CyberSecurity Related News – Daily digest: June 16, 2016

EVO Security/ June 16, 2016/ IT Security News&Updates/

Hacker faces 25 years in prison for giving ISIS a US kill list

Last June – almost a year to the day – a hacker from Kosovo who went by the handle Th3Dir3ctorY breached a server containing databases of personal information about US servicemen and federal employees.Over the next three months, he supplied data pertaining to more than 1,300 US military and…


Read the full story on thenextweb.com

Third-party cloud apps growing contribution to shadow IT threat

Third-party apps increasingly popularized by the cloud are contributing to shadow IT risks facing enterprises, according to a report announced by CloudLock this week.According to the cloud cyber security vendor’s Q2 report, The Explosion of Apps: 27% are Risky, which analyzed 10 million users,…


Read the full story on channelnomics.com

Lone wolf claims responsibility for DNC hack, dumps purported Trump smear file

In an intriguing follow-up to Tuesday’s report that Russian hackers gained access to Democratic National Committee servers, an anonymous blogger has claimed he alone was responsible for the breach and backed up the claim by publishing what purport to be authentic DNC documents taken during the online heist.


Read the full story on arstechnica.com

Got an hour to kill? Check out 56 minutes of 'The Legend of Zelda: Breath of the Wild'

Arguably the most anticipated game of 2016, ‘The Legend of Zelda: Breath of the Wild’ debuted at this year’s E3 .The game was so big, in fact, that Nintendo dedicated its entire booth to displaying the game. Luckily, Polygon got a chance to sit down with the Wii U version of the title and they…


Read the full story on thenextweb.com

Donald Trump claims DNC itself, not Russians, masterminded hack

A dossier containing critical information about Donald Trump that was hacked from files belonging to the Democratic National Committee (DNC) was posted on the internet on Wednesday, prompting the presumptive Republican nominee to claim his political adversaries, not Russian hackers, were responsible.


Read the full story on theguardian.com

How do you truly secure the connected car?

We’ve become accustomed to staying connected whenever and wherever we are. From Instagramming our exotic summer vacations to receiving alerts from our smartwatches about our next meeting — even ordering groceries via our mobile devices to skip the line — we have more than enough ways to stay tuned in 24/For better or worse, the fear of missing out (a.k.FOMO) is real, and businesses are quick to capitalize.


Read the full story on techcrunch.com

U.S. attorney in Manhattan probes Bangladesh Bank cyber heist: source

The U.attorney’s office in Manhattan has opened an investigation of the cyber heist of $81 million from Bangladesh Bank’s account at the Federal Reserve Bank of New York, a law enforcement source said. Preet Bharara, the U.attorney for the Southern District of New York, is investigating the February crime, in which criminals used the SWIFT fund-transfer network to steal money from Bangladesh’s central bank.


Read the full story on reuters.com

FireEye rejected multiple buyout offers this year: Bloomberg

FireEye Inc hired Morgan Stanley to explore a sale but has since rejected at least two takeover offers this year – including one from Symantec Corp – as they were below its expectations, Bloomberg reported. The cyber security company was looking for offers of $30 per share or more, Bloomberg reported, citing people familiar with the matter.


Read the full story on reuters.com

An online market is selling access to government servers for $6

Credit: Kaspersky An online black market known as xDedic has a catalog of over 70,000 compromised servers, according to Kaspersky Lab.The servers are in 173 countries and belong to businesses, universities and even government agencies — most of whom still have no idea they’ve been hacked….


Read the full story on thenextweb.com

The spy who hacked me: Evildoers love IoT's weak security – ReadWrite

With the explosive growth of the Internet of Things (IoT), both spies and hackers are feasting on a new universe of poorly secured technology.Recode quotes a top spy from the US National Security Agency who spoke with surprising candor about IoT’s security vulnerabilities. These vulnerabilities…


Read the full story on readwrite.com

ISIS hacker pleads guilty to giving terrorists US military kill list

A hacker the US authorities have labeled as the leader of an overseas Internet hacking group—the Kosova Hacker’s Security—pleaded guilty Wednesday in federal court to charges of providing material support to the US enemy. It was the first known prosecution of a hacker joining forces with a terror group in a bid to carry out terrorism, the government said.


Read the full story on arstechnica.com

Guccifer 2.0 DNC's servers hacked by a lone hacker

Worldwide known cyber security company CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by "sophisticated" hacker groups.I’m very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy.Guccifer may have been the first…


Read the full story on guccifer2.wordpress.com

Bumble and Spotify now let you weed out suitors by musical taste

Credit: Bumble Bumble, the dating app that lets women make the first move, and Spotify have partnered to help you make more informed dating decisions — at least as it pertains to musical interests. Users on Bumble will now be able to connect their profile to a Spotify account to let…


Read the full story on thenextweb.com

Create Your Entire Tech Budget From These 6 Elements

Budgeting is a necessary evil; one that most business leaders approach with a degree of dread. It’s challenging enough trying to forecast funding in support of predictable expenses, but what about the unpredictable ones? Never has this dilemma been more frustrating than when it comes to budgeting for workplace technology, especially for small to mid-size companies with tight margins.


Read the full story on inc.com

ISIS Twitter accounts hijacked to display gay porn

Several Twitter accounts belonging to the Islamic State militant group (ISIS) were hijacked yesterday and replaced with gay pride messages and links to gay pornography.A hacker affiliated with Anonymous, WauchulaGhost, first began hijacking the pro-ISIS Twitter accounts months before. In that…


Read the full story on thenextweb.com

How to protect yourself from phishing scams

Phishing is a common scheme in which a cyber criminal lures in a user with the intent to steal the recipient’s sensitive information, such as credit card information, usernames and email addresses, and social security numbers.Phishing scams reel in users using these three common forms: …


Read the full story on blog.dashlane.com

Schneider Patches Severe Flaw in Video Management System

Schneider Electric has released a software update for its Pelco Digital Sentry video management solution to address a high severity vulnerability that allows attackers to compromise affected systems. Pelco Digital Sentry (DS) is advertised as a video management system that is ideal for education, healthcare and corporate environments.


Read the full story on securityweek.com

The Car Hacker's Handbook digs into automotive data security

In the coming age of autonomous cars, connected cars, and cars that can communicate with each other, the city’s infrastructure, our phones, and the entire internet of things, data security is going to be paramount. That’s why Craig Smith, who has spent 20 years working in banking and healthcare digital security, wrote The Car Hacker’s Handbook: A Guide for the Penetration Tester.


Read the full story on techcrunch.com

Here's the data that told us Bernie Sanders would lose

As we approach the likely end of Bernie Sanders’s bid for the presidency, what from the volumes of campaign trail data might have foretold the end of his campaign? Drawing on the Internet Archive’s Television News Archive, the graph below shows each Democratic candidate’s percentage of mentions of all the Democratic candidates across the major U.national television networks from Jan. 2015, through this past weekend.


Read the full story on washingtonpost.com

The Orlando shootings are a brutal reminder that no part of the US has a monopoly on hate

The barbaric June 12 attack on a gay club in Orlando represents both the deadliest mass shooting in modern American history and the largest terrorist attack on American soil since 9/11. As it stands, the assault is also the most significant hate crime in contemporary American history. We don’t know exactly what motivated the shooter, US citizen Omar Mateen, to target Pulse patrons in Orlando.


Read the full story on qz.com

https://datafloq.com/read/the-weakest-link-cyber-security-and-routers/2120

Connecting Data and People The One-Stop Source for Big Data. We are the number one Big Data platform connecting Data and People, connecting all stakeholders in the global Big Data market.


Read the full story on datafloq.com

Hackers Found Selling Access to 70,000 Company Computer Systems

Cyber-security firm Kaspersky Lab says it has uncovered an online marketplace where criminals from all over the world sell access to more than 70,000 hacked corporate and government servers for as little as $6 each.Kaspersky discovered the forum after a tip from a European internet service…


Read the full story on bloomberg.com

Cybercrime market sells servers for as little as $6 to launch attacks

FRANKFURT (Reuters) – A major underground marketplace acting like an eBay for criminals is selling access to more than 70,000 compromised servers allowing buyers to carry out widespread cyber-attacks around the world, security experts said on Wednesday. Researchers at Kaspersky Lab, a global computer security firm based in Moscow, said the online forum appears to be run by a Russian speaking group.


Read the full story on venturebeat.com

DNC discovers Russian hackers' yearlong access to data

Russian hackers have had access to Democratic National Committee secret files — including opposition research on Donald Trump — for over a year, according to a new report in The Washington Post. The revelation comes a month after the director of national intelligence, James Clapper Jr., said that the agency had seen evidence of possible intrusions from foreign hackers into political sites.


Read the full story on techcrunch.com

Chinese Attackers Conduct Cyberespionage for Economic Gain

A threat group believed to be affiliated with the Chinese government has been conducting cyber espionage operations against Myanmar and other countries for economic gain. The actor, dubbed "Mofang" by Dutch security firm Fox-IT, has targeted entities in Myanmar, India, Germany, Canada, the United States, Singapore, South Korea and likely other countries since at least February 2012.


Read the full story on securityweek.com

Tales from Silicon wadi

STANDING amid the skyscrapers of Tel Aviv, looking west over the sun-warmed Mediterranean, one can almost forget how unlikely Israel’s recent economic success has been. The country is a fortress: a tiny island of prosperity in a troubled region. Its neighbours are hostile; Syria, in the midst of a devastatingly bloody civil war, is a failed state.


Read the full story on economist.com

Cyber-crime: What's the risk to your business?

Research from Aviva (the UK’s largest commercial insurer) shows that: More than two in five businesses believe they are unlikely to be a target for cyber-crime.Almost a quarter are worried but not sure what to do to protect themselves.8% haven’t thought about the risk at all. However, the…


Read the full story on venturefestoxford.com

Chips with Everything tech podcast

Etay Maor, a cyber-security advisor at IBM, talks to Olly Mann about the darknet, the shady underside to the web. The two look at what lives there, including automatic guns, marijuana and fake passports.


Read the full story on theguardian.com

Russia 'hacked Democrats data on Trump' says US

Russian government hackers breached Democratic National Committee computers to obtain opposition research on Republican Donald Trump, say officials. The DNC’s computer network was infiltrated in a "serious" incident, said chairwoman Debbie Wasserman Schultz. A cyber security firm has been hired to help, she said, to "kick out the intruders and secure our network".


Read the full story on bbc.co.uk