{"id":1003,"date":"2015-03-16T00:00:00","date_gmt":"2015-03-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/16\/newsalert-march-15-2015\/"},"modified":"2021-12-30T11:38:34","modified_gmt":"2021-12-30T11:38:34","slug":"newsalert-march-15-2015","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/16\/newsalert-march-15-2015\/","title":{"rendered":"Newsalert &#8211; March 15 2015"},"content":{"rendered":"<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Modulo Named as a Visionary in Inaugural Gartner 2015 Magic Quadrant for IT Risk Management<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Insurance News Net<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">&#8220;This year marks Modulo&#8217;s 30th birthday as an independent security risk &#8230; Today, thousands of customers globally rely on our GRC automation &#8230;<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/insurancenewsnet.com\/oarticle\/2015\/03\/13\/modulo-named-as-a-visionary-in-inaugural-gartner-2015-magic-quadrant-for-it-risk-a-605359.html\">http:\/\/insurancenewsnet.com\/oarticle\/2015\/03\/13\/modulo-named-as-a-visionary-in-inaugural-gartner-2015-magic-quadrant-for-it-risk-a-605359.html<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Area banker to highlight cyber security<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Jack Hartings was recently elected to a one-year term as chairman of the Independent Community Bankers of America and looks to advocate legislation mandating other industries to share in improving cybersecurity. A Coldwater bank president wants to use his new post as chairman of a national banking association to push for improved cybersecurity and de regulation.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/www.dailystandard.com\/archive\/2015-03-14\/stories\/26292\/area-banker-to-highlight-cyber-security\">http:\/\/www.dailystandard.com\/archive\/2015-03-14\/stories\/26292\/area-banker-to-highlight-cyber-security<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Influential National Association of Insurance Commissioners (NAIC) moves on Cyber<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">It is essential for insurers and insurance producers to join Financial Services Information Sharing and Analysis Center (FSISAC) to share information and stay informed about cyber and physical threat intelligence analysis and sharing.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"https:\/\/ctovision.com\/2015\/03\/influential-national-association-of-insurance-commissioners-naic-moves-on-cyber\/\">https:\/\/ctovision.com\/2015\/03\/influential-national-association-of-insurance-commissioners-naic-moves-on-cyber\/<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Survey: 54% of Patients Would Switch Providers After Data Breach<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">54 percent of patients say they would be \u201cvery\u201d or \u201cmoderately likely\u201d to change providers after a security data breach impacting their personal health information, according to a recent survey conducted by Software Advice. In light of recent high-profile security breaches at medical organizations such as Anthem, Software Advice surveyed patients on their fears of a breach, and explored how software solutions can minimize data security risks.  The survey also assessed how likely patients would be to change providers as a result of various security-breach scenarios\u2026<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/hitconsultant.net\/2015\/03\/13\/patients-would-switch-providers-data-breach\/\">http:\/\/hitconsultant.net\/2015\/03\/13\/patients-would-switch-providers-data-breach\/<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">BlackBerry And IBM Introduce The SecuTABLET Targeted For Government and Enterprise<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">This new tablet, called the SecuTABLET, is basically a Samsung Galaxy Tab S 10.5 and utilizes IBM\u2019s wrapping technology to prevent data leaks from applications such as Facebook that could cause security issues through such possible threats such as malware or viruses. Even if the tablet were to become infected, it would be capable of keeping sensitive data secure and prevent a security leak. This technology will work in a seamless tandem with other solutions by Secusmart and it is also seeking approval by the German government for secure communication and data security.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/www.androidheadlines.com\/2015\/03\/blackberry-and-ibm-introduce-the-secutablet-targeted-for-government-and-enterprise.html\">http:\/\/www.androidheadlines.com\/2015\/03\/blackberry-and-ibm-introduce-the-secutablet-targeted-for-government-and-enterprise.html<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">A cyber war staged in central London<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">In 2014, the competition took place in an underground bunker of the Churchill War Rooms, with prizes worth \u00a3100,000 going toward educational and career advancement opportunities. The competition, known as the Masterclass and developed by a group of cyber experts led by BT, is now in its fifth year and aims to plug the skills shortage currently affecting both governments and UK businesses. The competition essentially invites participants to put their skills to the test and experience a dramatized version of events faced by regular cybercrime fighting professionals. It also allows sponsors of the competition such as BT, Lockheed Martin, and Airbus, to hover on the sidelines and cherry pick the next cybercrime busting whizz kids. <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/arstechnica.com\/security\/2015\/03\/a-cyber-war-staged-in-central-london\/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29\">http:\/\/arstechnica.com\/security\/2015\/03\/a-cyber-war-staged-in-central-london\/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">U.S. warns IS may soon launch cyber attacks on American companies, government<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">The head of the U.S. Senate Intelligence Committee has said that the Islamic State (IS) may soon launch cyber-attacks on U.S. infrastructure, companies and government.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/www.sify.com\/news\/us-warns-is-may-soon-launch-cyber-attacks-on-american-companies-government-news-international-pdoqaphcdifje.html\">http:\/\/www.sify.com\/news\/us-warns-is-may-soon-launch-cyber-attacks-on-american-companies-government-news-international-pdoqaphcdifje.html<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Jamieoliver.com still compromised, now drops digitally signed malware<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Malwarebytes Unpacked<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Popular Chef Jamie Oliver is still serving&#8230; malware through his website. This is the second case within a month so foodies should be careful before &#8230;<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"https:\/\/blog.malwarebytes.org\/exploits-2\/2015\/03\/jamieoliver-com-still-compromised-now-drops-digitally-signed-malware\/\">https:\/\/blog.malwarebytes.org\/exploits-2\/2015\/03\/jamieoliver-com-still-compromised-now-drops-digitally-signed-malware\/<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Hackers developing file-infecting Virlock ransomware with resurrection powers<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">&#8220;We recently came across one malware family, detected as PE_VIRLOCK, that not only locks the computer screen but infects files &#8211; a first for ransomware,&#8221; read the advisory. This instructs Virlock to check infected machines for specific file types, \u2026 Virlock is believed to be a work in progress, and the researchers expect fresh variants to appear in the near future.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/www.v3.co.uk\/v3-uk\/news\/2399602\/hackers-developing-file-infecting-virlock-ransomware-with-resurrection-powers\">http:\/\/www.v3.co.uk\/v3-uk\/news\/2399602\/hackers-developing-file-infecting-virlock-ransomware-with-resurrection-powers<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Russia Hacking Your News<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">If you follow today\u2019s news and social media news feeds, then you are probably aware of what kind of danger inaccurate news-story covering poses, and how tricky it can be when it influences public opinion. Nowadays, it is a common journalists\u2019 mistake to jump the gun and share some unverified news with the entire world via Twitter Inc (NYSE:TWTR), Facebook Inc (NASDAQ:FB) and what have you.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Russian propagandists are particularly focused on being creative with how to break in the modern news delivery system. And to be honest, they are already quite creative. It is especially easy to fall for Russian propaganda when its spread in the form of unverifiable but convincingly looking data such as survey polls or some local events that are difficult to disprove.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/www.valuewalk.com\/2015\/03\/russia-hacking-your-news\/\">http:\/\/www.valuewalk.com\/2015\/03\/russia-hacking-your-news\/<\/a> <\/span><\/p>\n<p class=\"p2\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"> <\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><strong style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">Justice Department proposal for computer search warrants raises hackles<\/strong><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">WASHINGTON \u2014 A Justice Department proposal that could make it easier to locate and hack into computers that are part of criminal investigations is raising constitutional concerns from privacy groups and Google, who fear the plan could have broad implications.<\/span><\/p>\n<p class=\"p1\" style=\"margin-top: 1em; margin-bottom: 1em;\"><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\">The Justice Department wants the rules changed so judges in a district where \u201cactivities related to a crime\u201d have occurred could approve warrants to search computers outside their districts. The government says that flexibility is needed for cases in which the government can&#8217;t figure out the location of a computer and needs a warrant to access it remotely, and for investigations involving botnets \u2014 networks of computers infected with a virus that spill across judicial districts.<\/span><\/p>\n<p><span style=\"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);\"><strong>Link<\/strong>: <a href=\"http:\/\/triblive.com\/usworld\/nation\/7969441-74\/proposal-computer-privacy#axzz3UUx1bBJQ\">http:\/\/triblive.com\/usworld\/nation\/7969441-74\/proposal-computer-privacy#axzz3UUx1bBJQ<\/a> <\/span> <\/p>\n<p>&nbsp;<\/p>\n<div style=\"text-align: right; font-size: small; clear: both;\" id=\"blogsy_footer\"><a href=\"http:\/\/blogsyapp.com\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogsyapp.com\/images\/blogsy_footer_icon.png\" alt=\"Posted with Blogsy\" style=\"vertical-align: middle; margin-right: 5px;\" width=\"20\" height=\"20\" \/>Posted with Blogsy<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Modulo Named as a Visionary in Inaugural Gartner 2015 Magic Quadrant for IT Risk Management Insurance News Net &#8220;This year marks Modulo&#8217;s 30th birthday as an independent security risk &#8230; Today, thousands of customers globally rely on our GRC automation &#8230; Link: http:\/\/insurancenewsnet.com\/oarticle\/2015\/03\/13\/modulo-named-as-a-visionary-in-inaugural-gartner-2015-magic-quadrant-for-it-risk-a-605359.html Area banker to highlight cyber security Jack&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1003","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1003"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1003\/revisions"}],"predecessor-version":[{"id":3490,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1003\/revisions\/3490"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}