Thieves have again found their way into what was thought to be the most secure financial messaging system in the world and stolen money from a bank. The crime appears to be part of a broad online attack on global banking. New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines. The second attack involves a commercial bank, which Swift declined to identify.
Unethical Research: How to Create a Malevolent Artificial Intelligence – Federico Pistono, Roman V. Yampolskiy (Submitted on 10 May 2016)
“Cybersecurity research involves publishing papers about malicious exploits as much as publishing information on how to design tools to protect cyber-infrastructure. It is this information exchange between ethical hackers and security experts, which results in a well-balanced cyber-ecosystem.
Chronicle of Higher Education – May 13, 2016 – “We are on the verge of becoming the best trained, and least educated, society since the Romans — and reducing the humanities to a type of soft science will only hasten this trend. As the sciences rightly grow, a free society must ensure that criticism of the sciences grows apace. Effective criticism depends on distance, in this case on an unshakeable difference, between the humanities and the STEM fields.
Verizon's annual report into data breaches has triggered an avalanche of criticism that the company made critical errors when studying the most frequently exploited software vulnerabilities. The 2016 Data Breach Investigations report, released on April 27, is considered one of the most comprehensive annual guides on data breach trends, compiling data contributed by a wide range of computer security companies, law enforcement and government agencies. It also draws on more than 3,100 confirmed data breaches, an impressive sampling of attacks.
Facebook has arranged for hundreds of kids, from middle-school age up, to play a hacking game it’s developed—because it’s having trouble recruiting for security roles. The company has been arranging competitions using the tool for years, but May 11, it open-sourced the game in the hope of exposing more people—including kids, the Facebookers of the future—to the skills involved in cybersecurity work. “A software engineer job gets filled in a month,” said Javier Marcos, a security engineer at Facebook.
There is a difference of opinion within the federal government about what counts as a "major" data breach. The debate over the breadth and depth of the adjective is more than semantic.
More than a year after a hack of Office of Personnel Management systems compromised more than 22 million records, the agency has not been able to encrypt all the sensitive data on 4 million federal employees, including Social Security numbers.
The Homeland Security Department is under the gun to collect massive amounts of data about threats to the nation's physical and network infrastructure, according to contracting documents. To meet a June 1 deadline to come up with an aggregation strategy, DHS has awarded a contract to Sunesis Consulting LLC without holding a competition, a sole-source justification states.
Commercial Bank of Ceylon, based in Colombo, Sri Lanka, has apparently been hacked, with its data posted online May 12 by the Bozkurtlar hacking group, which has also posted seven other data dumps from banks in the Middle East and Asia since April 26. The group, believed to have Turkish ties, released data from five South Asian banks on May 10. It also dumped data online from UAE-based InvestBank on May 7 and data from Qatar National Bank on April 26.
Inside the detectives world of conmen and murderers Inside Story