Category Archives: News


News.  Some true

US NSA and UK GCHQ ‘can spy on smartphones’. The US National Security Agency (NSA) is reported have cracked the security codes which protect data on iPhones, Blackberries and Android devices. German news weekly Der Spiegel says documents suggest the NSA and the British GCHQ made joint efforts to gather intelligence. Teams looked at each phone to crack its privacy codes, Der Spiegel said. Saturday saw thousands of demonstrators in Berlin demand that the NSA stop monitoring internet users. Apple’s iPhone privacy protection codes are reported to have been compromised Codes unlocked. The documents Spiegel has seen do not show whether or not there has been mass surveillance of phone use. Once the intelligence teams had unlocked the codes, agencies could read a user’s contacts and lists of who had been called. The BBC’s Steve Evans in Berlin says the reports do seem to indicate that the British and American security agencies have the ability to read private communications beyond what might have previously been thought possible – or desirable by those who fear the intrusion of the state.
No 10 denies David Cameron red box security breach. A Passenger photographed red box briefly left unattended as prime minister travelled by train. David Cameron: allegedly left red box unattended. Downing Street has rejected suggestions that David Cameron might have caused a security breach by briefly leaving his official ministerial red box unaccompanied on the table of a train carriage. A train passenger took a photograph of the red box, which was published by the Daily Mirror. The passenger told the paper: “It was just sitting there. I could probably have run off with it if I’d wanted to.” However, Downing Street insisted the box was not left unattended and that the security detail protecting the prime minister was there at all times. The photograph was taken on Saturday on a train from King’s Cross station in London to York, where Cameron attended his sister-in-law’s wedding. Guidance was issued in 1999 by junior minister Peter Kilfoyle that red boxes should be “effectively disguised” if it was necessary to carry them on public transport.
Grumman Corporation has been retained by the Defence Science and Technology Laboratory (Dstl) to carry out a further phase of development of the N.Guru Cyber Situational Awareness System, the software application for the visualisation of cyber events for decision makers. The research project awarded by Dstl will be carried out by Northrop Grumman in partnership with the Universities of Oxford and South Wales. This work is part of the MOD’s Cyber Research Programme and is developing concepts, tools and techniques to provide cyber situational awareness for users. “The ability to visualise cyber events in new ways will help create greater situational awareness and enable users to improve the speed and effectiveness of network defence decision making,” said Danny Milligan, sector managing director, Northrop Grumman Information Systems Europe. “This research and the resulting capability it produces will be a key enabler in helping the MOD to defend its digital assets intelligently and maintain its core business processes.” The N.Guru project will develop techniques for the monitoring and mitigation of detected risks through the use of visualisations that enhance situational awareness and facilitate decision support for cyber defence. It will also explore the impact that a cyber-threat could have on business processes, look for more widespread anomalies and known threat patterns, and provide information that enables operators to develop mitigation actions. Northrop Grumman in the U.K. has successfully supported a number of cyber research programmes following the commissioning of the Federated Cyber Range at its Fareham site in 2010. The company is also teamed with Finmeccanica for the NATO Computer Incident Response Capability, which is currently being rolled out to multiple NATO sites in Europe and North America.
Massive spike of Tor users caused by Mevade botnet. Researchers at Fox-IT found evidence that a recent spike in users of The Onion Router (TOR) anonymity network was due to a botnet known as Mevade.A, which may also go by the names “Sefnit” or “SBC.” 
Obad Android trojan distributed via mobile botnets. The operators of the Obad mobile botnet have begun using four distribution methods to spread malware to mobile devices, including through a new method, dissemination via mobile botnet created by using another form of malware. 


News.  Some True

Cyber attack on Israel planned for Wednesday to mark 9/11. A few days ago, a YouTube video was distributed calling on Muslim hackers worldwide to attack Israel on Wednesday, September 11. Just over five months ago, on Holocaust Day, “Globes” reported on a cyber attack against Israel by Muslim hacker groups sponsored by underground organization, Anonymous. The attack included hacking into Israeli websites and crashing them, hacking into Facebook accounts of Israeli citizens, and other activity aimed at damaging Israel’s Internet space.  The hackers declared that the cyber attack’s general objective was to wipe Israel off the Internet map, which means that the attack was unquestionably a failure. But from the hackers’ perspective, they were able to deal Israel a painful blow, and they are now ready for a new round. A few days ago, a YouTube video was distributed calling on Muslim hackers worldwide to attack Israel on Wednesday, September 11.
Cyber Attacks More Threat to Supply Chain Than Weather. While recent natural catastrophes have highlighted the risks weather poses to a company’s supply chain, technology failure and cyber attacks represent an even greater threat that many companies overlook, a new report said. In its “Tomorrow Never Knows: Emerging Risks” report, the Guy Carpenter said, “Few aspects of our personal or commercial lives are now technology free. And yet, most individuals and businesses only realize the extent of this dependency when they are negatively affected by a technology-driven or technology-dependent event.” This reality extends to a company’s supply chain, Guy Carpenter said. “Due to technological innovation and advances, many parts of a company’s or industry’s supply chain may have become interconnected and automated. Technology is indeed a critical enabler of a supply chain’s operations,” states the report. As such, the consultancy said, a single disruption such as a cyber attack “has the potential to put an entire company’s supply chain at risk.” The report outlines results from the “Business Continuity Institute’s 2012 Supply Chain Resilience Survey,” which show that unplanned outage of IT/telecoms was the most significant cause of supply-chain disruption last year, outpacing adverse weather, which placed second.
Ultra Electronics, 3eTI Prevents Cyber-Attacks with New Defense-in-Depth Security Device for Industrial Control Systems. EtherGuard L3 integrates enhanced layers of Information Assurance (IA) and cyber security controls for truly intelligent, more secure protection of real-time systems. Ultra Electronics, 3eTI, a leading provider of military-grade, cyber-secure network solutions for critical information systems, infrastructure and industrial automation, announces the next major release of its EtherGuard® L3, a government-grade, Layer 3 encryption device. This release focuses on preventing sophisticated ICS cyber-attacks by providing defense-in-depth (DID) cyber security for machine-to-machine (M2M) and embedded systems connectivity. EtherGuard L3 is designed to prevent malware such as Stuxnet or “insider” attacks from targeting defense and industrial environments, as well as countering the inadequate security which commonly exposes networks and critical edge devices to exploitation.
The EtherGuard L3 provides multi-layer protection including encryption, authentication, access control, denial-of-service, deep-packet-inspection (DPI), intrusion detection and prevention, central network management, and key management for industrial control and real-time systems. Together these capabilities allow an EtherGuard L3 to efficiently provide both safety and security defenses against multiple types of attack. EtherGuard L3’s protection, which is available as a device or integrated OEM module, enhances situational awareness for critical applications and empowers network managers to achieve the ever-elusive balance between security and operations.
Sykipot malware used to gather intel on U.S. civil aviation sector. Trend Micro researchers spotted the Sykipot malware being used in a new campaign targeting the U.S. civil aviation sector.
Fraudsters abuse Google Calendar for Android to send out scam messages. Researchers at Webroot found that scammers are registering thousands of fake Google accounts and using the Google Calendar app for Android to send out spam calendar invites.


Some news, some true

Cyber attacks beat euro crisis photo UKCyberattacksbeateurocrisisastopriskfacingbankssaysBankofEnglandBusinessInsurance_zps33ab154f.png

Cyber attacks beat euro crisis as top risk facing banks, says Bank of England. U.K. banks consider cyber-attacks their biggest risk, even more than the euro crisis, Andrew Haldane, director of financial stability at the Bank of England, said. Mr. Haldane met with five major banks and four of them told him that cyber attacks were their main concern, Reuters reported. The management of this risk is somewhat in an early stage, Mr. Haldane said, and over the past five years focus on other risk factors might have distracted attention from cyber risks.

 photo BBCNewsSeniorpoliticiansunitetoissuecallfordatabill_zps732e514c.png

Senior politicians unite to issue call for data bill. The shelved Communications Data Bill would allow access to all Britons’ web browsing history Senior politicians from across the political divide have united to call for UK security services to be given greater internet monitoring powers. In a letter to The Times newspaper three former Labour home secretaries, three senior Tories and one Liberal Democrat urge changes. They say “coalition niceties” must not hinder counter terror efforts. A bill allowing the monitoring of all UK citizens’ internet use was dropped after Liberal Democrat opposition.

Chinese Bootkit Guntior Abuses Windows Help Center photo ChineseBootkitGuntiorAbusesWindowsHelpCenter_zps3cc63f6c.png

Chinese bootkit Guntior abuses Windows Help Center. Researchers at Sophos analyzed a recent version of the Guntior bootkit’s dropper and found that it utilizes a legitimate Windows executable file from Windows Help Center. 

 photo OpenRedirectVulnerabilityIdentifiedinFacebookndashVideo_zps7362b357.png

Open redirect vulnerability identified in Facebook. A researcher from revealed a low-risk open redirect vulnerability in Facebook.

BAE snaps up cyber security recruits photo BAEsnapsupcybersecurityrecruitsTelegraph_zps128d2d0d.png

BAE snaps up cyber security recruits. Almost half of the trainees recruited by BAE Systems this year will join the defence giant’s burgeoning cyber and security business as companies look to protect themselves against increasing cyber threats. BAE said hiring more people for its Detica arm reflected Britian’s growing need for cyber security and the cost of cyber crime to the UK. FTSE 100-listed BAE said on Tuesday that of the 293 graduates and trainees recruited by the company this year, 130 of them – 44pc – will join Detica, BAE’s cyber and security division. Alongside its more traditional defence business, BAE offers services to companies to help them collect and manage data, as well as manage risk and respond to breaches of cyber security and protect themselves in future. BAE said hiring more people for its Detica arm reflected Britian’s growing need for cyber security and the cost of cyber crime to the UK, which is currently estimated to be between £18bn and £27bn, according to the National Audit Office.

Cyber threat hunting service from Dell SecureWorks photo CyberthreathuntingservicefromDellSecureWorks_zps256cdad2.png

Cyber threat hunting service from Dell SecureWorks. Dell SecureWorks has launched a new Targeted Threat Hunting service aimed at finding cyber attackers who might be lurking in an organization’s network, intent on committing a breach. Using cyber intelligence and proprietary hunting technology from the Counter Threat Unit (CTU) research team, Dell SecureWorks experts will search an entity’s IT networks and host computers for evidence of a compromise, leveraging pre-determined intelligence of adversaries and their methods. The CTU Special Operations team will search for any indication hackers might be operating in the organization’s environment. If found, they will conduct an extensive study of the threat, outline a plan to eradicate the hackers, and put defenses in place to prevent them from re-entering.

 photo UKcybersecuritybecomingmoreconsolidatedsaysENISA11Jun2013ComputingNews_zps6a84652a.png

UK cyber security ‘becoming more consolidated’, says ENISA. Attempts to consolidate all the various bodies that have some responsibility for the UK’s cyber security are making steady progress, according to the European Network and Information Security Agency (ENISA). The government has been heavily criticised in the last year for a “lack of cohesion” between the various UK organisations set up to work towards its cyber security strategy. Former head of the GCHQ and CESG, Nick Hopkinson, told Computing last year that there was a need for rationalisation between the organisations, as co-ordinating a policy and strategy would be a challenge when dealing with the numerous bodies involved. But a year on from Hopkinson’s comments, ENISA’s head of unit, resilience and CIIP, Dr Vangelis Ouzounis, has said that every country including the UK, is trying to consolidate their own strategy. “In every member state there are different distributions which have been developed for different purposes, now they all have slightly different responsibilities around cyber security and of course there are overlaps. Every country is trying to consolidate their national strategy and ENISA does not intervene because although we recommend the simplification and avoidance of overlaps, it is up to the member states [to take action],” he told Computing at ISACA Insights World Congress 2013, in Berlin. “The [different bodies in the UK] have been developing from the bottom up over the years, that is why there is this situation but I believe that the UK cyber security strategy is now trying to consolidate the agencies – things like the Cyber Security Centre will help it to do this,” he added. Ouzounis admitted that the lack of cohesion was a problem but said that on a positive note, the problem had been identified and the government was trying to fix the issue. He also said that while the US is “advanced” in its cyber security strategy, he did not consider the country’s strategy as a template for European countries to follow, stating that some European countries may even be more advanced, without specifying which countries he was alluding to. “There are other countries that are doing equally as well [as the US] or even better, having developed other concepts that are working well,” Ouzounis said. As for the UK, Hopkinson was not the only expert to criticise the bodies involved in the UK cyber strategy for a lack of cohesion. Former US cyber intelligence officer at the Department of Defence, Bob Ayers, told Computing that “people seem to be getting resources in the absence of a cohesive plan and an ability to force compliance with that absent plan, [the UK] seems to be doing a lot, but never confuse activity for achievement”. While Mark Brown, director of information security at Ernst & Young, added: “I think there are 27 ministers of the state who have part of security in their job title, can anyone tell me who the actual person is who is solely accountable? The answer that always comes back from government is ‘no'”.

After CNN Patches Vulnerability, Diet Spammers Start Abusing Flaw photo AfterCNNPatchesVulnerabilityDietSpammersStartAbusingAskcomFlaw_zps3ac6ac93.png

After CNN patches vulnerability, diet spammers start abusing flaw.Spammers abused an open redirect vulnerability in CNN’s Web site until the news organization closed the vulnerability. However, similar vulnerabilities in and Yahoo continued to be used in the spam campaign.

McAfee Says It Made a Mistake, Koobface Worm Not on the Rise photo McAfeeSaysItMadeaMistakeKoobfaceWormNotontheRise_zpscc1c9a7d.png

McAfee says it made a mistake, Koobface worm not on the rise. McAfee acknowledged that it made a mistake in reporting that the Koobface worm has been on the rise, when instances of it have in fact decreased.

New variant of Bicololo malware disguised as legitimate antivirus photo NewVariantofBicololoMalwareDisguisedasLegitimateAntivirusApp_zps02d7b6ce.png

New variant of Bicololo malware disguised as legitimate antivirus app. Researchers discovered a new version of the Bicololo malware disguised as VIPRE Antivirus.

 photo NewAndroidTrojanappexploitspreviouslyunknownflawsresearcherssayNetworkWorld_zps085a9b67.png

New Android trojan app exploits previously unknown flaws, researchers say.Researchers discovered a sophisticated Android malware dubbed Backdoor.AndroidOS.Obad.a that can be used to execute commands via a remote shell, send SMS messages, steal data, and download additional malicious apps.


Some news, some true

fbi cyber criminals photo FBICyberCriminalsUsingPhotoSharingProgramstoCompromiseComputers_zps2c342f77.png

FBI: Cyber Criminals Using Photo-Sharing Programs to Compromise Computers. In the latest of what seems to be an ever-growing trend, hackers and internet criminals are finding new ways to get into computers and cause chaos. The FBI has seen an increase in cyber criminals who use online photo-sharing programs to perpetrate scams and harm victims’ computers. These criminals advertise vehicles online but will not provide pictures in the advertisement. They will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the victim receives a link to an online photo gallery. The photos can and often contain malicious software that infects the victim’s computer, directing the user to fake websites that look nearly identical to the real sites where the original advertisement was seen. The cyber criminals run all aspects of these fake websites, including “tech support” or “live chat support” and any “recommended” escrow services. After the victim agrees to purchase the item and makes the payment, the criminals stop responding to correspondence. The victims never receive any merchandise.

irony of hackers hacking hackers photo OhtheironyHackinggroupAnonymoushasTwitteraccounthackedbyrivalgroupTheNextWeb_zpsf7bc754e.png

Oh the irony: Hacking group Anonymous has Twitter account hacked by rival group. YourAnonNews (YAN), a Tumblr blog and Twitter account that supports the hacktivist movement Anonymous and posts regular tweets about breaking news stories, appears to have been hacked today by a group known as the Rustle League. More than two dozen tweets have since been issued from the account, containing a wide range of racial and potentially offensive language. The main Anonymous Twitter account recognised the hack before sharing a report by Softpedia. It’s unclear whether the central Anonymous group is assisting YourAnonNews to restore order at this time. Anonymous has also tweeted, however, to say that it has notified both Reuters and the BBC about the takeover.

belgian pm emails hacked photo BelgianPMspersonalemailshackedandsenttonewspaper_zpse1b06ded.png

Belgian PM’s personal emails hacked and sent to newspaper. Hackers have sent emails from Belgium’s Prime Minister Elio Di Rupo’s personal account to De Morgen newspaper, the daily said on Friday. Dating from 2004 to 2008 when Di Rupo was president of Belgium’s socialist party and before he became prime minister in 2011, the emails were mostly of a private nature, although some did refer to his political activities, the paper said.

hacker faces jail photo BBCNewsStratforhackerfacesjailafteradmittingcyberattack_zps5fcbed31.png

Stratfor hacker faces jail after admitting cyber-attack. Information taken from Stratfor was published by Wikileaks which defended Hammond after his guilty plea. A 28-year-old US man faces up to 10 years in prison after pleading guilty to carrying out a cyber-attack on global intelligence firm Stratfor. “Anarchist and hacker” Jeremy Hammond – who said he was part of activist group Anonymous – was charged with stealing information from Stratfor in 2011. The data included details of more than 850,000 clients, including government and law enforcement agencies.
Some of the accessed material was subsequently published by Wikileaks. Credit cards linked to some of the accessed details were used to spend more than $700,000 (£465,000) – with some of the money going to charities including the Red Cross and Save the Children.

nato discusses security photo NATOdefenceministerstodiscusscybersecurityNewEurope_zps0a4884a3.png

NATO defence ministers to discuss cyber security. A meeting of NATO defence ministers will be held next week at NATO headquarters in Brussels. A key item on the agenda is the issue of cyber defence, which has become an issue of increasing concern for the security of tech-dependent western nations. Cyber defence is a particularly tricky issue; the attacks themselves are very diverse, ranging from simple distributed-denial-of-service (DDoS) attacks that make websites inaccessible to strikes that have the potential to cause physical destruction. Espionage is also a serious threat; in February the Washington Post reported on a US National Intelligence Estimate that blamed China for a massive cyber espionage campaign intended to steal military secrets. Estonia was subjected to a large, sustained cyber attack in 2007 that lasted several days and left commerce in the Baltic country paralysed. The campaign is thought to have originated in Russia, but it is still unclear exactly who was responsible. Georgia was subjected to a cyber attack in advance of its 2008 war with Russia over the border region of South Ossetia. The attack was limited to shutting down a handful of Georgian government websites, but was the first incident of a cyber campaign coinciding with a shooting war.  Attribution is another aspect of cyber attacks that makes them very problematic. Due to the interconnected and largely anonymous nature of the internet, it is not difficult for the perpetrator of an attack to conceal their location. Even if the physical origin of an attack is located, determining the individuals or organisation responsible may not be possible. Unlike many traditional weapons, the knowledge and technology needed to conduct cyber attacks are largely unregulated and extremely prolific; one needs little more than access to an internet server and a modicum to technical skill to launch an attack. This means that cyber attacks can originate from any number of sources, ranging from state-directed campaigns to teenage pranksters.

chinese military games photo ChinesemilitarytolaunchcyberwargamesnextmonthDigitalTrends_zps32f9f8e8.png

Chinese military to launch cyber war games next month. The notion of a nation state conducting war games to test its military readiness is hardly a new idea, but China is approaching its next round of fake war with a new twist: This time, the war games will be conducted in the virtual realm. Somewhere, teenage Matthew Broderick is smiling. A report from the Xinhua news agency – the official press agency of the People’s Republic of China – has announced that the upcoming exercises will, in part, “test new types of combat forces including units using digital technology amid efforts to adjust to informationalised war.” The short report states that the exercises, which will be carried out next month at the country’s largest military training field at the Zhurihe training base in China’s Inner Mongolia Autonomous Region, will also “be the first time a People’s Liberation Army exercise has focused on combat forces including digitalized units, special operations forces, army aviation and electronic counter forces.” Eight military academies are forecast to participate in the war games, as well as members of the 38th and 68th combined corps of the Beijinh Military Area Command. The June date for the exercises mean that they are likely to follow a meeting between U.S. President Barack Obama and Chinese President Xi Jinping in California next week. The two are expected to discuss cyber security in light of renewed fears of Chinese cyber attacks into U.S. military networks.

ruby on rails photo HackersexploitRubyonRailsvulnerabilitytocompromiseserverscreatebotnetNetworkWorld_zps89078c30.png

Hackers exploit Ruby on Rails vulnerability to compromise servers, create botnet. A vulnerability in Ruby on Rails that was patched in January has been seen being exploited by attackers to take over servers and create a botnet. 

deloitte vigilant photo DeloitteAcquiresSpecialistCyberThreatFirmVigilantDark_zps478de6f5.png

Deloitte Acquires Specialist Cyber Threat Firm Vigilant. Deloitte, recognized by Forrester Research, Inc. as both a leader and the largest information security consulting organization in the world, strengthened its cyber security capabilities today by acquiring substantially all of the assets of Vigilant, Inc., a specialist in security monitoring and cyber threat intelligence. Vigilant provides consulting, managed services, and information services that help organizations detect and respond to emerging cyber threats. The combined practices will operate under the Vigilant by Deloitte brand. Vigilant’s suite of cyber threat management services complements Deloitte’s market-leading security consulting practice and enhances Deloitte’s cyber threat offerings. As a result, Deloitte has expanded its ability to provide customized security solutions to the world’s leading enterprises in high-risk industry sectors, such as financial services, aerospace and defense, retail, manufacturing, technology, communications, energy, and pharmaceuticals. 

secunia accidental disclosure photo SecuniaAccidentallyDisclosesImageViewingApplicationVulnerabilities_zps522fc9b9.png

Secunia accidentally discloses image viewing application vulnerabilities. A researcher accidentally emailed information on vulnerabilities in ERDAS ER Viewer to a public vulnerability mailing list. The large image file viewer is used by various organizations, including some in the defense industry.

microsoft cyber threat intelligence photo MicrosoftLaunchesCyberThreatIntelligenceProgramToBattleBotnetsMalwareInTheCloud_zps8a5940d2.png

Microsoft Launches Cyber Threat Intelligence Program To Battle Botnets, Malware In The Cloud. Microsoft launched the Cyber Threat Intelligence Program on Wednesday, a new system that uses the Windows Azure cloud computing platform to fight botnets and malware. The system will allow Microsoft to share information on computer virus infections with Internet Service Providers and Computer Emergency Response Teams in near real-time. Microsoft said in a blog post that it expects the program to dramatically increase the ability to keep up the changing cybercrime landscape. Microsoft is working with teams in Spain and Luxembourg, and said the new cloud-based program will, “allow these organizations to have better situational awareness of cyber threats, and more quickly and efficiently notify people of potential security issues with their computers.” C-TIP will send updated data related to computers infected with malware every 30 seconds using Windows Azure, giving antivirus teams nearly instant access to the most recent data on botnets and malware. 

ps3 password reset vulnerability photo ExpertsFindCodeExecutionFlawinPS3PasswordResetBuginSonyEntertainmentNetwork_zps9ee9a371.png

Experts find code execution flaw in PS3, password reset bug in Sony Entertainment Network. Researchers at Vulnerability Lab revealed that several vulnerabilities in Sony’s Playstation 3 firmware were disclosed to Sony and recently fixed. They also found that the Sony Entertainment Network Web site’s password recovery function could be exploited to reset users’ passwords. 

drop box vulnerability photo ExpertReportsTwoSecurityIssuestoDropboxOnlyOneFixedndashVideo_zpsaa5d1392.png

Expert reports two security issues to Dropbox, only one fixed. A researcher at Security Pulse found and disclosed two vulnerabilities in Dropbox. The first, an open redirect flaw, was addressed by Dropbox, while the second, a bug that allows attackers to unsubscribe users from the Dropbox for Business mailing list, was not regarded as a security issue by the company. 

dos vulnerability in mod photo DoSvulnerabilityinModSecurityfixedUpdateTheHSecurityNewsandFeatures_zpse2b724f3.png

DoS vulnerability in ModSecurity fixed. The developers of the ModSecurity firewall fixed a vulnerability that could be exploited to crash the firewall, among other fixes. 

chinese hackers breach weapons photo ReportChineseHackersBreachTopWeaponsDesignsDefenseNewsdefensenewscom_zpse612f4d0.png

Chinese hackers breach top weapons designs. According to a report prepared by the Defense Science Board, Chinese hackers have gained access to the designs of many of the United States most sensitive advanced weapons systems. compromised.’s security team discovered unauthorized access that exposed user names, countries, emails, and hashed passwords. reset all user passwords and was continuing to investigate to find out if other kinds of user information were also exposed.

botnet for 24 hours pharma scam photo KelihosBotnetUsedforldquoOnly24HoursLefttoShoprdquoPharmaSpamCampaign_zpsf80c586a.png

Kelihos botnet used for “Only 24 hours left to shop” pharma spam campaign. Cisco researchers discovered a pharmaceuticals spam campaign using the Kelihos botnet. The campaign sends out massive amounts of spam instead of trying to bypass spam filters, and the site linked to in the emails uses various means to track users.

botnet banking malware photo BetaBotmarksthelatestbankingmalwaretohittheonlineundergroundSCMagazine_zps3dd74188.png

Beta Bot” marks the latest banking malware to hit the online underground. A researcher at RSA reported the discovery of a new financial and root access malware dubbed Beta Bot. The malware has been seen for sale on underground forums and appears to have been created by a skilled programmer. 

motorola password pill photo CBBCNewsroundMotorolaspasswordinapillandelectronictattoo_zps109d5883.png

Motorola’s password in a pill and electronic tattoo. Always forgetting your password? Tech company Motorola is working on some rather unusual solutions! They’ve unveiled an electronic ‘tattoo’ that sticks to your skin. It has a circuit so gadgets can identify you. Another experimental idea is a password pill you swallow – that transmits a signal to devices outside the body. The pill doesn’t need batteries because it’s powered by stomach acid – but Motorola bosses say it won’t be on sale any time soon.


Some news, some true

paypal vulnerable to xss photo PayPalvulnerabletocrosssitescriptingagainTheHSecurityNewsandFeatures_zpsc1ec2ef5.png
PayPal vulnerable to cross-site scripting again. A student in Germany disclosed a cross-site scripting (XSS) vulnerability in PayPal’s German language version of the site.



faws in trend micro photo ExpertsFindMultipleSecurityFlawsinTrendMicrorsquosDirectPass150_zps0f3f4584.png

Experts find multiple security flaws in Trend Micro’s DirectPass 1.5.0. A researcher from Vulnerability Lab found two vulnerabilities in Trend Micro’s DirectPass password management software that could allow arbitrary code injection, hijack sessions, or perform other actions.


itv hit by syrian army photo ITVandSkybothhitbytheSyrianElectronicArmySCMagazineUK_zps26b70b74.png

ITV and Sky both hit by the Syrian Electronic Army. Members of the Syrian Electronic Army hacktivist group compromised the Twitter account of U.K. broadcaster ITV News and hacked at least six Android apps for U.K. broadcaster Sky in the Google Play Store. Google later removed the compromised apps.


0day in novell photo 0daysinNovellClientforWindowsTheHSecurityNewsandFeatures_zps5a1057db.png
0-days in Novell Client for Windows. Two zero day vulnerabilities were discovered by eEye researchers in Novell Client for Windows that can allow local code execution within the kernel.



malware targets the tibetans photo ResearchersfindunusualmalwaretargetingTibetanusersincyberespionageoperationNetworkWorld_zps7a064a08.png
Researchers find unusual malware targeting Tibetan users in cyberespionage operation. ESET researchers found a piece of cyberespionage malware dubbed Win32/Syndicasec that bypasses Windows User Account Control (UAC) to run arbitrary commands without prompting users to confirm.

skype used to spread virus photo AttackersuseSkypeotherIMappstospreadLiftohtrojanSCMagazine_zps1e676d43.png
Attackers use Skype, other IM apps to spread Liftoh trojan. The Liftoh trojan is being spread via shortened links in Skype instant messages, with malicious links being clicked more than 170,000 times, according to Symantec researchers.

Anonymous and The EDL

Here we go again.  While it’s hard not to sympathise with Anonymous outing the heinous EDL, they do so without accountability.  We don’t know if the list is accurate; we don’t know who to complain to if it is not.

The original list is on Pastebin.  Cached here.

Anonymous viddy-speak

Meanwhile, Anonymous post their announcement in a Youtube Videospeaky thing.  Which says

Good morning members, and leaders of the English Defense League.

We are Anonymous UK. We have been patiently observing your organisation, as you have inflated, indoctrinating our young with your criminal mindset.

You have capitalized on the misfortunes of our peoples, taking advantage of moments of fear, of terror, and of reconciliation, to spread hatred and animosity towards your fellow man.

Your constant belligerence, like a pack of raving ignoramuses, furthering only bigotry and segregation.

You have angered us considerably, and summoned our wrath irrevocably.

Last week, an innocent Drummer, Lee Rigby, lost his life at the hands of two vile and demented human beings in the most horrific, and heinous manner ever witnessed on the streets of Britain.

This villainous public display has thrown the United Kingdom into mourning; every community, and every congregation, extending their deepest condolences.

You however, have used this as another excuse to further spread your campaign of hate, bigotry, and misinformation. Under the guise of national pride you have instigated crimes against the innocent and incited the subjugation of Muslims. We will not allow your injustices, your lies, and your stupidity, to further radicalize our youth into fearing and despising their fellow man.

Our people are desperate for hope, in a hopeless society where our own government neglects us, where society has fails us, it is only natural to seek a relatable change maker. This sort of desperation, this quest for feeling of worth, is what you have taken advantage of.

In this operation, we will begin the systematic and comprehensive dissemination of your cult. We will further expose your falsities and your attempts to censor, to your members, to the British public, and to the world as a whole. You will fall, we can say this with complete confidence. We are everywhere, you cannot hide, you cannot win We are the voices of all and the voice of one. It will not happen over night, but we WILL be victorious.

It’s the cloud

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

Translation by HopeNotHate.

Latest DPA and ICO issues

Clyde and Co have published their latest DPA Newsletter.
 photo wwwclydecocomuploadsFilesPublications2013CC003241_Data_Protection_and_privacy_newsletter_280513_pdfpdf_zps83ae99a1.png

Some of the top ICO stories include:

  • Fine of 145,000 Euros for Google
  • Portadown GP Practice slapped and undertakes to do better
  • Met Police; Barnet Council and Manchester Council slapped by the ICO
  • Estate agent fined by the ICO