There have been many suggestions on how Edward Snowden managed to steal so many top secret documents from the NSA; but the NSA has kept quiet. Now new research claims to know how it was done, and challenges the NSA to deny it.
Trustwave Acquires Application Security Inc
Trustwave, a Chicago-based firm with a wide range of security offerings and a particular specialism in data protection, has bought privately held New York-based Application Security Inc, a specialist in database security. The acquisition is complete, a…
Waking Shark II – Stress Testing the City of London
Today is Waking Shark II day – the day the City of London’s cyber resilience is tested in a day long exercise. Details are scarce (it wouldn’t be a test if they were known) but the war game is expected to concentrate on the ability of banks to maintain…
APTs and the Moriarty of Cybercrime
Researchers have analyzed 11 apparently distinct APT campaigns, and have come to the conclusion that they are not as distinct as previously thought – in short, there’s a malware quartermaster, a Moriarty of cybercrime, serving multiple threat actors.
PCI DSS Version 3.0 Goes Beyond Compliance
The PCI Security Standards Council (PCI SSC) has published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) for debit and credit card security, geared to move organizations from mere compli…
How GCHQ hacked Belgacom
In September Der Spiegel published details from Snowden leaks indicating that GCHQ had been behind the hacking of Belgian telcommunications company Belgacom, in an operation codenamed Op Socialist. On Friday it published further details indicating how …
Stuxnet Also Infected Russian Nuclear Facility
Stuxnet is widely taken to be the harbinger of modern cyberwarfare. It was developed by the US and Israel to target the Iranian nuclear program – but now it appears that it also infected a Russian plant.
British Spy Agencies, Al Gore and Berners-Lee all Talking About Snowden
In an unprecedented move, the reclusive heads of Britain’s MI5, MI6 and GCHQ spy agencies appear in public before a parliamentary committee, while Al Gore gives a speech in Montreal and Sir Tim Berners-Lee is interviewed by the Guardian – and all are t…
Adobe Breach is Far, Far Worse than Originally Thought
After Brian Krebs gave Adobe a strong hint that it had been breached, the company announced that just short of three million accounts may have been compromised. It later upped this to 38 million – but it now appears that the true figure is around 150 m…
Lack of IT Automation Drives Frequent Firewall Outages
For UK and US businesses, increased complexity stemming from trends like cloud computing and virtualization is driving a need for more automation within the IT network; but reality is lagging the requirement.