Sony Pictures Demands That News Agencies Delete ‘Stolen’ Data
LOS ANGELES — Sony Pictures Entertainment warned media outlets on Sunday against using the mountains of corporate data revealed by hackers who raided the studio’s computer systems in an attack that became public last month.
In a sharply worded letter sent to news organizations, including The New York Times, David Boies, a prominent lawyer hired by Sony, characterized the documents as “stolen information” and demanded that they be avoided, and destroyed if they had already been downloaded or otherwise acquired.
To read the entire article please go to Sony Pictures Demands That news Agencies Delete ‘Stolen’ DataAmerica, Breach, Cyber Attack, Cyber Espionage, cyber warfare, CyberAttack, CyberCrime, CyberEspionage, Encryption, Entertaiment, Entertainment industry, Films, Hacker, Hacking, Movies, Sony, Sony Pictures, Stolen Data, Threat, Unied States
Hacked vs. Hackers: Game On
SAN FRANCISCO — Paul Kocher, one of the country’s leading cryptographers, says he thinks the explanation for the world’s dismal state of digital security may lie in two charts.
One shows the number of airplane deaths per miles flown, which decreased to one-thousandth of what it was in 1945 with the advent of the Federal Aviation Administration in 1958 and stricter security and maintenance protocols. The other, which details the number of new computer security threats, shows the opposite. There has been more than a 10,000-fold increase in the number of new digital threats over the last 12 years.
The problem, Mr. Kocher and security experts reason, is a lack of liability and urgency. The Internet is still largely held together with Band-Aid fixes. Computer security is not well regulated, even as enormous amounts of private, medical and financial data and the nation’s computerized critical infrastructure — oil pipelines, railroad tracks, water treatment facilities and the power grid — move online.
After a year of record-setting hacking incidents, companies and consumers are finally learning how to defend themselves and are altering how they approach computer security.
If a stunning number of airplanes in the United States crashed tomorrow, there would be investigations, lawsuits and a cutback in air travel, and the airlines’ stock prices would most likely plummet. That has not been true for hacking attacks, which surged 62 percent last year, according to the security company Symantec. As for long-term consequences, Home Depot, which suffered the worst security breach of any retailer in history this year, has seen its stock float to a high point.
In a speech two years ago, Leon E. Panetta, the former defense secretary, predicted it would take a “cyber-Pearl Harbor” — a crippling attack that would cause physical destruction and loss of life — to wake up the nation to the vulnerabilities in its computer systems.
No such attack has occurred. Nonetheless, at every level, there has been an awakening that the threats are real and growing worse, and that the prevailing “patch and pray” approach to computer security simply will not do.
So what happened?
To red the complete article go to Hacked vs Hackers: Game On
Hackers Pirate Sony Films and Leak Studio Salaries
LOS ANGELES — Just as Sony Pictures Entertainment appeared to be recovering from a crippling online attack, the studio found itself confronting new perils on Tuesday. The F.B.I. warned United States businesses of a similar threat, and additional Sony secrets were leaked online.
Sony, the studio behind “The Amazing Spider-Man” films and the “Breaking Bad” television series, restarted many of its computer systems on Monday after a Nov. 24 breach by a group calling itself #GOP, for Guardians of Peace. Executives at the entertainment company said they were also making progress in fighting the apparently related Internet pirating of five complete films, including the unreleased “Annie.”
The breach exposed two things the secretive movie industry loathes the most – the piracy of films and details about executive compensation — and sent a ripple of dread across Hollywood.
To read the entire article go to Hackers Pirate Sony Films and Leak Studio SalariesAmerica, Breach, Cyber Attack, Cyber Espionage, cyber security, CyberCrime, CyberWarfare, Encryption, Entertainment, Hacking, Movies, Sony Pictures, Spiderman
Hackers With Apparent Investment Banking Background Target Biotech
SAN FRANCISCO — For more than a year, a group of cybercriminals has been pilfering email correspondence from more than 100 organizations — the vast majority publicly traded health care or pharmaceutical companies — in apparent pursuit of information significant enough to affect global financial markets.
The group’s activities, detailed in a report released Monday morning by FireEye, the Silicon Valley security company, shed light on a new breed of criminals intent on using their hacking skills to gain a market edge in the pharmaceutical industry, where news of clinical trials, regulatory decisions or safety or legal issues can affect a company’s stock price.
Starting in mid-2013, FireEye began responding to intrusions at publicly traded companies — two-thirds of them, it said, in the health care and pharmaceutical sector — as well as advisory firms, such as investment banking offices or companies that provide legal or compliance services.
To read the complete article go to Hackers With Apparent Investment Banking Background Target Biotech.Big Data, Big Pharma, BioTech, Breach, cyber security, CyberCrime, Cybercriminals, CyberEspionage, CyberWarfare, Encryption, Hack, Hacker, Investment Banking, Scam, Threat, United States
Speeding Up Breach Detection
Organizations Must Balance Technology, Process Improvements
One reason for the lengthy detection time is two-thirds of organizations are told about a breach by a third party, rather than discovering it themselves, says Dave Merkel, chief technology officer at FireEye. “It’s the FBI showing up with your ‘wallet,'” he says. “Or even worse, your customer shows up [to tell you about a breach].”
Organizations looking to speed up breach detection on their own, rather than relying on others, need to improve their data analytics capabilities, prioritize the type of data they want to collect and analyze, and ensure they have appropriate staff who can take the time to review the data for suspicious activity.
In addition, entities in all sectors need to leverage their networks to segment and protect critical data, participate in threat intelligence sharing to spot signs of a breach and proactively scan the Internet for company data that could indicate a compromise has happened.
The bottom line? Security professionals need to pay as much attention to breach detection as they do to breach prevention, experts say. “We know that breaches are going to happen,” says Mike McCann, a consultant at Signum Security, which advises organizations on security matters. “What can we do to mitigate response times and mitigate the impact?”
For more information go to Speeding Up Breach Detection
“Anonymous” attack disrupting Ferguson city government
FERGUSON, MO (KTVI) – Protests in the streets have not been the only disruption in the city of Ferguson since the shooting of Michael Brown by police. A cyber attack by the hacker group “Anonymous” has done more damage than any bottle or brick.
The threats from “Anonymous” came shortly after the protests surrounding Brown’s death started. In a video released on YouTube, the group was specific about what it intended to do.
“We will take every web based asset of your departments and governments offline,” the robotic voice said over video associated with the Brown case. “That is not a threat, it is a promise. Attacking the protestors will result in the release of personal information on every single member of the Ferguson Police Department.”
It quickly became clear this was no joke.
For more information go to Anonymous Attack Disrupting Ferguson City Government
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it. Not long after the planes struck the twin towers, killing 658 of his co-workers and friends, including his brother, one of the first things on Lutnick’s mind was passwords. This may seem callous, but it was not.America, Breach, Cyber Attack, Cyber Crime, Cyber Espionage, cyber security, cyber warfare, CyberAttack, CyberCrime, CyberEspionage, CyberSecurity, CyberWarfare, Encryption, Hack, Hacker, Hacking, Law, Law & Forensic, Law Firms, Phishing, Scam, Threat, U.S.A., United States
Pavel Klimov – the general counsel (Emea) for US-based technology giant Unisys, which turns over $3.7 billion annually – told The Lawyer in an exclusive interview that “legal is one of the key departments for a business in setting up a risk and compliance strategy”. He continued by calling on in-house lawyers to shed any historic timidity they may have in forcing issues onto boardroom agendas.America, Breach, Cyber Attack, Cyber Crime, Cyber Espionage, cyber security, cyber warfare, CyberAttack, CyberCrime, CyberEspionage, CyberSecurity, CyberWarfare, Encryption, Hack, Hacker, Hacking, Law, Law & Forensic, Law Firms, Phishing, Scam, Threat, U.S.A., United States
Investors may not always like what they hear from venture capitalist Ted Schlein. For example, the general partner at Kleiner Perkins Caufield & Byers says companies are fooling themselves if they think they can keep hackers out of their networks. He and Scott Thurm, Wall Street Journal senior deputy technology editor, discussed Web security and other topics. Edited excerpts follow.America, Breach, Cyber Attack, Cyber Crime, Cyber Espionage, cyber security, cyber warfare, CyberAttack, CyberCrime, CyberEspionage, CyberSecurity, CyberWarfare, Encryption, Hack, Hacker, Hacking, Law, Law & Forensic, Law Firms, Phishing, Scam, Threat, U.S.A., United States