Received: from relay.hackingteam.com (192.168.100.52) by EXCHANGE.hackingteam.local (192.168.100.51) with Microsoft SMTP Server id 14.3.123.3; Thu, 25 Jun 2015 12:59:47 +0200 Received: from mail.hackingteam.it (unknown [192.168.100.50]) by relay.hackingteam.com (Postfix) with ESMTP id E20F46005F; Thu, 25 Jun 2015 11:34:59 +0100 (BST) Received: by mail.hackingteam.it (Postfix) id 0DD354440B3E; Thu, 25 Jun 2015 12:58:23 +0200 (CEST) Delivered-To: info@hackingteam.com Received: from manta.hackingteam.com (manta.hackingteam.com [192.168.100.25]) by mail.hackingteam.it (Postfix) with ESMTP id 0CE174440B03 for <info@hackingteam.com>; Thu, 25 Jun 2015 12:58:23 +0200 (CEST) X-ASG-Debug-ID: 1435229981-066a754c88345f0001-NmYfmv Received: from mail64.atl111.rsgsv.net (mail64.atl111.rsgsv.net [198.2.131.64]) by manta.hackingteam.com with ESMTP id Dfm33vb8rCfiA65m for <info@hackingteam.com>; Thu, 25 Jun 2015 12:59:41 +0200 (CEST) X-Barracuda-Envelope-From: bounce-mc.us3_25286147.918657-info=hackingteam.com@mail64.atl111.rsgsv.net X-Barracuda-IPDD: Level1 [mail64.atl111.rsgsv.net/198.2.131.64] X-Barracuda-Apparent-Source-IP: 198.2.131.64 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=mail64.atl111.rsgsv.net; h=Subject:From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=info=3Dcybersecurityintelligence.com@mail64.atl111.rsgsv.net; bh=cYKA5c+6tD96Z8PML+3XnnclZnQ=; b=RNHthhqVggoVsj6ZJdMwD7Nd8nMoQriI+CMaav2cmaEP/D6gG3NLuJSN5H728eFZRgwF1AhCAdFn WmvtTkeWJgwSKN56ZTb2EfKYM41bKfEAI/yPTKKqvaRsP9cXCc+I/yQYqKgp+mYZoUTH1G6EqZZ1 0LH3nATiiDHMWHmMTAc= DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=mail64.atl111.rsgsv.net; b=nyNipMCi4+LNJPmOI4VaVLsq9k2ytdXDhjXlDcJf+Jm5iwJ6AQQGaDY88zRdSWb+dQgC6ULhgGjJ kqw1CwzyaefnhIaoTBXkzpN0h0L9d4qFioipvJAKqctbyaf8V1IlQrviEr2v/6otZDIEvetH02EW 7TXAadW9R+zhTASAHxg=; Received: from (127.0.0.1) by mail64.atl111.rsgsv.net id hhffhs1ohlg0 for <info@hackingteam.com>; Thu, 25 Jun 2015 10:59:36 +0000 (envelope-from <bounce-mc.us3_25286147.918657-info=hackingteam.com@mail64.atl111.rsgsv.net>) Subject: =?utf-8?Q?UK=20Surveillance=20Laws.=20Hacking=20Hospital=20Networks.=20FBI=20Can=27t=20Track=20ISIS.=20Cyber=20Threats=20to=20Aircraft=20Evolve.=20Black=20Market=20Web=20Tour.=20Boardroom=20Insecurity.?= From: =?utf-8?Q?Cyber=20Security=20Intelligence?= <info@cybersecurityintelligence.com> X-ASG-Orig-Subj: =?utf-8?Q?UK=20Surveillance=20Laws.=20Hacking=20Hospital=20Networks.=20FBI=20Can=27t=20Track=20ISIS.=20Cyber=20Threats=20to=20Aircraft=20Evolve.=20Black=20Market=20Web=20Tour.=20Boardroom=20Insecurity.?= Reply-To: =?utf-8?Q?Cyber=20Security=20Intelligence?= <info@cybersecurityintelligence.com> To: =?utf-8?Q?Hacking=20Team?= <info@hackingteam.com> Date: Thu, 25 Jun 2015 10:59:36 +0000 Message-ID: <a7a85ac110ceb74440637343ff655f647a8.20150625105917@mail64.atl111.rsgsv.net> X-Mailer: MailChimp Mailer - **CIDb9540cce73f655f647a8** X-Campaign: mailchimpa7a85ac110ceb74440637343f.b9540cce73 X-campaignid: mailchimpa7a85ac110ceb74440637343f.b9540cce73 X-Report-Abuse: Please report abuse for this campaign here: http://www.mailchimp.com/abuse/abuse.phtml?u=a7a85ac110ceb74440637343f&id=b9540cce73&e=f655f647a8 X-MC-User: a7a85ac110ceb74440637343f X-Feedback-ID: 25286147:25286147.918657:us3:mc List-ID: a7a85ac110ceb74440637343fmc list <a7a85ac110ceb74440637343f.401805.list-id.mcsv.net> X-Accounttype: pd List-Unsubscribe: <mailto:unsubscribe-a7a85ac110ceb74440637343f-b9540cce73-f655f647a8@mailin1.us2.mcsv.net?subject=unsubscribe>, <http://cybersecurity-intelligence.us3.list-manage1.com/unsubscribe?u=a7a85ac110ceb74440637343f&id=111de05f1d&e=f655f647a8&c=b9540cce73> Sender: Cyber Security Intelligence <info=cybersecurityintelligence.com@mail64.atl111.rsgsv.net> x-mcda: FALSE X-Barracuda-Connect: mail64.atl111.rsgsv.net[198.2.131.64] X-Barracuda-Start-Time: 1435229981 X-Barracuda-URL: http://192.168.100.25:8000/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hackingteam.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 1.92 X-Barracuda-Spam-Status: No, SCORE=1.92 using global scores of TAG_LEVEL=3.5 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=8.0 tests=FB_GET_MEDS, FB_GET_MEDS_2, HTML_MESSAGE, MIME_QP_LONG_LINE, MIME_QP_LONG_LINE_2 X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.20171 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 FB_GET_MEDS BODY: Looks like trying to sell meds 0.00 HTML_MESSAGE BODY: HTML included in message 0.00 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars 0.82 MIME_QP_LONG_LINE_2 RAW: Quoted-printable line longer than 76 chars 1.10 FB_GET_MEDS_2 Looks like trying to sell meds Return-Path: bounce-mc.us3_25286147.918657-info=hackingteam.com@mail64.atl111.rsgsv.net X-MS-Exchange-Organization-AuthSource: EXCHANGE.hackingteam.local X-MS-Exchange-Organization-AuthAs: Internal X-MS-Exchange-Organization-AuthMechanism: 10 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="--boundary-LibPST-iamunique-1688904692_-_-" ----boundary-LibPST-iamunique-1688904692_-_- Content-Type: text/html; charset="utf-8" <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html><head><!-- This is a simple example template that you can edit to create your own custom templates --> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <!-- Facebook sharing information tags --> <meta property="og:title" content="UK Surveillance Laws. Hacking Hospital Networks. FBI Can't Track ISIS. Cyber Threats to Aircraft Evolve. Black Market Web Tour. Boardroom Insecurity."> <title>UK Surveillance Laws. Hacking Hospital Networks. FBI Can't Track ISIS. Cyber Threats to Aircraft Evolve. Black Market Web Tour. Boardroom Insecurity.</title> <style type="text/css"> #outlook a{ padding:0; } body{ width:100% !important; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:none; font-size:14px; font-weight:bold; height:auto; line-height:100%; outline:none; text-decoration:none; text-transform:capitalize; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; } body,.backgroundTable{ background-color:#9090BA; } #templateContainer{ border:1px solid #FFFFFF; } h1,.h1{ color:#000000; display:block; font-family:Arial; font-size:26px; font-weight:bold; line-height:100%; margin-bottom:10px; text-align:left; } h2,.h2{ color:#292e68; display:block; font-family:Arial; font-size:22px; font-weight:bold; line-height:100%; margin-bottom:10px; text-align:left; } h3,.h3{ color:#9090BA; display:block; font-family:Arial; font-size:18px; font-weight:bold; line-height:100%; margin-bottom:10px; text-align:left; } h4,.h4{ color:#FFFFFF; display:block; font-family:Arial; font-size:18px; font-weight:bold; line-height:100%; margin-bottom:10px; text-align:left; } #templatePreheader{ background-color:#9090BA; } .preheaderContent div{ color:#292E68; font-family:Arial; font-size:10px; line-height:100%; text-align:left; } .preheaderContent div a:link,.preheaderContent div a:visited{ color:#FFFFFF; font-weight:normal; text-decoration:underline; } .preheaderContent div img{ height:auto; max-width:600px; } #templateHeader{ background-color:#292E68; border-bottom:0; } .headerContent{ color:#FFFFFF; font-family:Arial; font-size:34px; font-weight:bold; line-height:100%; padding:0; text-align:left; vertical-align:middle; } .headerContent a:link,.headerContent a:visited{ color:#336699; font-weight:normal; text-decoration:underline; } #headerImage{ height:auto; max-width:600px !important; } #templateContainer,.bodyContent{ background-color:#ffffff; } .bodyContent div{ color:#000000; font-family:Arial; font-size:14px; line-height:150%; text-align:left; } .bodyContent div a:link,.bodyContent div a:visited{ color:#9090BA; font-weight:normal; text-decoration:underline; } .bodyContent img{ display:inline; margin-bottom:10px; } #templateFooter{ background-color:#FDFDFD; border-top:0; } .footerContent div{ color:#292E68; font-family:Arial; font-size:12px; line-height:125%; text-align:left; } .footerContent div a:link,.footerContent div a:visited{ color:#292E68; text-decoration:underline; } .footerContent img{ display:inline; } #social{ background-color:#FFFFFF; border:1px solid #FFFFFF; } #social div{ text-align:center; } #utility{ background-color:#FDFDFD; border-top:1px solid #F5F5F5; } #utility div{ text-align:center; } #monkeyRewards img{ max-width:160px; } </style></head> <body leftmargin="0" marginwidth="0" topmargin="0" marginheight="0" offset="0" style="-webkit-text-size-adjust: none;margin: 0;padding: 0;background-color: #9090BA;width: 100% !important;"> <center> <table border="0" cellpadding="0" cellspacing="0" height="100%" width="100%" id="backgroundTable" style="margin: 0;padding: 0;height: 100% !important;width: 100% !important;"> <tr> <td align="center" valign="top"> <!-- // Begin Template Preheader \\ --> <table border="0" cellpadding="5" cellspacing="0" width="580" id="templatePreheader" style="background-color: #9090BA;"> <tr> <td valign="top" class="preheaderContent"> <!-- // Begin Module: Standard Preheader \\ --> <table border="0" cellpadding="5" cellspacing="0" width="100%"> <tr> <td valign="top"> <div style="color: #292E68;font-family: Arial;font-size: 10px;line-height: 100%;text-align: left;"> Welcome to the Cyber Security Intelligence newsletter</div> </td> <td valign="top" width="180"> <div style="color: #292E68;font-family: Arial;font-size: 10px;line-height: 100%;text-align: left;"> <!-- -->Is this email not displaying correctly?<br><a href="http://us3.campaign-archive2.com/?u=a7a85ac110ceb74440637343f&id=b9540cce73&e=f655f647a8" target="_blank" style="color: #FFFFFF;font-weight: normal;text-decoration: underline;">View it in your browser</a>.<!-- --> </div> </td> </tr> </table> <!-- // End Module: Standard Preheader \\ --> </td> </tr> </table> <!-- // End Template Preheader \\ --> <table border="0" cellpadding="0" cellspacing="0" width="580" id="templateContainer" style="border: 1px solid #FFFFFF;background-color: #ffffff;"> <tr> <td align="center" valign="top"> <!-- // Begin Template Header \\ --> <table border="0" cellpadding="0" cellspacing="0" width="100%" id="templateHeader" style="background-color: #292E68;border-bottom: 0;"> <tr> <td width="300" class="headerContent" style="color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;text-align: left;vertical-align: middle;"> <!-- // Begin Module: Standard Header Image \\ --> <img src="http://www.nonamenoslogan.com/mail/logo.gif" alt="Cyber Security Intelligence" border="0" style="margin: 0;padding: 0;max-width: 600px;border: none;font-size: 14px;font-weight: bold;height: auto;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;" id="headerImage campaign-icon"> <!-- // End Module: Standard Header Image \\ --></td> <td width="300" class="headerContent" style="text-align: right;color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;vertical-align: middle;"><a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=e92fefd5c8&e=f655f647a8" style="color: #336699;font-weight: normal;text-decoration: underline;"><img src="http://www.nonamenoslogan.com/mail/twitter.gif" alt="Follow Us On Twitter" style="max-width: 600px;border: none;font-size: 14px;font-weight: bold;height: auto;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;"></a></td> </tr> <tr> <td colspan="2" class="headerContent" style="color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;text-align: left;vertical-align: middle;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"> Captured, Organised & Accessible</span></td> </tr> </table> <!-- // End Template Header \\ --> </td> </tr> <tr> <td align="center" valign="top"> <!-- // Begin Template Body \\ --> <table border="0" cellpadding="10" cellspacing="0" width="600" id="templateBody"> <tr> <td valign="top" class="bodyContent" style="background-color: #ffffff;"> <!-- // Begin Module: Standard Content \\ --> <table border="0" cellpadding="10" cellspacing="0" width="100%"> <tr> <td valign="top"> <div style="color: #000000;font-family: Arial;font-size: 14px;line-height: 150%;text-align: left;"><br> <span class="h1" style="color: #000000;display: block;font-family: Arial;font-size: 26px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span class="h2" style="color: #292e68;display: block;font-family: Arial;font-size: 22px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:28px">Newsletter June#5 2015</span></span></span><br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="110" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/b4c46461-2d37-4304-ad7e-5fec07e22d73.jpg" style="width: 180px;height: 110px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="180">What’s in the New UK Surveillance Bill?</span></span>The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance? <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=f73cd2144a&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/e77fbe41-e4e7-4a62-8a03-32535bcf0f5d.jpg" style="width: 180px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="180">Hackers Invade Hospital Networks</span></span>Hackers penetrate secure hospital networks, collecting valuable information, by targeting medical devices. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=e838255de0&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><img align="left" height="95" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/2ce0592e-f2ca-4a52-946e-19e0bde400c2.jpg" style="width: 180px;height: 95px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="180">Cybersecurity in the Boardroom</span><span style="color:rgb(51, 51, 51); font-family:sans-serif,arial,verdana,trebuchet ms; font-size:13px; line-height:20.7999992370605px">Two-thirds of directors are less than confident about their company’s cybersecurity and (surprise) t</span>he biggest risks to security are human errors. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=1a6681c616&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="110" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/0806f99b-b6d9-4366-84e7-a28e796cd6c8.jpg" style="width: 180px;height: 110px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="180">Top 6 Hacking Tools Security Teams Should Know About</span></span>Black Hat or White Hat: Here are the top 6 hacking tools that every security professional ought to know about. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=6b89013402&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/90b0c4a6-8fa7-4720-bd2c-f6f9351d4333.jpg" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">Got </span><strong style="font-size:20px">Good </strong><span style="font-size:20px">Cyber Insurance Cover? Beware of Holes in Your Policy.</span></span>Just because you have “cyber insurance” doesn't mean your insurer will pay a cyber-related claim. <a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&id=179ea378b1&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="110" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/5c450e77-fc73-436d-90c1-7309c95d2054.jpg" style="width: 150px;height: 110px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">FBI Unable to Monitor ISIS’s Encrypted Communications</span></span>The FBI has warned US lawmakers there is no way to monitor encrypted online communications. <a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&id=95b26304d1&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:19px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/b962c7f7-644b-4c9c-88d7-951b4ad92778.jpg" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">A Quick Tour of the Web Black Market</span></span>The most important requirement for both buyers and sellers is the anonymity of transactions using untraceable networks and a virtual currency. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=32003f25cd&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/1a27d971-5dbb-4f4d-81c1-a24279dc0139.jpg" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">Cyber attack on German Parliament Still Active</span></span>A cyber attack on the Bundestag is still stealing data & could force it to spend millions of euros replacing the entire IT system. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=a19835bccc&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/d32eea0d-b5bc-4a8e-a6cb-f3f6a1f34dad.jpg" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">The Ever-evolving Cyber Threat to Planes</span></span>Professional hackers claim airline computer systems are riddled with weaknesses that allow a breach via the in-flight entertainment system. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=1ced7eab4e&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/2af3f036-6d97-4b62-986a-e74ce3fc6ffd.jpg" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">Financial Services Firms Stare into the Abyss as Data Breaches Rocket</span></span>The UK Information Commissioner’s Office reports 791 breaches in this sector between 2012 and 2014, including 585 in 2014 alone. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=0df0ee2213&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><img align="left" height="100" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/a912e224-c77a-44ac-afe1-f7b5a76755bb.png" style="width: 150px;height: 100px;margin: 0px 10px 0px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">Cyber Vulnerability Report 2015</span></span>The Insurance industry & their customers need a better understanding of internal security and the different types of insurance available. <a href="http://cybersecurity-intelligence.us3.list-manage2.com/track/click?u=a7a85ac110ceb74440637343f&id=4a7eac83b8&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px">PwC says UK Security Breaches Often Not Reported</span></span>The majority of UK organisations suffering a security or data breach will never report it. <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=1a3146e28e&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px">OPM Hack: Paying for Non-Secrets</span></span>Information contained in the hacked OPM files needs to be treated like state secrets: <em>Opinion by Ronald Marks. </em><a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=0503bb98a9&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px">UK MOD to Build Open Source Analytics Platform</span></span>The MOD wants a new open source analytics platform to help understand its data. <a href="http://cybersecurity-intelligence.us3.list-manage2.com/track/click?u=a7a85ac110ceb74440637343f&id=260fd16d6c&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a><br> <br> <span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px">Digital Currencies: A Gold Standard for Bitcoin</span></span>Bitcoin-like currencies backed by the yellow metal show promise for crisis-scarred libertarians. <a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&id=c82e57ea64&e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">read more</a></div> </td> </tr> </table> <!-- // End Module: Standard Content \\ --> </td> </tr> </table> <!-- // End Template Body \\ --> </td> </tr> <tr> <td align="center" valign="top"> <!-- // Begin Template Footer \\ --> <table border="0" cellpadding="5" cellspacing="0" id="templateFooter" style="background-color: #FDFDFD;border-top: 0;"> <tr> <td valign="top" class="footerContent"> <!-- // Begin Module: Standard Footer \\ --> <table border="0" cellpadding="5" cellspacing="0" width="100%"> <tr> <td colspan="2" valign="middle" id="social" style="background-color: #FFFFFF;border: 1px solid #FFFFFF;"> <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: center;"> <p><strong><a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=aacd8378fc&e=f655f647a8" style="color: #292E68;text-decoration: underline;">www.cybersecurityintelligence.com</a></strong></p> <p><a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&id=f27e7b10a7&e=f655f647a8" style="color: #292E68;text-decoration: underline;">Follow us on Twitter</a> | <a href="http://us3.forward-to-friend.com/forward?u=a7a85ac110ceb74440637343f&id=b9540cce73&e=f655f647a8" style="color: #292E68;text-decoration: underline;">Forward to a friend</a> </p> </div> </td> </tr> <tr> <td valign="top" width="370"> <br> <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: left;"> <em>Copyright © 2015 Cyber Security Intelligence, All rights reserved.</em> <br> <!-- --> You are on this mailing list because you are connected with Cyber Security Intelligence via Twitter and / or the 2014 InfoSecurity & CyberSecurityExpo Exhibitions <br> <strong>Our mailing address is:</strong> <br> <div class="vcard"><span class="org fn">Cyber Security Intelligence</span><div class="adr"><div class="street-address">Sterling House</div><div class="extended-address">22 Hatchlands Road</div><span class="locality">Redhill</span>, <span class="region">Surrey</span> <span class="postal-code">RH1 6RW</span> <div class="country-name">United Kingdom</div></div><br><a href="http://cybersecurity-intelligence.us3.list-manage.com/vcard?u=a7a85ac110ceb74440637343f&id=111de05f1d" class="hcard-download">Add us to your address book</a></div> <br> <!-- --> </div> <br> </td> <td valign="top" width="170" id="monkeyRewards"> <br> <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: left;"> </div> <br> </td> </tr> <tr> <td colspan="2" valign="middle" id="utility" style="background-color: #FDFDFD;border-top: 1px solid #F5F5F5;"> <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: center;"> <a href="http://cybersecurity-intelligence.us3.list-manage1.com/unsubscribe?u=a7a85ac110ceb74440637343f&id=111de05f1d&e=f655f647a8&c=b9540cce73" style="color: #292E68;text-decoration: underline;">unsubscribe from this list</a> | <a href="http://cybersecurity-intelligence.us3.list-manage2.com/profile?u=a7a85ac110ceb74440637343f&id=111de05f1d&e=f655f647a8" style="color: #292E68;text-decoration: underline;">update subscription preferences</a><!-- --> | <a href="http://us3.campaign-archive2.com/?u=a7a85ac110ceb74440637343f&id=b9540cce73&e=f655f647a8" style="color: #292E68;text-decoration: underline;">view email in browser</a><!-- --> </div> </td> </tr> </table> <!-- // End Module: Standard Footer \\ --> </td> </tr> </table> <!-- // End Template Footer \\ --> </td> </tr> </table> <br> </td> </tr> </table> </center> <img src="http://cybersecurity-intelligence.us3.list-manage.com/track/open.php?u=a7a85ac110ceb74440637343f&id=b9540cce73&e=f655f647a8" height="1" width="1"></body> </html> ----boundary-LibPST-iamunique-1688904692_-_---