WASHINGTON — The FBI today notified the Free Speech Coalition that 25 adult sites have been hacked, allowing content to be stolen and uploaded to torrent sites.
The person behind the attacks targeted both adult and mainstream film companies, before being identified and arrested, the FBI said.
“According to the FBI, the hacker had a ‘calling’ copying video content and uploading to bit-torrent sites,” said Jeffrey Douglas, the FSC’s board chair who was notified of the breach by an FBI task force. “Sometimes he joined, often with multiple accounts. He would then terminate his membership after breaking through the security and stealing credentials.
Source: FSC: Authorities Announce Hack of 25 Porn Sites – XBIZ.com
IBM has announced a cloud service for organizations requiring a secure environment for blockchain networks. According to the company, the service, which allows clients to test and run blockchain projects that handle private data securely, is ideal for organizations in regulated industries that need strong compliance measures. “Blockchain will change the way we transfer high value goods, digital assets and financial instruments,” said Donna Dillenberger, IBM Fellow for Enterprise Solutions. “To accelerate blockchain adoption, clients must trust the infrastructure and the system that blockchain is running on. With IBM Blockchain, we are expanding access to the emerging technology — not only by making it easy to get up and running on the IBM Cloud but also by using the most secure infrastructure.” By creating a permanent record that can’t be altered, blockchain technology is well-suited for logging and monitoring large amounts of data, such as short-term loans or the millions of parts coursing through the aviation industry’s supply chain. Blockchain technology also permits tracking diamonds and other goods where buyers want to know the origins and previous owners, Bill Fearnley Jr., a research director at International Data Corp., told The Wall Street Journal. “Valuable assets of any kind could be tracked better, with an unerasable history, on a blockchain,” said Fearnley.
Source: IBM Launches Blockchain Cloud Services on High Security Server, LinuxONE | Bitcoin Magazine
Jerusalem and Tel Aviv may be the most well known Israeli cities, but a new one is quickly gaining international acclaim. An ancient-made-modern city in southern Israel, Be’er Sheva, has become the center of Start-Up Nation’s quickly growing cybersecurity arm. A major push by the government and private sector has transformed the desert town into a high-tech center with a special emphasis on cybersecurity. Dozens of startups have joined multinationals such as EMC/RSA, Lockheed-Martin (LM), and others in opening R&D labs there, and they have drawn in impressive talent. The result, to date, is a budding ecosystem of bright minds, dedicated to a common goal of developing world-class cybersecurity technology. Dubbed the “Capital of the Negev Desert,” Be’er Sheva has been locally known as a dusty pit stop between Tel Aviv and tourist destinations in the south of Israel. However, that’s no longer the case. Low real estate prices and new transportation options, including advancements to railway and highway systems, are facilitating a southbound migration. Making the move are ordinary Israelis and tech gurus, as well as some government offices and parts of the Israeli Army (IDF). And then there is Ben Gurion University (BGU), which offers Israel’s top graduate program in cybersecurity. Housing its own cybersecurity research institute, BGU has emerged as a top Israeli center for engineering, sciences, computers, and technology. With this mix of people, energy, facilities, and resources in place, sooner or later, something was going to spark a cyber-tech revolution.
Source: Meet Israel’s new cybersecurity hub | VentureBeat | Security | by Yoni Shohet, SCADAfence
A hacker claiming to have breached an Amazon server has released more than 80,000 usernames and passwords belonging to Amazon users after the online retail giant failed to heed his warnings about vulnerabilities in its servers. The hacker, who goes by 0x2Taylor on Twitter, told the Daily Dot he had attempted to contact Amazon three days ago to bring to the company’s attention a significant security risk that he spotted in ones of its servers. Contained on the server were the usernames and passwords of over 80,000 Amazon Kindle users, along with a considerable amount of information linked to each account including: city, state, ZIP code, phone number, and the IP address from the user’s last login. ADVERTISEMENT Ox2Taylor said he tested a selection of passwords and confirmed they were valid.
Source: Apparent Amazon breach yields login credentials of over 80,000 Kindle users | The Daily Dot
Officials are trying to determine whether a cyberattack was behind outages at websites affiliated with the North Atlantic Treaty Organization and whether hackers were attempting to counter a Warsaw summit that is addressing both cyberspace dangers and Russian aggression. Officials said there is no concrete evidence the websites were knocked out by hacking. But some officials suspect that Russian-backed hackers could be responsible for the website outage that took down a pair of websites affiliated with NATO’s Allied Transformation Command based in Norfolk, Va. The Russian Defense Ministry was not available for comment. Other Russian officials did not immediately respond to a request for comment.
Source: NATO-Linked Websites Go Down, Cyberattack Suspected – WSJ
Fast food chain Wendy’s announced in February that is was looking into a possible security breach. The franchise followed up in May confirming it found malware on its point-of-sale systems that was being used to nab credit card info. Stolen details were said to include including credit or debit card number, expiration date, cardholder verification value, and service code from less than 300 locations. Last month, the company provided and update that the investigation revealed the breach could be much worse due to a second cyberattack. Wendy’s gave another update on the situation this week, disclosing that over 1,000 locations had systems where the malware was installed. The company says that the malware has been disabled at all of the locations where it was discovered to be installed. Wendy’s explained that the breach likely originated from franchisees remote access credentials being compromised, giving the culprits the ability to install the software needed to swipe details from credit and debit card transactions. The investigation is still in progress, so more details could be on the way. “We will continue to work diligently with our investigative team to apply what we have learned from these incidents and further strengthen our data security measures,” said president and CEO Todd Penegor. For now, Wendy’s has posted a list of affected locations. If you made a purchase at one of those, the company is offering a year of fraud protection and identity restoration free of charge. Of course, it’s a good idea to take a glance at your recent statements even if your local restaurant isn’t on the list.
Source: Wendy’s says over 1,000 locations affected by credit card breach
Small to medium American firms are increasingly becoming targets for hackers, and it’s driving many of them out of business, according to a panel of cybersecurity experts who spoke to the House Small Business Committee. Sixty percent of hacked small to medium businesses are forced to go out of business within six months of being breached, Angela Dingle, founder of IT government consulting firm Ex Nihilo, told the committee. Additionally, 60 percent of all online attacks in 2014 targeted small to medium businesses, Timothy Francis, enterprise leader of cyber insurance at Travelers, told the New York Times earlier this year. Dingle and other witnesses at the Wednesday hearing urged committee chairman Chairman Steve Chabot, R-Ohio, to explore new solutions and to pursue action. “The innovative small businesses that are key engines of job growth and investment in our economy… must confront the very real threats we face in cyberspace,” testified Jamil Jaffer, director of the homeland and national law program at George Mason University School of Law. “Hard targets [for hackers] are going to be bypassed, I know, because there are plenty of weak targets out there. So, how do we get this message across to our small business owners in a way they can understand; that you can’t afford to be a soft target,” questioned Rep. Trent Kelly, R-Miss. Justin Zeefe, co-founder of cybersecurity consulting firm the Nisos Group, told the House committee that most small to medium business owners won’t understand the growing risk of cyberattacks until they actually see other companies fail.
Source: Small business cybersecurity lagging as attacks increase — security experts
Last year, CIO, CSO and PricewaterhouseCoopers released a new Global State of Information Security survey, which polled more than 10,000 executives from 127 countries about IT security. The results were a mixed bag, with security incidents up 38% over 2014 but corresponding budgets rising only 24%. The survey reflected broad thinking about how companies are trying to defend themselves from hackers as well as employees, the most often cited sources of security compromises. But despite the continued growth in hacks and other security incidents, there were some important signs that security threats aren’t being taken seriously enough at the executive level. For one, the poll found that only 45% of boards participate in overall security strategy.
Source: It’s Time To Think Of Cybersecurity As A Business Enabler – Forbes
IN OUR CONTEMPORARY WORLD, where in unison, the media contributes to a culture of fear, a mysterious mistress; the cyber security is, in reality, more spoken about than understood. After my recent article: Take the Lead. The Tango and The Tech was published on BIZCATALYST 360°; very strong support from the industry leaders made me accept the fact that technically and strategically speaking; the cyber security is the topic I would like to know more about. And, unsurprisingly, it was not a ‘why’ question anymore. Notwithstanding, the flow of capital, technologies, and skills in the field of security, including the cyber security attracts ‘white’ and ‘black’ players – ‘Lords of Order’ and ‘Lords of Chaos’. Multiplied by wild ambitions of the world’s military superpowers, here we are, standing in front of the Apocalypses at its best! A sensitive place of the worldwide integration of current and future of security industries. More often than not – undetectable; unseen and invisible for a non-professional; indistinguishable; hidden; unknown. Gravitation like, the cybersecurity must be taken as the fact rather than the fiction. CLICK TO TWEET While the idea is somewhat extreme, there is no disagreement that it is happening. The condensing of the artificial intelligence worldwide that affects lives of billions of people around the globe can also mean the rapid increase of cyber threats. Foundation of a universal culture of cyber security is marked by the initiatives and ongoing processes at the world’s most influential decision-making international forums. The United Nations General Assembly Resolution 57/239 regarding the “creation of a global culture of cybersecurity” was first adopted on January 31, 2003. Followed by numerous amendments, including the ‘UN General Assembly resolution mandating the creation of a Group of Governmental Experts (GGE) for 2016-2017. The Groups of Governmental Experts have become a known mechanism by which the General Assembly advances the international debate on norms, rules, and principles of state behavior in cyberspace.’ ** Cybersecurity. What it is not? With this and a few more questions I am proud and honored to invite Mr. Chuck Brooks – one of the world’s most known experts and the industry guru to my weekly Global Macro Roundtable. Chuck Brooks – the person – legend and reference for the theme’s most competent and comprehensive quest and analysis.
Source: The Globality Quotient: Cybersecurity | BIZCATALYST 360°