Identifying People Using Cell Phone Location Data

The two people who shut down four Washington power stations in December were arrested. This is the interesting part:

Investigators identified Greenwood and Crahan almost immediately after the attacks took place by using cell phone data that allegedly showed both men in the vicinity of all four substations, according to court documents.

Nowadays, it seems like an obvious thing to do—although the search is probably unconstitutional. But way back in 2012, the Canadian CSEC—that’s their NSA—did some top-secret work on this kind of thing. The document is part of the Snowden archive, and I …

Continue reading Identifying People Using Cell Phone Location Data

Arresting IT Administrators

This is one way of ensuring that IT keeps up with patches:

Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack by alleged Iranian hackers.

Prosecutors said the five IT officials of the public administration department had failed to check the security of the system and update it with the most recent antivirus software.

The next step would be to arrest managers at software companies for not releasing patches fast enough. And maybe programmers for writing buggy code. I don’t know where this line of thinking ends…

Continue reading Arresting IT Administrators

Fleeing Twitter users face uncertain privacy, security features on alternative platforms

Users are leaving Elon Musk’s Twitter in droves but risk seeing their data exposed on niche, less resourced platforms.

The post Fleeing Twitter users face uncertain privacy, security features on alternative platforms appeared first on CyberScoop.

Continue reading Fleeing Twitter users face uncertain privacy, security features on alternative platforms

Group indicted for breaching CPA, tax preparation firms via stolen credentials

United States Attorney Roger B. Handberg announces the partial unsealing of an indictment charging eight individuals with Racketeer Influenced and Corrupt Organizations (RICO) conspiracy. Four have also been charged with wire fraud conspiracy and aggra… Continue reading Group indicted for breaching CPA, tax preparation firms via stolen credentials

Many public safety agencies remain unequipped to defend against cyberattacks

Less than half of respondents in a survey of first responders said their agencies are “at least somewhat prepared in case of a cyberattack.”

The post Many public safety agencies remain unequipped to defend against cyberattacks appeared first on CyberScoop.

Continue reading Many public safety agencies remain unequipped to defend against cyberattacks

Hacking Automobile Keyless Entry Systems

Suspected members of a European car-theft ring have been arrested:

The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away.

As a result of a coordinated action carried out on 10 October in the three countries involved, 31 suspects were arrested. A total of 22 locations were searched, and over EUR 1 098 500 in criminal assets seized.

The criminals targeted keyless vehicles from two French car manufacturers. A fraudulent tool—marketed as an automotive diagnostic solution, was used to replace the original software of the vehicles, allowing the doors to be opened and the ignition to be started without the actual key fob…

Continue reading Hacking Automobile Keyless Entry Systems

What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare

At the recent meeting of the North Atlantic Council in Madrid, NATO heads of state agreed to boost resilience to cyber and hybrid threats. NATO members will strengthen their cyber defenses through enhanced civil-military cooperation, and expand industr… Continue reading What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare