Welcome to the Cyveillance Weekly Trends Report
Since threat intelligence is constantly evolving, we publish this weekly report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below, and follow us on Twitter, and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.
- A federal advisory workgroup that makes privacy and security recommendations to the Office of the National Coordinator for Health IT has officially re-launched with a new name, new members, and new topics to tackle in the coming months. The Privacy and Security Workgroup, formerly known as the Privacy and Security Tiger Team, will tackle such issues as secure and private interoperability of health data and the privacy concerns related to big data.
- One of the largest U.S. retailers confirmed a breach that started in early September involving a “new form” of Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs. that infected the company’s payment card systems. The breach was detected by the company’s IT team on October. 9th, which immediately led to a full investigation with the help of a leading IT security firm. Compromised information included debit and credit card numbers. Based on the forensic investigation to date, no personal information, debit card PINs, e-mail addresses or Social Security numbers were obtained by the hackers. The retailer also said there’s no evidence that its online customers were impacted by the breach. The malware used in the attack was undetectable by current anti-virus systems.
Legal and Regulations
- Twitter is suing the government in U.S. District Court in California, claiming that the government restrictions on the dissemination of U.S. government requests for user data violate the First Amendment. The government argues that the more is known about its sources and methods in collecting national security data, the less secure the nation will be.
- President Obama on Friday unveiled a series of steps aimed at improving the security of credit- and debit-card payments, including a pledge to shift government transactions over to the PIN and chip system and commitments from major retailers and credit card providers. In announcing the BuySecure initiative, Obama signed an executive order directing federal agencies to phase out magnetic strip credit and debit cards issued by the government, and to implement readers for the more secure PIN and chip cards in government retail locations such as national parks.
- The revolution will not be televised but it will be tweeted, instant messaged or, in the case of Hong Kong, broadcast on mesh networks like FireChat. FireChat — an ‘off-the-grid’ smartphone app — emerged this month as the technological glue holding Hong Kong’s pro-democracy protests together and a powerful weapon in the hands of mass movements, dissidents and protesters.
- FBI Director James Comey says new encryption standards by Apple and Google will create “a black hole for law enforcement” that will help sophisticated criminals avoid detection. Comey is taking up the FBI’s years-long push to expand federal surveillance law to require tech companies to include a way for law enforcement to get court ordered access to data on new devices. “The law hasn’t kept pace with technology,” Comey said in remarks at the Brookings Institution. “This disconnect has created a significant public safety problem. We call it ‘going dark,’ and what it means is this: those charged with protecting our people aren’t always able to access the evidence we need to prosecute crime and prevent terrorism.”
Cyveillance clients get access to the entire Weekly Trends Report, covering all of the above topics and much more. Contact us to find out how we can help your organization. And don’t forget to register for this Thursday’s webinar on Turning Data into Threat Intelligence.