ITsecurity
twitter facebook rss

ITsecurity Daily News: 08/25/2014

Posted by on August 25, 2014.

The ITsecurity daily security briefing: Monday, August 25, 2014.
If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com.

News Papers/Reports WebThings Events M&A Alerts

line

News

UK police have become private enforcers for Business and Govt preferences
The Law and the Rule of Law are no longer important
Met & FACT vs TBPTorrentFreak reports on London Met’s refusal to respond to a Freedom of Information request on correspondence between Met and FACT) because it would cost too much.
TorrentFreak: http://torrentfreak.com/police-finding-pirate-bay-documents-expensive-140824/
El Reg reports on Met’s claim that watching Foley video is illegal. It isn’t (but it could certainly put you on GCHQ’s watch list). Police suggested it was contrary to anti-terrorism laws; but couldn’t/wouldn’t say which.
The Register: http://www.theregister.co.uk/-2014/08/25/-police_lie_to_public_ about_law_on_terrorism_videos/

New version of oclHashcat released
Hashcat is claimed to be the fastest password cracker available. It is the perfect example of a dual purpose weapon – as valuable for pentesters auditing a company’s password strength as it is for hackers to crack stolen hashed passwords.
Hashcat Advanced Password Recovery:
http://hashcat.net/oclhashcat/

Hackers DDoS Sony over weekend
The group is known as Lizard Squad, and it clearly has an ISIL predisposition. The best commentary is from its own Twitter feed. As of writing this, the latest post claims: “Just took Vatican City offline, all kuffar shall die. #ISIS #Jihad #ISIL #IS”. See also John Smedley’s (president of Sony Online Entertainment) feed. His airplane was diverted when Lizard Squad claimed a bomb was on board.
Lizard Squad: https://twitter.com/LizardSquad
John Smedley: https://twitter.com/j_smedley

China targets own operating system to take on likes of Microsoft, Google
Reuters reports: “China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday.” There are probably two separate drivers: first that it is part of the continuing response to the US indictment of 5 Chinese military (see FBI indicts five members of the Chinese military for hacking US companies); and secondly that there are genuine and probably realistic security concerns (“Zeit Online published a story suggesting that various federal German agencies had come to the conclusion that Windows 8 is not safe for use by government.” Is Windows 8 an NSA trojan?).
Reuters:
http://www.reuters.com/article/2014/08/24/china-technology-idUSL3N0QU07420140824

Google wins victory in row with German publishers
“A German regulator handed Google Inc a victory on Friday as it said it would not pursue a complaint brought against the internet search engine operator by a group of publishers for giving users access to their news articles.”
Reuters:
http://www.reuters.com/article/2014/08/22/google-germany-antitrust-idUSL5N0QS34220140822

line

Whitepapers and Reports

Why Offensive Security Needs Engineering Textbooks
subtitle: how to avoid a replay of “crypto wars” in security research
Governments are increasingly producing loosely phrased laws that are designed to prevent hacking but can be interpreted as making independent security research illegal. The authors argue, “In order to protect our discipline, we need to make sure that good approachable textbooks or at least comprehensive dictionaries exist for it, that put it in proper perspective not only to experts but to much broader audience.”
Sergey Bratus, Ivan Arce, Michael E. Locasto, Stefano Zanero:
http://www.cs.dartmouth.edu/~sergey/drafts/why-offensive-security-needs-textbooks.pdf

line

Webcasts and Webinars

ID Management: Keeping track of user access
“In this interactive virtual event, we will be looking at the different ways you can create digital identities, how you should monitor and manage usage, and what technologies are strategies are best to implement them, while meeting regulatory and privacy concerns.”
07:00 AM EDT on Sep 16, 2014.
SC Congress eConference UK:
https://engage.vevent.com/index.jsp?eid=474&seid=9977&code=EB6

September EMEA #SecChat – The Economic Impact of Cybercrime
McAfee is hosting a #SecChat on September 4th to discuss the results from its Economic Impact of Cybercrime report. In addition, it will discuss how personal data loss can devastate brand trust, the impact intellectual property theft has on global trade and innovation, potential military and geopolitical repercussions, and the reasons businesses are so reluctant to release any information alerting their customer bases of an internal security breach.
9am PST / 5pm GMT on September 4th
McAfee:
http://blogs.mcafee.com/business/september-emea-secchat-economic-impact-cybercrime-2

line

Events

line

Mergers and Acquisitions

line

Alerts

Analysis of Tuscas
“Tuscas is a threat that steals passwords and other sensitive information from the compromised computer.” Stop Malvertising provides a detailed analysis. “Tuscas is currently downloaded by Upatre via unsolicited emails appearing to be from ADP. The emails arrive with the subject line “ADP: August 22, 2014 Anti-Fraud Secure Update” and inform the recipient that ADP released an Anti-Fraud Secure Update.”
Stop Malvertising:
http://stopmalvertising.com/malware-reports/analysis-of-tuscas.html

DHS Backoff PoS malware alert
“The Department of Homeland Security (DHS) encourages organizations, regardless of size, to proactively check for possible Point of Sale (PoS) malware infections. One particular family of malware, which was detected in October 2013 and was not recognized by antivirus software solutions until August 2014, has likely infected many victims who are unaware that they have been compromised.”
via Cryptome:
http://cryptome.org/2014/08/usss-backoff-nyt-14-0822.pdf


Share This:
Facebooktwittergoogle_plusredditpinterestlinkedinmail

Leave a Reply

Your email address will not be published. Required fields are marked *

Submitted in: News | Tags: , , , , , , , , ,