{"id":5583,"date":"2014-08-01T10:00:35","date_gmt":"2014-08-01T14:00:35","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=5583"},"modified":"2020-02-27T03:47:21","modified_gmt":"2020-02-26T16:47:21","slug":"july2014_monthly_news_podcast","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/july2014_monthly_news_podcast\/5583\/","title":{"rendered":"Kaspersky Daily July 2014 Monthly News Podcast"},"content":{"rendered":"<p>In the news this month, Microsoft stirs controversy with its latest botnet takedown, China spies on the U.S. seeking information about policy in Iraq, Verizon\u2019s latest transparency report suggests the government is most interested in location data, and hackers compromise defense contractors involved with Israel\u2019s \u201cIron Dome\u201d missile system.<\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-5583-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/06\/06042948\/July%2B2014%2Bmonthly%2Bpodcast%2Bfinal.mp3?_=1\"><\/source><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/06\/06042948\/July%2B2014%2Bmonthly%2Bpodcast%2Bfinal.mp3\">https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/06\/06042948\/July%2B2014%2Bmonthly%2Bpodcast%2Bfinal.mp3<\/a><\/audio>\n<p>If you\u2019re interested in further reading, then click on the links in the brief text beneath the image:<\/p>\n<p><em>THE SUPPLEMENTARY READING LIST<\/em><\/p>\n<p>Microsoft moved to take down a number of domains controlled by a hosting provider called No-IP. Microsoft claimed the domains hosted malicious content and that No-IP was profiting from allowing criminals to use their domains. <a href=\"https:\/\/threatpost.com\/latest-microsoft-malware-takedown-causes-waves-in-security-community\/106939\" target=\"_blank\" rel=\"noopener nofollow\">No-IP claimed Microsoft never contacted them ahead of the takedown<\/a>. In the end, Microsoft called the collateral damage caused by the takedown <a href=\"https:\/\/threatpost.com\/microsoft-says-technical-error-led-to-legitimate-no-ip-customers-losing-service\/106977\" target=\"_blank\" rel=\"noopener nofollow\">a technical error<\/a> before <a href=\"https:\/\/threatpost.com\/all-seized-domains-returned-to-no-ip\/107028\" target=\"_blank\" rel=\"noopener nofollow\">returning the seized domains to No-IP<\/a> and eventually <a href=\"https:\/\/threatpost.com\/microsoft-settles-with-no-ip-over-malware-takedown\/107121\" target=\"_blank\" rel=\"noopener nofollow\">reaching a settlement<\/a> with them.<\/p>\n<p>Security firm Crowdstrike released an analysis this month showing that Chinese APT groups became keenly interested in figuring out what U.S. position is in Iraq now that the Islamic State controls a large swath of that country, including oil fields upon which China relies. You can read a news report on CrowdStrike\u2019s findings at <a href=\"https:\/\/threatpost.com\/china-hackers-compromise-iraq-experts-at-national-security-think-tanks\/107059\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a> or you can read the full report <a href=\"http:\/\/www.crowdstrike.com\/blog\/deep-thought-chinese-targeting-national-security-think-tanks\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>Verizon released a transparency report suggesting that U.S. law enforcement has an increasingly large appetite for location data. Meanwhile, <a href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/07\/09\/under-surveillance\/\" target=\"_blank\" rel=\"noopener nofollow\">FirstLook.org<\/a> published an alarming report claiming that the FBI and NSA have been actively targeting and spying on leaders in the Muslim-American community. Of course, <a href=\"https:\/\/threatpost.com\/dni-justice-department-deny-targeting-americans-for-surveillance-based-on-religion-politics\/107093\" target=\"_blank\" rel=\"noopener nofollow\">the Director of National Intelligence and the Department of Justice swiftly denied such claims.<\/a>\u00a0<a href=\"https:\/\/threatpost.com\/microsoft-exec-says-company-has-never-been-asked-to-backdoor-a-product\/107433\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft denied <\/a>that it had ever installed backdoors in its products or systems at the behest of U.S. law enforcement.<\/p>\n<p>Investigative security journalist, Brian Krebs, found that the attackers compromised the networks of the defense contractors that developed Israel\u2019s notorious \u201cIron Dome\u201d missile defense system, making off with \u201c<a href=\"http:\/\/krebsonsecurity.com\/2014\/07\/hackers-plundered-israeli-defense-firms-that-built-iron-dome-missile-defense-system\/\" target=\"_blank\" rel=\"noopener nofollow\">huge quantities of sensitive documents pertaining to the shield technology<\/a>.\u201d<\/p>\n<p>Advocacy groups are asking the FTC to put <a href=\"https:\/\/threatpost.com\/consumer-groups-urge-ftc-to-halt-facebook-data-collection-program\/107478\" target=\"_blank\" rel=\"noopener nofollow\">Facebook\u2019s new targeted advertising system on hold<\/a>; a group of researchers bucked the trend, saying <a href=\"https:\/\/threatpost.com\/researchers-say-password-re-use-isnt-all-bad\/107265\" target=\"_blank\" rel=\"noopener nofollow\">password reuse isn\u2019t all bad<\/a>; for more than six months a group of attackers has tried to <a href=\"https:\/\/threatpost.com\/tor-sniffs-out-attacks-trying-to-deanonymize-hidden-services-users\/107514\" target=\"_blank\" rel=\"noopener nofollow\">de-anonymize the Tor network<\/a>; and last but not least, we\u2019ve got Black Hat and DEF CON in Las Vegas next week, so look forward to talks on <a href=\"https:\/\/threatpost.com\/critical-android-fakeid-bug-allows-attackers-to-impersonate-trusted-apps\/107462\" target=\"_blank\" rel=\"noopener nofollow\">Android vulnerabilities affecting millions of users<\/a>, <a href=\"https:\/\/threatpost.com\/def-con-hosting-soho-wireless-router-hacking-contest\/107463\" target=\"_blank\" rel=\"noopener nofollow\">router hacking contests<\/a>, and much, much more.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Recapping the months #security and #privacy headlines with @TheBrianDonohue<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8c2c&amp;text=Recapping+the+months+%23security+and+%23privacy+headlines+with+%40TheBrianDonohue\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>In the news: Microsoft&#8217;s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.<\/p>\n","protected":false},"author":42,"featured_media":5584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2647],"tags":[499,770,769,771,36,38,741,187,768],"class_list":{"0":"post-5583","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-apt","10":"tag-black-hat","11":"tag-china","12":"tag-def-con","13":"tag-malware-2","14":"tag-microsoft","15":"tag-nsa","16":"tag-passwords","17":"tag-surveillance"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/july2014_monthly_news_podcast\/5583\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/july2014_monthly_news_podcast\/3832\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/july2014_monthly_news_podcast\/3731\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/july2014_monthly_news_podcast\/4221\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/july2014_monthly_news_podcast\/5583\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/july2014_monthly_news_podcast\/5583\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=5583"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5583\/revisions"}],"predecessor-version":[{"id":26455,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5583\/revisions\/26455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/5584"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=5583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=5583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=5583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}