General Cyber News via Ars Technica Risk Assessment

Obama reportedly ordered implants to be deployed in key Russian networks

Covert program draws on the NSA, CIA, and US Cyber Command.
Publish Date: 6/23/2017
read more -->

Check Point says Fireball malware hit 250 million; Microsoft says no

Either way, Microsoft assures us that Windows 10 S would have been immune.
Publish Date: 6/23/2017
read more -->

How the CIA infects air-gapped networks

Sprawling “Brutal Kangaroo“ spreads malware using booby-trapped USB drives.
Publish Date: 6/22/2017
read more -->

Honda shuts down factory after finding NSA-derived Wcry in its networks

Automaker briefly stops making cars to contain worm that first struck in May.
Publish Date: 6/21/2017
read more -->

More Android apps from dangerous Ztorg family sneak into Google Play

Almost 100 such apps, with >1 million downloads, found so far (but not by Google).
Publish Date: 6/20/2017
read more -->

Web host agrees to pay $1m after it’s hit by Linux-targeting ransomware

Windfall payment by poorly secured host is likely to inspire new ransomware attacks.
Publish Date: 6/19/2017
read more -->

Serious privilege escalation bug in Unix OSes imperils servers everywhere

“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.
Publish Date: 6/19/2017
read more -->

How to install Linux on a Chromebook (and why you should)

Crouton and Gallium OS turn Chromebooks into Linux laptops.
Publish Date: 6/19/2017
read more -->

Google Play is fighting an uphill battle against Android adware

Google hasn’t yet removed all of the apps, which have as many as 6 million downloads.
Publish Date: 6/16/2017
read more -->

Advanced CIA firmware has been infecting Wi-Fi routers for years

Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
Publish Date: 6/15/2017
read more -->

Login-stealing phishing sites conceal their evil with lots of hyphens in URL

Compromised domains target Android users with fake login pages for cloud services.
Publish Date: 6/15/2017
read more -->

Georgia’s lax voting security exposed just in time for crucial special election

Report uncovers a litany of lapses in voting system used state-wide.
Publish Date: 6/15/2017
read more -->

Fileless malware targeting US restaurants went undetected by most AV

Ongoing campaign shows more hackers are adopting sneaky attack technique.
Publish Date: 6/14/2017
read more -->

Microsoft’s decision to patch Windows XP is a mistake

There will always be one more emergency.
Publish Date: 6/14/2017
read more -->

Win XP patched to avert new outbreaks spawned by NSA-leaking Shadow Brokers

Company warns of “destructive cyberattacks” as it tries to prevent another WCry.
Publish Date: 6/13/2017
read more -->

Russia struck at election systems and data of 39 US states

Investigators find evidence attackers tried to modify voter data, reports Bloomberg.
Publish Date: 6/13/2017
read more -->

Facing limits of remote hacking, Army cybers up the battlefield

Army prepares for a less friendly electronic battlespace, embeds cyber in units.
Publish Date: 6/13/2017
read more -->

Found: “Crash Override” malware that triggered Ukrainian power outage

Attack tools can be used against a broad range of electric grids around the world.
Publish Date: 6/12/2017
read more -->

Banking trojan executes when targets hover over link in PowerPoint doc

Novel infection method doesn't require link to be clicked.
Publish Date: 6/9/2017
read more -->

Sneaky hackers use Intel management tools to bypass Windows firewall

Serial ports don’t have firewalls.
Publish Date: 6/9/2017
read more -->