Security Affairs newsletter Round 21 – Best of the week from best sources

Pierluigi Paganini August 09, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Hacking Industrial Ethernet Switches to take over nuclear plants
Microsoft Windows 10 spies on you by default
Operation Potao – hackers used a trojanized version of TrueCrypt
Mt Goxs Mark Karpeles arrested in Japan
Hijacking Satellite Communications with a $1,000 Device
FDA says healthcare providers to stop using older drug infusion pumps made by Hospira
Hacktivists congratulate Daily Shows Jon Stewart via Donald Trumps website
Global spy system ECHELON confirmed at last – by leaked Snowden files
Sysadmin jailed for a decade after slurping US military docs
A secure employee departure checklist
The Snowball Effect of Data Breaches
Zscaler Raises $100 Million to Expand Cloud Security Business
Windows 10 Upgrade Spam Carries CTB-Locker Ransomware
Exploits start against flaw that could hamstring huge swaths of Internet
A secret NSA map shows successful Chinese attacks
EFF, AdBlock and Others Launch New Do Not Track Standard
RIG Exploit Kit 3.0 infected over 1.3 Million PC worldwide
0-day bug in fully patched OS X comes under active exploit to hijack Macs
New US cyber laws will hit privacy and security, says Homeland Security
Malvertising Attack Hits Yahoo! Ad Network
Researchers Uncover ‘Terracotta’ Chinese VPN Service Used by APT Crews for Cover
Terracotta VPN hijacks servers for commercial gain
Kaspersky DDoS Intelligence Report Q2 2015
Yahoo tackles large malvertising campaign in its ad network
Operation Lotus Blossom APT – Elise Malware
Hackers use cartons with sticks, may be foiled by watermelons
Hacker sends woman pictures of herself from her own webcam
Interpol is training Police officers to fight crime on the Darknet
Terracotta VPN Piggybacks on Network of Compromised Windows Servers
Thunderstrike 2 rootkit infects Mac firmware
Symantec Patches Critical Vulnerabilities in Endpoint Protection
Terracotta VPN, the Chinese VPN Service as Hacking Platform
Researchers make SHODAN of the skies to probe internet-of-things
TaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) Released
China Jails TV Hacker for 12 Years Over Anti-Govt Broadcast
CVE-2015-3823 Android bug phones in endless reboots
SDN switches arent hard to compromise, researcher says
IDG Contributor Network: What I learned from resetting over 300 passwords
Lightbulb moment: Why the Internet of Things is a security watershed
What is the core idea behind applying ISO 27001?
Biggest software update in history coming up: Google patches Android
Thunderstrike 2 rootkit uses Thunderbolt accessories to infect Mac firmware [Updated]
Google pushes fixes for critical code-execution bug in Android
From The Black Hat Keynote Stage: Jennifer Granick
Google to Issue Over The Air Updates to Nexus Devices
Newly discovered Chinese hacking group hacked 100+ websites to use as watering holes
APT Group Gets Selective About Data it Steals
Government Asks for Security Community’s Help on Technical Issues
Iranian, Syrian Hackers Hit Gas Gauges
ICANN Website Security Breached
The Panda Emissary APT specialized in defence aerospace projects
GameOver Zeus Gang Leader Engaged in Espionage: Researchers
FBI may pillory Hillary with email spillery grillery
Global Internet Authority — ICANN Hacked Again!
ICANN urges passwords reset due an external service provider breach
BLEKey Device Breaks RFID Physical Access Controls
Oh no ZigBee, as another front opens on home networking insecurity
Black Hat 2015: Salted Hash live blog (Day 2)
Hacked Opinions: Vulnerability disclosure – Chris Lord
Hacker-friendly Chrysler hauled into court for class-action showdown
Hackers Turn Square Readers into Crime Tools
Black Hat: Hackers urged to protect Internet freedom
Why it’s time to say goodbye to passwords
Crooks exploit public bug to plant adware on Yosemite Macs
Black Hat 2015: Hacker shows how to alter messages on satellite network
Black Hat 2015: IoT devices can become transmitters to steal data
Consumers still don’t get two-factor authentication
Android faces SECOND patching crisis, on the same scale as Stagefright
Hackers Can Remotely Steal Fingerprints From Android Phones
Updated DGA Changer Malware Generates Fake Domain Stream
Meet RollJam, the $30 device that jimmies car and garage doors
Hacking Team compromised non-jailbroken iOS devices
Mozilla Patches Firefox Zero-Day Exploited in the Wild
Ubiquiti Networks Victim of $39 Million Social Engineering Attack
Looking for lessons in the aftermath of the Hacking Team incident
Email addresses in DNS records? Well make a hash of it, says IETF
Researchers find way to steal Windows Active Directory credentials from the Internet
Attack on Sabre reportedly conducted by Anthem, OPA hackers
The NSA Playset: 5 Better Tools To Defend Systems
IDG Contributor Network: The best of times and worst of times in security education
Salted Hash: Live from DEF CON 23
Google Disables Inline Installation of Chrome Extensions for Deceptive Developers
0-day attack on Firefox users stole password and key data: Patch now!
Certifi-Gate Android Vulnerability Lets Hackers Take Complete Control of Your Device
Universal remote can ‘hack into any car’
DGA.Changer Malware Uses New Tricks to Throw Researchers Off Track
Blackhat USA and Defcon 2015
Hack a garage and the car inside with a childs toy and a few chips
Hackers are targeting Gas Tanks worldwide
Rush to Put Death Records Online Lets Anyone be Killed
Leading to a secure cloud – panel discussion recording, slides & transcript (downloads)
Phony death wish? Its incredibly easy to bump someone off online – infosec bod
RollJam — $30 Device That Unlocks Almost Any Car And Garage Door
Researchers to Share Details of Cyber-Terrorists Targeting Indian Government Officials
How Drones Can Find and Hack Internet-of-Things Devices From the Sky
0-day attack on Firefox stole sensitive data and password
Update Firefox NOW to foil FILE-STEALING vulnerability exploit, warns Mozilla
Hackers Broadcast Porn on TV Screens at Brazil Bus Depot
Hacking Windows Server Update Services to infect enterprises
Carphone Warehouse coughs to MONSTER data breach – 2.4 MEELLION Brits at risk

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)



you might also like

leave a comment