The week in security: Employees still don't grok security; FBI doesn't grok iPhone hack

Highlighting the rampant fear of attacks these days, there were claims that the 'Armada' copycat DDoS extortionists made $100,000 without actually launching an attack – or even having the ability to do so. Indeed, in some circles it's all about what you are seen to do as much as what you actually do – and, for aspiring security specialists, this can sometimes make all the difference.

Two security leaders shared their perspectives on social-media security, even as phishing emails were found to be using unique subject lines and Office documents that helped them slip past spam filters.

Torrent-download site The Pirate Bay was hit by ads spreading ransomware – which you might expect to happen eventually – but ransomware also infiltrated the Web site of toy maker Maisto, which you probably wouldn't. Meanwhile, a cyberespionage group was seen to be abusing the Windows hot-patching mechanism to hide malware activities.

Verizon's latest Data Breach Investigation Report (DBIR) warned that enterprises are falling behind in the fight against phishing and security breaches, and that they are still making the same mistakes as they always have – even with tools such as password managers promising to improve security significantly. Along the same lines, it was revealed that developers from hundreds of companies had leaked access tokens for their Slack accounts in public GitHub projects.

Seemingly fulfilling that prophecy, organisations including financial-transactions clearinghouse SWIFT and the Qatar National Bank were reporting that they had been hit by security breaches. This, despite a modicum of progress made as an Estonian man was jailed for over 7 years for his role in a global DNS hijacking botnet.

Here's one to file in the confidence-in-government drawer: the FBI now says it can't share the iPhone 5c hack it purchased with Apple because it doesn't even know how the tool works – and didn't buy full 'rights' about the hack. Similarly, the Australian government seems to be struggling enough with encryption that prime minister Malcolm Turnbull is citing it as a significant hurdle for law-enforcement authorities.

Somewhat more confidence-inspiring is the US government's cyberwar against ISIS, which analysts say could borrow from the tactics cybercriminals use against their business targets and is likely to take advantage of ISIS hackers' unorganised, underfunded capabilities.

US authorities were also being proactive in seemingly contradictory ways, as legislators passed a bill to strengthen email and cloud data privacy – and the Supreme Court green-lighting an expansion of the FBI's computer-search powers.

Join the CSO newsletter!

Error: Please check your email address.

Tags password managerscyberespionage groupattacksphishing emailiPhoneGrokDBIR datasocial media securityQatarDDoS attacksFBI computer searchslack accountsISIS hackSwiftfbiransomwareDNS hijackingcyberwarpirate bayverizon

More about AppleFBIVerizon

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts