Cyber Intelligence Bulletin
Optimising Information Security
Latest in the cyber threat landscape
- How Family Offices Can Demystify the Cyber Threat
- Time for a Diversity ‘Reboot’
- Gmail messages ‘read by human third parties’
- How crisis communications factor into a cyberattack
- Cybercriminals attempt to score using FIFA World Cup phishing emails
- Typeform data breach hits thousands of survey accounts
- Your social media memories may have been compromised
- Cops suspect fuel station hack… but experts aren’t convinced
How Family Offices Can Demystify the Cyber Threat
The webinar will discuss: the unique nature of the threat to mid-tier corporates and Family Offices; why you should be aware not alarmed; assessing your current cyber maturity; building strength in depth; the importance of leadership. The webinar will enable those who currently see a threat they don’t understand and are alarmed by, to begin to take concrete steps to address it. Malcolm Taylor is an ex-GCHQ expert and current Senior Cyber Security Advisor at ITC Secure, the London-based, leading MSSP and Cyber Security Consultancy company. Malcolm is a recognised expert in strategic cyber security, built upon a 20+ year career at GCHQ and in the private sector. Please click the link below to register your interest.
Time for a Diversity ‘Reboot’
Some experts claim now that the widely reported 11 percent figure cited for women in cybersecurity jobs in 2016, may actually drop to single digits (nine percent) in 2018. And nearly half the women – 48 percent – are less than experienced, having spent three years or less in the field, according to a soon to be released Cybrary survey. That’s not good for many reasons, chief among them, gender imbalance in the cybersecurity industry poses a threat to our nation’s security at a time when public and private sector organizations must fend off an ever-growing array of cyberattacks. “If the only people defending us are overwhelmingly from a single demographic orientation, we will fail to protect against evolving attacks,” says Tina Williams-Koroma, founder and president of TCecure LLC and cybersecurity academic innovation officer at the University System of Maryland.
Gmail messages ‘read by human third parties’
People who have connected third-party apps to their accounts may have unwittingly given human staff permission to read their messages. One company told the Wall Street Journal that the practice was “common” and a “dirty secret”. Google indicated that the practice was not against its policies. One security expert said it was “surprising” that Google allowed it. Gmail is the world’s most popular email service with 1.4 billion users. Google lets people connect their account to third-party email management tools, or services such as travel planning and price comparisons. When linking an account to an external service, people are asked to grant certain permissions – which often include the ability to “read, send, delete and manage your email”. According to the Wall Street Journal, this permission sometimes allows employees of third-party apps to read users’ emails.
How crisis communications factor into a cyberattack
After many high-profile cyber attacks that have brought down brands like Equifax, JP Morgan Chase and Yahoo!, most companies still haven’t implemented a company-wide crisis strategy. According to a recent global study conducted by Ponemon for IBM Resilient, 77 percent of respondents admit they don’t have a formal cybersecurity incident response plan (CSIRP) that is applied across their organizations, despite 65 percent agreeing that the severity of cyber attacks has increased and part of the severity stems from the longevity it takes to rebuild communications and infrastructure.
Cybercriminals attempt to score using FIFA World Cup phishing emails
IBM and Check Point each have noted several scams being run that bank on World Cup fans simply clicking through and paying no attention as to whether or not they are legitimate, even though clues indicating they are being targeted for a scam are quite obvious. IBM’s X-Force came across several scams with most telling the recipient that they had won upwards of $1 million and in a few cases, the criminals tied that bit of subterfuge to Coca-Cola, which is an official World Cup sponsor, to help make the offer legitimate. The attack picked up by Check Point uses an infected World Cup app to download PUPs.
Typeform data breach hits thousands of survey accounts
The Spanish company said it noticed the issue on 27 June, remedying its cause within 30 minutes. The affected data was that collected prior to 3 May, which meant “results collected since May 3rd 2018 are therefore safe and not compromised.” As breaches go, this is a slightly complicated one because Typeform’s paying customers are businesses that use its software to conduct customer surveys and quizzes. Each one of those collects data from possibly tens of thousands of their own customers when they take part, which widens the breach’s scope. Each affected provider will therefore need to contact these customers independently – a situation that draws parallels with the breach suffered by email marketing provider Epsilon in 2011, which saw dozens of large brands sending out apology emails.
Your social media memories may have been compromised
The idea is that the app turns every day into an anniversary, reminding you of what you were doing on this day last year, three years ago, five years ago, and so on. The app was briefly popular a few years ago, before Facebook built a similar feature, known as On This Day, into its own social network. The good news is that a third-party app like Timehop can’t work without your permission. The Timehop app has to be authorised by you, and furnished with cryptographic keys (known in the jargon as access tokens), to get into the various online services from which you want it to scrape photos and posts. The bad news is that Timehop just announced a data breach.
Cops suspect fuel station hack… but experts aren’t convinced
Fox News affiliate WJBK reported that the clerk was unable to shut off a pump that dispensed free fuel for 90 minutes. Ten vehicles took advantage of the security hole to fuel up without paying, leaving the outlet down $1,800 (about £1,360). The clerk said the system was unresponsive, but he eventually managed to shut it down using “emergency kit” before calling the cops. Officers reckon the perps used a “remote device” to hack the pump and pull off the scam, which took place in broad daylight at around 1pm on June 23 at a suburban gas station about 15 minutes from downtown Detroit in the US. Police are investigating the drivers involved, whose cars may have been caught on CCTV. Technical details are scant. In the absence of anything solid, cybersecurity experts offered a more prosaic explanation.