Jan Winter

437 Flips | 7 Magazines | 9 Likes | 112 Followers | @janwinternl | Keep up with Jan Winter on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jan Winter”

Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking

TENERIFE, Spain—The massive hack against Sony in late 2014 was sudden and loud. The perpetrators made themselves known four days before Thanksgiving …

OPM Hackers Netted Usernames, Social Security Numbers Years Ago

When a foreign power as early as 2013 first hacked the Office of Personnel Management and retrieved IT manuals for its network, swept up in the heist …

Social Security

Ikan Parende Feat Arman Manila

New OPM Cyber Chief Is Bracing for an ISIS Hack

The U.S., said the agency's first-ever senior cyber and information technology adviser, has to 'assume that at some point in time they may be …

Social Security

The Chinese didn’t just hack federal employees. Journalists were swept up in the massive breach, too.

By Lisa Rein<p>Lisa Rein<p>Reporter covering federal agencies and the management of government in the Trump administration<p>Email Bio Follow<p>The government is notifying journalists who are accredited by federal agencies that their personal information may have been stolen by the Chinese, another sign of the …

Social Security

Who Has The Chinese Government Arrested For Hacking OPM? Possibly No One.

On December 1st, Attorney General Loretta E. Lynch and Department of Homeland Security Secretary Jeh Johnson, together with Chinese State Councilor …

Resep Satai Padang

OPM mishandled contract for identity protection services, IG says

The Office of Personnel Management (OPM) got hammered yet one more time for breaches that laid the agency low earlier this year as a report from the …

China's Great Cannon

This post describes our analysis of an attack tool that we identify as separate from, but co-located with, the Great Firewall of China.

Do attribution and motives matter? - Help Net Security

Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, …

Cybersecurity

Attribution: OPM vs Sony

I read Top U.S. spy skeptical about U.S.-China cyber agreement based on today's Senate Armed Services Committee hearing titled United States …

Politically oriented cyber attacks expected to increase: Tripwire

The cyber attack launched earlier this week against several Russian governmental agencies, tied to the internet security issues discussed by the U.S. …

Disconcerting U.S. Cyber Deterrence Troubles Continue

Two weeks ago the newspapers were filled with leaked threats that the U.S. government was “developing a package of unprecedented economic sanctions …

Blue Termite APT group focuses on Japanese organizations

Security experts at Kaspersky Lab have analyzed the cyber attacks run by the Blue Termite APT, a hacking crew group focused on Japanese organizations.<p>…

Chinese Hackers Use US Servers In Cyber Attacks

Chinese-government linked hackers are using American computer services companies in conducting cyber attacks against private company networks, …

Closing the Case on the Reported 2008 Russian Cyber Attack on the BTC Pipeline

An article released today in Sueddeutsche (the largest German national daily newspaper) by Hakan Tanriverdi revealed new information that further …

Dusting for Beijing's Digital Fingerprints

American officials are still trying to calculate the damage from a massive hack of the Office of Personnel Management that resulted in the loss of …

T​elstra CISO blasts cyber 'attribution distraction'

Don't worry so much about who it was that attacked you, or how smart they were. Look to the problems with your own defence strategies, Telstra CISO …

Malware Evolution Calls for Actor Attribution? — Krebs on Security

What makes one novel strain of malicious software more dangerous or noteworthy than another? Is it the sheer capability and feature set of the new …

Why We Can't Afford To Give Up On Cybersecurity Defense

There is no quick fix, but organizations can massively reduce the complexity of building secure applications by empowering developers with four basic …

Harvard National Security Journal – Cybersecurity and National Policy

<b>**On January 10, this essay was nominated for the Third Annual Social Security Blogger Awards. Visit</b> …

An Irrelevant Thesis

This week The Diplomat published an article by Dr Greg Austin titled What the US Gets Wrong About Chinese Cyberespionage. The subtitle teases the …

Proxy Wars in Cyber Space: The Evolving International Law of Attribution

I(II) Fletcher Security Review 55-73 (2014)<p>23 Pages Posted: 1 Feb 2014 Last revised: 16 Aug 2014<p>Naval War College - Stockton Center for the Study of …

Five Reasons Attribution Matters

Attribution is the hottest word in digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here …

Opinion: Security firm’s Iran report mostly hype

A new report from the security firm Norse that claims growing Iranian cyberattacks on critical infrastructure relies on questionable data. It's the …

APT 30 and the Mechanics of a Long-Running Cyber Espionage Operation

Having some of the world’s most active economies, Asia Pacific countries are more likely to be a target of targeted attacks than the rest of the …

Russian government hacked the White House, claims report

Author:<p>Published<p>in Data loss, Law & order, Malware, Privacy, Vulnerability 1<p>CNN has published a report claiming that hackers, backed by the Russian …

Pin-pointing China's attack against GitHub

For the past week, the website "GitHub" has been under attack by China. In this post, I pin-point where the attack is coming from by doing an</i> …