http://motherboard.vice.com/read/someone-hacked-a-billboard-in-atlanta-to-display-goatse By Jason Koebler Staff Writer Motherboard.vice.com May 15, 2015 Atlanta’s affluent Buckhead neighborhood is a great place to shop, eat, and, last weekend, it was a great place to spot a man bent over stretching his asshole far beyond what could possibly be healthy. Hackers took over a video billboard in the neighborhood and replaced it the most infamous image from Goatse, one of the internet’s original shock sites (Image here, if you must see it). Specific details about how the hackers hijacked the billboard haven’t come out yet, but one security researcher says that he warned the company that owns and operates the billboard that many of its signs are vulnerable. Dan Tentler is a well-respected security researcher who works for Carbon Dynamics, a security firm. Thursday, he tweeted that he had been in contact with the company that owns the billboard and was told thanks but no thanks. “I wanted to let you guys know that your customers are deploying these signs and not changing the default passwords, which, if an actual bad guy found this out, could lead to some unwanted tinkering with the signs, possibly some defacement,” Tentler wrote in an email send in April to the company. […]
http://www.telegraph.co.uk/technology/internet-security/11612659/GCHQ-spies-given-immunity-from-anti-hacking-laws.html By Sophie Curtis The Telegraph 18 May 2015 The government has quietly rewritten a key clause of the Computer Misuse Act, giving GCHQ staff, intelligence officers and police immunity from prosecution for hacking into computers and mobile phones. The Computer Misuse Act, which came into effect in 1990, states that gaining unauthorised access to computer material is a criminal offence, punishable by up to 12 months’ imprisonment and a fine. Until recently, any violation of this Act was required to be by Article 8 of the European Convention on Human Rights, which provides a right to respect for one’s “private and family life, his home and his correspondence”, subject to certain restrictions that are “in accordance with law”. In May 2014, campaign group Privacy International, along with seven internet and communications service providers, filed complaints with the Investigatory Powers Tribunal, challenging GCHQ’s hacking activities, (exposed by NSA whistleblower Edward Snowden in 2013). […]
http://www.timesofisrael.com/a-million-hacks-a-day-but-israels-electric-grid-survives/ By David Shamah Times of Israel March 24, 2015 That Israel is a favorite target of hackers is common knowledge – but the sheer number and sophisticated level of those attacks is not as well known, according to the Israel Electric Corporation On the eve of the annual CyberTech conference in Tel Aviv Monday, IEC chairman Yiftah Ron-Tal said that during last summer’s Operation Protective Edge, the company’s servers and infrastructure were attacked nearly a million times – a day. “If we compare the number of cyber-attacks in the war to the relative number of missiles fired by Hamas, Israel’s electric grid was hit by two ‘cyber-missiles’ a day throughout 2013. In 2014, that would have been 15 a day,” said Ron-Tal, adding that, with all due respect to a missile that could destroy a single target, a “direct hit” on the electrical grid would have brought the entire country to its knees. Preventing those kinds of attacks is a major motivator for Israel to develop the world’s best cyber-security technology, said Dr. Eviatar Matania, chairman of Israel’s National Cyber Bureau. […]
http://www.csoonline.com/article/2894037/security-leadership/r-e-s-p-e-c-t-the-way-for-cisos-to-get-and-keep-it.html By Taylor Armerding CSO March 10, 2015 If you’ve got a “C” at the beginning of your professional title, you’re at the top, or pretty close to it. That, at least, is the perception of most people below the “C-suite” in an organization. But, there is a hierarchy in the C-suite as well, and the Chief Information Security Officer (CISO) tends to be stuck at the low end of it, both in influence and respect. That’s the finding of a survey by ThreatTrack Security, reported in a white paper titled, “No Respect: Chief Information Security Officers Misunderstood and Underappreciated by Their C-Level Peers.” More specifically, the survey of 203 C-level executives at U.S. organizations employing a CISO found that a large majority (74%) thought CISOs didn’t even deserve a seat at the C-level table and viewed them primarily as, “a convenient scapegoat in the event of a data breach.” […]
http://www.nj.com/entertainment/tv/index.ssf/2015/03/csi_cyber_review_patricia_arquette_cbs.html By Vicki Hyman NJ Advance Media for NJ.com March 04, 2015 Thank goodness Patricia Arquette just won an Oscar, because otherwise I’d really have nothing to say about “CSI: Cyber.” The newest “CSI” franchise, which debuts on CBS tonight at 10 p.m., is about the FBI’s cyber crime division, comes with all the series’ high-tech visual flourishes and stars “Boyhood” star Arquette, who, um, just won an Oscar. Yeah. Oh! This time, the Who theme song is “I Can See For Miles.” I’m not saying “CSI: Cyber” isn’t worth watching. I’m just saying there’s not a heck of a lot to say about it. (The original flavor “CSI” is still plugging away after 15 years, while the Miami and New York franchises lasted 10 and 9 seasons, respectively. The latest entry is a bit different in that there’s a lot of people peering at computer screens instead of into microscopes. […]
Please accept with no obligation, implied or implicit, my best wishes for an environmentally conscious, socially responsible, low-stress, non-addictive, gender-neutral celebration of the winter or in some locations summer solstice holiday, practiced within the most enjoyable traditions of the religious persuasion of your choice, or secular practices of your choice, with respect for the religious/secular persuasion and/or traditions of others, or their choice not to practice religious or secular traditions at all. I also wish you a fiscally successful, personally fulfilling and medically uncomplicated recognition of the onset of the generally accepted calendar year 2015, but not without due respect for the calendars of choice of other cultures whose contributions to society have helped make America great. Not to imply that America is necessarily greater than any other country nor the only America in the Western Hemisphere. Also, this wish is made without regard to the race, creed, color, age, physical ability, religious faith or sexual preference of the wishee.
http://www.computerweekly.com/news/2240236318/Cloud-security-remains-a-barrier-for-CIOs-across-Europe By Cliff Saran ComputerWeekly.com 09 December 2014 Security issues are the main factor limiting the further use of cloud computing services, research from Eurostat has found. In a survey conducted by the European Commission’s Eurostat statistics service, public cloud computing was reportedly used by 24% of large enterprises and 12% of small and medium-sized enterprises (SMEs) in the EU. However, the survey noted that the risk of a security breach scored highest both for large enterprises and SMEs, at 57% and 38% respectively. “Firms attach importance to the protection of their IT systems, but the issue can be seen in the wider context of resilience to possible security breaches when using the cloud,” the Eurostat report stated. […]
http://www.qianhuaweb.com/content/2014-10/22/content_5280999.htm [Google translation] By Jiang Tao and Guo Junyu China news agency October 22, 2014 Chinese Foreign Ministry spokeswoman Hua Chunying the 22nd at a regular press conference in Beijing, said the network security affairs consultation mechanism between Japan and South Korea for the first time the meeting discussed the fight against cybercrime and cyber-terrorism, emergency response cooperation and other issues of Internet. 21, Chinese Foreign Ministry Network Coordinator Ministry of Foreign Affairs of Japan, Ambassador network policy, South Korean Foreign Ministry in Beijing International Security Affairs Ambassador in Japan and South Korea co-hosted the network security affairs consultation mechanism first meeting. Hua Chunying said that the tripartite exchanged their network architecture policies and related mechanisms discussed cybersecurity code of conduct for responsible national and confidence-building measures, the Conference of the International Telecommunication Union, the ASEAN Regional Forum, the BRIC countries, the SCO and other international and areas related processes, to combat cyber crime and cyber terrorism, internet emergency response cooperation and other issues, and describes the relevant international conferences will be organized by the respective situation. Hua Chunying said the tripartite tentatively agreed to hold a second meeting will be held in South Korea next year. According to reports, Japan and South Korea in 2014 to establish the mechanism aimed at enhancing mutual trust and cooperation between the three countries in the network field.