Here we go with a HUGE update this week to kick off August, 2016. Beside the political campaign debacles, we’re facing the Summer Olympics from the third spam capital of the world, and there’s no shortage of news.
Of course if anyone was actually paying attention and listening without bias, they knew Trump did NOT invite Russia to hack Hillary — but rather carefully couched the comment to draw Russia out: “If you find anything …” note he assumed Russia had already hacked and had the mail. But Russia didn’t fall for it. Oh well. . . . nonetheless — we have the biggest cyber security update in the entire 16-year history of Safenetting.com :
- Car Hacking Village: Automotive Cyber-Security Vulnerabilities at Def Con 24
- My Microsoft Office 365 woes: crashes, malware macros – settings from Hell
- Hackers Target Clinton Campaign, House Democratic Campaign Committee
- Easy Tips on Cyber Security and Use of Social Media This Summer
- Scammers Using Genuine PayPal Emails to Spread Banking Malware
- Jihadi posting on Internet is latest effort in fear campaign
- Apple warns customers about £20 iTunes phishing scam emails
- Cybersecurity firms are booming thanks to Russian hackers
- Symantec Hurdles Rio Olympics Cybersecurity Competition
- Obama Administration Spells Out Cyber Security Policy
- Hackers breached Clinton campaign computer network
- User training could have prevented DNC email hacks
- 5 Takeaways From Cisco’s Big Cybersecurity Report
- iOS Smishing operation targets your Apple ID
- Hackers find sneaky way to attack Apple users
- Know the warning signs of Pokemon GO scams
ALERT Be very careful what you click! Many of the sites listed below employ stalker links! LOOK FOR the Firefox ‘READER’ icon in the address window to read the articles without the risks! (More here)
(Photo Credit : the Associated Press)
Symantec Hurdles Rio Olympics Cybersecurity Competition
Simone Biles, Katie Ledecky and Michael Phelps are on the road to Rio, but so are cybercrooks looking to bilk some of the bucks entering Brazil and hacktivists with an ax to grind.
So for the 2016 Games host Brazil, which Symantec (SYMC) cites as the source of 2% of all internet crime in 2015, cybersecurity is at the forefront, says Samir Kapuria, Symantec senior vice president of cybersecurity. Symantec says cybercrooks pull in $8 billion a year in Brazil. And the country is languishing in a deepening recession, already its worst in 25 years
Investors Business Daily
Obama Administration Spells Out Cyber Security Policy
Although it took him more than 8 years to wake up to Cyber Security, at least he’s doing it now since neither of our presidential candidates seem to think it’s a problem. But it’s still pretty lame if you read that actual directive which seems to focus only on large scale attacks.
The PPD on United States Cyber Incident Coordination is an all-encompassing directive that offers guidance from the initial identification of cyber threats all the way down to coordinated response to deal with those threats that are deemed severe. The PPD specifies specific policies and procedures to hone up federal cyber security as a whole.
GRAPHIC : chart showing cyber attack data
FACT SHEET: Presidential Policy Directive on United States Cyber Incident Coordination
Matt Mills – EDM Digest Timely emergency and disaster news
Hackers breached Clinton campaign computer network
Well, if you haven’t already heard this story, you’ve been living under a rock for the past week. Except, there’s a lot more to it than Trump and Clinton tongue-lashing each other — it’s a real threat that neither have incorporated into their campaign pitches. At least Kaine has extensive cyber security experience.
The latest attack, which was disclosed to Reuters on Friday, follows reports of two other hacks on the Democratic National Committee and the party’s fundraising committee for candidates for the U.S. House of Representatives.
Hackers Target Clinton Campaign, House Democratic Campaign Committee
A data program used by Hillary Clinton’s campaign was hacked, an aide said Friday, as a broad pattern of cyberattacks on Democratic political organizations began to emerge.
The Clinton campaign and the Democratic Congressional Campaign Committee both were targets in cybersecurity incidents, along with the Democratic National Committee, which recently saw a trove of hacked emails released after an attack. The hackers were able to access the analytics program’s server for about five days, a campaign aide said.
Colleen McCain Nelson and Kristina Peterson – Wall Street Journal
User training could have prevented DNC email hacks
Better computer training for members of the Democratic National Committee (DNC) could have prevented the phishing attacks that led to stolen emails, famed hacker turned security consultant Kevin Mitnick said.
Phishing attacks, in which users are baited into clicking on malicious links or providing personal data to fake websites, are a common method used by black-hat hackers to infiltrate a network or commit financial crimes. White-hat researchers, working everywhere from companies like Mitnick’s firm to major corporations, are emphasizing user training methods to prevent such incidents.
Kevin Mitnick – TechRepublic
Car Hacking Village: Discovering Automotive Cyber-Security Vulnerabilities at Def Con 24
The Car Hacking Village plays an important role for researchers interested in the safety and security of the more than one billion vehicles on the road worldwide. In 2015, over 16.5 million vehicles were sold in the United States. On average, motor vehicles are driven over 15,000 miles annually and consumers spend upwards of 730 hours per year in their cars.
This year, the Village returns to Def Con 24 in Vegas on August 4th.
Car Hacking Village
Cybersecurity firms are booming thanks to Russian hackers
When the Democratic National Committee discovered in April that its computer networks had been hacked, leaders there did not just alert government intelligence. They called CrowdStrike, a five-year-old cybersecurity firm that makes millions from mercenary work sold with a promise: “We Stop Breaches.”
Their weapon of choice: The cybersecurity equivalent of “a neighborhood watch program on steroids,”
Easy Tips on Cyber Security and Use of Social Media This Summer
This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.
Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts.That’s why we all need to educate ourselves in looking after our own online privacy
Nada Giuffrida — business2community.com
iOS Smishing operation targets your Apple ID
McAfee Labs blog is reporting that Intel Security Mobile Research has discovered a smishing operation that is targeting users Apple ID via SMS. Smishing is the same as phishing but the term was coined to refer to SMS or text phishing rather than email phishing.
The smishing SMS informs users they have been locked out of their Apple account and provides a link to a phishing site where they can then steal your username and password. The SMS attempts to make you comfortable by appearing familiar and the link takes you to website that looks similar to Apple’s.
Know the warning signs of Pokemon GO scams
The sudden success of Pokemon GO has scammers cooking up ways to cash in on the app’s popularity. The latest is a phishing email that fools victims into thinking they need to pay for the game.
You receive an email addressed to Pokemon GO players. The message reads: “due to the overwhelming response to our new Pokemon GO app and the need for more powerful servers we can no longer afford to keep your account as free.” The developers are now charging $12.99 a month, and your account will be frozen if you don’t upgrade.”
DALE DIXON @idahopress.com
Jihadi posting on Internet is latest effort in fear campaign
The latest salvo in the jihadi cyber war against the United States was fired Thursday via a social media posting from a group supporting the Islamic State.
The posting, in the form of an infographic, bragged about successful attempts to hack into U.S. Central Command’s social media sites and of online jihadi “kill lists” aimed at inspiring “lone wolf” attacks. The target: State Department employees and more than 10,000 U.S. troops.
Howard Altman, Times Staff Writer @tampabay.com
My Microsoft Office 365 woes: Constant crashes, malware macros – and settings from Hell
Microsoft Office remains one of the most important software products available, despite some rather nasty flaws. For me, Microsoft Office and video games anchor me to Windows. While video games seem set to remain largely Windows-only for the foreseeable future, Office is losing its grip.
Internet Explorer what? The worst of the problems crept up recently with Office 2016 flat out crashing randomly.
theregister.co.uk – Sysadmin blog
Scammers Using Genuine PayPal Emails to Spread Banking Malware
Another day another PayPal scam — This time, it’s highly sophisticated and comes from a genuine PayPal email address!
PayPal like other financial institutions is a favorite target of scammers, crooks and cyber criminals. Recently there has been an increase in PayPal related phishing scams but now researchers have also identified criminal elements using PayPal’s legitimate emails to spread dangerous Chthonic banking trojan.
Hackers find sneaky way to attack Apple users
After months, Kim finally caught up on this one — but it deems repeating. Kim is primarily a Windows talk radio show host, who has been becoming more and more “Apple” in the past couple of years.
services like Bonjour, Bluetooth, and Wi-Fi to have devices on the same network communicate with each other easily — according to security researchers from Indiana University Bloomington and Tsinghua University Beijing, this convenience has a price.
Komando Staff, Komando.com
5 Takeaways From Cisco’s Big Cybersecurity Report
Companies are still using outdated technology leaving them prone to cyber attacks, security researchers are losing their confidence, and hackers are making millions of dollars through so-called ransomware attacks.
These are some of the findings detailed in Cisco’s annual report on the state of cybersecurity based on research the company obtained from customers, outside security analysts, and its networking devices connected to the Internet.
Jonathan Vanian — fortune.com
Apple warns customers about £20 iTunes phishing scam emails
Apple has warned customers about a phishing scam that uses emails claiming that the recipient has been charged £20 to download a song from iTunes
The email purports to come from Apple and says that the user has mistakenly paid £23.34 to download a song or audio book from the iTunes Store. The victim is then encouraged to click on a link in an attachment to ‘cancel and manage subscriptions’. Apple has pointed those affected by the scam to the firm’s iTunes support page, and has advised people that they should avoid opening email attachments in shady looking emails.
Carly Page @www.v3.co.uk