Archives for February 2015

#SecuringTheVillage: Executive Order on Cybersecurity Is Issued – NYTimes.com ow.ly/3xl5By

#SecuringTheVillage: Wall St. and Law Firms Plan Cooperative Body to Bolster Online Security – NYTimes.com ow.ly/3xl5x8

#CyberPrivacy: White House Proposes Broad Consumer Data Privacy Bill – NYTimes.com ow.ly/3xl5uz

#CyberCrime: Personal data on 50,000 Uber drivers exposed in breach | PCWorld ow.ly/JKDoC

#IdentityTheft: Identity theft tops list of consumer complaints – Feb. 27, 2015 – CNN Money -ow.ly/JKDkz

#CyberWarning: Hackers impersonating IT staff popular tactic in data breaches, FireEye finds | ZDNet ow.ly/JKDaD

#CyberSunshine: Ramnit Botnet Disrupted By International Public-Private Collaboration – Dark Reading – ow.ly/JKD6r

#CyberResearch: DARPA offers rare glimpse at program to visualize cyberdefenses (+video) – CSMonitor.com ow.ly/3xfv42

See @bruceschneier and @HackingDave Kennedy June 4 @ LA Conv Ctr. Register @issala Information Security #Summit7 issa-la-summit-7.eventbrite.com/?aff=estw

#CyberDefense: How can I find and remove Superfish and similar malware? | Technology | The Guardian ow.ly/3xfsXJ

#CyberAttack: Webnic Registrar Blamed for Hijack of Lenovo, Google Domains — @krebsonsecurity ow.ly/3xfnyG

#CyberWarning: Spam Uses Default Passwords to Hack Routers — @krebsonsecurity ow.ly/3xfnw3

#CyberMisc: 5 Reasons To Never Market Malware – Forbes ow.ly/3xfnv8

#FinancialCyberSecurity: NY’s Lawsky Proposes New Cybersecurity, Money-Laundering Rules For Banks – WSJ ow.ly/3xfd6k

#CyberCrime: Urban Institute Hacked: Up To 700,000 Nonprofits Affected After Tax System Breach ow.ly/JEFKo

#CyberMisc Fine Arts Museums Threaten Workers’ Information Security, Union Says | SF Weekly ow.ly/3xf7Is

#CyberCrime: US offers highest-ever cybercrime reward for arrest of Russian hacker | The Guardian ow.ly/3xf7G8

#Privacy: U.S. and British Agencies May Have Tried to Get SIM Encryption Codes, Gemalto Says – NYTimes.com ow.ly/3xf7EQ

#IdentityTheft: New Study Says Over 2 Million Americans Are Victims Of Medical Identity Theft – Forbes ow.ly/JBo3i

#CyberPrivacy: How Malware Can Track Your Smartphone Without Using Location Data | MIT Technology Review ow.ly/JBnMU

#NationalCyberSecurity: @SteptoeLLP – Cyberlaw Podcast 54: Interview with Ben Wittes – Stewart Baker – ow.ly/JBdrw

#CyberMisc: Israeli ex-military elite form cyber security hub to combat corporate hackers – FT.com ow.ly/JBoZK

#CyberCrime: Lawyer who clicked on attachment loses $289K in hacker scam ABA Journal – ow.ly/JBmCV

#NationalCyberSecurity: How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Ars Technica ow.ly/JBnDh

#CyberMisc: Hackers Cut in Line at the Burning Man Ticket Sale—And Get Caught | WIRED ow.ly/JBoa5

#CyberSecurityManagement: Why Information Security Is Everybody’s Business Now – SungardASVoice – Forbes ow.ly/JBm2a

#FinancialCyberSecurity: #TurboTax’s Anti-Fraud Efforts Under Scrutiny — @krebsonsecurity ow.ly/JBdCj

#CitadelOnSecurity: Weekend Vulnerability and Patch Report, February 22, 2015 – Citadel Information Group – ow.ly/Jt0mk

#CitadelOnSecurity: Cyber Security News of the Week, February 22, 2015 – Citadel Information Group – ow.ly/Jt0h6

#CitadelOnSecurity: Cyber Security News of the Week, February 22, 2015 – Citadel Information Group – ow.ly/Jt03a