Personal Cybersecurity #16: Daily news

What you need to know for your personal cyber security life… 

Number Sixteen in a series of semi-regular daily current and topical computer threats that may affect your online, or even offline, digital and real life. Why cyber-security on SurvivalRing? Because EVERYTHING you do in your life everyday now is a part of the cyber world…even your offline plans. So, be aware, and pay attention. The bad guys WILL eventually get around to YOU…personally…so be prepared for it, by staying in the loop.  

evil inside

# # #

Exclusive: France’s Snecma targeted by hackers – researcher

http://www.reuters.com/article/2014/02/18/us-hacking-snecma-idUSBREA1H1Z320140218

  • By JIM FINKLE
  • Reuters
  • Feb 18, 2014

French aerospace engine maker Snecma, a unit of Safran, was attacked by hackers who exploited a vulnerability in Microsoft Corp’s Internet Explorer, according to a computer security researcher.

It was not clear how successful the hackers had been in their efforts to breach Snecma’s network, according to the researcher, who has studied malicious software and infrastructure used by the hackers.

A spokeswoman for Snecma’s parent, Safran, said she had no immediate comment.

The researcher said the malicious software used by the hackers contained code that identified Internet domain names belonging to Snecma. The researcher declined to be identified by name as he was not authorized to publicly discuss the matter.

[…]

# # #

Cyber Threats debut on the flightline at Nellis Air Force Base’s Red Flag

http://theaviationist.com/2014/02/17/cyber-war-at-red-flag/

  • By David Cenciotti
  • The Aviationist
  • Feb 17, 2014

“Train as you fight, fight as you train” has always been Red Flag’s motto.

U.S. Air Force’s main exercise has to prepare aircrew and support personnel to fight modern war. In the air, on the ground, over the sea and in the cyberspace.

For the first time, the recent Red Flag 14-1 at Nellis Air Force Base featured a “contested, degraded or operationally limited” environment, or CDO, for maintainers, who were trained to cope with cyber vulnerabilities in the systems they use on the flightline.

Ground personnel are always using computers and brand new technologies that may be targeted by cyber attacks launched by tech-savvy adversaries: laptop used for aircraft maintainance and diagnosis, GPS systems, communication and network equipment are all high-value targets for enemy hacking teams. That’s why Red Flag maintainers receive academics on cyber vulnerabilities, information operations and other CDO-related threats.

[…]

# # #

Israel Electric Opens Cyber-War Room to Defend Against Power-Grid Hacks

# # #

Iranians hacked Navy network for four months? Not a surprise

http://arstechnica.com/information-technology/2014/02/iranians-hacked-navy-network-for-4-months-not-a-surprise/

  • By Sean Gallagher
  • Ars Technica
  • Feb 19 2014

In 2012, Iranian hackers managed to penetrate the US Navy’s unclassified administrative network, the Navy Marine Corps Intranet. While the attack was disclosed last September, the scale of it was not — the attack gave hackers access to the NMCI for nearly four months, according to an updated report by The Wall Street Journal.

Vice Adm. Michael Rogers, who is now President Barack Obama’s choice to replace Gen. Keith Alexander as both NSA director and commander of the US Cyber Command, led the US Fleet Cyber Command when the attack came to light. Rogers’ response to the attack may be a factor in his confirmation hearings.

Iranian hackers attacked NMCI in August of 2012, using a vulnerability in a public-facing website to gain initial access to the network. Because of a flaw in the security of the network the server was hosted on, attackers were able to use the server to gain access to NMCI’s private network and spread to other systems. While the vulnerability that allowed the attackers to gain access in the first place was discovered and closed by October, spyware installed by the attackers remained in place until November.

Officials said no e-mail accounts were compromised and no data was stolen in the attack. But it cost about $10 million to repair the damage done to the network’s systems — a process that included taking the whole network down twice for upgrades to systems and removal of malware.

[…]

 # # #

 

Updated: February 20, 2014 — 10:11 am

The Author

Rich Fleetwood

Rich is the founder of SurvivalRing, now in it's 24th year, author of multimedia CDs and DVDs, loves the outdoors, his family, his geeky skill-set, and lives in rural southern Wyoming, just below the continental divide (long story, that...). Always ready to help others, he shares what he learns on multiple blogs, many social sites, and more. With a background in preparedness and survival skills, training with county, state, and national organizations, and skills in all areas of media and on air experience in live radio and television, Rich is always thinking about the "big picture", when it comes to helping individuals and families prepare for life's little surprises.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.