The role that insiders play in the vulnerability of all sizes of corporations is massive and growing. In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters involved malicious intent, and one-quarter involved inadvertent actors. While industries and sectors differ substantially in the value and volume of their (data) assets, and in the technology infrastructures they have to manage and defend, what all businesses have in common is people — all of whom have the potential to be an insider threat.
The FBI has warned state officials to boost their security, since state election websites in Arizona and Illinois experienced hack-related shutdowns earlier this summer. More than 30 states have provisions for online voting.
The FBI alerted Arizona officials in June that Russians were behind the assault on the election system in that state. The bureau described the threat as “credible” and significant, “an eight on a scale of one to 10.” Click here for more on this.
Illinois elections officials are confident no voter data were compromised this summer when a hacker was able to see information on about 200,000 registered voters. Click here for more on this.
For nearly a year, malicious hackers enjoyed full access to all Democratic National Committee servers, including emails, communications and documents, operating undetected for the majority of that time. Indeed, the sophistication of the attack suggests the direct involvement of foreign nation-states. Click here for more on this.
Is Donald Trump’s presidential bid just a unique Russian hack of the US voting system? Probably not.
Transparency has its limits!
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers.
“Without a doubt, they’re the keys to the kingdom,” said one former NSA employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Insider threats are behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss of company data. According to the Ponemon Institute, three out of every four organizations (76%) have been hit over the past two years—a significant increase from 67% in a 2014 study.
The findings show that the rise is due in large part to compromises in insider accounts—a phenomenon exacerbated by an increase in the proportion of employees who have unnecessary access to sensitive data. Respondents say insider negligence is more than twice as likely to cause the compromise of insider accounts as any other culprits
Australia has set up a cyber-intelligence unit to identify terrorism financing, money laundering and financial fraud online, the government said on Tuesday, because of “unprecedented” threats to national security.
The measure expands on a major platform of conservative Prime Minister Malcolm Turnbull, who narrowly won re-election last month after promising to improve Australia’s cybersecurity and transform the economy into a tech-savvy business hub.
Justice Minister Michael Keenan said the new unit, set up under money-tracking agency the Australian Transaction Reports and Analysis Centre (AUSTRAC), would investigate online payment platforms and financial cybercrime to crack down on money-laundering and criminal networks.
“We know that the use of fraudulent identities continues to be a key enabler of serious and organized crime and terrorism,” Keenan said in a statement.
Though the police here have released little information about Gavin Long, a deeper portrait is beginning to emerge, based on a large trail left online.
Many of these digital breadcrumbs — web posts, YouTube videos and podcasts — are tied to Mr. Long’s given name, or some version of a new name, Cosmo Ausar Setepenra, which he filed court documents in Missouri to adopt in May 2015.
There is evidence that he sought to do the right thing, pursuing higher education and serving his nation. There is also evidence of paranoid thinking, and an interest in shedding blood to advance the cause of oppressed peoples.
In an interview with a podcast host in March, Mr. Long identified himself as a member of the online community of so-called targeted individuals, people who believe they are being harassed with mind-control weapons and by armies of stalkers.
Last year, CIO, CSO and PricewaterhouseCoopers released a new Global State of Information Security survey, which polled more than 10,000 executives from 127 countries about IT security. The results were a mixed bag, with security incidents up 38% over 2014 but corresponding budgets rising only 24%.
This finding reflects common corporate psychology that cybersecurity is a cost center and a drain on resources – a Cisco survey of over 1,000 executives also found that 74% of respondents in the U.S. said that the main purpose of cybersecurity is to reduce risk instead of enable growth. I’ve found that people tend to think of cybersecurity as costly, complex, inefficient, and a damper on productivity. Many people believe it may not actually work or mitigate risk. This can result in security measures being implemented piecemeal without any overarching policy, resulting in costly but poor integration.
In a study published Thursday in the journal Science, Dr. Johnson and Miami colleagues searched for pro-Islamic State posts each day from mid-2014 until August 2015, mining mentions of beheadings and blood baths in multiple languages on Vkontakte, a Russia-based social media service that is the largest European equivalent to Facebook. Ultimately, they devised an equation that tries to explain the activity of Islamic State sympathizers online and might, they say, eventually help predict attacks that are about to happen.
The successful phishing attack on its corporate systems, which was first noticed on April 25, forced the utility to keep systems, including phone servers, locked down since then.
Investigators suspect that malicious software code allowing hackers to withdraw the money could have been installed several weeks before the incident. Malware gave hackers an inside look at the bank’s systems.
The hackers appeared to have stolen Bangladesh Bank’s credentials for the SWIFT messaging system, which banks around the world use for secure financial communication.
Investigators believe the attack was sophisticated, describing the use of a “zero day” and referring to an “advanced persistent threat.”