Another interesting week for news, so let’s get to it.
- First story of the week is another TOR related article. Seems like we are seeing a lot more of these in recent weeks as a result of some of the more publicized attacks on the TOR network. This one is a good read as it covers a report commissioned by the TOR authors that audited the security of the TOR browser bundle.
- Read More @ http://threatpost.com/tor-browser-hardening-features-under-scrutiny/107839
- Next, an article on a new tool created by a couple of Carnegie Mellon University researchers that uses machine-learning and data mining techniques to try and predict breaches before they happen. Not sure how useful this will be, in reality, but a very interesting read either way.
- Read More @ http://www.dailydot.com/technology/website-hack-prediction-big-data-carnegie-mellon/
- Next, the obligatory, weekly “another breach” article. Granted this one actually occurred a while back it still counts. Lucky winner this week is UPS.
- Read More @ http://time.com/3151681/ups-hack/
- Next, something a bit different. “Backoff” point-of-sale malware has been in the spotlight as of late, and Trustwave has a Q&A to provide a bit of info on this threat.
- Read More @ https://www.trustwave.com/Resources/Trustwave-Blog/Behind-the-scenes-of-Backoff–A-Q-A-on-the-latest-malware-danger/
- Next, an article on an interesting new technique used to bind malware to legitimate software. Interesting aspect of this is that it doesn’t do any code modification. This attack is still in research stages though, but an interesting read still.
- Read More @ http://gizmodo.com/a-new-attack-secretly-binds-malware-to-legitimate-softw-1624894033?linkId=9347828