Copy
Newsletter: Cyber Security Pulse. Insights about security.

2015 | November 26th. New issues are delivered every week. In this issue:

Analyst Insight

Airlines Also Targeted by Cyberattacks and Data Breaches


Airlines and travel services merchants are being targeted by cybercrime. Credentials with access rights to systems or loyalty cards are a valued commodity for resale on the black market. Malware families, phishing campaigns, vulnerabilities or mobile applications trying to impersonate airlines companies have already been detected. In this sense, these companies are in trouble when they need to identify fraudulent transactions made in the internet since users are not present when the payment is authorized.

At the same time, there are other threats that may affect the regular functioning of the airline activity and the discomfort of passengers: hacktivist and activist attacks or data breaches with personal records can result in high financial compensation. Therefore, to minimize the risks of these companies, the measures to be implemented should be oriented to the modeling of fraudulent transactions in early detection systems and to an automated monitoring service focused on those other internet threats to be found outside of them.
 

Top Stories

Critical Infrastructures, Without Adequate Cybersecurity Metrics




A report released by Government Accountability Office (GAO) about the existence of metrics to evaluate the cybersecurity measures taken by the industries which deal with critical infrastructures has revealed that 12 out of the 15 industries analyzed did not have appropriate cybersecurity metrics. In this regard, the lack of metrics to evaluate the effectiveness of the efforts conducted in the protection of these facilities is a prominent risk in the identification of the elements that need real protection. The authors of this report have also highlighted the importance of not being reluctant to sharing information with the private sector so as to develop these capabilities.

More information at US GAO


Fight Vs. Daesh Also Boosts Cybersecurity Budgets




Following the attacks in Paris on November 13, the effects have alsho shaken the cyberspace. While some governments such as France and the UK have launched protocols to strengthen their technical capabilities, hacktivist groups linked to Anonumous have also announced the resumption of the offensive actions against the orbit of the Islamic State in the network, especially in areas related to the fight against propaganda. Some experts like Robert Pritchard limited the Cyber Caliphate capabilities to taking part in defacement and denial of service attacks as well as the hi-jacking of high-level social networks profiles. In this regard, these actions have already been enough to shut down the services of institutions such as the one that knocked off air the French TV station TV5 monde for about 18 hours.

More information at The CyberSecurity Expert

Rest of the Week´s News

Check If Your Dell Is Affected


The Inspiron 5000, XPS 15 and XPS 13 models of Dell are being shipped with a certificate preinstalled that lets websites slurp up the machine's exact specifications, warranty status, and other details without the user knowing. This information could be used to biuld a fingerprint that potencially identifies a person while she browses across the web. Ir can be abused by phishers and scammers, who can quote the information to trick victims into thinking they are talking to legit Dell employees.
More information at The Verge

Chimera Ransomware Uses Peer-to-Peer for Decryption


A recent Chimera ransomware operation used a peer-to-peer messaging system, known as BitMessage, to communicate with the criminals' command-and-control server with the aim to hinder further investigations. On the other hand, researchers have demostrated how easy is to infect Smart TVs and also medical devices showing that the ransomware jump to these platforms is just a matter of time.

More information at Eweek and
Security Affairs
 

Increase the Production and Sale of ATM Skimmers and PoS Modified


The cybersecurity company Trend Micro has published  a report about the growth of the underground markets entitled The Chinese Cybercriminal Underground in 2015. The report describes the increased underground activity linked to the capture of financial information and the production (and sale) of new hardware like Point-of-Sale (PoS) and Automated Teller Machine (ATM) skimmers designed to capture this information.

More information at PCWorld

Further Reading

New Utilities on Destover Malware


More information at SCMagazine
 

Pearson VUE and Starwood Hotels Breached


More information at SCMagazine and
Krebs on Security
 

How Comcast Alerts About Copyrighted Material


More information at ZDNet
 
Website
LinkedIn
Twitter
YouTube
Facebook
Instagram
Copyright © 2015 ElevenPaths. Todos los derechos reservados.
Telefónica Digital Identity & Privacy, S.L.U. es una empresa española con sede social en Distrito Telefónica, Ronda de la Comunicación, s/n, 28050 – Madrid (España), con número de identificación fiscal (CIF) B-86362886 e inscrita en el Registro Mercantil de Madrid, volumen 29508; libro 0; folio 12, Sección 8; Hoja M-531046. Para cualquier información relativa al tratamiento digital de sus datos personales para ejercer su derecho de consulta, modificación o borrado, puede ponerse en contacto con nosotros mediante el correo electrónico contact@support.elevenpaths.com.