Posted by Kevin on September 18, 2014.
The ITsecurity daily security briefing: Thursday, September 18, 2014.
If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com.
NEWS ONLY TODAY
Pot (News Corp) calls the kettle (Google) black
News Corp Chief Executive Robert Thomson wrote last week to the EC’s competition commissioner opposing a settlement with Google. He wrote, “The company has evolved from a wonderfully feisty, creative Silicon Valley startup to a vast, powerful, often unaccountable bureaucracy, which is sometimes contemptuous of intellectual property and routinely configures its search results in a manner that is far from objective… Clearly this habitual appropriation of content and audiences does serious commercial damage, but there is also a profound social cost. The internet should be a canvas for freedom of expression and for high quality content of enduring value. Undermining the basic business model of professional content creators will lead to a less informed, more vexatious level of dialogue in our society.”
The problem is that the Google business model damages the News Corp business model. News Corp should remove its finger from up its own history and move with the times. That logo is so 1980s.
Americans accuse China of more hacking
“Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military’s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee (SASC) investigation has found,” says the Senate Armed Services Committee in a report published yesterday. The Chinese Embassy in Washington responded, “Making groundless accusations at others is not constructive at all and doesn’t contribute to the solution of the issue.” (WSJ)
SASC press release:
FireEye comments on the SASC report
“The intrusions detailed in the Levin report mirror activity FireEye has observed: we frequently see nation state threat actors target not only government, but also private sector organizations in order to obtain military intelligence…
“Of the 11 contractors impacted, eight said they were not aware of any threat activity occurring during the period in question. This hearkens back to a mantra we have at FireEye: it is not a matter of if an enterprise will be breached, but when. It is therefore critical that organizations prepare for the inevitable breach by monitoring for signs of an intrusion, sharing intelligence with industry peers, and having a strong incident response plan in place.”
eBay redirect attack puts buyers’ credentials at risk
Trust in Mass Media Returns to All-Time Low
“After registering slightly higher trust last year, Americans’ confidence in the media’s ability to report “the news fully, accurately, and fairly” has returned to its previous all-time low of 40%. Americans’ trust in mass media has generally been edging downward from higher levels in the late 1990s and the early 2000s.”
“Prior to 2004, Americans placed more trust in mass media than they do now, with slim majorities saying they had a “great deal” or “fair amount” of trust. But over the course of former President George W. Bush’s re-election season, the level of trust fell significantly, from 54% in 2003 to 44% in 2004. Although trust levels rebounded to 50% in 2005, they have failed to reach a full majority since.”
Apple will no longer unlock most iPhones, iPads for police, even with search warrants
“Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.
NSA shared Americans’ private communications with Israel: Snowden
“Among his most shocking discoveries, he told me, was the fact that the N.S.A. was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.
“Typically, when such sensitive information is transferred to another country, it would first be ‘minimized,’ meaning that names and other personally identifiable information would be removed. But when sharing with Israel, the N.S.A. evidently did not ensure that the data was modified in this way.”
New York Times:
Submitted in: News |