It’s a new year, and the elections are over. We have a new president we should all be standing behind. But there’s trouble in the world, and many people are pandering to it without even an inkling of the truth. The trouble isn’t what you think. It’s far more insidious than even those protesters can fathom. It will come slowly and quietly, until you suddenly discover it was happening all along, and the world is powerless to stop it.
- Cybersecurity experts worried about Russian hackers. One says: Look, a squirrel!
- Russian national detained in Spain suspected of developing computer malware
- Malware Scam Targets Google Chrome User’s Using ‘Font Update’ Technique
- Evaluating the US-China Cybersecurity Agreement, Part 2: China’s Take
- Malware infects Popeyes restaurants, compromising credit cards
- Mac-compatible ‘Fruitfly’ malware escapes detection for years
- Carbanak Malware Uses Google Svcs As C&C Servers
- How Secure Will Cyber Security Be Under Trump?
- That fake news story might come with malware
ALERT Be very careful what you click! Many of the sites listed below employ stalker links! LOOK FOR the Firefox ‘READER’ icon in the address window to read the articles without the risks! (More here)
How Secure Will Cyber Security Be Under Trump?
Adam Levin writes
I have to admit that when President-elect Trump uttered “the cyber” during the first presidential debate, I was right there with the tech community in the collective eye-rolling that followed. “The Cyber” memes were born, along with real concern about the candidate’s grasp on cyber security, and with the recent announcement of former New York City Mayor Rudy Giuliani as the cyber czar, those concerns multiplied.
Adam Levin on Twitter
That fake news story might come with malware
For many, fake news and its impact is a recent phenomenon; however, cybersecurity professionals have long been aware of the harm caused by false news in the digital world. James Scott, a senior fellow at the Institute for Critical Infrastructure Technology (ICIT), writes in this ICIT commentary:
“Regardless of your partisan persuasion, your opinion of mainstream media or your opinion of the ‘alt-right,’ one thing is for certain, ‘fake news’ is ‘old news’ when it comes to the weaponization of information by nation states and cyber mercenaries.”
Mac-compatible ‘Fruitfly’ malware escapes detection for years
A new type of malware has been discovered on the systems of biomedical research facilities, and appears to have been lurking undetected for years.
The malware – written with dual commands to be effective both on Mac and Linux machines – provides the attacker with screen captures, webcam access, and information on the other computers in the local network.
Malware infects Popeyes restaurants, compromising credit cards
Call it deep-fried fraud.
Customers chowing down on chicken at several Popeyes locations in Texas, North Carolina and Georgia may have been affected by a malware infection.
nydailynews.com Jessa Schroeder
Malware Scam Targets Google Chrome User’s Using ‘Font Update’ Technique
Researchers have found another malware campaign that is particularly targeting Google Chrome clients on Windows PCs.
This malware is attempting to deceive the users to download a font update package for a corrupted fonts. This campaign utilizes the scandalous EITest chain that has been utilizing in multiple exploit kits that lead to an identity thief, ransomware, and other different sorts of assaults. However, this time it is being utilized in more targeted attacks instead of being used in exploit kits.
Russian national detained in Spain suspected of developing computer malware
Russian national Stanislav Lisov detained in Barcelona is suspected of developing malicious software, Spain’s Civil Guard reported on Friday.
According to its data, the Spanish police detained the Russian national in cooperation with the FBI. Thirty-two-year-old Lisov was on the US wanted list on suspicion of his complicity in a network engaged in “computer hacking and fraud with the use of electronic means.”
Carbanak Malware Uses Google Svcs As C&C Servers
Following the reports that newer versions of Carbanak malware now use Google services to host command-and-control infrastructure to infect organizations and exfiltrate data (the Carbanak group has previously stolen more than $1 billion from banks around the world).
Phishing and malware installation is an uphill battle enterprises are constantly fighting. Organizations must concentrate on preventing and containing breaches, and especially on detecing those vectors where breached internal computers and user accounts are used to identify and exfiltrate their most important assets.
Information Security Buzz
Most cybersecurity experts are worried about Russian hackers. One says: Look, a squirrel!
Close your eyes and try to envision the biggest threat to America’s cybersecurity – something that could knock out power to a city in a blink.What image is floating there? A dark room full of foreign soldiers, staring intently at computer screens? Russian President Vladimir Putin, possibly shirtless and on a horse?
Think smaller. Think cuddlier.Think squirrels. But bonus points if you imagined Putin on a Shetland pony.
Cleve R. Wootson Jr. | The Washington Post
Evaluating the US-China Cybersecurity Agreement, Part 2: China’s Take on Cyberspace and Cybersecurity
Part one of this three-part series showed how differing approaches to their respective national interests drove China and the United States to contrasting views on the implementation of cyber policies and explored the U.S. position as well as the 2015 agreement between the two states.
This article, part two, details China’s approach to cyberspace and cybersecurity. Part three will conclude by reviewing reactions to the agreement, and assessing its success to date and its longer-term prospects.
Gary Brown and Christopher D. Yung, The Diplomat