background preloader

Cyber Security Threats

Facebook Twitter

Comment: Grand Theft Data – How to Protect an Organization from Breaches. When large-scale data breaches occur, it makes headline news and everyone talks about how bad the problem is.

Comment: Grand Theft Data – How to Protect an Organization from Breaches

People get very uncomfortable; they feel vulnerable. Therefore, it is common practice to quickly identify one vulnerability as the cause of the compromise, and the company that experienced the breach offers a solution. Consumers immediately feel better, believing that a fix has been provided and that it won’t happen again in the future. Cybercrime hits financial firms hardest: survey. UK spy agency intercepted webcam images of millions of Yahoo users. Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

UK spy agency intercepted webcam images of millions of Yahoo users

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo reacted furiously to the webcam interception when approached by the Guardian. Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance - Special Report to Parliament - January 28, 2014. Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance January 28, 2014 Office of the Privacy Commissioner of Canada 112 Kent Street Ottawa, Ontario K1A 1H3 © Minister of Public Works and Government Services Canada 2014 Follow us on Twitter: @PrivacyPrivee.

Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance - Special Report to Parliament - January 28, 2014

How Seriously Should the Threat of Cyber Warfare be Taken? Cyber warfare is very much a contentious issue.

How Seriously Should the Threat of Cyber Warfare be Taken?

To briefly illustrate this, in 1993, John Arquilla and David Ronfeldt wrote an article entitled “Cyber War is Coming!” The Most Overlooked Part of Your Data Security - Kyle Marks. By Kyle Marks | 10:30 AM June 14, 2013 Organizations constantly replace outdated computers, servers, laptops, copiers, and countless other types of electronic devices to keep up with technology and enhance worker productivity.

The Most Overlooked Part of Your Data Security - Kyle Marks

This rush to upgrade, however, creates a challenge: large numbers of excess electronics must be managed and disposed of properly. During a recent IT asset disposal project for a large New York bank, a chain-of-custody audit revealed three computers were untracked. An IT director was suspected of taking them. When first questioned about the missing assets the IT director — let’s call her “Robin Hood” — denied any knowledge. The Other Sochi Threat: Russian Spies, Mobsters Hacking Your Smartphones.

While the world focuses on the threat of terrorism to the Winter Olympic Games in Sochi, Russia this month, spectators in the Black Sea town will face a stealthier threat to their digital lives from Russian spies and tech savvy mobsters, experts and security sources told ABC News.

The Other Sochi Threat: Russian Spies, Mobsters Hacking Your Smartphones

Russian law allows its intelligence agents to do electronic snooping on anyone inside the country, meaning the phones and personal computers of thousands of foreign visitors, including Americans, are fair game. But even outside of the law, Russian organized crime groups also are well known for hacking smartphones and email for information they use for illicit profit. "It's the same as during the Beijing Games -- the host government, private enterprise and individuals pose a big threat to people traveling to the Sochi Games, in respect to monitoring conversations on cell phones and intercepting texts and emails," one Olympic security contractor told ABC News last week. States of surveillance - cyber security threats. It’s difficult to overstate the level of cyber security threats presently facing states, companies and individuals.

States of surveillance - cyber security threats

As the United States considers legislation to share classified intelligence with private companies, IBA Global Insight assesses the risks and responses. Arthur Piper China is literally attempting to steal our way of life,’ US Republican Senator and House Intelligence Committee Chairman Mike Rogers told The Detroit News in February. Responding to a spate of increasingly high-profile data security attacks on US companies by Chinese hackers, he added: ‘Cyber war is currently being waged on American businesses and the government is unable to deploy defenses on their behalf. 162,000 WordPress sites tricked into launching DDoS attack. If you're new here, you may want to subscribe to the RSS feed, like us on Facebook, or sign-up for the free email newsletter which contains computer security advice, news, hints and tips.

162,000 WordPress sites tricked into launching DDoS attack

Thanks for visiting! If you’re a bad guy wanting to blast a website off the internet, the obvious method is to use a distributed denial-of-service (DDoS) attack. DDoS attacks typically use a botnet of computers in a co-ordinated attack, driving web traffic to a particular site. The victim site can’t cope with the barrage, and – unless properly prepared – falls over. Many sites would have the same problem if hordes of Justin Bieber fans all clicked on a link he had tweeted at the same time. White House Releases NIST Cybersecurity Framework — The Harvard Law School Forum on Corporate Governance and Financial Regulation. Editor’s Note:Holly J.

White House Releases NIST Cybersecurity Framework — The Harvard Law School Forum on Corporate Governance and Financial Regulation

Gregory is a partner and co-global coordinator of the Corporate Governance and Executive Compensation group at Sidley Austin LLP. This post is based on a Sidley update by Alan Raul and Ed McNicholas. On February 12, the White House released the widely anticipated Framework for Improving Critical Infrastructure Cybersecurity (“the Framework”).