baseline standard for FISMA high systems around the government for comment in the next month. Matt Goodrich, the acting director of the FedRAMP program, said the program management office then will submit the draft baseline to industry for comment before finalizing it in 2015.

http://www.federalnewsradio.com/239/3752146/FedRAMP-developing-a-FISMA-high-baseline-in-2015

 

 

+ Newly revealed cyber espionage attack ‘more complex’ than Stuxnet, Flame &  now Regin

First there was Stuxnet and Flame, and now there’s an even more sophisticated, stealthy, and powerful cyber espionage attack called Regin that dates back as far as 2003 and has been found infecting machines in more than a dozen countries. Symantec and Kaspersky Lab have each published their separate findings on Regin, a modular malware platform that has targeted Windows machines in telecommunications operators, governments, financial institutions, researchers, governments, small businesses, and individuals associated with cryptography research.

http://www.darkreading.com/attacks-breaches/newly-revealed-cyber-espionage-attack-more-complex-than-stuxnet-flame/d/d-id/1317710

+ What we know about ‘Regin,’ the powerful malware that could be the work of NSA

http://mashable.com/2014/11/25/regin-spy-malware-nsa-gchq/?utm_campaign=Feed%3A+Mashable+%28Mashable%29&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=feedburner

AND

http://securityaffairs.co/wordpress/30472/cyber-crime/regin-highly-advanced-spying-tool-discovered-symantec.html

 

 

+ NSA director: “Totally defensive” a losing strategy

Although there are no established principles for norms in cyberspace, such as what qualifies as an “act of war,” the idea that nations should refrain from offensive action and operate day-to-day completely on the defensive is not acceptable to the U.S. military, said Vice Adm. Mike Rogers, the dual-hatted head of the National Security Agency and Cyber Command. “Being totally on the defensive is a very losing strategy to me. It will cost a significant amount of money. It leads to a much decreased probability of mission success. That’s just not a good outcome for us in the long run,” said Rogers during a Nov. 20 hearing before the House Intelligence Committee.

http://www.fiercegovernmentit.com/story/nsa-director-totally-defensive-losing-strategy/2014-11-24

 

 

+ A tool to know if you’re being watched

Want to know if someone is spying on your computer? A coalition of privacy and civil liberties groups this week released a free tool, dubbed Detekt, that searches for surveillance spyware on your computer. The spyware might be collecting emails, listening to Skype video calls, observing through a computer camera, or even monitoring keystrokes to determine passwords and Internet activity. Designed for journalists and human rights organizations – the subject of intense government scrutiny in many countries – the tool works for anyone with a Windows computer.

http://thehill.com/policy/cybersecurity/225053-a-tool-to-know-if-youre-being-watched

 

 

+ As cyberthreats increase, big money chases patches

The year since hackers broke into Target and accessed millions of credit and debit card numbers has been a brutal one for cyberattacks. Next year’s threat forecast doesn’t look any better. But for cybersecurity firms and companies offering cyber-insurance, the year has been great. Business is booming and stock prices are shooting upward. Security start-ups are also getting a massive boost in funding. The hackers that infiltrated Target’s point-of-sale terminals sometime before Black Friday last year were able to steal as many as 70 million credit and debit card records. That, it turns out, was just the beginning. Twenty major U.S. retailers have been breached so far this year, according to data from the security benchmarking company BitSight.

http://www.cnbc.com/id/102208309#

 

 

+ Security Checklists Useful as Part of Larger Strategy

Lists of top vulnerabilities to look for and address are helpful, but only when used as part of a larger overall strategy. Each organization needs to use the list to complement its own risk assessment practices.

http://www.zdnet.com/infosec-checklists-becoming-common-but-theyre-not-magic-7000036219/

 

 

+ NIST – Guide to Cyber threat information sharing

Some great info in areas.    ExSumm overview points    2.2 – challenges    2.3 – cyber kill chain   2.7 – recommendations..   and most of Section three, especially  3.4, self-assessment.   Appendix D is great – lots of good resources and links!

http://csrc.nist.gov/publications/drafts/800-150/sp800_150_draft.pdf

 

 

+  The catastrophic state of security in 2014

Pretty good / sometimes humorous looks at four key problem areas…(don’t agree with some)

http://www.infoworld.com/article/2853993/security/catastrophic-state-of-security-in-2014.html?phint=newt%3Dinfoworld_daily&phint=idg_eid%3D9dabe641a7a08124a961fea53e0e9ff4#tk.IFWNLE_nlt_daily_am_2014-12-02

 

 

+ Why We Need Better Cyber Security: A Graphical Snapshot

By 2022, demand for security industry professionals will grow 37%.  Some great statics too..

http://www.darkreading.com/operations/why-we-need-better-cyber-security-a-graphical-snapshot-/d/d-id/1317398?_mc=NL_DR_EDT_DR_daily_20141202&cid=NL_DR_EDT_DR_daily_20141202&elq=1bddbdf13b314d99bd3d09649cb5b225&elqCampaignId=11193

 

 

+ DLP remains high on the list of cybersecurity policies

Data loss prevention (DLP) has been a part of Internet security almost as long as the Internet has existed. Sometimes, though, it seems like old hat, a not very cool older uncle that is irrelevant in the face of other, sexier security solutions. But as recent high-profile events have shown, it still needs to be the focus for most organizations

http://fcw.com/microsites/2014/snapshot-cdwg-cybersecurity-evolving-threats/01-dlp-remains-high-on-the-list-of-cybersecurity-policies.aspx

 

 

+ How the Pentagon plans to bolster cloud security

A new report from the DOD CIO offers soup-to-nuts guidance on security for commercial cloud providers and Defense Department customers.

http://fcw.com/articles/2014/12/01/pentagon-bolsters-cloud-security.aspx?s=fcwdaily_021214

 

 

+ Network Security Needs Big Data | ZTM (zero trust model)

http://www.cio.com/article/2851315/big-data/network-security-needs-big-data.html

 

 

+ A computer-vision algorithm that can describe photos

http://www.kurzweilai.net/a-computer-vision-algorithm-that-can-describe-photos?utm_source=KurzweilAI+Weekly+Newsletter&utm_campaign=8238ea716c-UA-946742-1&utm_medium=email&utm_term=0_147a5a48c1-8238ea716c-282126313

 

 

+ NSA Technology Transfer Program / Catalog

https://www.nsa.gov/research/_files/tech_transfers/nsa_technology_transfer_program.pdf

 

 

 

+ Applying the 20 Critical Security Controls to the Internet of Things (IoT)..  Good mapping..

http://www.counciloncybersecurity.org/articles/a-look-at-applying-the-20-critical-security-controls-to-the-internet-of-things-iot-part-2/

 

 

+ Short-Range Low Power Wireless Devices and Internet of Things (IoT)

http://www.digikey.co.uk/en/articles/techzone/2014/jan/short-range-low-power-wireless-devices-and-internet-of-things-iot

and

http://spectrum.ieee.org/telecom/internet/lifi-gets-ready-to-compete-with-wifi

 

 

+ The Dark Side Of Wearable Tech: Should You Be Worried?

http://www.business2community.com/tech-gadgets/dark-side-wearable-tech-worried-01069916

 

 

+ 17 New Trends in Big Data and Data Science

https://www.linkedin.com/groupItem?view=&item=5939939051736936452&type=member&gid=4732551&trk=eml-b2_anet_digest-hero-4-hero-disc-disc-0&midToken=AQHSP9kJrDSXtw&fromEmail=fromEmail&ut=3h339lCIjawCw1

 

 

 

 

 

++++  FYI / FYSA   +++

 

 

+ Speeding up breach detection

On average, organizations take 229 days to detect a data breach, according to a recent study from the online security firm FireEye. One reason for the lengthy detection time is two-thirds of organizations are told about a breach by a third party, rather than discovering it themselves, says Dave Merkel, Chief Technology Officer at FireEye. “It’s the FBI showing up with your ‘wallet,'” he says. “Or even worse, your customer shows up [to tell you about a breach].” Organizations looking to speed up breach detection on their own, rather than relying on others, need to improve their data analytics capabilities, prioritize the type of data they want to collect and analyze, and ensure they have the appropriate staff who can take the time to review the data for suspicious activity.

http://www.bankinfosecurity.com/speeding-up-breach-detection-a-7604

 

 

+ U.N. urges protection of privacy in digital era

The United Nations adopted a resolution on Tuesday urging all countries to protect the right to privacy in digital communications and to offer their citizens a way to seek “remedy” if their privacy is violated. Though not legally binding, the resolution signaled growing international attention to the issue of digital privacy, which it described as a human right. The measure passed by consensus in the General Assembly’s human rights committee, which meant that it was not put up for a vote. But it was a result of intense closed-door negotiations, and it set the stage for a showdown in Geneva next spring, when the issue is expected to go to the Human Rights Council. Privacy advocates are pushing for the United Nations to establish a special envoy.

http://www.nytimes.com/2014/11/26/world/un-urges-protection-of-privacy-in-digital-era.html

 

 

+ Derived credentials to roll out across DoD by July 2015

Personnel in the Department of Defense Office of the Chief Information Officer are piloting the use of derived credentials to send secure emails on their mobile devices without having to go through the added steps of plugging in an authorized common access card (CAC), a system that could be rolled out across the component agencies by this summer. Placing credentials on a user’s mobile device – derived from their CAC – enables use of authorized personal identity verification (PIV) for secure communications without forcing the user to plug in a sled (extraneous device) to read their CAC.

http://www.federaltimes.com/article/20141121/MOB/311210011/1001

 

 

+ Symantec uncovers sophisticated, stealthy computer spying tool

Computer security researchers at Symantec say they have discovered a sophisticated piece of malware circulating the world that appears to be used for spying at Internet service and telecommunications companies, and was likely created by a government agency. And while its origin is unclear, a short list of capable countries would include the U.S., Israel and China. The research, published today, comes from the same team at Symantec that four years ago helped discover and ferret out the capabilities of Stuxnet, the world’s first digital weapon. It is believed to have been created by the combined efforts of the U.S. and Israel and used to sabotage the Iranian nuclear research program.

https://recode.net/2014/11/23/symantec-uncovers-sophisticated-stealthy-computer-spying-tool/

 

 

+ NIST Weighs Pros and Cons of Cyberattack Data Sharing

To facilitate more and faster information sharing around cyberattacks, the National Institute for Standards and Technology (NIST) released a draft document Monday outlining some best practices.

http://www.defensenews.com/article/20141118/DEFREG02/311180040/NIST-Weighs-Pros-Cons-Cyberattack-Data-Sharing

 

 

+ NIST – Guide to Cyber threat information sharing

– Solid ExSumm overview points ..   2.2 – challenges..   2.3 – cyber kill chain…   2.7 – recommendations

and most of Section three, especially  3.4, self-assessment… Appendix D is great – lots of good resources and links!

http://www.nist.gov/itl/csd/sharing-111014.cfm

http://csrc.nist.gov/publications/drafts/800-150/sp800_150_draft.pdf

 

 

+ The Week When Attackers Started Winning The War On Trust

The misuse of keys and certificates is not exotic or hypothetical. It’s a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.

http://www.darkreading.com/endpoint/the-week-when-attackers-started-winning-the-war-on-trust-/a/d-id/1317657?_mc=NL_DR_EDT_DR_daily_20141124&cid=NL_DR_EDT_DR_daily_20141124&elq=954116d36fca40f8be218a8994111604&elqCampaignId=10994

 

 

+ Cybersecurity, the Internet of Things, and the Role of Government

http://www.diplomaticourier.com/news/topics/security/2423-cybersecurity-the-internet-of-things-and-the-role-of-government

 

 

+ The top cloud computing threats and vulnerabilities in an enterprise environment

http://www.cloudcomputing-news.net/news/2014/nov/21/top-cloud-computing-threats-and-vulnerabilities-enterprise-environment/

 

 

+ Testing the Security of Smart Devices with the OWASP Top Ten

http://blog.norsecorp.com/2014/11/24/testing-the-security-of-smart-devices-with-the-owasp-top-ten/

 

 

+ GAO Report on VA Information Security

http://www.slideshare.net/mobile/slideshow/embed_code/42264208

 

 

+ Liberty Mutual Offers Cyber Insurance Coverage for Small, Mid-Sized Businesses

http://www.insurancejournal.com/news/national/2014/11/30/347946.htm

 

 

+ Digital Storage And The Internet Of Things

http://www.forbes.com/sites/tomcoughlin/2014/11/30/digital-storage-and-the-internet-of-things/

 

 

+ NSA Releases New Data-Flow Software to the Open Source Community

http://blog.norsecorp.com/2014/11/25/nsa-releases-new-data-flow-software-to-the-open-source-community/

 

 

+ Cyber Defense Plan of USAF

http://horizon.hozint.com/2014/11/aspj-policy-for-us-cybersecurity/

 

 

+ 10 hottest IT skills for 2015

http://www.networkworld.com/article/2848488/careers/10-hottest-it-skills-for-2015.html

 

 

+ The Ten Commandments of Counterintelligence

https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html

 

+ Amazon embraces docker

http://www.wired.com/2014/11/following-google-microsoft-amazon-embraces-next-big-thing-cloud-computing/

 

 

+ Deconstructing the Cyber Kill Chain

http://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d-id/1317542

 

 

+ Private Cloud Security Considerations Guide..

http://blogs.technet.com/b/privatecloud/archive/2014/11/09/private-cloud-security-considerations-guide-security-design-considerations.aspx

 

 

+ Five great browser add-ins to protect your privacy

http://www.itworld.com/article/2852599/five-great-browser-add-ins-to-protect-your-privacy.html

 

 

 

 

 

++++  THREATs  / bad news stuff / etc  +++

 

 

+ Now e-cigarettes can give you malware

E-cigarettes may be better for your health than normal ones, but spare a thought for your poor computer – electronic cigarettes have become the latest vector for malicious software, according to online reports. Many e-cigarettes can be charged over USB, either with a special cable, or by plugging the cigarette itself directly into a USB port. That might be a USB port plugged into a wall socket or the port on a computer – but, if so, that means that a cheap e-cigarette from an untrustworthy supplier gains physical access to a device.

http://www.theguardian.com/technology/2014/nov/21/e-cigarettes-malware-computers

 

 

+ Docker security flaw found

The Docker Linux container format has a major exposure that could allow malicious code to assume unassigned privileges with the host server and order the extraction of files that are not intended to be accessible to the container’s code. Several generations of the Docker container formatting system are subject to the vulnerability; only the latest version, Docker 1.3.2, is exempt. There’s no way to patch the thousands of copies of Docker with release numbers before the 1.3.2 release, according to company representatives — the only safeguard is to upgrade to the recent release.

http://www.informationweek.com/cloud/infrastructure-as-a-service/docker-security-flaw-found/d/d-id/1317751

 

 

+ As hackers hit consumers, retailers keep quiet about security

As the holiday buying season approaches, retailers remain open to the same attack – called a “point of sale” attack – that hit Target and Home Depot, security experts say. Those analysts say that retailers have their fingers crossed, hoping they’re not next. And leading companies are keeping very tight-lipped about what, if anything, they’re doing to protect customers. It’s easy to spot a scratched face on a watch. It’s much harder to tell if the checkout machine that you swipe to pay for that watch is defective. But Davi Ottenheimer knows how. He’s a security researcher at EMC, a Hopkinton, Mass.-based data storage company. He’s been auditing retail for a decade. And we’re looking at how “hackerproof” stores are this holiday shopping season.

http://www.npr.org/blogs/alltechconsidered/2014/11/24/366367832/as-hackers-hit-customers-retailers-keep-quiet-about-security

 

 

+ 6 million+ email accounts worldwide exposed in past 3 months

More fallout from the epidemic of data breaches that occurred in 2014: More than 6 million email accounts and credentials from around the globe have been leaked in the past three months, according to a new study. Putting that into perspective, the researchers who gathered that data from the cybercrime market say they typically see around 150,000 such pilfered accounts per month. “This explosion can only be connected to the high number of data breaches that occurred in 2014,” Heimdal Security said in a blog post warning of the surge in stolen email account credentials.

http://www.darkreading.com/endpoint/6-million+-email-accounts-worldwide-exposed-in-past-3-months/d/d-id/1317732

 

 

+ Cybersecurity was missing in action on Election Day

In the run-up to the recent election, there were many discussions of issues like the Islamic State in Iraq and Syria (ISIS), immigration, the Ebola virus and the Keystone XL pipeline, just to name a few. The one area missing from the pre-election dialogue: a serious discussion about cybersecurity. Perhaps this was because discussions on cybersecurity can quickly turn into arcane discussions of technical and policy minutiae, and candidates are incessantly advised by their handlers not to provide detailed positions on anything – to eschew the minutae in favor of the time-tested political platitude. The bumper sticker slogan always beats the well-reasoned complex argument in American politics.

http://thehill.com/blogs/pundits-blog/technology/225143-cybersecurity-was-missing-in-action-on-election-day

 

 

+ The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites

The largest cyber attack in history has been carried out against independent media sites in Hong Kong over the past few months.

http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/

 

 

+ Masque Attack: All Your iOS Apps Belong to Us

FireEye mobile security researchers have discovered that an iOS app installed using enterprise/ad-hoc provisioning could replace another genuine app installed through the App Store, as long as both apps used the samebundle identifier.

https://www.fireeye.com/blog/threat-research/2014/11/masque-attack-all-your-ios-apps-belong-to-us.html

 

 

+ The 10 Biggest Bank Card Hacks

http://www.wired.com/2014/12/top-ten-card-breaches/

 

 

+ Underground Markets Online: Criminals Test Stolen Card Data on Charity Websites

http://securityaffairs.co/wordpress/30677/cyber-crime/underground-markets-online-criminals-test-stolen-card-data-charity-websites.html

 

 

+ The top cloud computing threats and vulnerabilities in an enterprise environment

http://www.cloudcomputing-news.net/news/2014/nov/21/top-cloud-computing-threats-and-vulnerabilities-enterprise-environment/

 

 

+ Nearly half of all web application cyber attacks target retailers

http://www.computerweekly.com/news/2240235253/Nearly-half-of-all-web-application-cyber-attacks-target-retailers-study-shows

 

 

+ Your Wi-Fi’s WPA2 Encryption Can Be Cracked Offline: Here’s How

http://www.howtogeek.com/202441/your-wi-fi%E2%80%99s-wpa2-encryption-can-be-cracked-offline-here%E2%80%99s-how/

 

 

+ ‘Most advanced mobile botnet EVER’ is coming for your OFFICE Androids

http://www.theregister.co.uk/2014/11/19/android_botnet_notcompatible/

 

 

+ U.S. Gov Insists It Doesn’t Stockpile Zero-Day Exploits to Hack Enemies

For years the government has refused to talk about or even acknowledge its secret use of zero-day exploits to hack into the computers of adversaries and criminal suspects. But this year the Obama administration finally acknowledged what everyone…

http://www.wired.com/2014/11/michael-daniel-no-zero-day-stockpile/

 

 

 

 

 

++++   SD/SoCAL security events / opportunities +++

 

+ CyberTECH events / networking / startups / etc  —  THE cyber happening place in SD!!!  Join their Meetup Group for the latest event information!   The definition of “Cyber KEWEL

http://www.meetup.com/cybertech/

 

 

+ Webster University’s  new SD cyber security program – check it out..

http://www.webster.edu/sandiego/academic-programs/cybersecurity.html

 

 

DEC

 

16 – ISSA Annual elections and BIG prize raffle!!   AND Ira Winkler, President ISSA International

https://www.eventbrite.com/e/december-2014-san-diego-issa-chapter-annual-membership-meeting-holiday-raffle-sponsored-by-tickets-12875526045

 

 

18 – ISACA chapter meeting –  Leveraging a Strong IT Audit and Information Security Partnership… BY Alex Branisteanu, Director Information Security, Scripps Health..  NEW LOCATION – Coleman University.

https://www.eventbrite.com/e/december-2014-isaca-san-diego-chapter-meeting-tickets-14512514321

 

 

JAN

 

15 – OWASP – Running InfoSec for America’s Finest City..   Gary Hayslip, CISO for the city of San Diego,

http://www.meetup.com/Open-Web-Application-Security-Project-San-Diego-OWASP-SD/events/218878976/?a=md1_evn&rv=md1&_af_eid=218878976&_af=event

 

28 – International Data privacy day –   all day event – “Securing the IoT Privacy masters”  CyberTECH, SOeC, others)

 

30  – Cross Border cyber opportunities – MX/TJ and CA/SD collaboration event, all day Friday!!!  (Hosted at Coleman University) – Contact me to join in…

 

31 Jan – Tentative    Started planning “BigDataDay 4 SD”  all-day event – free –   Jump in and help us!

WE went to the one in LA and it was great…   likely our three tracks will be:

(1)  Technical =  Hadoop / Hbase / NoSQL;

(2)  Data science = predictive analytics, parallel algorithms, statistical modeling, algorithms for data mining, etc and

(3)  Applications =  key use cases…  Privacy by Design / data security,  data start-ups / incubators, novel products,

 

 

 

+++  Future events in planning  FYI:

 

TBD  – Provided by IEEE Cyber SIG / Various Security groups – all day – – Privacy by design workshop – a cyber model & why you must be part of this initiative!  (at Coleman University –  AM Technical approach… PM public discussions)

Help move SD forward in cyber –  DOING security vs admiring the problem…. SO engage and help out on cyber 4 PbD!!!

+++  Join our PbD / data security meetup, stay tuned into what’s happened..

http://www.meetup.com/San-Diego-Privacy-by-Design-Data-Security-Meetup/

See our over Cyber for PbD brief at

http://www.sciap.org/blog1/wp-content/uploads/Privacy-by-Design-cyber-security.pdf

AND Our more detailed technical paper on our Cyber 4 PbD approach, including an executable, proposed open privacy framework within an enterprise architecture is at (this rough draft is also getting ready to be published in a major IEEE magazine in Jan 2014):

http://www.sciap.org/blog1/wp-content/uploads/Cyber-security-enable-privacy-design.pdf

 

 

Comments are closed.