Heartland Breach: Colorado Bank Reports New Fraud

Heartland Breach: Colorado Bank Reports New Fraud


Heartland Breach: Colorado Bank Reports New Fraud

Posted:

InfoSec News: Heartland Breach: Colorado Bank Reports New Fraud: http://www.bankinfosecurity.com/articles.php?art_id=2259
By Linda McGlasson Managing Editor Bank Info Security March 3, 2010
A Colorado bank has come forward to reveal that as many as 5,000 of its customers were at risk because of new fraudulent transactions tied to [...]

Shands notifies 12,500 patients that data at risk

Posted:

InfoSec News: Shands notifies 12,500 patients that data at risk: http://www.gainesville.com/article/20100302/ARTICLES/3021003/1002
By Nathan Crabbe Staff writer Gainesville.com March 2, 2010
Shands HealthCare has notified about 12,500 patients that a laptop containing their medical information was stolen in January. [...]

Nation's cybersecurity suffers from a lack of information sharing

Posted:

InfoSec News: Nation's cybersecurity suffers from a lack of information sharing: http://fcw.com/articles/2010/03/03/cybersecurity-policy.aspx
By William Jackson FCW.com March 03, 2010
SAN FRANCISCO -- The lack of trust between the public and private sectors continues to inhibit the sharing of information needed for the nation to effectively defend against rapidly evolving cyberthreats, a panel of industry experts and former government officials said Tuesday.
"We need to have more transparency in the public-private partnership," said Melissa Hathaway, former White House advisor who conducted last year's comprehensive review of government cybersecurity. "The trust does not exist between the two parties."
Hathaway, who now runs her own cybersecurity consulting firm, said during a panel discussion at the RSA Security Conference that a .safe space. overseen by a trusted third party is needed to facilitate sharing.
William Crowell, former National Security Agency deputy director, said that it should be possible to share information without identifying the source, to make the parties feel more secure about providing it. "We need to be able to abstract the information we are are going to share," he said. "That's our best approach in the long run."
[...]

Tracing attack source key to cybersecurity strategy, Chertoff says

Posted:

InfoSec News: Tracing attack source key to cybersecurity strategy, Chertoff says: http://www.computerworld.com/s/article/9165638/Tracing_attack_source_key_to_cybersecurity_strategy_Chertoff_says?taxonomyId=17
By Jaikumar Vijayan Computerworld March 3, 2010
SAN FRANCISCO -- The difficult task of identifying the true sources of cyber attacks remains one of the biggest challenges in the development of a national cybersecurity strategy, former Department of Homeland Security Secretary Michael Chertoff told Computerworld in an interview at the RSA Security conference here today.
Chertoff, who is participating in a panel discussion at the conference, said there is a growing need for the U.S to create a strong, formal strategy for responding to cyberattacks against American interests.
Such a strategy would need to clearly articulate possible U.S. responses to attacks, which could include diplomatic and other tools.
Chertoff noted that by comparison, physical attacks are relatively easy to track down and respond to. "In the Cold War we could attribute an attack. It was clear where it came from and we could respond," he said.
[...]

Alameda man charged in ticket-hacking scam

Posted:

InfoSec News: Alameda man charged in ticket-hacking scam: http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/03/01/BAK21C9544.DTL
By Henry K. Lee Chronicle Staff Writer SFGate.com March 2, 2010
An Alameda man is among four people indicted by a federal grand jury on charges of reaping $25 million reselling premium tickets to concerts and [...]

Study: Few teachers, schools educate students on cybersecurity

Posted:

InfoSec News: Study: Few teachers, schools educate students on cybersecurity: http://thehill.com/blogs/hillicon-valley/technology/83757-study-few-teachers-schools-educate-students-on-cybersecurity
By Tony Romm Hillicon Valley 02/25/10
At least three out of four public school teachers have little to no recent training on Internet safety, according to a new study. [...]

N. Korea develops own OS

Posted:

InfoSec News: N. Korea develops own OS: http://www.koreaherald.co.kr/NEWKHSITE/data/html_dir/2010/03/04/201003040036.asp
By Kim So-hyun The Korea Herald 2010.03.04
North Korea's self-developed software operating system named the "Red Star" was brought to light for the first time by a Russian satellite broadcaster yesterday. [...]

Deadline Extension: CSIIRW 6th Cyber Security & Information Intelligence Research Workshop

Posted:

InfoSec News: Deadline Extension: CSIIRW 6th Cyber Security & Information Intelligence Research Workshop: Forwarded from: Frederick Sheldon <sheldonft (at) ornl.gov>
CALL FOR ABSTRACTS
CSIIRW-10 http://www.csiir.ornl.gov/csiirw
April 21-23, 2010
Sixth Cyber Security and Information Intelligence Research Workshop Oak Ridge National Laboratory CSIIRW-09 Proceedings [...]

Product Watch: Free Tool Cleans Up 'Rusty, ' Unsafe Firewall Settings

Posted:

InfoSec News: Product Watch: Free Tool Cleans Up 'Rusty, ' Unsafe Firewall Settings: http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=223100907
By Kelly Jackson Higgins DarkReading Mar 01, 2010
SAN FRANCISCO -- RSA Conference 2010 -- Matasano Security here today rolled out a new Web-based open-source tool that scans for any firewall [...]

One Man's Life on the Security D-List

Posted:

InfoSec News: One Man's Life on the Security D-List: http://www.csoonline.com/article/561663/One_Man_s_Life_on_the_Security_D_List
By Bill Brenner Senior Editor CSO March 02, 2010
SAN FRANCISCO -- It used to be that security practitioners were seen as propeller-hat wearing introverts hunched over computers in dark, cold [...]

Giga-Biter In Obstruction Charge

Posted:

InfoSec News: Giga-Biter In Obstruction Charge: http://www.thesmokinggun.com/archive/years/2010/0302101flash1.html
The Smoking Gun MARCH 2, 2010
In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed the data storage device while in the custody of Secret Service agents, records show. Florin Necula ingested the Kingston flash drive shortly after his January 21 arrest outside a bank in Queens, according to U.S. District Court filings. Necula and several codefendants had been transported to a Secret Service office in Brooklyn, where they were to be questioned and processed. While there, and in the view of investigators, Necula "grabbed Subject Flash Drive 2, which had been on his person at the time of his arrest, and swallowed," Agent Joseph Borger noted in the below February 25 search warrant affidavit. When Necula was unable to pass the item after about four days, doctors--concerned that the drive was not compatible with the suspect's GI tract--concluded he "would be injured if they allowed the flash drive to remain inside of him," reported Borger. Necula eventually agreed to allow doctors at New York Downtown Hospital to remove the item, according to a source familiar with the incident. A Kingston executive said it was unclear if stomach acid could damage one of their drives. "As you might imagine, we have no actual experience with someone swallowing a USB," Mike Sager wrote in an e-mail to TSG. In return for swallowing the storage device, Necula was charged with obstruction of justice, one of four felonies detailed in an indictment returned in late-January. Prosecutors allege that Necula and three other men placed card readers over ATM slots to "skim" magnetic strip information off cards inserted in those machines. After Necula and his codefendants were busted, agents recovered laptops, cameras, flash drives, and cell phones from the men (and at a Long Island City apartment). Necula is currently being held without bail at a Queens jail. (4 pages)

U.S. Declassifies Part of Secret Cybersecurity Plan

Posted:

InfoSec News: U.S. Declassifies Part of Secret Cybersecurity Plan: http://www.wired.com/threatlevel/2010/03/us-declassifies-part-of-secret-cybersecurity-plan/
By Kim Zetter Threat Level Wired.com March 2, 2010
The Obama administration declassified part of the government's cybersecurity plan Tuesday, publishing parts of it that discuss [...]

Woman called Window joins Apple

Posted:

InfoSec News: Woman called Window joins Apple: http://www.theregister.co.uk/2010/03/02/ex_mozilla_security_chief_joins_apple/
By John Leyden The Register 2nd March 2010
Ex-Mozilla security boss Window Snyder has joined Apple.
Snyder, who worked at Mozilla between 2006 and 2008, and is credited [...]

Spain arrests three accused of running huge botnet

Posted:

InfoSec News: Spain arrests three accused of running huge botnet: http://news.cnet.com/8301-27080_3-10462718-245.html
By Elinor Mills InSecurity Complex CNet News March 2, 2010
Authorities in Spain have arrested three men accused of operating a massive botnet composed of 12.7 million PCs that stole credit card and [...]

DoD Requires Hacker Certification

Posted:

InfoSec News: DoD Requires Hacker Certification: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=223101209
By Elizabeth Montalbano InformationWeek March 2, 2010
Official government cyber defenders are now required to have the skills of a hacker according to a mandatory certification approved this week by [...]

0 comments:

Post a Comment