Thursday, June 22, 2017

Cyber World: Fraud hotspots revealed by Which?

Why we act as we do: neurons, neurotransmitters, hormones, teachers, peers, and society. Yet every “cause” of our behavior is linked to dozens of other variables  Nudging the Nudgers -- MEdia Dragons - Full Speed Ahead

Labor MP filed documents for billionaire ALP donor's Chinese ...

Cyber attack hits speed cameras

Lost in the showdown between President Trump and James B. Comey that played out this past week was a chilling threat to the United States. Mr. Comey, the former director of the F.B.I., testified that the Russians had not only intervened in last year’s election, but would try to do it again. “It’s not a Republican thing or Democratic thing — it really is an American thing,” Mr. Comey told the Senate Intelligence Committee. “They’re going to come for (Russians remember well what Stalin taught them ... It is those who count votes that really count - not those who cast the votes) whatever party they choose to try and work on behalf of. And   they’re not devoted to either, in my experience. They’re just about  their own advantage. And they will be back.” Trump-Comey Feud Eclipses a Warning on Russia: ‘They Will Be Back’

The office of the European Public Prosecutor promises a new era has dawned in the EU for fighting financial crime New Europe. Micael: “Sounds great but all depends on what is criminalized. Doesn’t look like they are focusing on anything systemic. Does VAT have effect of paralyze the economy like the banks in 2008?”

Fifth Domain Cyber

As U.S. Cyber Command continues to mature its workforce, operations and tactics, so too are allied nations, some of which are also standing up cyber commands. Just as the U.S. enjoys information sharing, intelligence sharing and cooperative battlefield integration with friendly international forces, the it is seeking to do the same in cyberspace. CYBERCOM is currently working on a concept of operations draft about defensive cyber ops with the Five Eyes nations, which includes the U.K., Canada, Australia and New Zealand. Brig. Gen. Maria Barrett, deputy of operations J-3 at CYBERCOM, at a June keynote address hosted by AFCEA’s Northern Virginia Chapter announced the development of the draft. “This included a tabletop exercise with the participants to better understand the friction point when it came to how we might operate in defensive operations together,” she said.

Fraud hotspots revealed by Which? The Spectator

Ars Technica

Researchers have detected a brazen attack on restaurants across the United States that uses a relatively new technique to keep its malware undetected by virtually all antivirus products on the market. Malicious code used in so-called fileless attacks resides almost entirely in computer memory, a feat that prevents it from leaving the kinds of traces that are spotted by traditional antivirus scanners. Once the sole province of state-sponsored spies casing the highest value targets, the in-memory techniques are becoming increasingly common in financially motivated hack attacks. They typically make use of commonly used administrative and security-testing tools such as PowerShell, Metasploit, and Mimikatz, which attackers use to feed malicious commands to targeted computers. FIN7, an established hacking group with ties to the Carbanak Gang, is among the converts to this new technique, researchers from security firm Morphisec reported in a recently published blog post.

Australian push to make decryption easier ‘could threaten global internet security’ Guardian  Headline misleading, it’s about backdoors. But the result is the same.

Eric Alterman’s commentary about the 2016 U.S. election in “The Nation” won a top award this week in the Mirror competition for media industry reporting. We recommend reading it again for Alterman’s body-slam of the "he said-she said” style of journalism — a traditional writing style that lacks factual focus and usefulness.

Cyber Scoop

Those on the front lines of the cybersecurity workforce crisis are dogged by one question above all others: how to recruit and retain the highly technically skilled personnel they need. Now, thanks to the SANS Institute, they have some fresh answers — at least in the government contracting sector. The institute, an information-security training provider and research clearinghouse, analyzed a list of the top 100 U.S. government contractors, and identified the eight companies which score highest on two indices reflecting metrics developed by the Center for Strategic and International Studies think tank last year. The eight firms are all major U.S. defense and intelligence  contractors, called systems integrators because they build IT and other business systems for the government by assembling hardware, software and services from multiple vendors. According to the SANS analysis, the eight companies have had “remarkable success” in recruiting and retaining the highly technically skilled individuals that the CSIS report dubbed “cyber ninjas.”

Ex-DTA chief Shetler lands at Stone & Chalk

NEXT time you go to do something nefarious with a printer from work, you might want to think again because your actions might be much more traceable than you think. 
Even if you somehow manage to escape leaving the obvious digital footprint that comes from using a printer connected to your work computer, there is a way your actions could be tracked. The revelation was first revealed around 2004 when senior research fellow at Xerox Peter Crean told about tiny yellow dots tucked around the words and margins on every document.

  • If anything can go wrong, it will[1]
  • If a job is worth doing, it is worth doing well[1]
  • If at first you do not succeed, try, try again[1]
  • If God had meant us to fly, he would have given us wings[1]
  • If ifs and ands were pots and pans, there would be no work for tinkers[1]
  • If life deals you lemons, make lemonade[1][18]
  • If the cap fits, wear it[1]
  • If the mountain will not come to Mohammed, then Mohammed must go to the mountain[1]
  • If we're not back by dawn, call the President.
  • If wealth is lost, nothing is lost. If health is lost, something is lost. If character is lost, everything is lost.[1]
  • If wishes were horses, beggars would ride[1]
  • If you're growing in Age,then you're nearing to the Graveyard[1]
  • If you cannot be good, be careful[1]
  • If you cannot beat them, join them[1]
  • If you cannot stand the heat, get out of the kitchen[1]
  • If you give a mouse a cookie, he'll always ask for a glass of milk[1]
  • If you think that you know everything, then you're a Jack ass[1]
  • If you lie down with dogs, you will get up with fleas[1]
  • If you pay peanuts, you get monkeys[1]
  • If you steal from one author, it is plagiarism; if you steal from many, it is research. Wilson Mizner (1876–1933)[19]
  • If you want a thing done well, do it yourself[1]
  • If you have never seen the bottom of the tree, you cannot know how tall it stands[1]
  • Imitation is the sincerest form of flattery[1]
  • In for a penny, in for a pound[1]
  • In the kingdom of the blind, the one eyed man is king[1]
  • In the midst of life, we are in death[1]
  • Into every life a little rain must fall[1]
  • It goes without saying[1]
  • It is all grist to the mill[1]
  • It is an ill wind that blows no one any good[1]
  • It is best to be on the safe side[1]
  • It is better to give than to receive[1]
  • It is better to have loved and lost than never to have loved at all[1]
  • It is better to cultivate a Land with two Bulls, rather working under Boss who never gives Wage when asked[1]
  • It is better to light a candle than curse the darkness[1]
  • It is better to travel hopefully than to arrive[1]
  • It is easy to be wise after the event[1]
  • It is like juggling sand (Ian Murray)[1]
  • It is never too late[1]
  • It is no use crying over spilt milk[1]
  • It is no use locking the stable door after the horse has bolted[1]
  • It is on[1]
  • It is the early bird that gets the worm[1]
  • It is the empty can that makes the most noise[1]
  • It is the squeaky wheel that gets the grease[1]
  • It never rains but it pours[1]
  • It takes a thief to catch a thief[1]
  • It needs a Hundred Lies to cover a Single Lie[1]
  • It takes all sorts to make a world[1]
  • It takes one to know one[1]
  • It takes two to tango[1]
  • I'm going to have to give you the pink slip[1]
  • It will come back and haunt you[1]