News - May 2015 - Cyber Security Review

News – May 2015


US to Bring Japan Under Its Cyber Defense Umbrella
May 30, 2015
The United States will extend its cyber defense umbrella over Japan, helping its Asian ally cope with the growing threat of online attacks against military bases and infrastructure such as power grids, the two nations said in a joint statement on Saturday.
Continue reading…


Cyber Command Says New Mega-Contract Will Be Out By Fall
May 28, 2015
After abandoning last week a $475 million job posting for cyberattack and network defense experts, the Pentagon now says a retooled solicitation that takes into account private sector questions will be out by Oct. 1.
Continue reading… 


DHS Seeks Input On Public-Private Cyber Sharing Groups
May 27, 2015
The Department of Homeland Security is soliciting comment on ways the public and private sectors can better share information about cyber threats.
Continue reading… 


Kaspersky Lab: New cyber-spy attacking SMBs under guise of Microsoft Word
May 28, 2015
Threat shows SMBs are as vulnerable as large companies, Kaspersky says
Continue reading… 


China cybersecurity plan aims to protect state secrets: official paper
May 28, 2015
China will prepare a five-year cybersecurity plan to protect state secrets and data, the official China Daily said on Thursday, citing a senior official of the Ministry of Industry and Information Technology.
Continue reading…


NASSCOM sets up task force to build India as cyber security hub
May 25, 2015
NASSCOM, in partnership with Data Security Council of India, has launched ‘NASSCOM Cyber Security Task Force’ that aims to build India as a global hub for providing cyber security solutions, developing cyber security R&D plan and develop a skilled workforce of cyber security experts.
Continue reading…


Android factory reset not enough to keep data secure
May 22, 2015
If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data?
Continue reading…


Isle of Man tax haven accidentally leaks personal details of hundreds of taxpayers
May 22, 2015
The Isle of Man – a renowned tax haven for the rich and famous – has accidentally leaked the personal details of hundreds of taxpayers.
Continue reading…


Elbit Systems to buy NICE Cyber Division for $158m
May 21, 2015
NICE System’s Cyber and Intelligence Division employees will join Elbit System’s unit Cyberbit.
Continue reading…


INTERPOL holds first meeting for major events cybersecurity experts group
May 21, 2015
Global experts in sporting event security gathered at the INTERPOL Global Complex for Innovation to share best practices to create cybersecurity plans for major sporting and other events.
Continue reading…


Why small firms mean big business for cybersecurity
May 20, 2015
Small firms, especially in finance, need cybersecurity companies that can provide affordable solutions.
Continue reading…


US proposes tighter export rules for computer security tools
May 20, 2015
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.
Continue reading..


The Army Is Shopping for Cyber Weapons
May 19, 2015
As part of the Pentagon’s plan to beef up its capabilities, the service is reaching out to providers to see what kinds of tools are available.
Continue reading…


Nigerian Fraudsters Attack Oil Logistics Firms Without Using Malware: Report
May 18, 2015
Scammers apparently based in Nigeria have been stealing information from various companies in the oil logistics sector, according to a report published by Panda Security.
Continue reading…


Hacker ‘made plane climb’ after taking control through in-flight entertainment system
May 17, 2015
FBI affidavit says hacker removed from United Airlines flight last month managed to change flight direction from his seat
Continue reading…


‘Fraudsters hacked emails to my solicitor and stole £340,000 from my property sale’
May 16, 2015
Hacking into email accounts and impersonating the owners to steal money, information or both is a growing form of crime that almost cost this family the entire proceeds of their property sale.
Continue reading…


Venom Vulnerability Exposes Most Data Centers to Cyber Attacks
May 15, 2015
Just after a new security vulnerability surfaced Wednesday, many tech outlets started comparing it with HeartBleed, the serious security glitch uncovered last year that rendered communications with many well-known web services insecure, potentially exposing Millions of plain-text passwords.
Continue reading…


UK cybersecurity fund C5 Capital invests £16 million in security firm Omada
May 12, 2015
UK-based security investment specialists C5 Capital has announced a major $24 million (£16 million) investment in Danish identity access management (IAM) firm Omada.
Continue reading…


Quantum computing is about to overturn cybersecurity’s balance of power
May 11, 2015

“Spooky action at a distance” is how Albert Einstein described one of the key principles of quantum mechanics: entanglement.
Continue reading…


Flawed encryption leaves millions of smart grid devices at risk of cyberattacks
May 11, 2015

Millions of smart meters, thermostats, and other internet-connected devices are at risk of cyberattacks because they come with easily crackable encryption, a study has warned.
Continue reading…


Financial Services Firms to Increase Risk-Management Investment in Response to Emerging Cyber-Security and Fraud Risks
May 11, 2015
Nearly nine in 10 financial services firms plan to increase their investment in risk-management capabilities in the next two years in response to emerging risks of cyber security and fraud, according to a new report from Accenture.
Continue reading…


Staff’s mobile devices ‘a big cyber security threat’
May 10, 2015

One of the biggest cyber security threats companies face is their own employees. Almost a third of the 500 employees surveyed here as part of a new global study have lost company or personal data through their mobile phones and tablets.
Continue reading…


US Based Company Lost $3.8 Million Stolen Due To Cyberattack
May 9, 2015
Due to a cyberattack an Alaska Native Corporation had to bear the loss of $3.8million which the firm was transferring to a Hong Kong based bank account last month.
Continue reading…


Iran Ministry Of Defense Website Hacked By Saudi Hacker
May 9, 2015
Saudi Arabia along with its allies is fighting a war in Yemen while their hackers are fighting an online war against Iran, accusing the country of supporting Houthi forces.
Continue reading…


DHS picks Booz Allen Hamilton for cyber contract
May 8, 2015
Booz Allen Hamilton has been awarded a $39 million DHS cybersecurity contract.
Continue reading…


US Navy Looks to Dump Lenovo Servers on Security Concerns – Report
May 7, 2015
The US Navy is reportedly looking for a new server supplier for some of its guided missile cruisers and destroyers due to security concerns around Lenovo’s recent purchase of IBM’s x86 server division.
Continue reading…


Appeals Court Rules NSA Metadata Collection Not Authorized by Section 215
May 7, 2015The United States Court of Appeals for the Second Circuit ruled Thursday that the Patriot Act does not authorize the bulk collection of phone records by the NSA.
Continue reading…


Cisco Partners With Airbus For Cybersecurity, IoT, Cloud
May 7, 2015
Cisco makes play in defence, security and satellite communication market with Airbus partnership
Continue reading…


Companies are falling behind on securing their SAP environments
May 7, 2015More than 95 percent of SAP systems deployed in enterprises are exposed to vulnerabilities that could lead to a full compromise of business data, a security firm claims.
Continue reading…


Here’s why Lockheed invested in a commercial cyber company
May 6, 2015

Lockheed Martin Corp. is among the investors to throw $25 million toward a Boston cybersecurity startup, demonstrating how its approach to the booming commercial cyber market differs from one of its peers in the defense industry.
Continue reading…


Super secretive malware wipes hard drive to prevent analysis
May 5, 2015Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.
Continue reading…


Cybercriminals borrow from APT playbook in attack against PoS vendors
May 5, 2015Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
Continue reading…


Taking out cyber insurance cover to become ‘the norm’ within 10 years
May 5, 2015

Businesses will regard having cyber insurance cover as “essential” within the next 10 years, the UK’s main insurance industry trade body has said.
Continue reading…


Hacking Military Drones Now Reality
May 4, 2015
Recent published research gives malicious hackers a how-to manual for breaking into and taking control of unmanned drones, according to an Israeli defense company.
Continue reading…


US cybersecurity trade mission visits Poland, Romania
May 4, 2015
The US Deputy Secretary of Commerce Bruce Andrews announced he will lead a delegation of 20 American companies on a Cybersecurity Trade Mission to Bucharest, Romania, and Warsaw, Poland on 11-15 May. Assistant Secretary for Industry and Analysis Marcus Jadotte will also participate in the mission.
Continue reading…


The 3 Best Stocks to Invest in Cybersecurity
May 4, 2015

Unfortunately, cyber crime isn’t going away. Hacking scandals have become an almost regular occurrence for public companies, devastating the shares of those unfortunate enough to find themselves the victims of a major data breach.
Continue reading…


Dyre Banking Trojan Jumps Out of Sandbox
May 1, 2015
A number of unidentified commercial and freely available sandboxes fail to detect a new version of the Dyre banking Trojan, which was recently blamed for more than $1 million in losses to financial institutions and enterprises.
Continue reading…


IDF’s cyber defenders preparing for attacks by ‘Lebanese opponent’
May 1, 2015
Officers from the secretive Cyber Defense unit tell ‘Post’ about the daily need to stay one step ahead of sophisticated cyber enemies, who seek to target IDF networks.
Continue reading…