How the NSA-led US Cyber Command Wishes You a Happy Valentine’s Day

Slashdot reader DevNull127 writes: The U.S. Cyber Command, headed by the National Security Agency’s director, has been a part of America’s Department of Defense since 2009. Today this unified combatant command wished its followers on Twitter a happy Valentine’s Day, adding “As our gift to you, we present 12 crypto challenges designed by the information security community. “Love is in the…

SolarWinds Hackers Accessed DOJ Emails, But there’s No Indication They Reached Classified Systems

Hackers who tapped into government networks through SolarWinds software potentially accessed about 3% of the Justice Department’s email accounts, but there’s no indication they accessed classified systems, a DOJ spokesperson said in a statement Wednesday. From a report: The DOJ Office of the Chief Information Officer learned of the hack the day of Christmas Eve, according to the statement, where agents…

Is the US Government’s Cybersecurity Agency Up to the Job?

CNN reports that some critics are now questioning whether America’s Cybersecurity and Infrastructure Security Agency (CISA) is equipped to protect the integrity of government systems from adversaries: Some of the nearly half-dozen government agencies affected by the hack have recently reached out to CISA for help with addressing the known vulnerabilities that were exploited in the attack but were told the…

Police Turn To Car Data To Destroy Suspects’ Alibis

In recent years, investigators have realized that automobiles — particularly newer models — can be treasure troves of digital evidence. Their onboard computers generate and store data that can be used to reconstruct where a vehicle has been and what its passengers were doing. From a report: They reveal everything from location, speed and acceleration to when doors were opened and…

Walmart-exclusive Router and Others Sold on Amazon and eBay Contain Hidden Backdoors To Control Devices

Bernard Meyer, reporting for CyberNews: In a collaboration between CyberNews Sr. Information Security Researcher Mantas Sasnauskas and researchers James Clee and Roni Carta, suspicious backdoors have been discovered in a Chinese-made Jetstream router, sold exclusively at Walmart as their new line of “affordable” wifi routers. This backdoor would allow an attacker the ability to remotely control not only the routers, but…

Twitter Names Famed Hacker ‘Mudge’ as Head of Security

Social media giant Twitter, under increased threat of regulation and plagued by serious security breaches, is appointing one of the world’s best-regarded hackers to tackle everything from engineering missteps to misinformation. From a report: The company on Monday named Peiter Zatko, widely known by his hacker handle Mudge, to the new position of head of security, giving him a broad mandate…

America’s ‘Cyber Command’ Is Trying to Disrupt the World’s Largest Botnet

The Washington Post reports: In recent weeks, the U.S. military has mounted an operation to temporarily disrupt what is described as the world’s largest botnet — one used also to drop ransomware, which officials say is one of the top threats to the 2020 election. U.S. Cyber Command’s campaign against the Trickbot botnet, an army of at least 1 million hijacked…

Ransom Gangs Increasingly Outsource Their Work

Brian Krebs writes via KrebsOnSecurity.com: There’s an old adage in information security: “Every company gets penetration tested, whether or not they pay someone for the pleasure.” Many organizations that do hire professionals to test their network security posture unfortunately tend to focus on fixing vulnerabilities hackers could use to break in. But judging from the proliferation of help-wanted ads for offensive…

Cory Doctorow: ‘Self-Driving Cars are Bullshit’

“Self-driving cars are bullshit,” writes Cory Doctorow:
I’m a science fiction writer, so I quite enjoy thinking about self-driving cars. They make for really interesting analogies about data, liability, self-determination, information security and openness… But I’m a science fiction writer and that means I can tell the difference between “thought experiments” and “real things.” Alas, the same cannot be said of corporate…

DOD, FBI, DHS Release Info on Malware Used in Chinese Government-Led Hacking Campaigns

The U.S. government today publicly exposed malware used in Chinese government hacking efforts for more than a decade. From a report: The Chinese government has been using malware, referred to as Taidoor, to target government agencies, entities in the private sector, and think tanks since 2008, according to a joint announcement from the Department of Homeland Security’s Cybersecurity and Infrastructure Security…