• The Guardian view on police and child spies: ends don’t always justify the means | Editorial

    The revelation that juvenile sources are being used in covert operations is alarming – but what we do not know is as concerning as what we have found outDowning Street tells us that child spies are used very rarely by British police and intelligence agencies, and only when it is judged really vital. How reassuring. We would not know they were being used at all were it not for government plans to relax the controls on their use. The House of Lords committee on secondary legislation has
  • The Guardian view on cybersecurity: trust – but verify | Editorial

    The use of Chinese-made equipment in Britain’s broadband infrastructure demands, and gets, careful scrutinyHow far can we trust Chinese companies to supply our critical national infrastructure? The question was raised by the Hinkley Point power station, but is even more pressing in the telecoms business. Broadband internet is now as critical a part of the infrastructure as the road or rail network. So the question seems to answer itself. Many countries are extremely reluctant to allow two
  • Novichok poisonings: police release drone footage of search

    One theory is that one of the victims found the bottle in the park in Salisbury and sprayed it on their handsPolice investigating the nerve agent poisonings of five people in Wiltshire have released drone footage of officers searching a shallow stream in a Salisbury park.Officers can be seen peering into the water and combing a bank in Queen Elizabeth Gardens, one of the spots Dawn Sturgess visited with her partner, Charlie Rowley, the day before they collapsed having been exposed to novichok.Co
  • Has GDPR Impacted Insider Threats?

    Has GDPR Impacted Insider Threats?According to new research from Clearswift, the introduction of GDPR has led to a slight drop in insider threats in both the UK and Germany. Survey respondents said that insider threats make up 65% of reported incidents in 2018, compared to 73% last year. German companies reported similar declines, with insider error incidents at 75% this year, down from 80% last year.The research surveyed 400 senior IT decision makers from global organizations wit
  • Advertisement

  • Novichok investigation: police search Salisbury park visited by couple - video

    Wiltshire police release drone footage showing officers searching Queen Elizabeth Gardens in Salisbury as part of their investigation into the novichok poisonings. A fingertip search of the city centre park, which Dawn Sturgess visited before she fell fatally ill, started on WednesdayNovichok poisonings: police search Salisbury park visited by couple Continue reading...
  • Who Are ComplyRight's Security Employees?

    Who Are ComplyRight's Security Employees?The website of human resources firm ComplyRight was reportedly breached and sensitive data compromised, according to KrebsonSecurity. In addition to tax forms from thousands of the company’s clients, other sensitive information accessed in the breach included names, addresses, phone numbers, email addresses and Social Security numbers.As part of his investigation, Krebs reported that he searched ComplyRight employee profiles on LinkedIn in an effort
  • Rosenstein Warns Russia Is Only One Tree in Forest

    Rosenstein Warns Russia Is Only One Tree in ForestIn the closing session of the first full day of the 2018 Aspen Security Forum, Deputy Attorney General Rod Rosenstein warned not only of increased threats from Russian influence operations but also of the additional global cyber-threats from other nation-states.Sharing key points from the Justice Department’s new cyber-digital task force report, Rosenstein said that Russian interference in the 2016 presidential election was &ldquo
  • Child spies used only when very necessary, says Downing Street

    Theresa May’s spokeswoman defends practice revealed by House of Lords committeeDowning Street has defended the use of child spies by British police and intelligence agencies in operations against terrorists, gangs and drug dealers, saying this happened very rarely and only when it was considered vital to do so.The comments by Theresa May’s spokeswoman came after a House of Lords committee revealed the practice and also raised the alarm that the government planned to give law enforcem
  • Advertisement

  • MoneyTaker Grabs $1m from PIR Bank

    MoneyTaker Grabs $1m from PIR BankHacker group, MoneyTaker, stole $1m from Russian bank PIR, transferring the money to 17 accounts at other major Russian banks and before cashing out. Group-IB were hired to respond to the incident and limit the damage, and it is thought that the withdrawal of the stolen funds means most of the money is lost to PIR Bank.Group-IB confirmed that the attack on PIR Bank started in late May 2018, with the hackers gaining access to the bank by compromising a route
  • UK Puts Huawei on the Naughty Step for Security Issues

    UK Puts Huawei on the Naughty Step for Security IssuesA report by Huawei's Cybersecurity Evaluation Centre (HCSEC) has found that the company's products, which are deployed or are contracted to be deployed in the UK, have underlying engineering issues.Addressed to the UK National Security Advisor, HCSEC Oversight Board's fourth annual report explained that there were still concerns regarding the company broadband and mobile infrastructure products, referring to a security critical third party so
  • UK Gov Launches Consultation to Speed-Up Cybersecurity Strategy

    UK Gov Launches Consultation to Speed-Up Cybersecurity StrategyThe Department for Digital, Culture, Media and Sport (DCMS) has launched a consultation into developing the cybersecurity profession in the UK to support the National Cyber Security Strategy (NCSS). To support this effort, it has also proposed to create a UK cybersecurity council, which would sit independently of the government. The NCSS sets out the government's ambition to ensure there is a sustained supply of the best possibl
  • UK intelligence and police using child spies in covert operations

    Home Office wants more freedom to find information on terrorists and gangs via childrenBritish police and intelligence agencies are using children as spies in covert operations against terrorists, gangs and drug dealers.A committee of the House of Lords revealed the practice while raising the alarm over government plans to give law enforcement bodies more freedom over their use of children. Related: Labour MP calls for takedown law to tackle extremism onlineRelated: Prevent strategy stigmatising
  • Advertisement

  • British intelligence uses child spies in covert operations

    Home Office wants more freedom to find information on terrorists and gangs via childrenBritish police and intelligence agencies are using children as spies in covert operations against terrorists, gangs and drug dealers.A committee of the House of Lords revealed the practice while raising the alarm over government plans to give law enforcement bodies more freedom over their use of children. Related: Labour MP calls for takedown law to tackle extremism onlineRelated: Prevent strategy stigmatising
  • SIA CEO Alan Clamp announces departure

    The SIA's CEO Alan Clamp announces his departure
  • Vulnerable IoT Vacuums, DVRs Put Homes at Risk

    Vulnerable IoT Vacuums, DVRs Put Homes at RiskThe internet of things (IoT) has seen a string of vulnerabilities across multiple devices, the latest of which are new vulnerabilities in Dongguan Diqee 360 robotic vacuum cleaners, which could allow cybercriminals to eavesdrop, perform video surveillance and steal private data, according Positive Technologies.Researchers Leonid Krolle and Georgy Zaytsev uncovered the Dongguan Diqee 360 security issues found on vacuums, which most likely affect
  • Attention Airline Passengers, Your Data Is at Risk

    Attention Airline Passengers, Your Data Is at RiskA new report, Attention All Passengers: Airport Networks Are Putting Your Devices & Cloud Apps at Severe Risk, released by Coronet found that some of America’s airports are cyber-insecure.The data collected identified San Diego International Airport, John Wayne Airport-Orange County (CA) International Airport and Houston’s William P. Hobby International Airport as lagging in cybersecurity.Over the course of five months, vast amoun
  • Novichok poisoning: police identify Skripal suspects – report

    Russian suspects spotted on CCTV, as inquest opens into death of Dawn SturgessPolice are believed to have identified the suspected perpetrators of the novichok attack on the Russian former spy Sergei Skripal and his daughter, Yulia.
    Detectives think several Russians were involved in the attack in Salisbury in March and are looking for more than one suspect, the Press Association reported.I think this story belongs in the “ill informed and wild speculation folder” Related: Novichok po
  • IBM Can't Contain Itself, Launches Nabla

    IBM Can't Contain Itself, Launches NablaIBM researchers have created a new approach to container isolation with the launch of Nabla containers, designed for strong isolation on a host. The containers achieve isolation by adopting a strategy of attack surface reduction to the host and using only nine system calls.According to the Nabla website, IBM researchers have "measured exactly how much access to the kernel common applications exhibit with Nabla containers and standard containers by mea
  • Campaign's Election Data Exposed in Virginia

    Campaign's Election Data Exposed in VirginiaA Virginia-based political campaign and robocalling company Robocent left hundreds of thousands of voter records on a public, exposed and unprotected Amazon S3 bucket. This year has already seen a lineup of attempted attacks on local elections and campaigns, but this news comes less than a week after the indictment of 12 Russian officials for meddling in the 2016 US presidential election.According to an 18 July blog post by Bob Diachenko, hea
  • Gov Slow to Address Urgent CNI Security Needs

    Gov Slow to Address Urgent CNI Security NeedsA committee of MPs and peers in the UK has criticised the government for its lack of urgency in addressing the cybersecurity skills gap in relation to critical national infrastructure (CNI).According to a report released following the meeting with The Joint Committee on the National Security Strategy, the shortage in specialist skills and deep technical expertise is one of the greatest challenges faced by the UK's CNI operators and regulators in relat
  • Cisco Rushes Out 25 Patches for Wireless Vulnerabilities

    Cisco Rushes Out 25 Patches for Wireless VulnerabilitiesCisco has advised users of its Policy Suite that it has discovered vulnerabilities, which allow remote attackers to access different features of the solution.The company's Policy Suite provides a framework for building rules that can be used to enforce business logic against policy enforcement points such as network routers and packet data gateways. It is mainly used by wireless and mobile organisations.According to Cisco, the vulnerab
  • Eurofighter Will Be Natural Bridge to European FCAS

    Eurofighter Jagdflugzeug GmbH CEO, Volker Paltzo, confirmed that an enhanced Eurofighter Typhoon would form a core part of any European future combat air system (FCAS), working hand in hand with any...
  • US Retail Weak in Encryption, Security Practices

    US Retail Weak in Encryption, Security PracticesA large majority of US retailers have experienced a breach, which according to the 2018 Thales Data Threat Report exceeds the global average. The report found that 75% of retailers have experienced a breach in the past year, compared to 52% in 2017.US retail lags behind the global average when it comes to implementing encryption, with only 26% of retailers reporting that they have begun implementation. Still, retail is more inclined to store sensit
  • Federal Agencies Struggle with DMARC Compliance

    Federal Agencies Struggle with DMARC ComplianceAccording to new research from Proofpoint, the majority of federal agencies are behind schedule when it comes with complying to the Department of Homeland Security’s (DHS's) Binding Operational Directive (BOD) 18-01. With less than 90 days remaining for agencies to secure their email systems, some agencies have not started their Domain-based Message Authentication, Reporting & Conformance (DMARC) email authentication compliance journe
  • Web Forums, Social Media Targets for Credentials

    Web Forums, Social Media Targets for CredentialsWeb forums were the greatest targets for credential spills during 2017, which saw more than 2.3 billion credentials from 51 different organizations reportedly stolen, according to a new report from Shape Security. Of those 51 different organizations, companies providing online services contributed the largest number of compromised credentials, with over 2 billion credential spills. In total, the criminal enterprise is costing US businesses ove
  • Millions of Health Records at Risk Following LabCorp Suspected Breach

    Millions of Health Records at Risk Following LabCorp Suspected BreachLabCorp, a healthcare diagnostics company, has shut down its systems after a suspected network breach, which could have put millions of health records at risk. In a report to the United States Securities and Exchange Commission, the company announced that during the weekend of July 14 2018, it had detected suspicious activity on its IT network and immediately took specific systems offline. The company said that the su
  • US Vote-Counting Computers Had Flaw, Allowed Hackers Access

    US Vote-Counting Computers Had Flaw, Allowed Hackers AccessIn the US, vote-counting computers used in government elections contained a security vulnerability which could have been used to affect election results. The systems, which were sold by Elections Systems & Software (ES&S), contained remote-access software and were sold between 2000 and 2006, with some machines still being used as late as 2011. Election-management systems are not voting terminals - they are in county election
  • UK spy agencies criticised for lack of black leaders

    MI6 and MI5 had no one from minority ethnic background in a top post, MPs findThe UK’s intelligence agencies suffer from a lack of black and Asian staff in top posts, according to a report from the parliamentary intelligence and security committee published on Wednesday.Neither MI6, which deals with overseas intelligence-gathering, nor MI5 had any people from a black, Asian or minority ethnic background in the top posts in 2016-17. The surveillance agency GCHQ was the only agency listed as
  • GDPR Fueling Rise of PII Theft, Cryptomining Plateauing

    GDPR Fueling Rise of PII Theft, Cryptomining PlateauingScammers are increasingly targeting Personally Identifiable Information (PII), turning away from bitcoin scams and putting resource behind traditional technology support scams. According to Malwarebytes's Cybercrime tactics and techniques: Q2 2018 report, the new General Data Protection Regulation (GDPR) could be fueling this increase in PII theft, as the information could be more valuable on the black market. The company observed
  • GDPR Hurts Security but Publicity Might Help

    GDPR Hurts Security but Publicity Might Help A survey of 900 security professionals conducted by AlienVault at Infosecurity Europe found that spending on GDPR compliance efforts has hindered threat detection but cybersecurity publicity might actually benefit the industry. Additionally, the survey reflected the strong belief that cybersecurity is becoming entrenched in politics.Of the professionals that participated in the survey, 51% said the additional resources their organization are spending
  • Government, Finance Will See Increased Attacks

    Government, Finance Will See Increased AttacksThe number of cyber incidents saw a 32% jump in the first quarter of 2018 compared to the same period in 2017, according to a new report from Positive Technologies. According to the report, hackers are motivated by data theft, and malware attacks have spiked 75% since Q1 2017.“Attackers are planning to either use these credentials in future attacks or profit by selling this information on the black market,” Leigh-Anne Galloway, cyber secu
  • Lost Devices on TfL Network Raise Data Breach Risk

    Lost Devices on TfL Network Raise Data Breach RiskOver 26,000 mobile devices and laptops were lost on the Transport for London (TfL) network between April 2017 and April 2018, raising serious questions about threats individual devices pose to company data security, says think tank Parliament Street.Through a Freedom of Information (FOI) request, the think tank discovered that 26,272 devices were lost and handed into TFL lost property, with Apple devices taking the top spot followed by Samsung an
  • Telefonica Calls Authorities after Massive Breach

    Telefonica Calls Authorities after Massive BreachThe Netherlands-based Telecompaper reported that Telefonica, a top-10 telecom vendor based in Spain that delivers telecom services across more than 20 countries, was hit by a major security breach. Personal customer data of millions of its clients was possibly exposed in the breach. The company reportedly said the flaw was fixed and that the breach was reported to the authorities.Information exposed by the breach was reported to have included cust
  • Reprise Software Refuses to Patch RLM Issue

    Reprise Software Refuses to Patch RLM IssueReprise Software has refused to patch a vulnerability in its Reprise License Manager (RTM) which has been flagged by SpiderLabs at Trustwave.Discovered by security consultant, Adrian Pruteanu, the issue comes about by running on the non-standard port 5054 where by default RLM's web server does not require authentication. Attackers can specify an arbitrary license file on the server to read and modify which could result in information leakage or remote c
  • Russia Publishes Only 10% of CVEs

    Russia Publishes Only 10% of CVEsRussian vulnerabilities published by yearA report by Recorded Future has found that Russia's vulnerability database, while highly focused, is incomplete and slow, and only publishes 10% of known vulnerabilities.Run by the military organization, Federal Service for Technical and Export Control of Russia (FSTEC), the vulnerability database, also known as BDU, has published only 11,036 vulnerabilities of the 107,901 Common Vulnerabilities and Exposures (CVEs) report
  • Putin rejects UK's 'ungrounded accusations' over novichok poisoning

    President says London has not provided evidence to back up claims that Moscow was behind poisoning of four people – one fatallyVladimir Putin has accused Britain of making baseless allegations against Russia over the former Soviet spy and three other people poisoned, one fatally, with the novichok nerve agent in Salisbury.
    Asked in a Fox News interview about the British government’s assertion that Moscow was behind the novichok attack on the former spy Sergei Skripal, Putin said Lond
  • From National Security to Cybersecurity

    From National Security to CybersecurityIn an effort to address the growing skills gap in the cybersecurity industry, a team of former Royal Marines Commandos have launched a business providing free cybersecurity training, accredited qualifications and careers for ex-service members looking for a path back to the civilian life while maintaining their roles as security defenders.Crucial Academy offers accredited training courses covering both offensive and defensive cybersecurity, information assu
  • Russia Fends Off 25 Million Cyber-Attacks During World Cup

    Russia Fends Off 25 Million Cyber-Attacks During World CupRussia prevented nearly 25 million cyber-attacks and other criminal acts during the football World Cup, according to the Kremlin. The Moscow Times reported that Russian President Vladimir Putin praised the world of the country's security forces, along with international cooperation, ensuring a safe tournament. “I expect that your close and constructive interaction will continue and will contribute to ensuring the security of ou
  • Russia Indictments Reminder of Phishing Threats

    Russia Indictments Reminder of Phishing ThreatsIn the aftermath of the 13 July announcement that the Mueller investigation indicted 12 Russian military officials, Americans have debated everything from the legitimacy of the investigation to the consequences of the election interference, but Sen. Rand Paul (Ky.) told CNN, “We should now spend our time protecting ourselves instead of having this sort of witch hunt on the president. I think we need to be done with this and start actually prot
  • Spread of 'Fake News' Could Affect Irish Elections, says Gov Report

    Spread of 'Fake News' Could Affect Irish Elections, says Gov ReportA high-level government report has found that Irish elections are exposed to interference through cyber-attacks and the spread of "fake news". Reported by the Sunday Independent this weekend, the unpublished report found that social media and search engines were most at risk of being used to influence the outcome of the country's elections. The report was compiled by the Interdepartmental Group on the Security of Ireland's E
  • "Red Alert" Warning on US Cyber-Attacks, Now at "Critical Point"

    "Red Alert" Warning on US Cyber-Attacks, Now at "Critical Point"The United States' director of national intelligence issued a "red alert" warning on a dangerous new level of cyber-warfare during a Washington think tank conference. He also spoke of Russia as one of the "worst offenders" ahead of US President Trump's meeting with Russian President Vladimir Putin in Finland. Dan Coats addressed the Hudson Institute last Friday, commenting: "Today, the digital infrastructure that serves th
  • US Orgs Overly Optimistic About Cyber-Readiness

    US Orgs Overly Optimistic About Cyber-ReadinessSenior executives at most US organizations believe the cybersecurity of their firms is above board, according to a new survey of 500 senior IT executives. The survey included responses from interviews conducted with executives across multiple sectors in the US and 10 other countries.Results of the survey conducted by FICO revealed that 68% of US firms said they are better prepared for data breaches than their competitors, re
  • Novichok: police take away 400 potentially contaminated items

    Searches to continue despite discovery of bottle linked to murder of Dawn SturgessPolice investigating the novichok poisoning of a couple in Wiltshire say more than 400 items have been recovered. A significant number are said to be potentially contaminated and have been submitted to the government’s Defence Science and Technology Laboratory for analysis.Related: Novichok poisonings 'putting huge strain' on police resourcesContinue reading...
  • Novichok that killed woman came from bottle, police believe

    Object found in Amesbury home of Charlie Rowley held nerve agent, officers say Police have found a bottle believed to have contained the novichok that killed Dawn Sturgess and poisoned Charlie Rowley in Wiltshire, Scotland Yard has announced.The search for the container was conducted by officers from Scotland Yard’s counter-terrorism command, four months after a nerve agent attack against Sergei and Yulia Skripal in Salisbury. Related: Salisbury Journal: 'We don't get murders or stabbings
  • Spambot Targets WordPress with Spray and Pray

    Spambot Targets WordPress with Spray and PrayResearchers at Imperva published their discovery of a new comment spam campaign that is leveraging the popularity of the World Cup to trick people into clicking on links that take them to shady betting sites.The campaign, which mainly targets WordPress sites, is launched by a botnet and implemented in the form of comment spam. Despite its being one of the oldest tricks in the hacker’s book, comment spam is still pretty popular.The comments
  • Australia's Airport Security Threatened by Hack

    Australia's Airport Security Threatened by HackAviation Security Identity Cards (ASICs) are intended to prevent criminals and terrorists from gaining access to restricted areas in airports, as well as to airplanes, but Australian-based Aviation ID, a company that issues ASICs, has been hacked.The company, which services regional and rural airports throughout Australia, reportedly received emails alerting it to the possibility that the ASIC application had been stolen. As is now required under Au
  • Man who called for attack on Prince George jailed for terrorism

    Husnain Rashid jailed for life with a minimum term of 25 years for string of offencesAn Islamic State supporter who called for an attack on Prince George has been jailed for life with a minimum of 25 years for a string of terrorism offences.Husnain Rashid, of Nelson, Lancashire, called for the four-year-old to be targeted shortly after the prince joined Thomas’s school in Battersea, south-west London, last year. Continue reading...
  • New Ransomware Rumored to Spread SMB Exploit

    New Ransomware Rumored to Spread SMB ExploitWithin two days of news that GandCrab 4.0 ransomware was being distributed by compromising websites disguised as download sites for cracked applications, a newer version (v4.1) was found using the same method, according to Fortinet’s FortiGuard Labs.A distinction not observed in the previous version is that GandCrab now includes an additional network communication tactic, as well as an unusually long hard-coded list of compromised websites t
  • Western E-Tailers Set to Lose Nearly $19bn to Fraud

    Western E-Tailers Set to Lose Nearly $19bn to FraudE-commerce sites in the US and Western Europe are estimated to lose a whopping $18.6bn this year through fraud, according to a new Forrester report.The market analyst compiled its figures from LexisNexis estimates that in 2017 the cost of fraud was just over 2% of revenue for e-tailers, and that the regions are expected to generate $859bn in revenues this year.In response to the growing losses, it claimed that the fraud management solutions
  • Users Warned of New Sextortion Attack

    Users Warned of New Sextortion AttackReports are emerging of a new sextortion campaign in which victims are asked to pay thousands of dollars in Bitcoin to keep quiet a supposed webcam video of them watching porn.The unsolicited email attempts to trick the user into believing the extorter as it opens by revealing a genuine password linked to the recipient’s email address.It then proceeds as follows:“Well, I actually placed a malware on the porn website and guess what, you visited thi

Follow @Security_UKnws on Twitter!