Risk Radar Free Cyber Newsletter – Dec 13, 2016

Obama orders intel probe of election hacks
President Obama has ordered an intel probe of the alleged election hacking. There is also a bipartisan investigation taking place in the senate. The potential for nation state hacking to influence another countries election is there. The investigations will be trying to source the attacks and provide lessons learned for the future.
Popcorn Time Ransomware Urges Victims to Infect Others
Would you infect two others with ransomware to get your files decrypted? Popcorn Time ransomware is giving people this option. This ransomware can also delete encrypted files if the decryption code is put in wrong 4 times. I think these developers work for Negan.

Request the Ransomware Epidemic whitepaper from 4D5A Security for more information on how to defend against ransomware

Apple Fixes 12 Vulnerabilities in iOS 10.2
The latest iOS version patches 12 vulnerabilities for the iPhone. Two important vulnerabilities that can lead to arbitrary code execution have been patched. Sounds like an importance update, make sure to get it if you have an iPhone.

Americans Say Cyber-Attacks Are a Threat But Don’t Protect Themselves
If you do some basic to intermediate threat mitigation you will be well ahead of the crowd. While more Americans seem to be aware of information security attacks the majority are not taking the basic precautions to defend against them. The article gives some good options to be more secure than the average American.
Mobile Subscribers Unaware of the Threats Facing Them
Mobile devices users think they are better protected on their mobile networks than they really are. Most users do not even check their monthly billing to see if a suspicious charge has been added. With security becoming more important to users there is an opportunity for mobile networks lock in customers, even if these customers are not aware of all the threats they face.
84% of Phishing Sites Last for Less Than 24 Hours
One of the reasons phishing emails are so prevalent is due to how the phishing sites are operated. The sites can be up for as little as 15 minutes and most no longer than 24 hours. This limits the effectiveness of blacklisting and other old techniques against phishing sites.