NOKIA COMEBACK
Tim&Larry

New York Bill Proposes Backdoors in All Devices

Here is the weekly roundup :

New York Bill Proposes Backdoors in All Devices
A new formal bill has been put before the New York State Assembly which would fundamentally mandate manufacturers to devise backdoors for their devices.

Forbes Visitors Forced to Disable Ad-Block See Malware-Ads
Forbes is among a select group of websites that is actively forcing visitors to their websites to turn off their ad blockers. As it turned out, a security researcher visiting the website with his adblocking solution switched off, was redirected to a web page serving malware.

Maker of Car Breathalyzers Hacked
In further evidence to prove that any device or company can be hacked, a firm that develops and sells car breathalyzers was hacked, with its internal documents dumped on the dark web.

Passwords of 320,000 Time Warner Cable Customers Stolen
Cable and broadband provider Time Warner Cable has revealed that the passwords of up to 320,000 customers may have been stolen, along with their email addresses.



Misconfigured Database Exposes Data of 191 Million Voters
In what could be one of the largest database leaks ever, a massive database containing some 191 million voter records is in the wild and completely accessible, without anyone taking any ownership for it.


Teen Hacker Group Targets US Spy Chief
Headlines were made when a group of “teenage hackers” broke into the CIA director’s AOL email account in 2015. Now, the group is back and have set their sights on James Clapper, the Director of National Intelligence.




Interesting Reading From Around the Web:

Apple Keeps Leaving Macs Open To Malware - But Whitehat Hackers Have Your Back
Apple employed a Gatekeeper for its Macs to do one job: keep unsigned, unverified software out. It might be time to fire Gatekeeper, or hire a new one, as its failures have again been shown up by Patrick Wardle, ex-NSA staffer and head of research at bug hunting firm Synack.


Ransomware a Threat to Cloud Services, Too
Ransomware — malicious software that encrypts the victim’s files and holds them hostage unless and until the victim pays a ransom in Bitcoin — has emerged as a potent and increasingly common threat online. But many Internet users are unaware that ransomware also can just as easily seize control over files stored on cloud services.


9 Cybersecurity Predictions for 2016
In 2015, hackers exposed 170 million personal records in the U.S., according to the Identify Theft Resource Center. The attacks cost businesses worldwide more than $400 billion, British insurance company Lloyd’s revealed. So what’s the data breach forecast for 2016? It’s not looking good, according to cybersecurity experts.


Authentication Can Stop Hackers (or 2015 Hacks in Review)
The year 2015 was rather illustrious for cyberattacks, with hacks both famous and even infamous. Among the most notable attacks – some for the sheer numbers of victims, some for who was hacked, and some for both – were the following...



Upcoming Events:


LIFARS & LemonFish Webinar on Data Security and Data Breaches

It’s no longer a matter of if, but when your company gets breached. Today, cybercrime and espionage cost companies nearly $500 billion, and by the time it takes you the average 220 days to just learn of a breach in your company, it’s too late. This webinar will help you gain the knowledge to help save your company millions, whether it be in the open or deep web.


January 20, 2016



Register Now



LIFARS at the Cybertech 2016: The Anatomy of an APT Attack

Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States.

Wondering what an APT attack looks like under the microscope? In this 2 hour workshop, we will examine the process of response to an APT attack in some real-world scenarios. We will also elaborate on the process of detonation of malware, the forensic investigation, and more.

To meet with our team, please send us an email at info@lifas.com . We are looking forward to hearing from you!

FOR A 10% DISCOUNT, PLEASE USE THE FOLLOWING CODE: LIFARS cybertech20


January 26-27, 2016, Tel Aviv, Israel



Find Out More



LIFARS at the QuBit Conference 2016

Another year, another QuBit Conference - and of course, we will be there. Get ready for another great community event in the heart of Europe - the city of Prague. Take advantage of the discounted pricing while it lasts!


April 12-14, 2016, Prague, Czech Republic



Find Out More


Featured Article:



Juniper Networks to rip out NSA-developed code amid new backdoor security concerns

One of the biggest fears of any company is that a hacker or outside organization is utilizing a backdoor to spy on them. For customers of Juniper Networks, as it turns out, the NSA could have been eavesdropping for quite some time.



Read on TechRepublic




Q&A w/ Experts:



Leo Taddeo on the Insider Threat

Leo Taddeo, the Chief Security Officer (CSO) of Cryptzone, joins LIFARS to answer questions from insights developed in his twenty years of experience as an elite FBI agent.

Read Full Q&A







Natalie Blackbourne on Social Engineering

Natalie Blackbourne is the President of Blackbourne Worldwide, a cybersecurity company that specializes in cyber threat analysis and mitigation, social engineering, and security research.

Read Full Q&A




Featured Content:



Cybersecurity and Privacy Guide

Like a thief cuts through a bike lock, hackers can override your technology’s security measures. To keep us mindful of security best practices, Assurex Global’s “go to” resource for digital forensics and cybersecurity, LIFARS, has answered questions we should all be asking.



Free Download






Experts on the Data Loss Prevention (DLP) Market in 2016 & Beyond

A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.



Read Article



Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.