- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Malware still running rings around security tools, eThreatz testing finds
- Fake-police ransomware reaches Australia
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
The U.S. Department of Justice has made the right decision to not prosecute WikiLeaks' founder Julian Assange for publishing leaks from former U.S. Army intelligence analyst Bradley Manning, if a recent report in the Washington Post is correct, press freedom advocates said.
Venezuela's president Nicolas Maduro has offered to give asylum to Edward Snowden, the former contractor of the National Security Agency who leaked documents about the agency's surveillance programs.
Former Booz Allen Hamilton employee-turned-fugitive document leaker Edward Snowden withdrawn his request for political asylum in Russia as his options for shelter in other countries appear to be dwindling.
Applications for asylum or asylum assistance were submitted on behalf of former U.S. National Security Agency contractor Edward Snowden to a number of countries including China, Russia, and India, whistle-blower site WikiLeaks said Tuesday.
Putin says Snowden must stop harming U.S. interests, but Russia unlikely to send him back
It's not an exaggeration to say that the recent Wikileaks scandal has shaken the Internet to its core. Regardless of where you stand on the debate, various services have simply refused to handle Wikileaks' business -- everything from domain-name providers to payment services -- and this has led to many questioning how robust the Internet actually is.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
Whitepapers about wikileaks
In July 2013, the database breach in the WikiLeaks case led president Obama to sign an executive order intended to address the insider threat. Among other things, it created an inter-agency task force and urged federal employees to observe their coworkers and flag questionable behaviour or circumstances. The implications of this incident go beyond the risks of trusted employees going rogue. Download report.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.