ITsecurity
twitter facebook rss

ITsecurity Daily News: 09/18/2014

Posted by on September 18, 2014.

The ITsecurity daily security briefing: Thursday, September 18, 2014.
If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com.

NEWS ONLY TODAY

News Papers/Reports WebThings Events M&A Alerts

line

News

newscorplogoPot (News Corp) calls the kettle (Google) black
  News Corp Chief Executive Robert Thomson wrote last week to the EC’s competition commissioner opposing a settlement with Google. He wrote, “The company has evolved from a wonderfully feisty, creative Silicon Valley startup to a vast, powerful, often unaccountable bureaucracy, which is sometimes contemptuous of intellectual property and routinely configures its search results in a manner that is far from objective… Clearly this habitual appropriation of content and audiences does serious commercial damage, but there is also a profound social cost. The internet should be a canvas for freedom of expression and for high quality content of enduring value. Undermining the basic business model of professional content creators will lead to a less informed, more vexatious level of dialogue in our society.”
  The problem is that the Google business model damages the News Corp business model. News Corp should remove its finger from up its own history and move with the times. That logo is so 1980s.
News Corp:
http://newscorp.com/2014/09/17/news-corp-opposed-googles-european-commission-settlement-offer-welcomed-competition-commission-reconsideration/

SASCreportAmericans accuse China of more hacking
  “Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military’s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee (SASC) investigation has found,” says the Senate Armed Services Committee in a report published yesterday. The Chinese Embassy in Washington responded, “Making groundless accusations at others is not constructive at all and doesn’t contribute to the solution of the issue.” (WSJ)
SASC press release:
http://www.armed-services.senate.gov/press-releases/sasc-investigation-finds-chinese-intrusions-into-key-defense-contractors

FireEye comments on the SASC report
  “The intrusions detailed in the Levin report mirror activity FireEye has observed: we frequently see nation state threat actors target not only government, but also private sector organizations in order to obtain military intelligence…
  “Of the 11 contractors impacted, eight said they were not aware of any threat activity occurring during the period in question. This hearkens back to a mantra we have at FireEye: it is not a matter of if an enterprise will be breached, but when. It is therefore critical that organizations prepare for the inevitable breach by monitoring for signs of an intrusion, sharing intelligence with industry peers, and having a strong incident response plan in place.”
FireEye:
http://www.fireeye.com/blog/technical/2014/09/putting-transcom-in-perspective.html

eBay redirect attack puts buyers’ credentials at risk
  The BBC reports on a redirect attack on eBay. It was discovered by a Scottish eBay user, Paul Kerr, who put a demonstration on YouTube. The BBC reports, “It involved the attackers placing malicious Javascript code within product listing pages. This code in turn automatically redirected affected users through a series of other websites, so that they ended up at the page asking for their eBay log-in and password.” There has been some concern expressed over the length of time it took eBay to respond to Paul Kerr’s alert.
BBC:
http://www.bbc.co.uk/news/technology-29241563

Trust in Mass Media Returns to All-Time Low
  “After registering slightly higher trust last year, Americans’ confidence in the media’s ability to report “the news fully, accurately, and fairly” has returned to its previous all-time low of 40%. Americans’ trust in mass media has generally been edging downward from higher levels in the late 1990s and the early 2000s.”
galluptrust  “Prior to 2004, Americans placed more trust in mass media than they do now, with slim majorities saying they had a “great deal” or “fair amount” of trust. But over the course of former President George W. Bush’s re-election season, the level of trust fell significantly, from 54% in 2003 to 44% in 2004. Although trust levels rebounded to 50% in 2005, they have failed to reach a full majority since.”
Gallup:
http://www.gallup.com/poll/176042/trust-mass-media-returns-time-low.aspx

Apple will no longer unlock most iPhones, iPads for police, even with search warrants
  “Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.
  “The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.”
Washington Post:
http://www.washingtonpost.com/business/technology/apple-will-no-longer-unlock-most-iphones-ipads-for-police-even-with-search-warrants/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html

NSA shared Americans’ private communications with Israel: Snowden
  “Among his most shocking discoveries, he told me, was the fact that the N.S.A. was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.
  “Typically, when such sensitive information is transferred to another country, it would first be ‘minimized,’ meaning that names and other personally identifiable information would be removed. But when sharing with Israel, the N.S.A. evidently did not ensure that the data was modified in this way.”
New York Times:
http://www.nytimes.com/2014/09/17/opinion/israels-nsa-scandal.html

line

Whitepapers and Reports

line

Webcasts and Webinars

line

Events

line

Mergers and Acquisitions

line

Alerts


Share This:
Facebooktwittergoogle_plusredditpinterestlinkedinmail

Leave a Reply

Your email address will not be published. Required fields are marked *

Submitted in: News | Tags: , , , , , , , , , , ,