Banks: Credit Card Breach at CiCi’s Pizza

"CiCi’s Pizza, an American fast food business based in Coppell, Texas
with more than 500 stores in 35 states, appears to be the latest
restaurant chain to struggle with a credit card breach. The data
available so far suggests that hackers obtained access to card data

Selasa, 14 Jun 2016
VK.com Data Breach Includes 100 Million Cleartext Passwords

A hacker has put up for sale 100,544,934 records he claims were stolen
from VK.com, a Russian-based social network. This is the same hacker who
had previously sold data dumps from MySpace, LinkedIn, Tumblr, and

Named Peace (or Peace_of_mind), the hacker is ask

Selasa, 14 Jun 2016
Iran-Saudi tensions erupt in 'cyberwar'

"Mainly Shia Iran and Saudi Arabia have long been regional rivals but
tensions worsened dramatically last year, partly because of the
conflicts in Syria and Yemen.

Within days of Gen Jalali's remarks, Iranian and Saudi hackers were
attacking websites in each oth

Selasa, 14 Jun 2016
US Visa Applicants Targets of Espionage Campaign with Qarallax RAT

"People who applied for a US visa in Switzerland complained about
receiving malware from an unknown person via Skype, posing as a US
government official guiding applications through the said process.

The victims said the person sent them a file named "US Travel Docs<

Selasa, 14 Jun 2016
Hire a DDoS Attack for as Little as Five Dollars

Fancy a career as a blackmailing cybercriminal but don’t have the
technical nous?

Don’t worry, you can easily find people all too willing to help you
embark on your life in cybercrime via popular freelance-hiring websites.
And, it seems, you may only need to

Rabu, 08 Jun 2016
Milwaukee Bucks Fall to Phishing Attack, Players’ W-2 Records Compromised

The Milwaukee Bucks confirmed that a phishing email scam resulted in
the NBA franchise disclosing the financial records of the team’s players
and staff.

In a statement made last week, the team said it has reported the
incident to the IRS and the FBI.


Rabu, 08 Jun 2016
LinkedIn is Latest Contributor to Breach Fatigue

Breach data markets used to be more cloak and dagger. Now the data is
a commodity. LinkedIn data is for sale on not just the dark web, but
also sites like Leaked Source who are selling what are essentially
day-passes to the data,” Hunt said.
“With dat

Rabu, 08 Jun 2016
What’s driving Silicon Valley to become ‘radicalized’

Like many Silicon Valley start-ups, Larry Gadea’s company collects
heaps of sensitive data from his customers.

Recently, he decided to do something with that data trove that was long
considered unthinkable: He is getting rid of it.
“We have to keep

Rabu, 08 Jun 2016
Can Google replace passwords by tracking you more thoroughly?

Google thinks it has the answer: build the biometric measurements into
the device and the operating system itself by tracking some, any or all
of how you type, speak, move, and otherwise conduct your online life…

…so that the device can vouch for you at any momen

Rabu, 08 Jun 2016
Canary Watch Project Runs Its Course

Warrant canaries aren’t definitive markers that a company has been
served with a National Security Letter or some other type of court order
mandating that customer information be turned over to a government
agency or law enforcement. But oftentimes, they are a strong indic

Rabu, 08 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: