• 83% of SMB owners have no cash put aside to deal with the fallout from a cyber attack
    Small businesses are leaving themselves exposed to significant financial risk from cybercrime by not having adequate measures in place to recover in the event of a cyber attack. Although the average cost for small and medium-sized businesses to recover from a cyber attack is estimated to be $120,000, 83% of SMBs do not have any money reserved to get back to business as usual should a breach occur. Lack of understanding leaving SMBs vulnerable More than half (52%) of small business owners think it is unlikely their company will be a victim of a cyber attack. cyber attacks on SMBs are on the rise, but few have a solid contingency plan in place, let alone insurance. Although many small business owners admit to being unprepared, 25% believe a cyber attack is a matter of ‘when’, not ‘if’, with a quarter also planning to ‘do more to prevent cyber attacks’. Brogie continued: “It’s positive that SMB owners are beginning to take note of the damage a cyber attack can do to their business, but what’s clear from our survey is that they don’t fully understand the benefit of having a cyber insurance policy.Read More
  • Facebook Increases Security For Political Campaign Staff
    Facebook is introducing new security tools for political campaign staff, concerned about dirty tricks in the run-up to the mid-term elections. Large numbers of fake accounts and pages, many of which appear to have been run by Russia's Internet Research Agency (IRA), spread misinformation during the campaign. However, this latest move is aimed at protecting those accounts and pages that are actually genuine by providing additional security measures. Given that political campaigns are usually short-term in nature, says head of cybersecurity policy Nathaniel Gleicher, Facebook can't by itself know which accounts to protect, meaning that they will need to ask for assistance. "We’ll help officials adopt our strongest account security protections, like two-factor authentication, and monitor for potential hacking threats," promises the company's head of cybersecurity policy Nathaniel Gleicher in a blog post. "If we discover an attack against one campaign official, we can review and protect other accounts that are enrolled in our program and affiliated with that same campaign."Read More
  • Air Force Warrant Officers Might Solve Cyber Retention: Enlisted CYBERCOM Leader
    -- As the military fights to keep cyber warriors from ditching their uniforms for high-paying private-sector gigs, allowing enlisted airmen to become warrant officers could be a boost for that community, U.S. Cyber Command's top enlisted leader said Monday. They go on to become members of corporate America." For the Air Force, the only service that doesn't currently have warrant officers -- technical experts who advise and lead others in their field -- creating that opportunity could prove beneficial, he said. But it may be something that we can look at and study if we keep losing talent." The idea of bringing back the warrant officer ranks in the Air Force isn't a new one. Lt. Gen. Brian Kelly, commander of the Air Force Personnel Center, said warrant officers probably won't answer the service's pilot retention problem, but the idea could work long term for other technical fields. "And that's what we're going to go back and tell Congress." Cyber troops are on the front lines daily, going up against countries such as Russia, North Korea and China, Stalker said.Read More
  • Malware Samples Targeting IoT More Than Double in 2018
    A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers. A Range of Devices A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices populating the landscape – from MikroTik routers to smart dishwashers. MikroTik devices are known to be involved in an array of malicious campaigns, including the efforts of the VPNFilter IoT botnet, which has infected almost a million consumer-grade internet routers in more than 50 countries. “Most likely, they were infected through the known (since March 2017) CVE-2017-7240 vulnerability in PST10 WebServer, which is used in their firmware.” The Telnet Vector The most popular infection vector at this point involves cracking weak Telnet passwords — often configured with default settings — to access the device.Read More
  • Lambo and millions in cryptocurrencies seized from deceased AlphaBay Kingpin
    Home > News Federal authorities seized millions dollars’ worth of cryptocurrency, luxury property, and exotic cars including a Lamborghini Aventador and an $80,000 Mini Cooper from a deceased Dark Web Kingpin. Canadian national Alexandre Cazes committed suicide by hanging in a Thai prison last summer after he was arrested on suspicion of operating the dark web marketplace AlphaBay, according to Coindesk. Before his death, authorities accused Cazes of facilitating and profiting from the sale of illegal goods and services to U.S. and overseas customers on the site until it was shut down by law enforcement. Because the site didn’t accept traditional payment methods, authorities said Cazes possessed more than $8.8 million in cryptocurrencies pooled across 1,605.05 bitcoins, 8,309.27 ether, 3,691.98 zcash and an unknown amount of Monero. Authorities also seized a $900,000 2013 Lamborghini Aventador LP700-4, an $81,000 Mini Cooper, a $21,000 BMW motorcycle, a $292,957 Porsche Panamera and six beachfront vacation resorts overlooking the coasts of Thailand, Cyprus, St. Phillips South and Antigua and Barbuda all of which was collectively valued at $12 million.Read More
  • US military given more authority to launch preventative cyberattacks
    (CNN) The US military is taking a more aggressive stance against foreign government hackers who are targeting the US and is being granted more authority to launch preventative cyberstrikes, according to a summary of the Department of Defense's new Cyber Strategy. The Pentagon is referring to the new stance as "defend forward," and the strategy will allow the US military "to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict." The new military strategy, signed by Defense Secretary James Mattis, also emphasizes an intention to "build a more lethal force" of first-strike hackers. The "defend forward" initiative wasn't included in the 2015 strategy and further enables the United States to carry out offensive hacking operations to defend against cyberattacks on critical US infrastructure, such as election systems and the energy grid. In effect, it gives the US military more authority to act on its own -- even against computer networks based in friendly countries. Read MoreRead More
  • Government Gets Poor Marks Securing Students' Personal Info
    The Education Department office that oversees student loan issues isn’t effectively monitoring cybersecurity vulnerabilities among the third parties it shares students’ personal information with, including collection agencies, according to a watchdog report released Monday. In general, the Federal Student Aid office is most closely monitoring the security of collection agencies and third-party servicers of federal student loans, according to the Government Accountability Office report. The report breaks down four “key practices” for protecting student’s personal information: mandating that those third parties have privacy and security controls in place; independently ensuring those controls are implemented and effective; mandating fixes when security weaknesses are identified; and conducting ongoing monitoring to make sure security and privacy controls stay in place. The student aid office got spotty marks all around for ongoing monitoring of security and privacy controls, but those marks were worst for guaranty agencies and nonfederal lenders.Read More
  • Department of Defense unveils new cyber strategy
    In its first formal cyber strategy document in four years, the Department of Defense said it would focus its cyber efforts on China and Russia and use the Pentagon’s cyber capabilities to collect intelligence as well as to prepare for future conflicts. According to an unclassified summary and fact sheet released Sept. 18, the documents lay out a vision for addressing cyber threats and addresses the priorities of the department’s National Security Strategy and National Defense Strategy, which focused on a new era of strategic great power competition.Read More
  • The NSO Group’s Pegasus spyware targeted victims in 45 countries
    Pegasus is believed to be one of the most intrusive and prolific spyware variants to have ever emerged. It is the brainchild of the Israeli surveillance products vendors - the NSO Group.Read More
  • The top 11 phishing email subject lines SMBs should look out for
    Despite growing threats of phishing, ransomware, and more, many small businesses have no employee cybersecurity training program in place, according to a Tuesday report from Webroot. In surveying 500 small- to medium-sized businesses (SMBs) in the US, Webroot found that 66% of businesses with fewer than 19 employees didn't have any kind of employee cybersecurity training in place. A separate Webroot report found that when employees underwent phishing simulations in combination with ongoing training, their click rate on these phishing links dropped by more than half—from 26% down to 12%. Companies that have 20-99 employees ranked employee naiveté is their top threat, with phishing coming in at 22%. As such, "SMBs should focus on training employees to securely manage their email," the Webroot report said. Phishing is still the top risk for SMBs, although many small businesses lack any formal security training for their employees.Read More