Lucian Constantin reports: The hackers that targeted Twitter, Facebook, Apple and Microsoft developers two years ago have escalated their economic espionage efforts as they seek confidential business information and intellectual property they can profit from. The group, which security researchers from Kaspersky Lab and Symantec call Wild Neutron or Morpho, has broken into the networks…
Category: Of Note
National Association of Attorneys General: Federal Data Breach Legislation Should Not Preempt States
The National Association of Attorneys General (NAAG) sent a letter today to congressional leaders urging them to ensure that federal data breach legislation preserves states’ ability to enforce state laws in order to protect consumers from data breaches and identity theft. Most of the federal bills related to data security and data breach notification pending…
New Hampshire Enacts Breach Notification Requirement for the Department of Education
Scott Koller explains: The state of New Hampshire recently enacted House Bill 322 (“HB 322”), which requires the Department of Education (“DOE”) to implement additional procedures to protect student and teacher data from security breaches. Those procedures now include a breach notification requirement. Effective August 11, 2015, the DOE must develop a detailed security plan…
GhostShell Returns with a New Hacking Concept – Dark Hacktivism
Ionut Ilascu writes: Breaking into the systems of an organization and accessing files without authorization is regarded as trespassing. The motivation behind this act can be anything from financial gain to proving one’s skills among fellow hackers. No matter the reasons, the success of such an action is most of the times due to lack…
Hacking Team hacked, all files dumped (Update 2)
As seen on Twitter tonight: Since we have nothing to hide, we’re publishing all our e-mails, files, and source code https://t.co/dCBZAPTtpD https://t.co/Frr1ut01o5 — Hacked Team (@hackingteam) July 6, 2015 Their Twitter profile has also been, er… edited… to “Hacked Team:” @hackingteam Developing ineffective, easy-to-pwn offensive technology to compromise the operations of the worldwide law enforcement…
Insurer Claims That Hi-Tech Thieves Had Inside Help In Record Eli Lilly Heist
Edmund H. Mahony reports: In an effort to recover tens of millions in losses, the insurer for pharmaceutical giant Eli Lilly is trying to prove that lax control over confidential, computer data by Lilly’s security contractor enabled thieves to use detailed schematics to carry out brazen warehouse burglaries in Enfield and elsewhere across the country….