Wednesday, February 20, 2019
SC Magazine

30 years in: My, how SC and security have changed

1989. Acid wash jeans, Bon Jovi and the compassionate conservatism of the Reagan Era were actually, unironically popular. The Berlin Wall fell, free elections were held in the then Soviet Congress of Deputies, Vaclev Havel became president of Czechoslavakia,...
SC Magazine

Third decryption tool for GandCrab ransomware released to public

A new free decryption tool for counteracting the effects of GandCrab ransomware is now available to the public.  This latest decryptor is effective against versions 1, 4 and 5.x up through 5.1, which means GandCrab variants released as recently as...
SC Magazine

42,000 patients data compromised AdventHealth Medical Group data breach

AdventHealth Medical Group Pulmonary and Sleep Medicine officials are warning up to 42,000 of their patients of a 16-month-long data breach at the facility that exposed their personal and health information. The breach was discovered on December 27, 2018, but...
SC Magazine

Using the zero trust model to prevent phishing

By Philip James, director of architecture and integration, Alagen Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact,...
SC Magazine

Reitspoof mysterious multistage malware makes its rounds

A multi-staged malware dropping multiple payloads is infecting its victims without a clear purpose and has shown a significant uptick in activity since January 2019. Dubbed Reitspoof, the malware has bot capabilities although Avast researchers believe it was primarily designed...
SC Magazine

Dunn Brothers Coffee, Holiday Inn among those exposed by third-party payment card vendor breach

A company that handles payment operations for a large number of hotels and food establishments, including Holiday Inn, Dunn Brothers Coffee and Zipps Sports Grill, is informing its customers of a data breach that may have compromised consumer’s payment...
SC Magazine

Password manager flaws can expose data on compromised devices, report says

Flaws in top password managers can expose the very data they are supposed to protect, a study by researchers at Independent Security Evaluators (ISE) researchers found. “100 percent of the products that ISE analyzed failed to provide the security to...
SC Magazine

Russian cyberattackers are in and gone in less than 20 minutes

Russian threat actors are almost eight-times faster at taking advantage of a compromised system compared to other nation-state actors, a tribute to their operational tradecraft, according to Crowdstrike’s 2019 Global Threat report. An analysis of what Crowdstrike calls “breakout time”...
SC Magazine

Wendy’s to pay $50M in data breach settlement

Wendy’s has agreed to pay $50 million to settle negligence claims following its 2015-2016 data breach that affected more than 1,000 of the burger chain’s locations. Payment card data was stolen from victims who purchased food at these locations then...
SC Magazine

Search warrants in Russian hackers case reveal interaction between Stone, WikiLeaks

Search warrants executed in Special Counsel Robert Mueller’s probe of Russian hackers have unearthed interactions between recently indicted Trump campaign adviser Roger Stone and WikiLeaks, which leaked emails stolen from the DemocraticNational Committee (DNC) and other Democratic-related organizations and...
SC Magazine

UK committee hammers Facebook on privacy failures

A U.K. parliament report condemning a multitude of actions by Facebook called for closer regulation of the social media giant stating the company often ignored its own privacy policy and its executives were less than forthcoming when testifying before...
SC Magazine

Search warrants in Russian hackers case, reveals interaction between Stone, WikiLeaks

Search warrants executed in Special Counsel Robert Mueller’s probe of Russian hackers have unearthed interactions between recently indicted Trump campaign adviser Roger Stone and WikiLeaks, which leaked emails stolen from the DemocraticNational Committee (DNC) and other Democratic-related organizations and...
SC Magazine

Former Cambridge Analytica exec cooperating with Mueller probe

A former Cambridge Analytica executive is cooperating with Special Counsel Robert Mueller’s investigation into collusion between the Trump campaign and Russian operatives. A spokesperson for the data analytics firm’s former business development director, Brittany Kaiser, said she was subpoenaed by Mueller,...
SC Magazine

Australian PM says parliament, political party hacks work of state actor

Australian Prime Minister Scott Morrison said Monday that “a sophisticated state actor” was behind the hacks of parliament and the country’s political parties first reported February 8. “Our cyber experts believe that a sophisticated state actor is responsible for...
SC Magazine

Gnosticplayers selling third round of databases on Dream Market

The Gnosticplayers hacker has put a third set of databases up for sale on the Dream Market dark web marketplace. This round includes an additional eight databases with data from92.76 million users, according to a report in ZDNet, with each database...

Can you really sniff out gas station card skimmers with your phone?

A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesn't help much...
SecurityWeek

Canada Helping Australia Determine ‘Full Extent’ of Hack

Canada's electronic eavesdropping agency said Wednesday it is working with Canberra to try to determine the scale of computer hacking on Australia's parliament and political parties just months from an election. read more

Researcher: Not Hard for a Hacker to Capsize a Ship at Sea

Maritime transport still contributes in an important way to the world’s economy, with on-time shipments influencing everything from commodities availability and spot pricing to the stability of small countries. Unfortunately, capsizing a ship with a cyberattack is a relatively...
SC Magazine

30 years in: My, how SC and security have changed

1989. Acid wash jeans, Bon Jovi and the compassionate conservatism of the Reagan Era were actually, unironically popular. The Berlin Wall fell, free elections were held in the then Soviet Congress of Deputies, Vaclev Havel became president of Czechoslavakia,...
SecurityWeek

WinPot ATM Malware Resembles a Slot Machine

A piece of malware targeting automated teller machines (ATMs) has an interface that looks like a slot machine, Kaspersky Lab reports.  Dubbed WinPot, the malware was initially detected in March last year, targeting the ATMs of a popular vendor to...