News – March 2017


  • Spring 2017 edition of the Cyber Security Review is now available

    March 31, 2017

    We are pleased to inform you that Spring 2017 edition of the Cyber Security Review is now available. Please view contents here or subscribe. We would like to thank all organisations and authors of the articles for their support and contribution to the publication. We hope you find this edition of the Review useful and informative and look forward to receiving your ...

  • German military to unveil new cyber command as threats grow

    March 30, 2017

    Germany’s military will launch a cyber command next week as part of an effort to beef up online defenses at a time when German spy agencies are warning of increasing cyber attacks by Russia. The German military remains a high-value target for hackers, with some 284,000 complex and professional would-be attacks registered in the first nine ...

  • Ghana to set up national cyber security council

    March 30, 2017

    Ghana is to establish a national cyber security council to tackle the increasing rate of cyber crime in the country. The initiative is part of the government’s effort to build a comprehensive cyber security governance arrangement involving all key public and private sector stakeholders. The National Cyber Security Council will be an independent advisory body made ...

  • Espionage Group Turla Tweaks Carbon Backdoor Malware with New Variants

    March 30, 2017

    Russian espionage group Turla has been working on various tools for years, including several new versions of Carbon, a second stage backdoor malware.  The discovery was made by researchers from ESET who claim that this malware is still under active development. Since the group is well known for changing its tools once they are exposed, it’s ...

  • IDEF’17 Will Open the Door Under the Auspices of The Presidency of the Republic of Turkey

    March 30, 2017

    One of the most important organization of Tukey, IDEF 13thInternational Defence Industry Fair will be held under the auspices of the Presidency of the Republic of Turkey and hosted by the Ministery of National Defence and under the management and responsibility of Turkish Armed Forces Foundation. IDEF which will be organized between May 09-12, 2017 at ...

  • Banking Malware Source Code Leaked by Author to Gain Credibility Among Hackers

    March 29, 2017

    The source code for a new Trojan called Nuclear Bot has been leaked online, which may spark a rise in attacks against banking services. As it happens almost every time the source code for a malicious program lands online, it is quite likely to see more unskilled cybercriminals launching malware attacks against users. Nuclear Bot first landed ...

  • The WikiLeaks Hacking Dump Exposed a Big Disconnect Over Cyber Security

    March 29, 2017

    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems swung into action. The WikiLeaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco’s ...

  • Credit card details and passwords of MILLIONS of users have been leaked online by Microsoft’s Docs.com

    March 28, 2017

    Credit card details, passwords and social security numbers are just some of the highly sensitive documents leaked by an online sharing site. Computer security researchers have revealed that Microsoft’s Docs.com is automatically sharing data – which users believed they were distributing privately among colleagues – with the public. Anyone using the site’s search engine can access this ...

  • Apple Fixes 223 Vulnerabilities Across macOS, iOS, Safari

    March 28, 2017

    Apple fixed hundreds of bugs, 223 to be exact, across a slate of products including macOS Sierra, iOS, Safari, watchOS, and tvOS on Monday. More than a quarter of the bugs, 40 in macOS Sierra, and 30 in iOS, could lead to arbitrary code execution – in some instances with root privileges, Apple warned. The lion’s share of ...

  • Laptops With More than 3.7 Million Hong Kong Voters’ Data Stolen

    March 28, 2017

    The Registration and Electoral Office of Hong Kong has reported the disappearance of two laptop computers after the chief executive election. The laptops contained around 3.7 million city’s voters personal information that could be compromised after the one of the most significant, if not the biggest ever data breaches in Hong Kong. The information that was ...

  • Nato to spend £2.6 billion on satellites, cyber security and drones

    March 27, 2017

    Nato will announce plans to spend €3bn (£2.6bn) on upgrading its satellite and computer technology over the next three years, a senior official has said. As the alliance adapts to new types of warfare it hoped the technology will deter hackers, as the North Atlantic Treaty Organisation (Nato) acknowledges conflicts are increasingly fought out online rather than in the air, on land or at sea. The ...

  • New Clues Surface on Shamoon 2’s Destructive Behavior

    March 27, 2017

    Researchers on Monday reported progress in piecing together some of the missing pieces of the Shamoon 2 puzzle that have been eluding them when it comes to lateral network movement and execution of the Disttrack malware component used in past campaigns. Shamoon 2 uses a combination of legitimate tools, such as the open source utility PAExec, and ...

  • Germany Fought Off Two Fancy Bear Cyber Attacks in 2016

    March 27, 2017

    Fears about Russian involvement in European elections, especially after last year’s US election, aren’t exactly unfounded or born out of paranoia. In fact, Germany says it fended off two cyber attacks coming from the same cybercriminals that targeted Hillary Clinton’s campaign. Arne Schoenbohm, a top German official, told Reuters they managed to fight off two attacks ...

  • Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates

    March 27, 2017

    A security researcher has disclosed critical issues in the processes and third-party API used by Symantec certificate resellers to deliver and manage Symantec SSL certificates. The flaw, discovered by Chris Byrne, an information security consultant and instructor for Cloud Harmonics, could allow an unauthenticated attacker to retrieve other persons’ SSL certificates, including public and private keys, ...

  • Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking

    March 27, 2017

    Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving ...

  • Ex-cyber security chief says Government is ‘using’ Westminster attack to grab unnecessary spying powers

    March 27, 2017

    The Ministry of Defence’s former cyber security chief has accused the Government of trying to “use” the devastating Westminster attack to grab unnecessary and intrusive surveillance powers. Major General Jonathan Shaw said ministers were attempting to “use the moment” to push for security services having more control, despite there being only a weak case for it. Home Secretary Amber Rudd ...

  • How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products

    March 26, 2017

    We’re entering a world of deepening complexity and far vaster breadth when it comes to security for the modern enterprise. With companies integrating legacy data centers, manufacturing facilities, and networks with the cloud and the Internet of Things (IoT), all connecting to an uncontrollable mass of independently governed endpoints, CIOs and CISOs face a constant ...

  • Indian Startup Develops a Next-Gen Cybersecurity Solution on the Blockchain

    March 26, 2017

    A new innovative prototype startup powered by blockchain technology for cybersecurity has recently launched in India aimed at curbing the global phenomenon of cybercrime. Mumbai-based Block Armour was thought up by Narayan Neelakantan, former CISO and Head of IT Risk and Compliance with India’s National Stock Exchange (NSE) and Floyd DCosta, who has a background in ...

  • US Critical Infrastructure Cybersecurity Milestone

    March 25, 2017

    Last week the Idaho National Laboratory (INL) and the Department of Homeland Security (DHS) announced the successful completion of the 100th iteration of the Industrial Control Systems Cybersecurity training on defending systems used across the critical infrastructure sectors. Since April 2007, over 4,000 cybersecurity professionals have participated in the advanced course. These professionals represent all ...

  • Jefferies Has 4 Cybersecurity Stocks to Buy as Growth to Continue for Years

    March 24, 2017

    Just a few short years ago, cybersecurity was the hottest of red-hot tech sectors and we covered the top companies seemingly all the time. Scorching hot initial public offerings had lots of investors, especially the fast-money type, going all in here. Then suddenly, things slowed to a crawl. The hot IPOs crashed, and the huge ...