Daniel Gifford

Posts by Daniel Gifford

Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers- 15 July 2014

15 July 2014- by Andy Greenberg- “Wired” Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers. Google has put together a team of renowned vulnerability researchers who will work to find and secure vulnerabilities in software and protocols not made or … Continue reading

Israel’s Channel 10 TV Station Hacked by Hamas- 16 July 2014

16 July 2014- by “Waqas”- “HackRead” Israel’s Channel 10 TV Station Hacked by Hamas. Hamas has attacked the satellite uplink used by Israeli channel 10, in a broadcast signal intrusion incident. This is the second such attack, the first being … Continue reading

Crowdstrike Attributes Hacking Attacks to PLA Unit 61486- 9 June 2014

9  June 2014- by Nathaniel Hartley- “Crowdstrike Blog” Hat-tribution to PLA Unit 61486. Crowdstrike has attributed a number of hacking attacks on the US and European defense, aerospace and satellite industries to a Chinese military unit. Among the evidence presented … Continue reading

Microsoft Research Paper on Individual Password Management- 1 July 2014

1 July 2014- by Dinei Florencio, Cormac Herley, and Paul C. van Oorschot- “Microsoft Research” Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. Microsoft researchers have published a paper, to be presented at the USENIX Security 2014 conference … Continue reading

The WIP and CNS are hosting #LocalVoicesTalk about Women in Islam, a Twitter event.

On Thursday, July 24, The WIP and the James Martin Center for Nonproliferation Studies will co-host Twitter chat “Women in Islam: Myth vs. Reality.” Join the conversation from 9:30 am – 10:30 am PDT on Twitter. #LocalVoicesTalk.  There will also be a workshop … Continue reading

How Russian Hackers Stole the Nasdaq- 17 July 2014

17 July 2014- by Michael Riley- “Bloomberg Businessweek” How Russian Hackers Stole the Nasdaq. A review of an incident, still not wholly resolved within the public domain, wherein hackers of possible Russian origin gained access to the operating code for … Continue reading

Apple hits back at China over iPhone privacy claims- 14 July 2014

14 July 2014- by Kevin Rawlinson- “BBC News” Apple hits back at China over iPhone privacy claims. Apple has responded to claims by researchers in China that the IPhone IOS 7 threatens Chinese national security through the “Frequent Locations” feature, … Continue reading

Chinese Hackers Pursue Key Data on U.S. Government Workers- 9 July 2014

9 July 2014- By Michael S. Schmidt, David E. Sanger, and Nicole Perlroth- “The New York Times” Chinese Hackers Pursue Key Data on U.S. Government Workers. The Office of Personnel Management has apparently had its servers and databases breached by … Continue reading

Smart LED light bulbs leak wi-fi passwords- 8 July 2014

8 July 2014- by Jane Wakefield- “BBC News” Smart LED light bulbs leak wi-fi passwords. Context Security has released details of a security lapse in the design of the LIFX LED light bulb, which allow users to remotely control their … Continue reading

EFF sues NSA over the “hoarding” of zero-day security bugs- 2 July 2014

2 July 2014- by Lain Thompson- “The Register” EFF sues NSA over snoops ‘hoarding’ zero-day security bugs. The controversy over the purchase of zero-day flaws has expanded with a new lawsuit by the EFF against the NSA for their practices. … Continue reading

Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC

A recent report from the MS-ISAC (Multi-State Information Sharing Analysis Center) and written by CIS (Center for Internet Security, a private nonprofit) publicized by security journalist Brian Krebs addresses a series of concerns regarding an infrastructure hacker who calls himself “Sun Hacker” … Continue reading

Turkey Thrashes Twitter, Leaks put Gov in a Twist

Amid deepening corruption scandals in Turkey, the Turkish Government has shut down access to a number of social media outlets, most recently Twitter, after Twitter failed to comply with their demands to censor links to wiretapped conversations of the inner … Continue reading

Commerce Dept. Cans ICANN

The US Government is winding down their participation in the Internet Corporation for Assisgned Names and Numbers (ICANN). ICANN’s duties include setting policies for domain names, top level domains, and controlling the root nameservers that are the backbone of the … Continue reading

Point of Sale Target’ed, Millions of Credit Cards Scraped.

Early in December rumors began bouncing across cyberspace that retail giant Target had been hit in an extensive cybercrime scheme, wherein point of sale devices, (read here cash registers) had been infected with a program designed to steal credit card … Continue reading

Hotels May Become New Data Breach Point

A data breach appears to have hit White Lodging, a firm which manages hotel franchises for the Marriott, Hilton and Starwood Hotel chains. As reported by Brian Krebs, The breach appears to have struck computers in the restaurants and gift … Continue reading

New White House Initiative Pledges $750 Million for Student Technology

A new corporate initiative spearheaded by the White House has assembled a war chest of $750 million through donations from the business sector. The money will be used to ensure that “99 percent” of students receive strengthened access to technology … Continue reading

Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset

Amid continuous revelations of a variety of “Advanced Persistent Threat” (APT) hacking operations sponsored by nation states–among them Flame/Gauss/Duqu/Stuxnet, Red October, Comment Crew, Shamoon, Icefog and Dark Seoul– the major global players such as the US, Russia, and China have … Continue reading

The Syrian Electronic Army: Mediums of Disinformatics

“We are just Syrian youths who want to defend their country against the media campaign that is full of lies and fabricated news reports” The Syrian Electronic Army (SEA) most likely began at least in part as an outgrowth of … Continue reading

Successor to Blackhole Exploit Kit May Take Years to Emerge

The arrest of Paunch shut off the flow of updates to the highly popular crimeware infastructure support tool, the Blackhole Kit. Since then there have been a number of contenders for the lucrative crown. A new article at Threatpost speaks … Continue reading

FBI Asking Tech Vendors to Install Backdoors

Wickr’s Nico Sell has disclosed in a PCMag article that she was approached by the FBI at a security conference, and that an agent casually asked if she would be willing to install a backdoor for them in her company’s … Continue reading