Welcome to the Cyveillance Weekly Trends Report
Since threat intelligence is constantly evolving, we publish a weekly report to keep our customers updated on the latest threats across a variety of industries. Starting this week, we’ll be posting an abridged version of the report here on our blog for everyone to read. You can expect highlights from our analysts’ research reports, the latest cyber intelligence news, and more. For the latest security news stories throughout the day, follow us on Twitter, and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.
- Your medical information is worth 10 times more than your credit card number on the black market. Cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging computer systems that do not use the latest security features.
- A vulnerability in the Bash command interpreter poses a critical security risk to Unix and Linux systems. Countless websites, servers, PCs, OS X Macs, various home routers, and more are vulnerable to hacker exploits. The vulnerability is present in Bash up to and including version 4.3. Patches are not yet complete. As of September 26, the Bash, or Shellshock, vulnerability was being actively targeted by malicious hackers who appear to have already claimed more than 700 victims. Honeypots detected two different attack campaigns that target Shellshock. One attempts to install a malicious Linux binary file on vulnerable systems, while the other tries to infect them with a malicious Perl script.
Legal and Regulations
- The U.S. District Court for the Southern District of New York has found that setting up auto-forwarding to receive copies of another person’s incoming emails is a violation of the federal Wiretap Act.
- Apple fans in mainland China are being made to wait for the iPhone 6 and smugglers are cashing in, marking up Hong Kong prices by as much as $1,000.
- Apple, Amazon, and Google long since outstripped the Pentagon in information technology. But as the military and intelligence community try to take advantage of commercial IT innovation, especially in cloud computing, they have run into harsh limits. Security, long-range bandwidth and the sheer volume of data have created problems for the Pentagon that current commercially available cloud services can’t solve. In fact, it’ll need several different kinds of cloud services, customized for different missions.
- FBI Director James B. Comey sharply criticized Apple and Google on Thursday for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.
Cyveillance clients get access to the entire Weekly Trends Report, covering all of the above topics and much more. Contact us to find out how we can help your organization.