Here is the weekly roundup :
|
Cyber Checklist of Security Questions to Ask Your Law Firm
|
Law firms are not regulated and only have a contractual and professional obligation to safeguard client information. But they handle the most sensitive, non-public market moving information on the planet.
|
|
Banking Trojans Combine to Siphon $4 Million in a Few Days
|
A new piece of malware has been discovered by security researchers at IBM and has reportedly stolen $4 million from over 24 U.S. and Canadian banks, in a matter of just a few days.
|
|
How to Avoid Bad HIPAA Compliance Practices
|
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was enacted to protect health insurance coverage for employees and their families. HIPAA compliance is an important facet in any healthcare organization. Here, we take a look at some bad practices or missteps that are surprisingly common when dealing with compliance concerns, leaving the door ajar for a possible leak or worse, a data breach.
|
|
Apple Co-Founder: Cybercrime is World’s Greatest Threat
|
Apple co-founder Steve Wozniak believes the attack on cybersecurity is the world’s greatest threat and that cybersecurity is getting “worse and worse year by year, not better and better.”
|
|
DHS Wants Windows Users to Uninstall Apple’s Quicktime
|
Citing security firm Trend Micro, the Department of Homeland Security has issued an alert to Windows users, reminding them that Apple has ended QuickTime support for Windows, leaving them vulnerable to new exploits.
|
|
Surveillance Cameras Sold on Amazon Found Infected with Malware
|
A security researcher has discovered that a set of outdoor surveillance cameras purchased on Amazon was embedded with malware on arrival from Amazon.
|
Interesting Reading From Around the Web
|
Hacker Promises To Kill Apple Mac Ransomware Before It Becomes A Nightmare
|
If you own an Apple Mac, there’s much less chance of your PC being infected with ransomware than if you’re a Microsoft user. Only one fully-functional sample has ever been seen — KeRanger, which infected under 7,000 Apple machines. Not only are there only a handful of examples, two of which were developed as research projects rather than genuine cybercriminal tools, but one professional hacker has developed a tool he believes will successfully prevent any current forms of ransomware infecting Mac OS X.
|
|
SpyEye Makers Get 24 Years in Prison
|
Two hackers convicted of making and selling the infamous SpyEye botnet creation kit were sentenced in Georgia today to a combined 24 years in prison for helping to infect hundreds of thousands of computers with malware and stealing millions from unsuspecting victims.
|
|
How the GozNym Trojan Stole Millions
|
The GozNym hybrid, part banking Trojan and part ransomware, combines features of Nymaim and Gozi ISFB malware to create a powerful Trojan, IBM Executive Security Advisor Limor Kessem said in an IBM alert. GozNym worked like a double-headed beast, where the two codes relied on one another to carry out the malware’s internal operations, he said.
|
|
Upcomming Events
LIFARS & Partners CISO Wine Tasting
New York, NY, April 28
More information
Internet Week Panel
New York, NY, May 17
More information
ASIS NYC
New York, NY, April 27-28
More information
EnFuse 2016
Las Vegas, NV, May 24-26
More information
Featured Q&A:
Ami Rojkes on Today’s Privacy Concerns
Ami Rojkes is an Israeli-based writer with a focus in technology. Ami is currently the Chief Cyber Editor of Israel Defense, an Israeli magazine that covers topics in the Israeli cyber, defense, and the information and communications industries. LIFARS had the privilege of speaking with Ami Rojkes and received an outside view on the security competition in the global community.
Featured Article
The Global Cyber Crime Underground: What Are They and What Do They Sell?
This is the first blog in a three-part series co-written by LookingGlass Cyber Threat Intelligence Group and LIFARS. The series provides a high level overview of the global cyber crime underground and the biggest players in this space. Today we will be discussing the Chinese underground.
|