ICD Brief 5.
15.08.2016. – 22.08.2016.
“According to The Global Risks Report 2016, compiled through a strategic partnership between Marsh & McLennan Companies and Zurich Insurance Group, cyber attacks are expected to be the top tech risk most likely to occur in the US, and according to the World Economic Forum’s “2016 Global Risk Report”, terrorism is one of the top three risk concerns for companies doing business here.”
“A leak of sensitive computer code is spurring calls for the government to be more transparent about its handling of a secret stockpile of network intrusion tactics. The leaked code, believed to be written by an NSA operation, contained new techniques to hack widely used hardware from Cisco, Fortinet and Juniper Networks. The leaks left countless computer networks vulnerable to hackers — something security professionals and government officials alike acknowledge is a risk of stockpiling these kinds of techniques.”
“Cisco and Fortinet, two of the technology vendors whose products were the apparent target of secret software exploits supposedly developed by NSA hackers and subsequently shared publicly by the so-called Shadow Brokers, each disclosed to their customers, Wednesday, that the target vulnerabilities exist and are being dealt with accordingly. “
“On 3rd August 2016, Arizona situated Banner Thunderbird Medical Center a provider of healthcare declared identifying a security hack into the computers the organization maintained and that it’d soon inform staff, doctors and patients about the incident which leaked financial and personal data.”
“In the wake of cyber breaches against Democratic targets, Congress is trying to step up its own cybersecurity to gird against future threats. The Democratic National Committee and the Democratic Congressional Campaign Committee were targeted in high profile hacks that included leaks of sensitive information.”
“Cybersecurity is now a top national security problem — some officials even call it a bigger threat than terrorism. But both major presidential candidates have hit hurdles on the campaign trail that raised questions about how they would try to keep U.S. computers safe if elected. How seriously should voters take those high-tech hiccups? And what will a Clinton or Trump victory mean for the United States’ ability to fend off the rising tide of digital attacks?”
“Theresa May has said that the mass collection of private data by the security services is “vital” for public safety after an official review found it is has been repeatedly used to stop terrorist attacks in Britain.David Anderson, the Independent Reviewer of Terrorism Legislation, revealed that MI6 used “bulk data” to identify terror suspects who posed a threat to the UK in the wake of the attacks in Paris and Brussels.”
“Salaries for tech jobs in the UK are still rising in the second quarter of the year, despite the fact that the number of jobs in the industry is slowly declining. This is according to a new report by Dice, the online career site for the technology community. Together with Watch, it lists the most wanted jobs and skills in the industry. The two companies say cloud and security skills are still most wanted, both in permanent and contract roles.”
“On Friday, Sage (an accounting, payroll, and payments software company) announced that there had been unauthorized access to customer information using an internal login.
Sage is one of Britain’s largest technology companies, and it says it has more than 6 million small and medium-sized businesses using its software worldwide while operating in 23 countries.”
“Bahraini investment firm Investcorp has acquired British cybersecurity firm Nebulas Solutions Ltd with its portfolio company SecureLink Group under plans to form a European cybersecurity giant. The acquisition is Investcorp’s second of a regional cyber security company this year, following its recent purchase of Scandinavia’s Coresec Systems.”
“Israel’s young cyber industry is a remarkable success story: Between the National Cyber Bureau and budding Cyber Defense Authority Israel can protect its critical infrastructure and continue cementing its position as a global cybersecurity powerhouse.”
“The Israeli army’s C2 Systems Department recently purchased two HoloLens glasses from Microsoft Corp. The commander of the head programming department, Major Rotem Bashi, intends to develop the technology to improve battlefield strategy and train field personnel. And quickly: He intends for HoloLens to be used on active duty within months.”
“India’s third largest software exporter Wipro has picked up a minority stake in Israeli cybersecurity startup Insights Cyber Intelligence for $1.5 million, months after the Bangalore-based firm invested in Israeli venture capital firm TLV Ventures. “
The Czech Republic
“The government is scheduled on Wednesday to debate the national Industry 4.0 Initiative. The aim of the document is to promote the so-called fourth industrial revolution in the Czech Republic to ensure the country’s long-term competitiveness. According to the ministry, the document suggests possible measures that could boost the country’s economy and industry and includes plans to support investment and applied research and deals with issues related to the cyber security, logistics, and smart cities.”
“China’s pending cybersecurity law will not create obstacles for foreign business, China’s Foreign Ministry said, responding to concerns by international business lobbies over the planned rules. More than 40 global business groups last week petitioned Premier Li Keqiang, according to a copy of a letter seen by Reuters, urging China to revise draft cyber rules they believe are vague and discriminate against foreign enterprises.”
“A draft cybersecurity law in China could have serious implications for international banks, experts have warned. Opponents have claimed that the wide-reaching Cyber Security Law along with new insurance regulations would allow China access to proprietary systems and would also contravene WTO rules.”
“Cyber weapons allegedly were stolen from the US government’s National Security Agency (NSA) appeared in an online auction set up by a group calling itself the Shadow Brokers. Snowden, however, has warned this is not the work of a rogue hacking group, but rather the first move in a state-sponsored electronic war being waged by Vladimir Putin.”
“Measuring the true economic impact of security incidents on critical information infrastructures (CIIs) is extremely difficult, the European Union Agency for Network and Information Security (ENISA) concluded in a report released Aug. 10.”
“In calling for a Manhattan Project on cyber security author Marc Goodman laments that “We’ve wired the world, but failed to secure it.” Recent examples of computer systems faulting under attacks include Russian hackers allegedly leaking DNC emails, Oracles’ giant cash registry breach, and the Australian Bureau of Statistics nationwide census website being taken down.”
“Cyberattacks have become so common that they tend to fade from view. But for head-in-the-sand executives who believe they have better ways of spending their time and money, here’s a wake-up call. Just a few of the more notable cybersecurity dangers to hit the news in just the last week. Ignore them – and all the others – at your peril.”