Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Daily news digest – 26th November 2013

by The Gurus
November 26, 2013
in Opinions & Analysis
Share on FacebookShare on Twitter

When Time magazine announces its “person of the year” for 2013, it could do worse than to follow its two “objects” of 1982’s computer and 1988’s planet earth with the BitCoin.
 
With stories of hyperinflation to Silk Road, the internet-based currency, the humble BitCoin has had plenty of headlines in 2013 and in the past few days, this has not abated. For example, the Register reported that the soaring price of BitCoin has prompted the owners of the CryptoLocker malware to reduce the levy they impose on victims from 2 BTC to 0.5 BTC as they are making too much money.
 
The change, spotted by F-Secure, found that those behind the scam are simply following regular business practices ultimately geared at maximising the return from their activities, while the owners also battle with a value of $1,400 per BitCoin. They may also be considering the chances of being tracked more by law enforcement as the amount to be paid rapidly increases, that is if law enforcement are not on to them already.
 
In other BitCoin news, it was reported that the payment processor for merchants and free online wallet service was the target of a major distributed denial-of-service attack and subsequent theft that saw 1.295 BitCoins stolen, around $1 million. At the old price of $300 per coin, that would have come out at $388.500,
 
The CEO of the Danish processor BIPS said that the funds were “from the company’s own holdings” and while the theft was not due to any vulnerability in the code of its “hot wallet” and no clients were affected, it does mark a significant loss.
 
The DDoS attack occurred on 15th November with the theft on 17th November which disabled the site, overloaded managed switches and disconnected the iSCSI connection to the SAN on BIPS servers. In a statement, it said that this was enabled “despite several layers of protection”. It took until the 22nd November to fully restore all services.
 
Hardly a Bonnie & Clyde or George Nelson case, but the days of holding up the bank with a gun or mobile phone are past us if the valuable currency is traded online. In the case of BIPS, a sophisticated attack and blind-side DDoS was all it took for a cool million to be pocketed. My question is if this is a digital currency can it not be tracked? Then again if it is, surely the criminals will use mules and obfustication to cover their tracks.
 
In other financial news, it was announced today that the first stage of a health check of the FTSE 350 found that most (56 per cent) say their boards “never” or “rarely” review the information to confirm the legal, ethical and security implications of retaining their key data assets.
 
It also found that only 19 per cent regularly receive intelligence about who might be targeting the organisation, or what their methods and motives are, from their company’s senior cyber risk executive, and three-quarters do not feature cyber risk on their organisations’ board update. In fact, only 17 per cent feel that their boards have clearly set and understood the appetite for cyber risk , while more than a third of respondents said they were “anxious” or “very anxious” about their company’s ap
proach.
 
The second stage of the health check is planned for later in 2013, and will involve a cyber diagnostic component.
 
Is that going to be enough to protect assets, and if a payment processor can be smashed and grabbed, then risk needs to be more recognised before a major attack is attempted and succeeds against one of these firms.

FacebookTweetLinkedIn
Tags: attackBitCoinDDoSfinancial services
ShareTweetShare
Previous Post

CERTs under the microscope

Next Post

Ask Dan Raywood version 2

Recent News

Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information