Month: February 2017

IndependentKrebs

Who Ran Leakedsource.com?

Credit to Author: BrianKrebs| Date: Wed, 15 Feb 2017 18:03:06 +0000

Late last month, multiple news outlets reported that unspecified law enforcement officials had seized the servers for Leakedsource.com, perhaps the largest online collection of usernames and passwords leaked or stolen in some of the worst data breaches — including billions of credentials for accounts at top sites like LinkedIn, Myspace, and Yahoo. In a development that may turn out to be deeply ironic, it seems that the real-life identity of Leakedsource’s principal owner may have been exposed by many of the same stolen databases he’s been peddling.

Read More
SecurityTrendMicro

Bad Choices, Exposed Data

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 15 Feb 2017 16:46:07 +0000

Our researchers produce a lot of really interesting material. This week, they published a paper called, “U.S. Cities Exposed In Shodan.” The research looks systems that are exposed online…exposure that systems owners aren’t always aware of. The most disturbed statistic in the research is a simple one: the fourth most exposed system is MySQL. I had…

Read More
ComputerWorldIndependent

Researchers trick 'CEO' email scammer into giving up identity

Credit to Author: Michael Kan| Date: Wed, 15 Feb 2017 08:13:00 -0800

Businesses targeted in email scams don’t always have to play the victim. They can actually fight back.

Researchers at Dell SecureWorks have documented how they identified a suspected email scammer from Nigeria by essentially playing along with the scheme to fool the attacker into revealing his true whereabouts.

Anyone can use these tips, said Joe Stewart, director of malware research at SecureWorks. “We’re letting [the scammers] give us all the information about themselves,” he said.

The email scheme involved a fraudster impersonating a CEO in what’s called a business email spoofing attack. The goal is often to trick a victim into wiring funds to the scammer’s bank account.

To read this article in full or to leave a comment, please click here

Read More
FortinetSecurity

The Challenge of Securing IoT

Credit to Author: John Maddison| Date: Wed, 15 Feb 2017 06:24:36 -0800

By now, everyone has heard the numbers. IoT is part of a networking revolution that is transforming the world. Experts predict that by 2020 there will be over 33 billion IoT devices deployed, or 4.3 Internet-connected devices for every man, woman, and child on the planet. Of course, IoT is more than just one thing. There are a variety of IoT devices and categories, each with their own implications. Consumer IoT includes the connected devices we are most familiar with, such as smart cars, phones, watches, laptops, connected appliances, and…

Read More
SecurityTrendMicro

Devices Exposing Critical Industries and U.S. Cities

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Wed, 15 Feb 2017 13:06:15 +0000

As connected devices continue to intertwine with daily life, the security of those devices and the information they process is a growing conversation. To gain a better understanding of cyber assets exposed to the internet, Trend Micro researchers took a comprehensive look at the exposed assets in the 10 largest U.S. cities – New York…

Read More
ComputerWorldIndependent

Doubts abound over U.S. action on cybersecurity

Credit to Author: Michael Kan| Date: Wed, 15 Feb 2017 04:02:00 -0800

How should the U.S. respond to cyberattacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.

Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show in San Francisco, but they admit that politics and policy conflicts have hampered the government’s approach. 

“I wish the federal government could do this, but it’s very hard, unfortunately, due to partisan politics,” said Virginia Gov. Terry McAuliffe, during a speech at the show. “They haven’t been able to take the lead on this issue as they should have.”

To read this article in full or to leave a comment, please click here

Read More