Daniel Gifford

Posts by Daniel Gifford

The Data Brokers: Selling Your Personal Information- 9 March 2014

9 March 2014- By Steve Kroft- “Sixty Minutes” A segment on Sixty Minutes details the business of information brokers, who acquire and compile data on billions of consumers, and repackage that data for sale to other parties.

Market watchdog warns on danger of cyber attack- 24 August 2014

24 August 2014- by Sam Fleming- “Financial Times” The Chairman of the Board of the International Organisation of Securities Commissions (IOSCO) has predicted that the next “Black Swan” event will take the form of a cyber attack on financial players … Continue reading

In India, an App for Chats and for Keeping Secrets- 25 August 2014

25 August 2014- By Saritha Rai- “The New York Times” A new messaging app, called Hike, has become popular among Indian teens because of the fine grained control the app gives users  in regards to who can see what kinds … Continue reading

California Governor Signs Law Requiring a ‘Kill Switch’ on Smartphones- 25 August 2014

25 August 2014- By Brian Chen- “The New York Times” In an effort to reduce cell phone theft, California Governor Jerry Brown signed a law requiring cell phone manufacturers to include a “kill switch” functionality on their devices, allowing them … Continue reading

Facebook is Cracking Down on Click-Bait- 26 August 2014

26 August 2014- By Gail Sullivan- “The Washington Post” Facebook has announced efforts to reduce the amount of gratuitous click-bait that is seen in user feeds. This is in response to user discontent with the low quality of this genre … Continue reading

The Chief Technology Officer of the United States is leaving. What now?- 25 August 2014

25 August 2014- by Nancy Scola- “The Washington Post” The nation’s current “Chief Technology Officer”, Todd Park, is resigning his position. Mr Park will remain associated with the Obama Administration, and is the second technologist to hold the role.

Researchers Present Evidence Smart Phone Gyroscopes Can Be Used to Record Speech- 14 August 2014

14 August 2014- By Andy Greenberg- “Wired” Researchers have presented a proof of concept at the USENIX security conference which shows the feasibility of eavesdropping on nearby conversations using the gyroscope included in smartphones. This is especially concerning because in … Continue reading

Cell-Phone Data Might Help Predict Ebola’s Spread- 22 August 2014

22  August 2014- By David Talbot- “MIT Technology Review” Using cell phone data provided by carriers, researchers have been able to map population movement in West Africa. This data could provide important assistance to the medical community as they attempt to … Continue reading

New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques- 14 August 2014

14 August 2014 by Etay Maor- “IBM’s Security Intelligence” A new version of the Bugat/Cridex/Feodo/Geodo malware family has adopted techniques of HTML injection used in the highly successful but now largely defunct GameOver Zeus botnet. The new versions have been … Continue reading

UPS Stores hacked, possibly compromising user data 20 August 2014

20 August 2014 by Dara Kerr- “CNET” UPS has disclosed a malware attack on at least 51 of its branch locations which has resulted in the possible compromise of consumer credit and debit card information. An incident response company has … Continue reading

Twitter Steps Up, Suspends Accounts That Share Horrific Beheading Video- 20 August 2014

20 August 2014 by Issie Lapowsky- “Wired” Twitter has announced plans to suspend any accounts which share the video of the beheading of journalist James Foley at the hands of the Islamic State. This marks a continuing evolution in policy … Continue reading

How to Break Cryptography With Your Bare Hands- 20 August 2014

20 August 2014 by David Talbot- “MIT Technology Review” Researchers have found a new method of breaking encryption, by measuring the electrical potential changes in the chassis of the device as it performs cryptographic operations. The attack can even be … Continue reading

New Site Recovers Files Locked by Cryptolocker Ransomware- 6 August 2014

6 August 2014- By Brian Krebs- KrebsOnSecurity.com New Site Recovers Files Locked by Cryptolocker Ransomware. FireEye and Fox-It have collaborated to help out the hundreds of thousands of users worldwide who fell victim to the Cryptolocker ransomware.  Users simply need … Continue reading

Russian Hackers Amass Over a Billion Internet Passwords- 5 August 2014

5 August 2014- by Nicole Perlroth and David Gelles- New York Times Russian Hackers Amass Over a Billion Internet Passwords. A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password … Continue reading

New Malware Operates Entirely from the Registry Using No Files- 31 July 2014

31 July 2014- by Paul Rascagnères- GDATA SecurityBlog Poweliks: the persistent malware without a file. Malware has been discovered which operates exclusively from the victim machine’s registry, posing problems for some of the dominant remediation paradigms. The malware also uses a … Continue reading

The Social Laboratory: Singapore’s Experience with Surveillance and Big Data- 29 July 2014

29 July 2014- by Shane Harris- Foreign Policy The Social Laboratory. Singapore is testing whether mass surveillance and big data can not only protect national security, but actually engineer a more harmonious society. This essay explores Singapore’s mass surveillance and data-mining apparatus, … Continue reading

Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers- 15 July 2014

15 July 2014- by Andy Greenberg- “Wired” Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers. Google has put together a team of renowned vulnerability researchers who will work to find and secure vulnerabilities in software and protocols not made or … Continue reading

Israel’s Channel 10 TV Station Hacked by Hamas- 16 July 2014

16 July 2014- by “Waqas”- “HackRead” Israel’s Channel 10 TV Station Hacked by Hamas. Hamas has attacked the satellite uplink used by Israeli channel 10, in a broadcast signal intrusion incident. This is the second such attack, the first being … Continue reading

Crowdstrike Attributes Hacking Attacks to PLA Unit 61486- 9 June 2014

9  June 2014- by Nathaniel Hartley- “Crowdstrike Blog” Hat-tribution to PLA Unit 61486. Crowdstrike has attributed a number of hacking attacks on the US and European defense, aerospace and satellite industries to a Chinese military unit. Among the evidence presented … Continue reading

Microsoft Research Paper on Individual Password Management- 1 July 2014

1 July 2014- by Dinei Florencio, Cormac Herley, and Paul C. van Oorschot- “Microsoft Research” Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. Microsoft researchers have published a paper, to be presented at the USENIX Security 2014 conference … Continue reading