October 2013  

ACTIVE DEFENSE

Is hacking in self-defence legal?, http://www.smh.com.au/it-pro/security-it/is-hacking-in-selfdefence-legal-20130927-hv1u8.html?goback=%2Egde_1836487_member_276901100#%21

CFAA

Yes, Case Law Says It Really Is A CFAA Violation To DDoS A Website http://shawnetuma.com/2013/10/09/yes-case-law-says-it-really-is-a-cfaa-violation-to-ddos-a-website/?goback=%2Egde_1807664_member_5793795600176660483#%21

CHINA

China 'employs 2 million to police internet', http://www.cnn.com/2013/10/07/world/asia/china-internet-monitors/index.html?goback=%2Egde_1807664_member_5793080482153381890#%21

CYBER CONFLICT

Estonia: To Blackout an Entire Country – Part 2, http://resources.infosecinstitute.com/estonia-to-blackout-an-entire-country-part-2/

Estonia: To Black Out an Entire Country – part one, http://resources.infosecinstitute.com/estonia-to-black-out-an-entire-country-part-one/?goback=%2Egde_37658_member_278108502#%21

CYBERCRIME

Cybercrime migrating to smart-devices, http://www.cbc.ca/news/canada/manitoba/cybercrime-moving-to-smartphones-and-tablets-say-experts-1.1877058?goback=.gde_1836487_member_5793891450550771716#%21 

Paunch, the author of Blackhole Exploit kit arrested in Russia, http://thehackernews.com/2013/10/paunch-author-of-blackhole-exploit-kit.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&_m=3n.009a.363.rz0ao05fd7.7uj or http://www.hotforsecurity.com/blog/russian-police-reportedly-arrest-blackhole-mastermind-7142.html?utm_source=SMGlobal&utm_medium=SMGlobal&utm_campaign=H4S#%21

Alarming Cybercrime Victims Stats, http://www.fastcompany.com/3019097/fast-feed/63-of-americans-70-of-milennials-are-cybercrime-victims?goback=%2Egde_1836487_member_5793891831263547395#%21

2013 Norton Report: Cost per Cybercrime Victim Up 50 Percent, http://www.symantec.com/content/en/us/about/presskits/b-norton-report-2013.pptx

UAB takes aim at spammers, phishers, and purveyors of malware, http://www.techrepublic.com/blog/it-security/uab-takes-aim-at-spammers-phishers-and-purveyors-of-malware/?goback=%2Egde_1807664_member_278310084#%21

CYBER INSURANCE

Interesting new decision regarding insurance coverage for a data breach, http://www.jdsupra.com/legalnews/california-court-finds-advertising-injur-21512/

CYBERSECURITY

A Scary Look At Future Cybersecurity Threats, http://www.siliconbeat.com/2013/10/04/a-scary-look-at-future-cybersecurity-threats/?goback=%2Egde_1836487_member_5792386079122276352#%21

Agency of the Future Guide: Winning the Cybersecurity Battle, http://www.govloop.com/profiles/blogs/the-govloop-guide-winning-the-cybersecurity-battle

CYBER THREAT

"World War C - Motives behind State Sponsored Cyber Attacks Read Report,  http://thehackernews.com/2013/10/world-war-c-report-motives-behind-state_3.html

World War C Report at http://www.fireeye.com/resources/pdfs/fireeye-wwc-report.pdf

CYBER WARFARE

No Longer if the Shadows: Cyberwars Potential is now an Open Secret, http://thinkprogress.org/security/2013/10/04/2699361/cyber-conflict-just-over-the-horizon/?goback=%2Egde_3045583_member_5792272828053078019#%21

Inside a state-sponsored U.S. cyber warrior's secret universe, http://www.pcworld.com/article/2043995/inside-a-state-sponsored-u-s-cyber-warriors-secret-universe.html?page=0

Hacking Summit Names Nations With Cyberwarfare Capabilities, http://blogs.mcafee.com/mcafee-labs/hacking-summit-names-nations-with-cyberwarfare-capabilities

DARK WEB

End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market,

http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market/?utm_campaign=forbestwittersf&utm_source=twitter&utm_medium=social&goback=%2Egde_37658_member_278189711#%21

DATA BREACH LIABILITY

Understanding a Retailer's Liability for a Payment Card Breach, http://www.businessinsurance.com/article/99999999/NEWS070108/130509832?tags=%7C332%7C338%7C299%7C342#

DHS

DHS will miss Oct. 10 deadline for infrastructure plan, http://insidecybersecurity.com/Cyber-General/Cyber-Public-Content/dhs-will-delay-submission-of-infrastructure-protection-plan/menu-id-1089.html?S=LI#%21

EDUCATION

More Colleges Offer Programs in Cybersecurity, http://online.wsj.com/article/SB10001424127887323527004579081031537896834.html?goback=%2Egde_1836487_member_5793468821251567617#%21

EXPLOITS

7 Top Tactics Hackers Use to Steal Your Data!, http://www.thecyberadvocate.com/2013/10/09/7-top-tactics-hackers-use/?goback=%2Egde_1807664_member_5793881943250591745#%21

The Internet of Things – Easy Pickings for Hackers, http://i-hls.com/2013/10/internet-of-things-easy-pickings-for-hackers/?goback=%2Egde_1836487_member_5793955786862379012#%21

Apple's own Encryption Mechanism allows hacker to create an Undetectable Mac OS X Malware, http://thehackernews.com/2013/10/apples-own-encryption-mechanism-allows.html?goback=%2Egde_37658_member_5793061695148544000#%21

Internet Explorer exploit release could trigger a surge in attacks, while Microsoft has yet to issue a permanent patch for a known exploit, the code could become widely available to cybercriminals after being integrated into an open-source testing tool, http://news.cnet.com/8301-1009_3-57605601-83/internet-explorer-exploit-release-could-trigger-a-surge-in-attacks/

EUROPEAN UNION

EUROPE’S CYBER SECURITY DIRECTIVE COULD COST ORGANIZATIONS BILLIONS, http://www.tripwire.com/state-of-security/top-security-stories/eus-cyber-security-directive-cost-organizations-billions/?goback=%2Egde_1836487_member_5793801966018646020#%21

FACEBOOK

Facebook new graph search, http://www.csoonline.com/article/740753/facebook-s-new-graph-search-features-create-phishing-wonderland

FBI

As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm, http://www.nytimes.com/2013/10/03/us/snowdens-e-mail-provider-discusses-pressure-from-fbi-to-disclose-data.html?pagewanted=2&src=recg

GOOGLE

Google to pay for open-source code security fixes, http://www.computerworld.com/s/article/9243110/Google_to_pay_for_open_source_code_security_fixes?goback=%2Egde_1836487_member_5794053001375141890#%21

HEALTH

Industry gets short notice for billion dollar iEHR demonstration (Electronic Health Record System (EHRS)), https://www.fbo.gov/index?s=opportunity&mode=form&id=e795ecc7ae3ab4d3c4de4ddd16287a85&tab=core&tabmode=list&=&goback=%2Egde_1836487_member_5793098443677249540#%21

INSIDER THREAT

Insider tied to Vodafone breach in which 2 million records were compromised, http://www.csoonline.com/article/739562/insider-tied-to-vodafone-breach-in-which-2-million-records-were-compromised?goback=%2Egde_1836487_member_5792682394154717184#%21

INTERNET

Losing The Future: Schneier On How The Internet Could Kill Democracy, https://securityledger.com/2013/10/losing-the-future-schneier-on-how-the-internet-could-kill-democracy/?goback=%2Egde_1836487_member_278149510#%21

IRAN

Iranian cyber warfare commander shot dead in suspected assassination, http://www.telegraph.co.uk/news/worldnews/middleeast/iran/10350285/Iranian-cyber-warfare-commander-shot-dead-in-suspected-assassination.html?goback=%2Egde_1836487_member_278231920#%21

LEGISLATION

Cybersecurity reform going nowhere fast, http://www.politico.com/story/2013/10/cybersecurity-reform-going-nowhere-fast-98027.html?goback=%2Egde_1836487_member_5793797575412826113#%21

Langevin seeks openings to move cybersecurity bill, http://insidecybersecurity.com/Cyber-General/Cyber-Public-Content/rep-langevin-a-cybersecurity-leader-looks-for-openings-to-advance-cyber-debate/menu-id-1089.html?S=LI#%21

MICROSOFT

Microsoft releases best practices for developing a national strategy for cybersecurity, http://download.microsoft.com/download/B/F/0/BF05DA49-7127-4C05-BFE8-0063DAB88F72/Developing_a_National_Strategy_for_Cybersecurity.pdf

Microsoft paid $28,000 Rewards to Six Researchers for its first ever Bug Bounty Program, http://thehackernews.com/2013/10/microsoft-paid-28000-rewards-to-six_7.html?goback=%2Egde_37658_member_5793084585768148992#%21

MIT

Seven Must-Read Stories (Week Ending October 4, 2013), http://www.technologyreview.com/view/519821/seven-must-read-stories-week-ending-october-4-2013/

NATIONAL CYBER STRATEGIES

Microsoft releases best practices for developing a national strategy for cybersecurity, http://download.microsoft.com/download/B/F/0/BF05DA49-7127-4C05-BFE8-0063DAB88F72/Developing_a_National_Strategy_for_Cybersecurity.pdf

NSA

Alexander Calls on Industry to Help Set Record Straight, http://www.defense.gov/news/newsarticle.aspx?id=120926

Alexander: Shutdown has been a blow to NSA morale, http://www.politico.com/story/2013/10/alexander-shutdown-has-been-a-blow-to-nsa-morale-97990.html?goback=%2Egde_1836487_member_5793888835528044547#%21

Dual-leadership role at NSA and Cyber Command stirs debate, http://www.washingtonpost.com/world/national-security/dual-leadership-role-at-nsa-and-cyber-command-stirs-debate/2013/10/06/ffb2ac40-2c59-11e3-97a3-ff2758228523_print.html

NSA using Browser Cookies to track Tor Users,http://thehackernews.com/2013/10/nsa-using-browser-cookies-to-track-tor.html?goback=%2Egde_37658_member_5792272626177040387#%21

Keith Alexander: In Best Interest Of U.S. To 'Put All The Phone Records' Into A Searchable 'Lockbox', http://www.huffingtonpost.com/2013/09/26/keith-alexander-nsa_n_3998071.html

Secret NSA documents show campaign against Tor encrypted network, http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html?goback=%2Egde_1836487_member_5792217299964407809#%21

Everything you need to know about the NSA and Tor in one FAQ, http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/

In Test Project, N.S.A. Tracked Cellphone Locations, http://www.nytimes.com/2013/10/03/us/nsa-experiment-traced-us-cellphone-locations.html?src=recpb&goback=%2Egde_1836487_member_5792234146696802307&_r=0

NSA Does Not Assasinate People, http://www.digitalcrazytown.com/2013/10/rogers-hayden-nsa-does-not-assassinate.html

SCADA

SCADA AND ME: A CHILDREN’S BOOK FOR SECURITY POLICY MAKER, http://www.tripwire.com/state-of-security/security-data-protection/scada-childrens-book-security-policy-makers/

SOCIAL MEDIA

A New -INT Looms for Social Media, http://www.afcea.org/content/?q=node/11729

TOOLS

5 Security YouTube Channels to Watch, http://www.informationsecuritybuzz.com/5-security-youtube-channels-to-watch/

Back to top