ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted the personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them.

Newsweek reports that the Caliphate Cyber Army (CCA), formerly known as the Islamic Cyber Army, posted the personal details of fifty-five New Jersey police officers last week after hacking into the Web site of the New Jersey Transit police.

“The lone wolves r hungry for yr blood,” one tweet from the group stated. The list of personal details includes home addresses, phone numbers, names, and ranks. The Twitter accounts used to encourage the attacks have since been shut down.

New Jersey Transit said in a statement: “The NJ Transit Information System was not compromised, however some information was breached from an outside vendor. The New Jersey Transit police are working with the Department of Homeland Security and the FBI on this matter.”

The CCA has in the past carried out hacks on seemingly arbitrary online targets.

The group also recently threatened to take down Google but instead defaced the Web site of Add Google Online, a small Indian firm that offersSEO services.

Experts say the kind of attacks CCA carries out shows that the group has limited technical skills.

“We believe they gained access to vulnerable sites using elementary hacking methods and stumbled upon databases or spreadsheets with information they felt would appear threatening if released,” Raijin Rising, a pseudonymous member of the independent counterterrorism network Ghost Security Group, told Newsweek.

“Their activities shine a light on just how vulnerable websites are out there,” the member said. “It’s amazing how bad it is. I would estimate between 50 percent and 75 percent of websites are weak and vulnerable to simple attacks like these.”

I-HLS: http://bit.ly/1WtyQgL

« Now Ambulances Are Vulnerable To Hackers
Cybercrime Is Changing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Firedome

Firedome

Firedome's tailormade solution for IoT companies is designed to proactively prevent, detect, and respond to inevitable vulnerabilities in connected devices.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.