Security Alerts & News
by Tymoteusz A. Góral

#176 Internet of Things (IoT) to be used as spy tool by governments
James Clapper, the US director of national intelligence, told lawmakers Tuesday that governments across the globe are likely to employ the Internet of Things as a spy tool, which will add to global instability already being caused by infectious disease, hunger, climate change, and artificial intelligence.
#175 Cyber-thieves steal Pin codes from US Revenue
The US government's tax collection agency has said attackers fooled its computers into generating more than 100,000 tax return Pin codes. The codes could have been used to seek payouts had the scam not been detected. The Internal Revenue Service (IRS) said no personal taxpayer data had been compromised or disclosed by its systems.
#174 Google alpha-tests cloud events feature
Google is testing out a feature that allows changes in cloud services to automatically trigger other events, making it easier for developers to build richer services.
#173 Gmail to warn you if your friends aren’t using secure email
The alterations are fairly subtle: when you receive a message from, or are on the brink of sending a message to, someone using a service that doesn’t support encryption, you’ll see a broken lock in the top-right of the screen. Clicking on the icon will bring up a pop-up alert with an explanation and a warning to perhaps consider removing the offending recipient.
#172 Amazon's new cloud engine has a zombie apocalypse clause
Under section 57.10 of the AWS service terms, it notes that Lumberyard is not intended for use with life-critical or safety-critical systems, "however, this restriction will not apply in the event of the occurrence (certified by the United States Centers for Disease Control or successor body) of a widespread viral infection transmitted via bites or contact with bodily fluids that causes human corpses to reanimate and seek to consume living human flesh, blood, brain or nerve tissue and is li
#171 Loki - Simple Indicators of Compromise Scanner (IOC)
Scanner for Simple Indicators of Compromise. Detection is based on four detection methods: File Name IOC, Yara Rule Check, Hash check, C2 Back Connect Check.
#170 Hearthstone add-ons, cheating tools come with data-stealing malware
Hearthstone, a free-to-play card game based on World of Warcraft, has been indirectly targeted by malware authors. These attackers have created third-party programs that supposedly benefit Hearthstone players, but in reality can compromise their computers with malicious software.
#169 Poseidon: a targeted attack boutique specializing in global cyber-espionage
Poseidon’s practice of being a ‘custom-tailored malware implants boutique’ kept security researchers from connecting different campaigns under the umbrella of a single threat actor. This approach entails crafting campaigns components on-demand and sometimes fabricating entirely unique malicious artifacts.
#168 Microsoft Security Bulletin Summary for February 2016
This month the vendor is releasing 13 bulletins, six of which are rated Critical.
#167 How satellites could soon play a bigger role in broadband
A series of three new satellites will provide faster internet speeds across the globe, delivering a more than twice the total combined network capacity of the 400 commercial communications satellites in space today.
#166 Xero partners with Microsoft to enable big data collection
Cloud accounting firm Xero has teamed up with Microsoft to provide an avenue for its customers to collect and collate its own big data across Xero's software and other integrated business applications, via Microsoft Power BI.
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12