{"id":1005,"date":"2015-03-20T00:00:00","date_gmt":"2015-03-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/20\/newsalert-march-18-2015\/"},"modified":"2021-12-30T11:38:34","modified_gmt":"2021-12-30T11:38:34","slug":"newsalert-march-18-2015","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/20\/newsalert-march-18-2015\/","title":{"rendered":"Newsalert &#8211; March 18, 2015"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nMiddle of the week, a quiet news day but make sure you&#8217;re ready for the OpenSSL patching activities that will need to be launched today.<\/p>\n<p>So onto the news:<\/p>\n<p>Case study: When a hacker destroys your business<\/p>\n<p>Former Distribute.IT co-founder Carl Woerndle shares his experience of the cyber attack that destroyed this business. It\u2019s been almost four years since business owners Carl Woerndle and his brother Alex were caught up in a cyber attack so damaging it destroyed their once prospering technology business, Distribute.IT.<\/p>\n<p>Carl Woerndle has given a warts and all account of how he and other staff at his former company dealt with the crisis and the fallout of the malicious hack in a new cyber security guide, in conjunction with the CIO Executive Council.<\/p>\n<p>Link: http:\/\/www.cso.com.au\/article\/569410\/case-study-when-hacker-destroys-your-business\/ <\/p>\n<p>Regulators seek more authority in data breach bill<\/p>\n<p>Federal regulators told lawmakers March 18 they want to see tougher provisions on rulemaking authority and protection of personal information added to data breach notification legislation before it becomes law.<\/p>\n<p>The bill, which was recently released as a discussion draft, would set a national standard for companies to report data breach notifications within 30 days of the discovery of a hack, if there is a risk of financial harm or fraud to consumers. The draft defines personal information as Social Security numbers, as well as account credentials stored by covered commercial companies. The bill would preempt the patchwork of 47 state laws covering data breach notification, but would not intrude on the areas of health care and financial institution data covered by existing law.<\/p>\n<p>Link: http:\/\/fcw.com\/articles\/2015\/03\/18\/regulators-data-bill.aspx <\/p>\n<p>The days of mass attacks are over; now it&#8217;s all about big data<\/p>\n<p>Security execs at CeBit spoke about how the threat landscape has changed and warned against the temptation to hack back. &#8220;It&#8217;s a big data game these days, it&#8217;s not about mass attacks,&#8221; said Vincent Steckler, CEO of Avast, describing how hacking has changed in the past few years. &#8220;Consumers are no longer targeted on a mass scale,&#8221; Steckler said.<\/p>\n<p>Instead, hackers identify what they&#8217;re after at a company&#8211;typically corporate secrets or other data&#8211;and they go for it, said Natalya Kaspersky, CEO of InfoWatch and the co-founder and former CEO of Kaspersky Lab.<\/p>\n<p>Link: http:\/\/www.fierceitsecurity.com\/story\/days-mass-attacks-are-over-now-its-all-about-big-data\/2015-03-18 <\/p>\n<p>APPLE PATCHES WEBKIT VULNERABILITIES IN SAFARI<\/p>\n<p>Apple on Tuesday pushed out new versions of its Safari browser that address 17 security vulnerabilities in the WebKit engine.<\/p>\n<p>\u201cA user interface inconsistency existed in Safari that allowed an attacker to misrepresent the URL,\u201d Apple said. \u201cThis issue was addressed through improved user interface consistency checks.\u201d<\/p>\n<p>Link: https:\/\/threatpost.com\/apple-patches-webkit-vulnerabilities-in-safari\/111699<\/p>\n<p>Feedback, questions? Our mailing address is: dailynews@paulgdavis.com<\/p>\n<p>If someone forwarded this email to you and you want to be added in,<br \/>\nplease click this:   Subscribe to this list<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Middle of the week, a quiet news day but make sure you&#8217;re ready for the OpenSSL patching activities that will need to be launched today. So onto the news: Case study: When a hacker destroys your business Former&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1005","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1005"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1005\/revisions"}],"predecessor-version":[{"id":3492,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1005\/revisions\/3492"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}