This week's IT security news roundup has stories on the Indian government's (ridiculous) plan to ship cybersecurity brochures with new computer hardware; Gozi malware arrests; new SCADA password cracking code; Android software vulnerabilities; and more. In an effort to combat online crime, the Indian government will soon make retailers ship brochures on cybersecurity along with every piece of computer hardware sold in the country. The main objections to the plan focus, so far, on how difficult it will be to execute it and not on how stupid an idea it is in the first place. According to the Economic Times of India: “Hardware firms briefed about the government’s plan are concerned that they will be faced with a logistical nightmare, all for the sake of an archaic but well-intentioned step of doubtful effectiveness. If the government has its way, every desktop computer, mobile phone, modem or USB stick will have to come pre-packaged with what are called ‘Cyber Security Awareness Brochures’. The intention, much like with the statutory warnings on cigarette packets, is to draw attention to a grave threat.” We all know how effective those warnings on cigarettes are. Also in this week’s news: Gozi Malware Arrests, Report Highlight Russian Cybercrime (CSO) Feds charge Russian national over the Gozi Trojan that hit banks, new report shows 70% of exploit kits released or developed in Russia. SCADA Password Cracking Code Available (HelpNetSecurity) ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access and control of programmable industrial control systems. Android Malware Potentially Stole Up to 450,000 Pieces of Personal Data (CSO) A fake app store that steals personal information on Android devices may have potentially stolen between 75,000 and 450,000 pieces of personal data such as contact details, according to security firm Symantec. Not long after Symantec discovered Android.Exprespam, the security firm acquired data that indicated more than 3000 visits were made to the fake app store called Android Express’s Play from 13-20 January. Security Researchers Cripple Virut Botnet (CSO) Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday. The Virut malware spreads by inserting malicious code into clean executable files and by copying itself to fixed, attached and shared network drives. Some variants also infects HTML, ASP and PHP files with rogue code that distributes the threat. College Student Expelled After Bringing Web Vulnerability to School’s Attention (ThreatPost) A Canadian college student was expelled after reporting a vulnerability in the school’s Web site that potentially exposed private data on more than 250,000 students. The high-achieving computer science major, Hamed Al-Khabaz and another student, Ovidiu Mija, in November were developing a mobile app using Omnivox Web portal software when they discovered “sloppy coding” that could lead to a major data breach. Ominvox is used at hundreds of Canadian campuses, including theirs at Montreal’s Dawson College. Red October Attackers Shutting Down C&C Infrastructure (Threatpost) It appears that the attackers behind the Red October cyberespionage campaign are taking their ball and going home. Since the attack came to light on Monday, the attackers have begun shutting down their infrastructure and the hosting providers and registrars involved with some of the command-and-control domains are shutting those down, as well. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe