Citadel Information Group

  • Home
  • About Us
    • About Citadel
    • Who We Are
    • When To Call Citadel
  • Services
    • Overview: Delivering Information Peace of Mind ® to Business and the Nonprofit Community
    • Citadel’s Information Peace of Mind ® Program
    • Assessments and Reviews
    • Information Security Policies and Standards
    • Secure The Human
    • Phishing Defense Training
    • CCPA and Defendable Security Procedures and Practices
    • Privacy: Information Inventory / Data Mapping
    • Security Management of the IT Network / Infrastructure
    • Incident Response / Business Continuity
    • Secure Application Development — Learn By Doing
    • Litigation Support
    • Keynotes
    • Client Success Stories
  • Blog
  • Resources
    • Information Security Library
      • Citadel Guides
      • Awareness Posters
      • For Boards and the C Suite
      • Cybersecurity Law
      • Cybersecurity Surveys
      • HIPAA HITECH
      • Insurance and Risk Management
      • National Cybersecurity
      • Online Bank Security
      • Payment Card Industry Data Security Standard
      • Personal Cybersecurity
      • Securing the IT Network
      • Helpful Links
    • Blogs
      • Cybersecurity Blogs
      • Leadership and Culture Change Blogs
  • Contact
You are here: Home / Cybersecurity News of the Week / Cyber Security News of the Week, June 7, 2015

June 7, 2015 by Stan Stahl Ph.D.

Cyber Security News of the Week, June 7, 2015

Cyber Privacy

New Snowden leak: NSA uses warrantless Web surveillance to hunt hackers: Ever since Edward Snowden began to leak details on the mass surveillance programs of the NSA and other government agencies, there’s been an ongoing debate over the nature and limits that should be placed on such surveillance. One of the most troubling trends exposed in repeated leaks is the degree to which the government has exceeded the enormous authority granted it by the Patriot Act and other legislation. New information, available today, is going to reignite that argument. Days after the Senate voted to reauthorize the Patriot Act with some modest modifications, details have leaked on how the Obama Administration authorized the NSA to search the Internet for evidence of malicious hacking, even when there were no obvious ties between the alleged hackers and any international groups. ExtremeTech, June 4, 2015

NSA’s use of ‘back-door searches’ against hackers is reformers’ next target: Surveillance reformers, fresh off a week of tenuous victories, have vowed to ensure there are further overhauls to the National Security Agency’s vast dragnets after a new report detailed another stretch of legal authority by the US government to stop malicious hackers. The Guardian, June 4, 2015

Bruce Schneier on Privacy and the Data Free-for-All: OVER THE PAST two decades, few voices have shouted louder from the rooftops about global cybersecurity and digital privacy concerns than Bruce Schneier. He’s the CTO of Resilient Systems, a board member of the Electronic Frontier Foundation (EFF) and has authored 14 books—his latest, Data and Goliath, was published in March. Wired, May 31, 2015

Identity Theft

Chinese Hackers Accused Of Attacking US Government Agencies: Citadel’s Dr. Stan Stahl discusses breach at Office of Personnel Management putting as many as four million current and former federal employees at risk of identity theft. Dave Bryan reports. CBS Los Angele, June 4, 2015

Hacking Linked to China Exposes Millions of U.S. Workers: WASHINGTON — The Obama administration on Thursday announced what appeared to be one of the largest breaches of federal employees’ data, involving at least four million current and former government workers in an intrusion that officials said apparently originated in China. The New York Times, June 4, 2015

Identity Theft — Tax Refund Fraud

States Seek Better Mousetrap to Stop Tax Refund Fraud: With the 2014 tax filing season in the rearview mirror, state tax authorities are struggling to incorporate new approaches to identifying and stopping fraudulent tax refund requests, a $6 billion-a-year problem that’s hit many states particularly hard this year. But some states say they are encountering resistance to those efforts on nearly every front, from Uncle Sam to online tax vendors and from the myriad of financial firms that profit handsomely from processing phony tax refunds. KrebsOnSecurity, June 2, 2015

Phony Tax Refunds: A Cash Cow for Everyone: When identity thieves filed a phony $7,700 tax refund request in the name of Joe Garrett, Alabama’s deputy tax commissioner, they didn’t get all of the money they requested. A portion of the cash went to more than a half dozen U.S. companies that each grab a slice of the fraudulent refund, including banks, payment processing firms, tax preparation companies and e-commerce giants. KrebsOnSecurity, June 2, 2015

IRS Changes Identity Theft Policy: The Internal Revenue Service has agreed to change its policy on identity theft and provide victims with copies of the fraudulent tax returns that have been filed under their names by scammers. Accounting Today, June 1, 2015

Cyber Warning

New exploit leaves most Macs vulnerable to permanent backdooring: Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. ars technica, June 1, 2015

Cyber Security Management

Data breach costs now average $154 per record: The average total cost of a single data breach rises 23% to $3.8 million, according to the Ponemon Institute. ComputerWorld, May 27, 2015

Cyber Security Management – Cyber Defense

MICROSOFT GIVES DETAILS ABOUT ITS CONTROVERSIAL DISK ENCRYPTION: Recently, I wrote a guide explaining how to encrypt your laptop’s hard drive and why you should do so. For the benefit of Windows users, I gave instructions for turning on BitLocker, Microsoft’s disk encryption technology. The Intercept, June 4, 2015

Facebook boosts notification email security with OpenPGP encryption: The next time someone tags you in a Facebook post, the social network can send you a super secret notification that not even the National Security Agency can read—at least as far as we know. On Monday, Facebook announced that you can now add an OpenPGP key to your Facebook profile. PCWorld, June 1, 2015

Securing the Village

Co-operation driving progress in fighting cyber crime, say law enforcers: International collaboration and co-operation is driving progress in fighting cyber crime, according to a panel of UK, US and European law enforcement officers. ComputerWeekly, June 5, 2015

Security Compass Donates Security Training Courses to the ISSA-LA Summit Attendees: With threats to the mobile environment growing steadily over recent years, and new features like mobile payments raising the stakes even more for consumers and businesses, Security Compass, with extensive knowledge in web and mobile application security, is announcing a new mobile security training program for application developers and architects, IT administrators and security professionals which can dramatically reduce these risks. PRWeb, June 3, 2015

Cybercrime Solutions Top Agenda of ISSA-LA Information Security Summit (CDSA): This week will see the seventh annual Information Security Summit, held by the Los Angeles Chapter of the Information Systems Security Association (ISSA-LA). CSDA, June 1, 2015

ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions Reaching Out the Entertainment Industry: The Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) is holding its Seventh Annual Information Security Summit on June 4 – 5, 2015 at the Los Angeles Convention Center. The Summit theme, The Growing Cyber Threat: Protect Your Business, reflects the reality that cybercrime impacts the financial health of all our organizations: businesses, government agencies, healthcare, schools, nonprofits, and the entertainment industry. The Summit will highlight emerging solutions to the challenges of cybercrime. Virtual-Strategy Magazine, May 14, 2015

National Cyber Security

Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border: WASHINGTON — Without public notice or debate, the Obama administration has expanded the National Security Agency‘s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents. The New York Times, June 5, 2015

Cyber Underworld

Profile Of A Cybercrime Petty Thief: Although the cybercrime game is dominated by organized criminals — according to IBM X-Force, 80 percent of cyber attacks are driven by highly organized crime rings — there are one-man operations getting a piece of the action, too. Trend Micro today proposed that actors like these may be the “evolved version of the petty thief,” and profiled one individual operating in Canada. DarkReading, May 26, 2015

Cyber Misc

A flaw in the design: A brief history of Internet (in)security. David D. Clark, an MIT scientist whose air of genial wisdom earned him the nickname “Albus Dumbledore,” can remember exactly when he grasped the Internet’s dark side. He was presiding over a meeting of network engineers when news broke that a dangerous computer worm — the first to spread widely — was slithering across the wires. The Washington Post, May 30, 2015

Filed Under: Cybersecurity News of the Week

Call us for a free confidential consultation:
323-428-0441

Get our newsletter

A weekly report of critical security updates and the latest cybersecurity news delivered to your inbox from Secure The Village.

Sign Up

Categories

Get in touch

323 428 0441
info@citadel-information.com

Citadel Information Group
Citadel on Linkedin
SecureTheVillage on Linkedin

About Us

Citadel Information Group is a full service integrated information security management / governance firm. We work either consultatively or as part of a client’s senior management team, assisting our clients cost-effectively manage the confidentiality, privacy, integrity and availability of their information. Learn more.

Key Resources

  • The Citadel Way to Information Security Management
  • Creating a Cybersecurity Aware Culture
  • Secure Application Development: The CISO’s Role – a webinar with WhiteHat Security
  • Information Security Library

Copyright © 2018 by Citadel Information Group  All Rights Reserved | Privacy Policy