Network Security

  • Most Topular Stories

  • Sony Pictures Entertainment Taken Down By Hackers

    Milton Security
    Milton Security Group
    24 Nov 2014 | 3:10 pm
    Sony Pictures Entertainment’s corporate network was breached and taken offline today by attackers. Employees attempting to use the network discovered an image that claimed that they’d been hack by #GOP. The image also claimed that the attackers had acquired all internal data and would release it publicly if their requests were not met. The requests were not listed in the image. The message from “#GOP” warned that the allegedly stolen data would be released November 24th at 11 p.m. GMT, which is 3 p.m. PST/6 p.m. EST today. It was also reported that a large number of Sony Twitter…
  • De-provisioning Users in Active Directory

    Feed: Articles & Tutorials
    Derek Melber
    19 Nov 2014 | 2:24 am
    This article takes a look at ways to de-provision separated employees in Active Directory.
  • Response to "Can a CISO Serve Jail Time?"

    TaoSecurity
    17 Nov 2014 | 8:30 am
    I just read a story titled Can a CISO Serve Jail Time? Having been Chief Security Officer (CSO) of Mandiant prior to the FireEye acquisition, I thought I would share my thoughts on this question.In brief, being a CISO or CSO is a tough job. Attempts to criminalize CSOs would destroy the profession.Security is one of the few roles where global, distributed opponents routinely conduct criminal acts against business operations. Depending on the enterprise, the offenders could be nation state adversaries largely beyond the reach of any party, to include the nation state hosting the…
  • 5 Security Metrics That Don’t Work – And Why

    Pivot Point Security
    Mosi
    20 Nov 2014 | 4:00 am
    Awhile back I blogged about “Making Your Security Metrics Work For You.” That post explained why many organizations need some time to settle on the right security metrics, and often end up redefining at least a few of the metrics they originally establish. This post offers more specific guidance on metrics, which will hopefully save you time and effort. Here’s a list of 5 security metrics that haven’t worked in my experience, along with an explanation of why they failed. Metrics tied to a specific technology or system Metrics tied to specific technologies or systems will fail when the…
  • Mike Lynch-backed Darktrace takes new approach to security

    Techworld.com security
    25 Nov 2014 | 8:40 am
    Security startup Darktrace wants businesses to rethink how they protect their data from hackers.
 
 
  • add this feed to my.Alltop

    Tenable Network Security Blog

  • Is Your Mobile POS Secure?

    Jeffrey Man
    26 Nov 2014 | 6:00 am
    The 2014 holiday season is upon us and with it, the forecast of billions in retail sales.
  • Regin Malware: Its Targets and How You Can Detect It

    Ken Bechtel
    25 Nov 2014 | 6:01 am
    On the 24th of November 2014, a major anti-malware vendor released a report concerning a long running piece of backdoor Trojan malware, now called “Regin.” We at Tenable Network Security were aware of this report on the Sunday before the release, and looked
  • Naughty or Nice: The Holidays Put Security Practices of Merchants to the Test

    David Schreiber
    19 Nov 2014 | 7:00 am
    In less than two weeks, US consumers will engage in the annual holiday shopping frenzy known as Black Friday.
  • Is Cyber Insurance Your Last Line of Defense?

    Jeffrey Man
    18 Nov 2014 | 9:29 am
    In a new article on BetaNews, Tenable’s Jeffrey Man discusses the viability of cybersecurity insurance for companies that experience payment card breaches. “Is cyber insurance your last line of defense?” examines the impact of litigation on retailer liability and PCI compliance.
  • Nessus v6 is Now Available

    Paul Asadoorian
    18 Nov 2014 | 7:00 am
    Today Tenable has released Nessus v6 for download. This latest version helps reduce your attack surface by enforcing compliance and system hardening policies.
 
  • add this feed to my.Alltop

    TaoSecurity

  • Response to "Can a CISO Serve Jail Time?"

    17 Nov 2014 | 8:30 am
    I just read a story titled Can a CISO Serve Jail Time? Having been Chief Security Officer (CSO) of Mandiant prior to the FireEye acquisition, I thought I would share my thoughts on this question.In brief, being a CISO or CSO is a tough job. Attempts to criminalize CSOs would destroy the profession.Security is one of the few roles where global, distributed opponents routinely conduct criminal acts against business operations. Depending on the enterprise, the offenders could be nation state adversaries largely beyond the reach of any party, to include the nation state hosting the…
  • Thank You for the Review and Inclusion in Cybersecurity Canon

    10 Nov 2014 | 2:27 pm
    I just read The Cybersecurity Canon: The Practice of Network Security Monitoring at the Palo Alto Networks blog. Rick Howard, their CSO, wrote the post, which marks the inclusion of my fourth book in Palo Alto's Cybersecurity Canon. According to the company's description, the Canon is:a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in a cybersecurity professional’s education that will make the practitioner incomplete.The Canon candidates include both fiction and…
  • We Need More Than Penetration Testing

    16 Sep 2014 | 9:47 am
    Last week I read an article titled  People too trusting when it comes to their cybersecurity, experts say by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post:[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes. When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete…
  • A Brief History of Network Security Monitoring

    16 Sep 2014 | 9:07 am
    Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the network security monitoring (NSM) community.Doug asked me to present the history of NSM. To convey some of the milestones in the development of this operational methodology, I developed these slides (pdf). They are all images, screen captures, and the like, but I promised to post them. For example, the image at left is the first slide from a…
  • Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

    4 Sep 2014 | 8:41 am
    I'm pleased to announce that I will be teaching one class at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is Network Security Monitoring 101. I taught this class in Las Vegas in July 2013 and 2014, and Seattle in December 2013. I posted Feedback from Network Security Monitoring 101 Classes last year as a sample of the student commentary I received.This class is the perfect jumpstart for anyone who wants to begin a network security monitoring program at their organization. You may enter with no NSM knowledge, but when you leave…
 
  • add this feed to my.Alltop

    Spyware news

  • Using expired anti-spyware can be as dangerous as having no anti-spyware!

    21 Nov 2014 | 5:54 am
    We have been saying for ages that you should always keep your anti-spyware up-to-date. No matter how insignificant it seems, it can easily save your time that you might need when trying to fix your infected computer. Of course, money is also a great factor because there are lots of viruses that can’t be eliminated […]
  • What is FBI Android virus and how to get rid of it?

    2-spyware.com
    6 Nov 2014 | 12:52 am
    If you have ever been infected with FBI virus, you will definitely know how serious this infections is. For those who have never heard about it we must say that FBI virus is a dangerous cyber threat that was released several years ago. It was labeled as ransomware because it seeks to trick people into […]
  • Critical Windows vulnerability is used to spread Sandworm malware

    16 Oct 2014 | 6:23 am
    One day it’s Shellshock, the other day it’s Sandworm. What should you know about this malware that was announced with fanfare several days ago? ISIGHT, the company that discovered this virus, says that Sandworm relies on a Windows zero-day vulnerability that is known as CVE-2014-4114. Fortunately, Microsoft patched this vulnerability in October, 2014. It has also been […]
  • What should I know about Shellshock?

    1 Oct 2014 | 5:56 am
    Everyone is now talking about Shellshock. What is that and what can you do about it? Here’s what you should remember: Shellshock is a software bug, which affects the Bash – the common command-line shell that is actively used in Linux/UNIX OS and Apple Mac OS X for controlling different programs and their features. It […]
  • Hackers relaunch multi-name rogues to steal people’s money!

    8 Sep 2014 | 11:52 pm
    Just imagine: you start your computer one day and see a window showing how Win 7 Antivirus 2014 scans your PC system. After performing it, this program informs you about a long list of viruses, including trojans, adware and other threats. Naturally, it offers you to remove these threats from your computer in exchange for […]
  • add this feed to my.Alltop

    Uncommon Sense Security

  • Yeah, I’m sick of hearing it too. So just go vote.

    26 Nov 2014 | 8:55 am
    (ISC)2 member?  Read on.  Not a member?  You may not care about this one- although if you are in the InfoSec field the results of the election may be of interest. It is election time for the (ISC)2 again.  As I’ve said before, I don’t have much hope for fixing that mess, but some folks are really trying to make a difference, and if it won’t die I guess I should support them. The candidates are listed here.  As you peruse that list, you’ll note that all candidates hold some (ISC)2 cert, most CISSP- that’s because it is a requirement for board service. …
  • Introducing the Shoulders of InfoSec Project

    13 Oct 2014 | 12:19 pm
    "If I have seen further it is by standing on the shoulders of giants" Most famously attributed to Sir Isaac Newton, this quote reflects the sentiment of a new project.  In InfoSec we all stand on the shoulders of giants. It was just supposed to be a talk at DerbyCon, but as I dug into the topic I realized it needed to be more than just one talk. Another relevant quote is George Santayana’s oft-misquoted: “Those who cannot remember the past are condemned to repeat it.” In information security we have a very bad habit of ignoring the past; many times it isn’t even a…
  • What’s the best tool for the job?

    23 Jun 2014 | 7:54 am
    This year I’ve been thinking about fundamentals a lot.  That includes  patch management, and in preparing a presentation on the topic I pondered the question: “What is the best patch management tool?” I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses.  That reminded me of a lesson about tools I learned many years ago. What is the best [insert category here]?  I believe there are two answers: The one you have The one you know Note that these may not necessarily True, but…
  • Is OWASP broken?

    17 Jun 2014 | 11:00 am
    That’s a silly question.  I wasn’t going to comment on the current struggles of the Board of Directors for fear of adding to the Pointless InfoSec Drama, but I need to say a few things about it.  I am not an OWASP insider, but I do support their mission. OWASP has done a lot of great things, and continues to do so today.  As I said, I’m not an insider, but there appear to be some struggles at the global Board level and possibly organizationally at the national and international level.  And I don’t really care- I hope it gets sorted out soon, but the power of OWASP…
  • A small rant on presenting at conferences

    22 Apr 2014 | 9:31 am
    The more conferences I run the more sympathy I have for other conference organizers, even the big commercial ones, and the more inclined I am to follow their rules and requests- but I expect the conferences to have a clue about what’s involved in delivering a good presentation and facilitate that, not hinder it. If there are glitches at a BSides or other smaller, volunteer-run, or new events I’m OK with that.  It happens.  What I can’t stand are conferences which try to manage the speakers in ways that prevent delivering quality presentations. First and foremost, I hate having…
  • add this feed to my.Alltop

    Schneier on Security

  • New Snowden Documents Show GCHQ Paying Cable & Wireless for Access

    schneier
    26 Nov 2014 | 11:29 am
    A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired by Vodafone in 2012 -- to eavesdrop on Internet and telecommunications traffic. New documents on the page, and here. Ars Technica article. Slashdot thread.
  • FBI Agents Pose as Repairmen to Bypass Warrant Process

    schneier
    26 Nov 2014 | 4:50 am
    This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians to gain access to his hotel room without a warrant. From the motion to suppress: The next time you call for assistance because the internet service in your home is not working, the "technician" who comes to your door may actually be an undercover government agent. He will have secretly disconnected the service, knowing that you will naturally call for help and -- when he shows up at your door, impersonating a technician -- let…
  • Regin: Another Military-Grade Malware

    schneier
    25 Nov 2014 | 4:57 am
    Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept has linked it to NSA/GCHQ operations, although I am still skeptical of the NSA/GCHQ hacking Belgian cryptographer Jean-Jacques Quisquater.
  • The Security Underpinnnings of Cryptography

    schneier
    24 Nov 2014 | 12:21 pm
    Nice article on some of the security assumptions we rely on in cryptographic algorithms.
  • New Kryptos Clue

    schneier
    24 Nov 2014 | 4:54 am
    Jim Sanborn has given the world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos.
 
  • add this feed to my.Alltop

    Infosec Events

  • Week 47 In Review – 2014

    md
    24 Nov 2014 | 12:00 pm
    Resources SHack3rcon 5 Videos – irongeek.com Here are the videos from Hack3rcon^5. You can watch and download the videos from here. Let’s Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools – motherboard.vice.com Last August, at Defcon, the hacker conference in Las Vegas, engineer and security researcher named Michael Ossmann stood on the stage of a lecture hall, about to detail a stunning new set of tools designed for spying on a wealth of electronic devices. He explained to the audience just how he had engineered the kind of surveillance devices that, six months earlier,…
  • Week 46 In Review – 2014

    md
    17 Nov 2014 | 11:02 am
    Events Related Amazon Fire Phone, iPhone, Nexus 5, Samsung S5 All Popped At Mobile Pwn2Own – forbes.com A slew of the world’s most popular smartphones have been prized open at the Mobile Pwn2Own hacking contest in Tokyo, Japan this week. Hosted by the HP Zero Day Initiative, the competition offered up big cash prizes for those who could successfully show off their exploits and a handful whitehats managed to break security protections on the Amazon Fire Phone, iPhone 5S, LG Nexus 5 and the Samsung S5. HP TippingPoint + Mobile Pwn2Own = Zero Day Filter Protection – h30499.www3.hp.com HP…
  • Week 45 In Review – 2014

    md
    11 Nov 2014 | 8:46 am
    Resources Secure messaging scorecard – eff.org Many companies offer “secure messaging” products—but are these systems actually secure? EFF decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto. Google Study: Email Users 36 Times More Likely To Get Scammed If Friends’ Accounts Get Hacked – consumerist.com So you think your job is done — you’ve secured your email against hackers by thinking up the best password in the entire world. You’re safe, or so you think. But a new study from Google says that if your friends and email contacts…
  • Week 44 In Review – 2014

    md
    3 Nov 2014 | 1:19 pm
    Events Related Inside BlackHat Europe 2014 – blog.fortinet.com The conference started with Adi Shamir’s keynote. Axelle Apvrille was really happy to listen to such a brilliant mind like Adi Shamir. In this blog post, Axelle has given his personal opinion on some of the best talks he attended. Resources Social-Engineer, Inc. Releases Annual Report on DEF CON 22 Social Engineering Capture the Flag (SECTF) Contest – social-engineer.org Social-Engineer, Inc., the leader in social engineering security testing, awareness and training, announced the release of the fifth annual…
  • Information Security Events For November

    sheila
    3 Nov 2014 | 1:16 am
    Here are information security events in North America this month:   21st ACM Conference on Computer and Communications Security : November 3 to 7 in Scottsdale, AZ,USA   7th International Symposium on Foundations & Practice of Security (FPS-2014) : November 3 to 5 in Montréal, Canada   CISO Executive Summit Boston : November 3 in Boston, MA, USA   SafeConfig 2014 : November 3 in Arizona, USA   TrustED 2014 : November 3 in Scottsdale, AZ, USA   CISO Executive Summit St. Louis 2014 : November 4 St. Louis, MO , USA   Cybercrime Prevention Summit 2014 :…
  • add this feed to my.Alltop

    Security Catalyst

  • Catalyst Weekly Rewind (Nov 24) – more value, less time

    Michael Santarcangelo
    24 Nov 2014 | 4:23 am
    Did you get a chance to read what I created and curated last week? The weekly rewind is a brief look at last week — the work I published, articles I curated, and insights in where I’m focusing some energy — all in one place. A few of the curated articles (on Friday) really stood out to me; definitely worth a read. I always welcome the opportunity to connect over good conversation. Have a great week. Quote of the week “The chains of habit are generally too small to be felt until they are too strong to be easily broken.” -Samuel Johnson Created: What I published this week…
  • Catalyst Weekly Rewind – Value in time and passwords

    Michael Santarcangelo
    17 Nov 2014 | 6:53 am
    As we start another week, take a moment to pause, rewind, and replay the highlights from last week. This captures the work I published, elements I shared, and offers some insights in where I’m focusing some energy. Connection, context, and conversation are encouraged! Quote of the week This week I came across a word that really resonated with me: meraki: (verb) do something with soul, creativity, or love; to put something of yourself into your work I hope you get to experience some this week! Created: What I published this week To increase value, you need to know what your time is really…
  • ICYMI Nov 10 – Weekly Rewind – 3 questions

    Michael Santarcangelo
    10 Nov 2014 | 4:09 am
      Welcome to the weekly rewind – a chance to play last week again. This is my latest attempt to figure out the right way to blend various writing efforts — now spreading over more platforms — together. It also captures the content I shared last week in one convenient place. I’ll try this for a few weeks – feedback welcomed! I’ll include some notes about what I’m working on below, too. Check ‘em out. Quote of the week Don’t judge each day by the harvest you reap but by the seeds that you plant. – Robert Louis Stevenson Created: What I published this…
  • DtR Security Newscast: why CISOs get no respect, how many passwords?, and more

    Michael Santarcangelo
    12 Aug 2014 | 9:34 am
    Recording the Security Newscasts is a real blast. Hopefully that comes through when you listen in! I invite you to listen to the latest episode of the Down the Rabbithole (DtR) Security Newscast for August 11, 2014– with Raf Los (@Wh1t3Rabbit) and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. More than a run-down of the news, it’s our unfiltered (but safe for work) discussion of top stories. We usually inject some passion and and some divergent thinking to fuel your week. This…
  • Monday Motivation – the power of perspective

    Michael Santarcangelo
    11 Aug 2014 | 7:50 am
      Something to think about Perspective is essential. Similar to context, our perspectives change. Evident from the top of a tall building, where everything below looks like a model, and people the size of ants. Or gazing out at the vastness of the ocean. Sometimes our perspectives shift based on location. Other times experience does the trick. A key to success is to accept and embrace other perspectives. Location, experience, and the views of the people we serve, work with, and share our world with. Those perspectives give us depth. They inform decisions. They allow us to understand…
  • add this feed to my.Alltop

    Dr Anton Chuvakin Blog PERSONAL Blog

  • Links for 2014-11-12 [del.icio.us]

    Anton Chuvakin
    13 Nov 2014 | 12:00 am
    How Enterprises Can Get The Most From Threat Intelligence
  • Monthly Blog Round-Up – October 2014

    1 Nov 2014 | 11:11 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book. “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the…
  • Links for 2014-10-06 [del.icio.us]

    Anton Chuvakin
    7 Oct 2014 | 12:00 am
    How a bank knows it has been hacked | Marketplace.org
  • Monthly Blog Round-Up – September 2014

    1 Oct 2014 | 8:20 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. “Top 10…
  • Links for 2014-09-26 [del.icio.us]

    Anton Chuvakin
    27 Sep 2014 | 12:00 am
    Chip and PIN: No panacea, but worth the effort – and the cost | CSO Online
 
  • add this feed to my.Alltop

    Security Blog

  • Weekly Intelligence Summary Lead Paragraph: 2014-11-21

    dkennedy
    25 Nov 2014 | 8:28 am
    Tuesday, Microsoft released MS14-068 out-of-cycle to mitigate a vulnerability in Kerberos that could be exploited to take over Windows domains.  The severity of the impact of a successful attack drove our recommendation for a 30-day deployment and pre-planning for a much shorter fuse if risk changes.  We’ve been collecting all the reliable intelligence we can regarding last week’s MS14-066 (SChannel). We have no reports of threats in the wild for it.  We can’t say the same for Adobe’s Flash Player bulletin from last week because Kafeine from DontNeedCoffee.com discovered the Angler…
  • Twitter and Information Security awareness

    Bhaskar karambelkar
    18 Nov 2014 | 10:02 am
    Wow! If Heartbleed was an 11 (on scale of 10) Shellshock is probably a 12 as it will affect many more computers! http://t.co/c7ivKcdMHa — William H. Saito (@whsaito) September 25, 2014 Twitter is giving traditional media a run for its money in many aspects, especially when it comes to getting the news out. Over the last few years a common pattern has emerged where news breaks first over Twitter or a comparable social media platform only to be picked up later by traditional media such as TV/Radio/Newspapers. In fact, most of the traditional media powerhouses have started incorporating social…
  • Weekly Intelligence Summary Lead Paragraph: 2014-11-14

    ssimpson
    14 Nov 2014 | 1:42 pm
    The majority of intelligence collected by the VCIC this week could easily be organized into two categories: serious vulnerabilities and noteworthy attacks. Microsoft released its hefty November patch update on Tuesday, but the attention wasn’t on the cumulative Internet Explorer update or the patch for a second Windows OLE vulnerability that’s being exploited in a small number of attacks. The focus was on a remote code execution vulnerability in SChannel, which is Microsoft’s SSL/TLS implementation in Windows. Add it to the long list of crypto bugs we’ve seen this year and be sure to…
  • Context Graph Based Analysis of Apple Pay Domains – Part 3 of 3

    Gabe Bassett
    10 Nov 2014 | 6:44 am
    In our previous posts we identified Apple Pay domains created after the Apple Pay announcement here.  We then aggregated them in a context graph and analyzed the features of the graph here.  We then statistically analyzed the individual clusters here.  Companion posts explaining Verum, the context graph system, can be found here and here.  In this post we will manually validate the results of the previous analysis by looking at the individual clusters previously identified through statistical analysis. Manual Cluster Validation To this point in the analysis, everything can be automated.
  • Weekly Intelligence Summary Lead Paragraph: 2014-11-07

    dkennedy
    7 Nov 2014 | 7:30 pm
    Microsoft announced intentions to release sixteen security bulletins next week.  Sixteen is the most the company has released in one month since June 2011 and one under April 2011’s high water mark.  The VCIC dedicates extra effort to targeted attacks.  Not because they are currently prevalent among our clients, but because the methods that succeed today will almost certainly be used on Verizon Enterprise clients in the future.  This week those attacks include “TooHash” (GData), “Poisoned Handover” (FireEye), “BlackEnergy 2” (and 3 from Kaspersky) and “Rotten Tomato”…
  • add this feed to my.Alltop

    symantec.com

  • DroidJack RAT: A tale of how budding entrepreneurism can turn to cybercrime

    Peter Coogan
    25 Nov 2014 | 4:26 am
    See how Android.Sandorat, a multi-featured mobile crimeware tool, began life as a legitimate Android app. Twitter Card Style:  summary Small-scale mobile app software entrepreneurship has been described as the cottage industry of the 21st century. It allows talented software developers to apply their skills to create new and innovative mobile apps, with the hope of becoming the next big thing and, perhaps, even attaining the trappings of wealth associated with success. read more
  • Regin: Top-tier espionage tool enables stealthy surveillance

    Symantec Security Response
    23 Nov 2014 | 8:58 am
    An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals. Twitter Card Style:  summary   read more
  • POS malware: Potent threat remains for retailers

    Symantec Security Response
    20 Nov 2014 | 9:14 am
    The retail industry continues to be a low-hanging fruit for attackers and attacks are likely to continue until the full transition to more secure payment technologies. Twitter Card Style:  summary As Americans gear up for another holiday shopping season, the threat posed by point-of-sale malware remains high. More than a year after the discovery of the first major attacks against POS networks, many US retailers are still vulnerable to this type of attack and are likely to remain so until the complete transition to more secure payment card technologies in 2015.  read more
  • Annual G20 summit is attractive target for Flea attack group

    Symantec Security Response
    13 Nov 2014 | 3:44 pm
    Attackers attempt to steal information from targeted officials through spear-phishing emails. Twitter Card Style:  summary Each year, as world leaders come together to discuss a variety of global economic issues at the G20 summit, organizations with a vested interest in the event are the recipients of malicious emails from threat actors. read more
  • The four most important online security events of 2014

    Kevin Haley
    13 Nov 2014 | 1:56 am
    From major vulnerabilities to cyberespionage, Symantec looks at what the past year has brought and what it means for the future. read more
 
  • add this feed to my.Alltop

    Optimal Security

  • Infosec Haiku

    Chris Merritt
    22 Nov 2014 | 10:45 am
    Anata no joho sekyuritei konshu no haiku Citadel Trojan Now Targeting Your Password Managers – Beware!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Infosec Haiku

    Chris Merritt
    15 Nov 2014 | 3:03 pm
    Anata no joho sekyuritei konshu no haiku US CERT Warns That Server Twenty-Oh-Three Is Going End-of-Life   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • 14 Bulletins This Patch Tuesday and IE Cumulative Update Is Not Your Most Critical

    Russ Ernst
    11 Nov 2014 | 10:25 am
    While we enjoyed a relatively low number of patches each month so far this year, November definitely takes a big jump up with 14 total bulletins released today. 4 are critical, 8 important and 2 moderate. While this is two less than what we thought we would have today according to last week’s ANS, we still have to go back to September of last year for the last time Microsoft released this many bulletins in a single month. The good news however is the CVE count. Just 33 CVEs means fewer opportunities for the bad guys but because the software impacted is widespread, this Patch Tuesday is…
  • Infosec Haiku

    Chris Merritt
    9 Nov 2014 | 9:58 am
    Anata no joho sekyuritei konshu no haiku ‘Tis the Season to Watch Out for Phishing Email. Do Not Click That Link!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • A Whopping Patch Tuesday

    Russ Ernst
    6 Nov 2014 | 10:25 am
    IT pros will be thankful for some holiday time off at the end of this month because November Patch Tuesday will certainly keep them busy. Microsoft is set to release 16 bulletins next week, 5 are critical, 9 important and 2 moderate. We have enjoyed a relatively low number of patches each month in 2014 but November definitely takes a big jump up. We have to go back to June 2011 for the last time Microsoft released this many bulletins in a single month, although in that month there were 9 critical bulletins. The most recent monthly update that included nearly this many bulletins was when…
 
  • add this feed to my.Alltop

    TRUSTe Blog

  • Smart Practices for Marketers Collecting Consumer Data

    kfreeman
    25 Nov 2014 | 11:33 am
    By Andrew McDevitt, senior privacy consultant at TRUSTe This article is based on a presentation “Privacy in the Digital Age- Avoiding Consumer Backlash: Smart Marketing Practices for Collecting Customer Data while Improving Personalization, Trust and Transparency” which was delivered by Andrew McDevitt, TRUSTe at “The Customer Centricity Summit,” sponsored by Knowledge@Wharton, the online business journal … Continue reading »
  • TRUSTe Wins Silver 2014 US Mobile & App Design Award

    lgradman
    20 Nov 2014 | 9:49 am
    We’re excited to announce that the TRUSTe Privacy App has won the silver 2014 US Mobile & Design Award in the Utilities category! This award program acknowledges the shift in the importance of mobile apps in our everyday lives and celebrates the courage of innovators in one of the great design nations of the world. … Continue reading »
  • TRUSTe’s Agreement with the FTC

    kfreeman
    17 Nov 2014 | 11:19 am
    Chris Babel, CEO At TRUSTe we take very seriously the role we play in the privacy ecosystem and our commitment to supporting our customers. And if we fall short, we admit it, we address the issue, and we move forward. Today, an agreement was announced with the Federal Trade Commission (FTC) settling a complaint about … Continue reading »
  • Rise in Privacy Investment Evident as Companies Rush to Join New DPM Platform Beta Program

    kfreeman
    13 Nov 2014 | 7:00 am
    Today we’re excited to announce that the beta program for our Data Privacy Management Platform has reached full capacity. Numerous well-known international brands have signed-up to participate in this program, which will give them access to this comprehensive and intuitive privacy solution. The interest we’ve seen since announcing this program is a strong indicator that … Continue reading »
  • Survey Shows Growing Data Privacy Concerns In the Farming Community

    kfreeman
    10 Nov 2014 | 11:45 am
    “As the Internet of Things expands and data collection remains a multi billion dollar business, we’ll see concerns about data privacy in every sector, industry and profession,” says TRUSTe CEO Chris Babel. A recently published survey of 3,380 farmers from The American Farm Bureau Federation (AFBF) conducted from late July to September this year found that … Continue reading »
  • add this feed to my.Alltop

    iViZ Blog

  • SaaS-based Security Testing Provider iViZ being Acquired by Cigital

    admin
    7 Nov 2014 | 2:02 am
    Cigital to leverage iViZ products and technologies to introduce 3D Unlimited Application Security Testing. iViZ Security, an IDG Ventures funded pioneering cloud-based “Web and Mobile Application Security Testing” provider, is getting acquired by Cigital Inc, a leader in software security services and solutions. Founded in 2006 by former IITians Bikash Barai (CEO) and Nilanjan De (CTO), iViZ Security is a pioneer in taking penetration testing or ethical hacking to the cloud and launching its proprietary Software-as-a-Service Platform’. The innovative, 60-people product company with…
  • Shellshock Bug: A Quick Primer

    Nilanjan De
    30 Sep 2014 | 5:27 am
    What is ShellShock Bug?  Shellshock is a security vulnerability(CVE-2014-6271) in the widely used Unix Bash Shell which was discovered by Stéphane Chazelas on 12 September 2014 and disclosed on 24 September 2014. Subsequently, various researchers have discovered multiple other vulnerabilities in bash. What is the Vulnerability? The Unix Bash Shell stores exported function definitions in environment variables. When a new instance of bash is launched, it reads these specially crafted environment variables, and interprets them as function definitions. Unfortunately, due to insufficient…
  • Anatomy of Heartbleed Bug

    Nilanjan De
    30 Apr 2014 | 5:46 am
    There has been a lot of buzz about Heartbleed[1] in the news recently. In this blog post, we have tried to put together the important things that one should know about Heartbleed. What is Heartbleed? Heartbleed is the popular name given to the recently found vulnerability(CVE-2014-0160) inOpenSSL – an open-source encryption library. More specifically, this is a bug in the OpenSSL Heartbeat protocol which results in a vulnerable server to leak or bleed confidential content in its memory space (and hence the name ‘Heartbleed’).  What’s Heartbleed bug? OpenSSL is the most…
  • Penetration Testing E-commerce Applications

    jitendra.chauhan
    25 Apr 2014 | 3:46 am
    Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Why a conventional application penetration testing is not enough for E-commerce Applications? E-Commerce applications are growing in complexity, as a result conventional application penetration is simply not enough. Conventional application…
  • How effective is your SIEM Implementation?

    jitendra.chauhan
    16 Apr 2014 | 4:10 am
    During the last few penetration testing conducted for certain organizations, we have discovered a surprising fact that almost all the SIEM implementation had gaps on the implementation levels. For example, in certain cases, SIEM did not even detect at all when the internal network was conducted with rigorous penetration testing. I am not saying that all the SIEM implements are as bad as stated; however, it is mandatory to find out if your SIEM implementation is actually as effective as you perceive it. (Read More:  Is STORM Better Than HADOOP For Real Time Security Big Data Analytics?) How…
 
  • add this feed to my.Alltop

    Free IT - Security Magazines and Downloads from alltop.tradepub.com

  • Isn't The Cloud Already Secure?

    18 Nov 2014 | 12:00 am
    Successful innovations invariably reach a transitional point at which the general population stops viewing them as shiny toys and realizes these advances are valuable assets. Eventually, like email, it becomes a tool that society can't live without.The adoption of the cloud, however, hasn't been as rapid as experts predicted. Find out who's really responsible for these cloud apps, and the benefits of having a vendor that can protect your corporate data.Request Free!
  • Why Some Things Shouldn't Go Viral

    18 Nov 2014 | 12:00 am
    Email is the most used application in any modern enterprise, yet it remains the primary avenue for sensitive corporate data to leave your network. Securing email becomes even more challenging when BYOD is introduced.Employees love using a single mobile device for work and life. On the surface, this makes a lot of sense – not only is the employee already familiar with the device, but BYOD can also help cut costs.The problem? The fact that employees are using their own devices, running a variety of operating systems, and connecting over insecure Wi-Fi networks makes data security difficult to…
  • When Worlds Collide: Cloud Apps and Financial Services

    18 Nov 2014 | 12:00 am
    Trends suggest that cloud services will soon be the new norm for financial institutions. However, there are two major hurdles to clear when moving financial data out of an on-premises network to public cloud applications: security and compliance regulations. This white paper discusses cloud access security brokers and how they can help the finance industry stay secure in the cloud as well as be compliant.Request Free!
  • Top Six Things to Consider with an Identity as a Service Solution

    17 Nov 2014 | 12:00 am
    IT doesn't like it either. After all, they're just trying to ensure the security of your enterprise but they're often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employees have work to do, and they're suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.Is there a better way?Absolutely: unified identity management with an Identity…
  • The Essentials of IT Security - Free Kit

    16 Nov 2014 | 10:20 am
    The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.The following kit contents will help you get the most out of your IT Security research:Citrix NetScaler: A Powerful Defense against Denial of Service AttacksThe Future of Backup as a Data Protection Strategy10 Network Security Tools and Tests Everyone Should UseService & Security Agility Strategies for SDN & NFV NetworksRequest Free!
  • add this feed to my.Alltop

    IT-Security

  • Top 5 Steps to Prevent PHI Hacks

    Bob Chaput
    26 Nov 2014 | 10:00 am
    With Hack Attacks Occurring at an Alarming Rate, How Are You Gearing Up to Combat Medical ID Theft? The business of healthcare fraud is booming, fueling an outbreak of medical ID theft and a new wave of security risks for all healthcare organizations. In total, the FBI estimates $80 billion of the $2.2 trillion a year spent on healthcare in the United States is associated with fraud. And, according to the Medical ID Fraud Allianceapproximately half of all healthcare fraud is tied to medical ID theft. There is no avoiding the current trend: healthcare-related hacking incidents in 2013 grew to…
  • Group Plans More Susceptible than Ever to Security Violations

    Bob Chaput
    24 Nov 2014 | 10:00 am
    Many healthcare executives fall prey to two common misconceptions about data breaches: that the only companies making headlines for lax data security are big retailers like Target and that the biggest culprits are teenage hackers or sophisticated teams working in China or Eastern Europe. Plenty of healthcare organizations are getting burned for inept data security. On the Department of Health and Human Services website there’s a page that’s been dubbed the “Wall of Shame”that contains a list of all the organizations that have had a breach of 500 or more Protected Health Information…
  • Catalyst Weekly Rewind (Nov 24) – more value, less time

    Michael Santarcangelo
    24 Nov 2014 | 4:23 am
    Did you get a chance to read what I created and curated last week? The weekly rewind is a brief look at last week — the work I published, articles I curated, and insights in where I’m focusing some energy — all in one place. A few of the curated articles (on Friday) really stood out to me; definitely worth a read. I always welcome the opportunity to connect over good conversation. Have a great week. Quote of the week “The chains of habit are generally too small to be felt until they are too strong to be easily broken.” -Samuel Johnson Created: What I published…
  • Trust – Are You Building It or Breaking It?

    Bob Chaput
    21 Nov 2014 | 10:00 am
    In a recent edition of The Keckley Report, Paul Keckley, PHD, tackles the issue of trust within healthcare. He opens with the truism that public trust is hard to build and easy to lose. We have seen this firsthand in healthcare, as a growing number of data breaches and subpar privacy, security and compliance efforts have consistently put protected health data at risk.  Highly publicized instances at retailers such as Target and Michael’s have crippled consumer confidence with the offending brands and more broadly have influenced a declining public perception of the healthcare industry.
  • CEO-to-CEO – Top 5 Questions CEOs Should Ask Themselves & Board About Risk Management

    Bob Chaput
    19 Nov 2014 | 10:00 am
    Governance is usually defined as a system of processes and controls that ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-upon enterprise objectives to be achieved; setting direction through prioritization and decision making; and, monitoring performance and compliance against agreed-upon direction and objectives. Risk Management Governance is a strategic business practice area that is part of overall governance and ensures that: Risk management activities align with the enterprise’s opportunity and loss capacity and leadership’s…
 
  • add this feed to my.Alltop

    Email management, storage and security for business email admins

  • ITU and Internet Society Join Forces to Combat Spam

    Malcolm James
    11 Nov 2014 | 7:00 am
    Partnership in the war against spam is nothing new, but it’s curious that when we do hear about countries, organizations, and law enforcement agencies teaming up, it’s usually in the context of taking down a botnet or taking a group of cybercrooks into custody. So it’s worth mentioning when a group of organizations enters a formal agreement to fight spam, if only because we’re not entirely used to seeing a proactive approach when it comes to dealing with the nasty blighter. Such is the case this week, as the International Telecommunications Union and the Internet Society announced…
  • California Court Sides With Email Marketer

    Sue Walsh
    6 Nov 2014 | 7:00 am
    Well-known marketer Guthy-Renker LLC, the masterminds behind just about every TV infomercial you can think of,  has claimed a huge victory in a California court of appeals. The court ruled that they were not in violation of the state’s anti-spam law despite the fact that their emails were sent from names like “Proactiv Special Offer” or “Wen Healthy Hair.” and from domains that could not be traced back to Guthy-Renker. California Business & Professions Code Section 17529.5(a)(2) makes it unlawful “for any person or entity to advertise in a commercial e-mail…
  • Malicious Spam Campaign Uses Fake Ebola News

    Sue Walsh
    5 Nov 2014 | 7:00 am
    Not surprisingly, spammers have latched on to the current Ebola crisis in Africa and the fears it has prompted around the world and are exploiting it for their own gain. The messages claim to be from the World Health Organization (WHO) and urge recipients to read the attached file to learn how to protect themselves. “The information and prevention listed in the attached file will help you and those around you stay safe,” claims one email. “There is an outbreak of Ebola and other diseases around that you know nothing about. Download the World Health Organization file for more information…
  • New Spam Campaign Uses Fake Wire Transfer Notices

    Sue Walsh
    31 Oct 2014 | 8:30 am
    Experts have discovered a new spam campaign aimed at corporate finance departments. The messages are made to look like invoices to be brought to the attention of the accounts payable departments, and pretend to be from the company’s CEO or another senior executive. The goal is to trick the accounting staff into paying the invoice and initiating the requested wire transfer. By the time it is discovered to be fraudulent, the scammers and the money are long gone.  “The scammers will usually send the fake wire transfer emails to employees working in the finance department of a company, as…
  • Dropbox Phishing Campaign Hosted on Dropbox Itself

    Sue Walsh
    31 Oct 2014 | 8:00 am
    Still stinging from an alleged data breach they blamed on a third party service (if you were affected, you should have been contacted by now, but they claim all of the stolen passwords were expired), Dropbox has a new security issue to deal with. This time a phishing attack targeting Dropbox users has been discovered, and the fake Dropbox login page its emails direct to is hosted on Dropbox itself. The messages claim the recipient has had a large file shared with them and tell them to visit the site and log in to view it. Clicking the included link leads to the fake login page, which also has…
  • add this feed to my.Alltop

    F-Secure Antivirus Research Weblog

  • Out-of-Band Flash Player Update for CVE-2014-8439

    25 Nov 2014 | 7:02 am
    Adobe has released an out-of-band update to fix a vulnerability in Flash Player which was reported by F-Secure.We discovered the vulnerability while analyzing a Flash exploit from an exploit kit called Angler. We received the sample from Kafeine, a renowned exploit kit researcher. He asked us to identify the vulnerability which was successfully exploited with Flash Player 15.0.0.152 but not with 15.0.0.189. That would imply the vulnerability was something patched in APSB14-22. However, based on the information that we had received via Microsoft Active Protections Program the exploit didn’t…
  • A Tale of Two Powerpoint Vulnerabilities

    25 Nov 2014 | 7:02 am
    It's been already a week after the announcement of the CVE-2014-4114 vulnerability, and the tally of the exploiters have only increased.There are even files where the metadata has remained the same, which clearly shows that they have been copied from the original as in the case of Mirtec and Cueisfry (a trojan linked to Japanese-related APT attacks). Authors behind these malware copied the PowerPoint Document originally used by BlackEnergy and just replaced the payload and the content with legitimate material found online.BlackEnergy, Mirtec, Cueisfry document metadata, respectivelyWell, if…
  • The Regin Espionage Toolkit

    25 Nov 2014 | 7:02 am
    Regin is the latest in the line of sophisticated espionage toolkits used to target a range of organizations around the world. As already reported, it's one of the more complex pieces of malware around, and just like many of the other toolkits it also has a long history behind it. We first encountered Regin nearly six years ago in early 2009, when we found it hiding on a Windows server in a customer environment in Northern Europe.The server had shown symptoms of trouble, as it had been occasionally crashing with the infamous Blue Screen of Death. A driver with an innocuous name of…
  • It's Not a Game - It's a Violation of Human Dignity

    25 Nov 2014 | 7:02 am
    Still don't set a passcode on your phone?From Matthias Gafni and Malaika Fraley at the Contra Costa Times:The California Highway Patrol officer accused of stealing nude photos from a DUI suspect's phone told investigators that he and his fellow officers have been trading such images for yearsThe five-year CHP veteran called it a "game" among officers, according to an Oct. 14 search warrant affidavit.Source: Contra Costa TimesA game?IT'S A CRIME. (Or it certainly ought to be.)Again from the Contra Costa Times:CHP Commissioner Joe Farrow said in a statement that his agency too has "active and…
  • Video: R.I.P. Internet #Slush14

    25 Nov 2014 | 7:02 am
    Mikko gave an excellent presentation at Slush 2014 on Tuesday. Check it out!R.I.P. InternetAdditional Slush videos are available on YouTube. On 20/11/14 At 12:46 PM
  • add this feed to my.Alltop

    Pcthreat.com

  • Security Alert

    25 Nov 2014 | 8:29 pm
    Computer users nowadays know how important it is to keep their systems safe, but, at the same time, unfortunately, cyber criminals also know that users are interested in applying various security applications....
  • PC Optimizer Pro

    25 Nov 2014 | 8:29 pm
    Despite the best efforts of the online security industry to secure the exact opposite, many of its consumers continue to fall into the trap set by malicious rogue security tools like PC Optimizer Pro. This...
  • Qone8.com

    25 Nov 2014 | 8:29 pm
    Qone8.com is a search engine which returns search results from Google Search. The search engine is owned by Taiwan Shui Mu Chih Ching Technology Limited, and it very similar to such browser hijackers as...
  • BonusBerry

    25 Nov 2014 | 8:29 pm
    Russian computer users are currently terrorized by a program called BonusBerry. This adware application tracks your web browsing history and then generates a series of commercial advertisements that are...
  • V9 Redirect Virus

    25 Nov 2014 | 8:29 pm
    V9 Redirect Virus is a malicious browser hijacker which infects the system while you are browsing insecure websites or when you download spam email attachments. Once the infection gets in the system, the...
 
  • add this feed to my.Alltop

    Threatpost | The first stop for security news

  • New Google Security Dashboard Manages Device Activity

    Michael Mimoso
    26 Nov 2014 | 11:04 am
    Google released a new Devices and Activity Dashboard, along with a new security wizard for Google for Work accounts.
  • Siemens Patches WinCC Vulnerabilities Likely Being Exploited

    Michael Mimoso
    26 Nov 2014 | 7:04 am
    Siemens has patched two critical vulnerabilities in the WinCC application in a number of its products; the flaws are likely being exploited, ICS-CERT and Siemens said.
  • Home Depot Breach Cost Company $43 Million in Third Quarter

    Dennis Fisher
    26 Nov 2014 | 5:18 am
    The massive Home Depot data breach disclosed earlier this fall involved the theft of 56 million credit and debit card numbers, and now the company has revealed that the incident so far has cost it $43 million. The costs are the result of both the investigation into the data breach as well as the recovery […]
  • Sony Pictures Dealing With Apparent Network Compromise

    Dennis Fisher
    25 Nov 2014 | 11:40 am
    Sony Pictures Entertainment is still in the process of trying to recover from an apparent compromise of some of the company’s computer systems. The attack first came to light on Monday, and the extent of the incident is still emerging. The compromise appears to affect just the networks at SPE, a division of Sony. Reports […]
  • Adobe Releases Emergency Flash Player Patch

    Michael Mimoso
    25 Nov 2014 | 10:22 am
    Adobe released an emergency out-of-band Flash Player security bulletin, revising a patch released in October with an additional CVE addressing a memory corruption vulnerability.
  • add this feed to my.Alltop

    NSS Labs

  • Unicorn Just Got Real: Malware Analysis

    20 Nov 2014 | 12:00 am
    Analysis of the Dropped Malware Name: v3k.exe MD5: 74CE6CB9F8B983297F936936BCABC698 SHA1: B76B514707CD560F973DD66124D2C1101D75078A SHA-2/256: 11F5F243E07BFD173F8EEC248ADF457540926CD7E0725381DA04C46E8C39A15B The malware is a little different to that which is typically dropped from regular exploit kits and malware campaigns. The difference lies in the way in which this malware is packaged, and in its method of operation.
  • Unicorn Just Got Real

    18 Nov 2014 | 12:00 am
    Through the Cyber Advanced Warning System, NSS Labs is already observing reliable exploits for CVE-2014-6332 in the wild. Microsoft released security updates on November 11, 2014 to patch this vulnerability.
  • Having Your Virtual Cake and Eating It Too

    18 Nov 2014 | 12:00 am
    Today’s continuously evolving threat landscape and the need for business continuity mandate the need to rethink security workflows. Robust virtual data centers and considerable computing power are the ingredients for a new approach to securing critical data. With an adaptive approach, mission and business functions can continue at the same time that malware is encapsulated and monitored.
  • Technology of the Future: BDS Market Set to Explode

    29 Oct 2014 | 12:00 am
    “Assume you have been breached” has become standard advice from information security professionals today. As organizations continue to be breached, the conventional approach to information security – in which layers of best-of-breed security technologies are used to protect an organization – is being challenged. Many organizations are beginning to acknowledge that in fact it is not possible to guarantee protection.
  • Add a Dash of Cloud for a More Robust Security Infrastructure

    14 Oct 2014 | 12:00 am
    As the hype around cloud computing settles, and as organizations begin to evaluate solutions, the ability of security as a service (SaaS) solutions to improve security infrastructure becomes apparent.
  • add this feed to my.Alltop

    Private WiFi

  • Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

    Alexis O'Connell
    25 Nov 2014 | 1:00 am
    Now is the time to make your online activity a blur. Why? Well here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit - resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase. This trend, coupled with the shift to more consumers using online and mobile shopping during the upcoming holiday shopping season…
  • Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

    Jillian Ryan
    20 Nov 2014 | 7:32 am
    As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important! This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices as they shop. Check out our infographic below to learn more about the threats of holiday shopping and why the proliferation of mobile shopping is good for online commerce but potentially risky for consumers…
  • CNN Meets With PRIVATE WiFi to Understand Public WiFi Exploits, Privacy Dangers

    Elaine Rigoli
    31 Oct 2014 | 1:35 pm
    CNN International sat down with PRIVATE WiFi's Intrusion Expert, Caleb Huff in Central Park this week to better understand the exploits and dangers on public WiFi networks. CNN aired its "Walk in the Park" segment on "The Business View with Nina Dos Santos" to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi. Calling WiFi hacking “extremely easy and readily available” – like a walk in the park – the CNN report shares some eye-opening realities about Internet…
  • ITRC Victim Impact Survey Findings LIVE Event

    Cristy Koebler
    23 Oct 2014 | 2:00 am
    The emotional impact of identity theft is far-reaching and extends well beyond the initial discovery and subsequent process of clearing the theft. The Identity Theft Resource Center routinely conducts focused surveys on identity theft, asking victims who have reached out for support from the organization to participate in the voluntary research to help the industry better understand the root causes, illicit methods, and recovery experience from this type of crime. The survey results are then compiled into a report that the ITRC shares with a wide variety of industry stakeholders to help…
  • Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

    Elaine Rigoli
    21 Oct 2014 | 1:55 am
    Technology is a part of our lives but it should not take over our lives – or ever compromise our children’s online safety. Because October is National Cyber Security Awareness Month (NCSAM), and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Although his day job is in the security and privacy fields, several years ago he launched Savvy Cyber Kids, a nonprofit to help keep children safer online. Last year Savvy Cyber Kids joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT.. campaign's…
 
  • add this feed to my.Alltop

    Pivot Point Security

  • How Well Does a Penetration Test Uncover OWASP Top 10 Flaws?

    Bob
    25 Nov 2014 | 4:00 am
    In our work with clients we sometimes encounter a misconception that performing an Application Vulnerability Assessment and/or a Penetration Test amounts to an assessment of a web application’s vulnerability to the OWASP Top 10 security flaws. This has never been the case, and with the 2013 Top 10 it’s even somewhat less so than for previous versions. The scanning and manual testing of a web application that an Application VA/PT entails is extremely beneficial in uncovering vulnerabilities. But there’s no substitute for code review, audit and/or a Network VA/PT (to test the web server…
  • 5 Security Metrics That Don’t Work – And Why

    Mosi
    20 Nov 2014 | 4:00 am
    Awhile back I blogged about “Making Your Security Metrics Work For You.” That post explained why many organizations need some time to settle on the right security metrics, and often end up redefining at least a few of the metrics they originally establish. This post offers more specific guidance on metrics, which will hopefully save you time and effort. Here’s a list of 5 security metrics that haven’t worked in my experience, along with an explanation of why they failed. Metrics tied to a specific technology or system Metrics tied to specific technologies or systems will fail when the…
  • Could ISO 27001 Have Prevented the Home Depot Breach – and $3 Billion in Costs?

    John
    18 Nov 2014 | 4:00 am
    This morning I was speaking with a potential client in the retail space who was calling based on a question a board member had asked: “Would ISO 27001 have prevented the Home Depot breach?” My answer was “Probably,” which of course required explanation. ISO 27001 is an Information Security Risk Management framework.  If Home Depot was ISO 27001 certified and had considered the specific risk(s) that resulted in the breach, and if they had selected controls that mitigated those risks to an acceptable level, and if they had operated those controls properly, the breach wouldn’t have…
  • Why Personal Health Information is Worth More Off the Black Market than On It

    Robert Oliver
    17 Nov 2014 | 4:00 am
    What is the value of information? It can be hard to quantify. Organizations and society at large generally regard information as a commodity and an asset. One classic valuation of information is the amount you’d be willing to pay for it prior to making a decision. Conversely, the value of an information asset could be seen as equal to the cost of losing that asset to a competitor. In the case of personal information like names, addresses, and social security numbers, one way to reckon value is by what the market will bear. For example, I recently took note of this rather disconcerting…
  • Why You Absolutely Need SSL Certificates for Your Web Services

    Mike
    13 Nov 2014 | 4:00 am
    Recently I’ve had conversations about SSL certificates with security professionals working for a couple of Pivot Point Security’s clients. I don’t want to say that these folks flat-out didn’t care about SSL certificates, but both conversations went nowhere pretty fast. I find this attitude baffling. SSL certificates are a fundamental and vital security element for any company that offers web-based services to clients, partners or other external entities. Failing to provide valid SSL certificates to the browsers that access your web servers is like locking your front door but leaving…
  • add this feed to my.Alltop

    HOTforSecurity

  • Google Launches New Security Dashboard

    Alexandra Gheorghe
    26 Nov 2014 | 7:34 am
    Google launched a “Devices and Activity Dashboard” to offer users more control over which devices connect to their Google accounts and prevent unauthorized access, according to a company blog post. The dashboard provides a snapshot of the devices that connect to the user’s Google account, along with details including the last time their account was accessed, the location and the web browser used. This list stays up to date for 28 days. Users can also check for suspicious account activity. If they notice something out of the ordinary, they can click “Secure your account” to change…
  • Facebook Launches Privacy Guide; Media Points Fingers over Lee Rigby Murder Case

    Bianca Stanescu
    26 Nov 2014 | 7:09 am
    Facebook has launched a how-to Privacy Guide, and announced it will update its terms and policies early next year, according to a message on the company website. The update comes soon after the social network was blamed for not taking action on the murder of soldier Lee Rigby, The Independent writes. The social media platform hosted a chat conversation by one of Rigby’s killers five months ahead of the attack. The killer talked about his plans in “the most graphic and emotive manner,” according to the UK’s Intelligence and Security Committee. The organization told The BBC…
  • Adobe Fixes Highly Critical Vulnerability in Flash Player

    Lucian Ciolacu
    26 Nov 2014 | 4:00 am
    Adobe has issued a fix for critical vulnerability (CVE-2014-8439) found in Adobe Flash Player software, according to Adobe’s APSB14-26 security bulletin. The vulnerability affects all Adobe Flash Player and Adobe AIR versions on Windows, Macintosh and Linux. “Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer…
  • Sony Pictures Networks Threatened by Hackers Ultimatum

    Alexandra Gheorghe
    25 Nov 2014 | 6:02 am
    Sony Pictures Entertainment has fallen victim to a network security breach that defaced staff computers worldwide and allegedly stole internal data as well as company-owned Twitter account credentials, according to the thehackernews.com. The hacking group identifying itself as as #GOP (Guardians of Peace) left a threat that reads: “We’ve already warned you, and this is just a beginning. We continue till our request be met. We’ve obtained all your internal data, including your secrets and top secrets. If you don’t obey us, we’ll release data shown below to the world.
  • Malware Found in Chinese E-Cigarettes’ Charger; Company Exec Infected

    Lucian Ciolacu
    24 Nov 2014 | 6:39 am
    It hasn’t yet been proven that e-cigarettes can cause cancer, but they just might be able to give you malware. A recent report on Reddit posted by one IT employee suggested that e-cigarettes made in China had malware hard coded in their chargers. “One particular executive had a malware infection on his computer from which the source could not be determined,” the Reddit post said. “After all traditional means of infection were covered, IT started looking into other possibilities.” After ruling out of attack vectors the IT team asked the executive about recent changes in…
 
  • add this feed to my.Alltop

    Seculert Blog on Breach Detection

  • Data Breach Costs Rise 23%

    Liora R. Herman
    25 Nov 2014 | 6:09 am
    The Ponemon Institute’s new “2014 Global Report on the Cost of Cyber Crime” is confirming what many CISOs and other network security professionals have been saying for months: data breach costs are on the rise. The Report, which was commissioned by HP, surveyed 257 large organizations in seven countries, and analyzed more than 1,700 attacks. […] The post Data Breach Costs Rise 23% appeared first on Seculert Blog on Breach Detection. [[Read more...]]
  • Improved Reporting, More Threat Data [Product Update]

    Liora R. Herman
    24 Nov 2014 | 2:08 am
    Improved Reporting of DGA Incidents Among different classification criteria, threat types can be classified according to the pattern they use to call a command and control server (C&C). One category of threats that stands out is malware that uses a Domain Generation Algorithm (DGA) to call to seemingly random command and control (C&C) host names. […] The post Improved Reporting, More Threat Data [Product Update] appeared first on Seculert Blog on Breach Detection. [[Read more...]]
  • HP Revokes Digital Certificate Used to Sign Malware

    Liora R. Herman
    20 Nov 2014 | 4:00 am
    As reported by Krebs on Security, HP has performed the cyber security equivalent of a “my bad” by quietly advising customers of a digital certificate that had been used to sign malware in May 2010. The certificate, which was initially signed in error, was revoked by Verisign at HP’s request on October 21, 2014. HP […] The post HP Revokes Digital Certificate Used to Sign Malware appeared first on Seculert Blog on Breach Detection. [[Read more...]]
  • DGAs: A Domain Generation Evolution

    Aviv Raff
    18 Nov 2014 | 5:00 am
    You may remember hearing about Domain Generating Algorithms, aka DGAs, from our coverage of the PushDo malware or from the malware we dubbed DGA.Changer, or more recently from our post on the Tinba Trojan. Malware threats that contain DGAs are not new, but they are more difficult to prevent and detect. The experts in Seculert’s […] The post DGAs: A Domain Generation Evolution appeared first on Seculert Blog on Breach Detection. [[Read more...]]
  • Better Results, More Incident Format Options [Product Update]

    Liora R. Herman
    17 Nov 2014 | 5:09 am
    New Information in Elastic Sandbox Analysis Results Seculert’s Elastic Sandbox analysis results now indicate if a communication was found to a known Command and Control (C&C) server. In addition, to ensure that you always access the most up-to-date data, every time you view the results it is checked against the live C&C list. Figure 1: C&C […] The post Better Results, More Incident Format Options [Product Update] appeared first on Seculert Blog on Breach Detection. [[Read more...]]
  • add this feed to my.Alltop

    Radware Blog

  • Read this List and Check it Twice — How to Protect Your Retail Business From Cyber-Attacks This Shopping Season

    Shira Sagiv
    25 Nov 2014 | 8:18 am
    As consumers are getting their shopping lists ready for the biggest shopping days of the year, businesses should get ready as well.  Cyber-attacks, and most notably DDoS attacks, are more likely to occur on high traffic days – in fact, according to a 2013 eCommerce Cyber Crime Report conducted by the Ponemon Institute, 64% of respondents say "their organizations have seen an increase in Internet fraud and/or website attacks on high traffic days such as Cyber Monday."  With financial stakes high during the holiday season, online retailers need to make sure they are prepared and…
  • ‘The Art of Cyber War’ at Black Hat 2014 in Sao Paulo

    Werner Thalmeier
    24 Nov 2014 | 6:39 am
    This week I’ll be attending the Black Hat Conference in Sao Paulo (… my first time in Brazil and I’m really looking forward to it!) and I was given the exciting opportunity to discuss some of the latest cyber-crime trends that we’ve seen at Radware. Cyber-attacks have become so prevalent that nearly every online business, financial service, government agency, or critical infrastructure is a likely target.  In fact, a case can be made that cyber-attacks are not just a powerful option for perpetrators, but they have risen to become a desirable weapon in their caches. A…
  • The Rise of Thingbots

    David Monahan
    19 Nov 2014 | 8:34 am
    The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it…
  • The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service

    Carl Herberger
    18 Nov 2014 | 6:58 am
    Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence in approach is needed. Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short. What was realized…
  • DDoS 2.0: Hackers Getting a Taste of their Own Medicine

    Oren Ofer
    17 Nov 2014 | 10:15 am
    Cybercrime and hacktivism are on the rise and commercial and governmental organizations are common attack targets.  But, based on recent evidence, an increasing number of cyber-attack targets are other attackers.  That’s right – attackers attacking other attackers. Recently, Radware security researchers have analyzed samples of a potentially new attack tool called “ddos.exe”.  This tool challenges the concept of honor among thieves. The alleged Denial of Service (DoS) attack tool, “ddos.exe” as implied by its name, is actually a new variant of NJRAT agent…
  • add this feed to my.Alltop

    pfSense Setup HQ

  • Nagios Installation and Configuration: Part One

    maximumdx
    26 Nov 2014 | 2:00 pm
    Nagios is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. It enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes, and offers monitoring and alerting services. It alerts the users when things go wrong, and alerts them a second time when the problem has been resolved. Nagios was originally designed to run under Linux, but it also runs well on other Unix variants. It is licensed under the terms of the GNU GPL version 2. It was originally created under the name…
  • netio: A Network Benchmark Tool

    maximumdx
    17 Nov 2014 | 2:00 pm
    netio in action under pfSense 2.1.5. netio is a network benchmark utility for OS/2 2.x, Windows, Linux and Unix. It measures the net throughput of a network via TCP and UDP protocols using various different packet sizes. For netio to run a benchmark, one instance has to be run on one computer as a server process, while another instance is used on another computer to perform the benchmark. Starting with version 1.20, multi-threading support is required. While this does not affect anyone using the program under Linux or BSD, it did mean that DOS was no longer supported. netio: Installation and…
  • HAProxy Load Balancing: Part Three

    maximumdx
    11 Nov 2014 | 3:00 am
    Editing the HAProxy pool under pfSense 2.1.5. In the previous two articles in this series, we introduced HAProxy and began looking at configuration of HAProxy under pfSense. In this article, we conclude our look at HAProxy configuration. In the HAProxy Listener configuration tab, we had gotten as far as “Balance“. The next setting is “Stats Enabled“, which simply enables the saving of HAProxy statistics. If this check box is checked, 4 additional settings will appear: “Stats Realm“, “Stats Uri“, “Stats Username“, and “Stats…
  • Amazon Affiliate Purchases: October 2014

    admin
    8 Nov 2014 | 9:35 am
    Here are some of the items readers bought through my Amazon affiliate links: Coolerguys Programmable Thermal Fan Controller with LED Display EnGenius Technologies Dual Band 2.4/5 GHz Wireless AC1200 Router with Gigabit and USB (ESR1200) Fan Controller FC5V2 Black, Version 2, Changeable Display Colors, 30W per Channel, Controls up to 4 fans, RPM and TempretureDisplay Samsung Electronics 840 EVO-Series 1TB 2.5-Inch SATA III Single Unit Version Internal Solid State Drive MZ-7TE1T0BW The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall A special thanks to everyone who used my affiliate…
  • HAProxy Load Balancing: Part Two

    maximumdx
    3 Nov 2014 | 2:00 pm
    Listener configuration in HAProxy under pfSense 2.1.5. In the previous article, we introduced HAProxy as a load balancing solution for TCP and HTTP-based applications. In this article, we will continue our look at HAProxy configuration. The next setting in the “Settings” tab is “Global Advanced pass thru“, which is for text that you would like to pass through to the global settings area. The next section is “Configuration synchronization“. The first check box allows you to synchronize the HAProxy configuration to back up CARP members via XML-RPC, a remote…
 
  • add this feed to my.Alltop

    Tips4Tech Blog

  • Is Privacy More Important to the Media, Businesses or Consumers?

    Allan Pratt
    17 Nov 2014 | 9:19 pm
    There is no denying that businesses need to be more diligent in protecting their customers’ data, but with all the data breaches publicized in the mainstream media, who cares more about privacy? What do you think: businesses or consumers? Despite the many data breaches, consumers continue to provide their Personally Identifiable Information (PII) to medium size businesses. At the top of the list, this confidential information may include full name (first and last), home address, phone numbers, and email address. Depending on the business, requested information may also include social…
  • What Can Your Business Learn about #Privacy from the UK Direct Marketing Association?

    Allan Pratt
    1 Nov 2014 | 4:03 pm
    It seems as if a day doesn’t go by without notification by the media of a major data breach. If you’re a member of the C-Suite of a midsize business, you probably spend a good deal of time thinking about how to protect your data as well as your business reputation. I recently read some surprising news from a British marketing group (1) and offer it as a lesson for all businesses – no matter where your corporate headquarters may be located and how many offices you may have. In August 2014, the UK Direct Marketing Association released a new privacy code of practice to address customer…
  • Top 10 Tips to Share with Employees During Cyber Security Awareness Month (#NCSAM)

    Allan Pratt
    9 Oct 2014 | 7:28 pm
    There is no dispute that data breaches are becoming more common, and as a result, online safety and the protection of personally identifiable information (PII) are hot topics in the mainstream media. Therefore, the month of October presents an excellent opportunity for all businesses, especially midsize businesses, to remind employees about their responsibilities when it comes to protecting corporate data. Here are my top ten tips to share with employees during Cyber Security Awareness Month: [1] Complex Passwords All passwords should be at least 10 characters and include lower and upper case…
  • Are You Integrating Security into Your Celebration of #CXDay?

    Allan Pratt
    1 Oct 2014 | 7:47 pm
    Is the first Tuesday of October marked as a special date on your calendar? If not, the significance around social channels will alert you to this hashtag. The second Tuesday in October is #CXDay, and according to Annette Franz (@CXJourney on Twitter), “It’s a celebration of customer experience professionals, those folks who work tirelessly to design and deliver a great customer experience to their customers. The day is meant to continue to raise awareness of the importance of the customer experience.” My grad school studies were in marketing, so while my professional focus…
  • Don’t Forget Security When It Comes to E-Waste

    Allan Pratt
    24 Sep 2014 | 7:43 pm
    With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. But as you dream, what will you do with all your current devices? As you wonder where you’ll take your outdated smartphones, tablets, and desktops, either conduct a Google search for your nearest e-waste drop-off location or use a convenient app on your smartphone to find a location. But, whatever you do, take security precautions.
  • add this feed to my.Alltop

    blackstratus.com

  • How Safe Is Cloud Security?

    Rich Murphy
    18 Nov 2014 | 9:49 am
    Over the past year, the initial wave of enthusiasm for all things cloud-based has generally subsided, with a growing tide of skepticism emerging about the limits of its usefulness as a platform. Inspired by a number of high-profile security breaches, there is also skepticism about its security. While part of this is the inevitable backlash that occurs whenever something becomes trendy in tech, the security issue in particular is one that merits further investigation. While it’s reasonable to question whether or not your important data is safe in the cloud, it’s equally important to not…
  • Traditional and Software-Defined Networking

    Rich Murphy
    5 Aug 2014 | 3:00 am
    Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud computing. What Is Software-Defined Networking? Software-defined networking was pioneered between 2008 and 2011 by work done at Stanford University and the Nicira Company (now part of VMware). The basic premise behind SDN is that by separating control of network functions from hardware devices, administrators acquire more power to route and direct traffic in response to changing requirements. As…
  • Understanding Cloud Security Models

    Don Carfagno
    22 Jul 2014 | 2:00 am
    When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach to software-as-a-service and can have different security implications. The public cloud — Public cloud service is delivered over the Internet, typically on a pay-per-use model, meaning a business is charged only for the storage it needs. Public cloud models are ideal for small- or medium-sized organizations that prioritize collaboration. Because public cloud service providers rely on…
  • How to Implement Server Virtualization in Your Business

    Rich Murphy
    1 Jul 2014 | 3:00 am
    In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server virtualization has gained popularity in recent years, there’s still some confusion about how it works, what the benefits are and how to get started. Let’s take a look at some of the best ways to implement server virtualization in a small or medium sized business environment. What Is Server Virtualization? Server virtualization is a process when a physical server is segmented into a number of…
  • Security and Operational Efficiency

    Don Carfagno
    27 Jun 2014 | 11:47 am
    Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy and cost-effective to maintain while still providing complete protection of your data, applications and other valuable assets. In fact, the key to efficient, effective security is not necessarily to throw money at the problem, but to prioritize how and when resources are deployed. Some areas to focus on include: User training: Many IT managers assume that users will know how to securely access…
  • add this feed to my.Alltop

    Milton Security

  • Sony Pictures Entertainment Taken Down By Hackers

    Milton Security Group
    24 Nov 2014 | 3:10 pm
    Sony Pictures Entertainment’s corporate network was breached and taken offline today by attackers. Employees attempting to use the network discovered an image that claimed that they’d been hack by #GOP. The image also claimed that the attackers had acquired all internal data and would release it publicly if their requests were not met. The requests were not listed in the image. The message from “#GOP” warned that the allegedly stolen data would be released November 24th at 11 p.m. GMT, which is 3 p.m. PST/6 p.m. EST today. It was also reported that a large number of Sony Twitter…
  • DerpTrolling releases large number of Username and Passwords

    Milton Security Group
    21 Nov 2014 | 9:53 am
    Hacker Group, DerpTrolling, are claiming to be responsible for the massive Denial of Service attack on Blizzard’s servers last week during the release of the expansion pack, Warlords of Draenor. They have published a lengthy list of customer account information from the PlayStation Network, 2K Game Studios and Windows Live. The Pastebin document reads, “Dear Internet, the following is a very small portion of Lord Gaben and the rest of his crew’s glorious raids across the high seas of the Internet.” The Pastebin document includes usernames and passwords for 2,131 PSN users;…
  • Suspected WireLurker Creators Arrested in China

    Milton Security Group
    18 Nov 2014 | 10:25 am
    Two weeks after the WireLurker malware was revealed, three suspects have been arrested as possible authors of the Mac and iOS-based malware, and for distributing the WireLurker malware through a Chinese third-party online app. The Beijing Bureau of Public security announced, after an investigation done with the help of local security firm, Qihoo 360, the arrest of the three suspects. They have also said that the website that responsible for spreading the malware has been shut down. WireLurker is a hybrid malware, originally discovered earlier this month by Palo Alto Networks. It was found to…
  • Fingers Point At China After Cyber Attacks on Weather Network

    Milton Security Group
    12 Nov 2014 | 1:26 pm
    The Washington Post ran a story today alleging that China had launched a successful cyber attack on the Federal Weather Network, sending cyber security teams in to a scurry as they attempted to isolate data regarding disaster planning, aviation and shipping. On top that, they are alleging that the National Oceanic and Atmospheric Administration (NOAA) kept the breach under wraps instead of reporting it in a timely manner. Despite the fact that the breach is believed to have occurred in late September, NOAA gave no indication of a problem until October 20, and even then did not disclose the…
  • USPS Hacked! 800,000+ Could be Affected

    Milton Security Group
    10 Nov 2014 | 11:11 am
    The United States Postal Service announced today that they have been the victims of a data breach. 800,000+ people may have been affected, including current and former employees, regulators, and customers. The potentially compromised information of employees includes: names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment, and emergency contact information. “Postal Service transactional revenue systems in Post Offices as well as on usps.com where customers pay for services with credit and debit cards have not been affected by this incident,” said…
 
  • add this feed to my.Alltop

    Cyberoam : Securing You

  • Apple Users Becoming #1 Target

    Cyberoam
    23 Nov 2014 | 11:07 pm
    The Cyberoam co-branded CYREN Internet Threats Trend report for Q3 is out! Download your copy right away! The report highlights an unusual rise in attacks on Apple platforms, along with CYREN analytics that indicate a considerable increase in Apple Users being targeted. In early September of the world learned of celebrity photos being leaked on the Internet. Celebrities have been often known for their preferences with Apple products over others and the news took no time to spread that cybercriminals gained access to the photos by hacking into the Apple’s iCloud service. Investigators…
  • Kerberos Vulnerability affecting Windows Servers

    Cyberoam Threat Research Labs
    19 Nov 2014 | 3:39 am
    A privilege escalation vulnerability has been found in implementations of Kerberos Key Distribution Center (KDC) in Microsoft Windows, which supplies session tickets and temporary session keys to users and computers in an Active Directory domain. It has been found that Microsoft Kerberos KDC implementations fail to properly validate signatures, which can allow for certain aspects of a Kerberos service ticket to be forged. Exploiting the vulnerability, an attacker with valid domain credentials can gain domain administrator privileges, which can be used to further compromise any computer in the…
  • Schannel Remote Code Execution Vulnerability puts users as risk

    Cyberoam Threat Research Labs
    18 Nov 2014 | 9:39 pm
    A remote code execution vulnerability has been found in Microsoft Schannel – the security support provider package for internet applications running on HTTP. It is Microsoft’s implementation of SSL/TLS encryption. The vulnerability is due to improper processing of specially crafted packets. A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the target machine. Successful exploitation could result in arbitrary code execution on the affected system. The vulnerability has widely been considered highly critical and users are advised…
  • The Windows OLE flaw taken down after 2 decades of hiding

    Cyberoam Threat Research Labs
    13 Nov 2014 | 5:46 am
    A code execution vulnerability has been reported in Microsoft Windows Object Linking and Embedding (OLE).  OLE allows embedding and linking to documents and other objects and is proprietary technology developed by Microsoft. The vulnerability is due to Internet Explorer improperly accessing OLE objects in memory. It has been found that during Array Resize using redim preserve keyword, the size of the array can be changed. The problem occurs when error is encountered while allocating the new array size, as a result the old array size is not restored, which can be used to read/write access to…
  • Yet again Microsoft Internet Explorer is vulnerable!

    Cyberoam Threat Research Labs
    12 Nov 2014 | 2:07 am
    Once again Microsoft Internet Explorer is vulnerable. A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user. Microsoft has issued an advisory regarding this vulnerability: https://technet.microsoft.com/en-us/library/security/MS14-056 The…
  • add this feed to my.Alltop

    blackstratus.com

  • How Safe Is Cloud Security?

    Rich Murphy
    18 Nov 2014 | 9:49 am
    Over the past year, the initial wave of enthusiasm for all things cloud-based has generally subsided, with a growing tide of skepticism emerging about the limits of its usefulness as a platform. Inspired by a number of high-profile security breaches, there is also skepticism about its security. While part of this is the inevitable backlash that occurs whenever something becomes trendy in tech, the security issue in particular is one that merits further investigation. While it’s reasonable to question whether or not your important data is safe in the cloud, it’s equally important to not…
  • Traditional and Software-Defined Networking

    Rich Murphy
    5 Aug 2014 | 3:00 am
    Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud computing. What Is Software-Defined Networking? Software-defined networking was pioneered between 2008 and 2011 by work done at Stanford University and the Nicira Company (now part of VMware). The basic premise behind SDN is that by separating control of network functions from hardware devices, administrators acquire more power to route and direct traffic in response to changing requirements. As…
  • Understanding Cloud Security Models

    Don Carfagno
    22 Jul 2014 | 2:00 am
    When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach to software-as-a-service and can have different security implications. The public cloud — Public cloud service is delivered over the Internet, typically on a pay-per-use model, meaning a business is charged only for the storage it needs. Public cloud models are ideal for small- or medium-sized organizations that prioritize collaboration. Because public cloud service providers rely on…
  • How to Implement Server Virtualization in Your Business

    Rich Murphy
    1 Jul 2014 | 3:00 am
    In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server virtualization has gained popularity in recent years, there’s still some confusion about how it works, what the benefits are and how to get started. Let’s take a look at some of the best ways to implement server virtualization in a small or medium sized business environment. What Is Server Virtualization? Server virtualization is a process when a physical server is segmented into a number of…
  • Security and Operational Efficiency

    Don Carfagno
    27 Jun 2014 | 11:47 am
    Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy and cost-effective to maintain while still providing complete protection of your data, applications and other valuable assets. In fact, the key to efficient, effective security is not necessarily to throw money at the problem, but to prioritize how and when resources are deployed. Some areas to focus on include: User training: Many IT managers assume that users will know how to securely access…
  • add this feed to my.Alltop

    Cognoscape, LLC

  • How Cloud Backup Can Keep Your Business Data Secure

    multipage
    20 Nov 2014 | 1:00 am
    Data backup used to be a lot more difficult than it is now. Remember the days of floppy disks? Fortunately, the system eventually made its way to CDs and then external hard drives, but it is even easier than that. Did you ever wonder what would happen in the disks got into the wrong hands or they burned up in a fire? You do not have to worry about any of that with a cloud backup; it is safe, secure, and not as risk for catching on fire. Discover the many ways a cloud backup can keep your business data secure. Remember, to benefit from data archiving, you have to actually back up the files.
  • Six Awesome Benefits of the iPhone 6

    multipage
    6 Nov 2014 | 2:00 am
    Image: Hadrian / Shutterstock.com   So, do you have an iPhone 6 yet? If not, what are you waiting for? Apple has again successfully launched a sophisticated piece of engineering greatness and functional technology. If you have not yet purchased your iPhone 6, you are still getting used to its plethora of features, or you need a little more convincing, you may discover the answers to all of your iPhone 6 questions by the end of this post. In Dave Pogue’s review on Yahoo!, he called the latest version a “thin, sexy phone with a killer camera.” Explore with us the six awesome…
  • 5 Scenarios That Could Put You Out Of Business If You Don’t Have a Disaster Recovery Plan

    multipage
    23 Oct 2014 | 2:00 am
    Taking time and money to back up your company data is extremely burdensome, but make no mistake – having a disaster recovery plan is absolutely necessary. Many companies have perished after experiencing a devastating IT catastrophe. Here are 5 scenarios that could leave your businesses in pieces if you haven’t invested in disaster recovery. Can Your Company Survive Disaster? Could your company goes weeks without revenue? Most business owners would say no! Regardless of what type of disaster may come your way, most will leave you scrambling to pick up the pieces if you haven’t…
  • The Top 4 Ways You Can Benefit From Managed Services

    Cognoscape
    9 Oct 2014 | 2:00 am
    Choosing to switch to a Managed service provider, or MSP, may seem like a scary move to businesses. Having an IT professional in house seems like the most comfortable option. They are there all the time, so you can see them! Here at Cognoscape, our Dallas managed services solutions go well beyond the scope of IT management. They play a significant role in maximizing your productivity, minimizing your costs allowing you to redistribute resources and grow your company. Financial Implications of Managed Services Providers First, let’s take a look at numbers. Each individual employee you…
  • Top 5 Reasons You Need Network Security At Work

    Cognoscape
    2 Oct 2014 | 2:00 am
    Conducting day to day business can be consuming and stressful. Making sure that your company network is secure does not always rank number one on your list of things to do. There are so many things that need to be tended to! Here are the top 5 reasons why network security should be your top priority: 1. First and foremost, without network security at work your livelihood is at stake. As a business owner, most of your important documentation and records are stored on a computer. Leaving your network unprotected means that at any time your system could be infiltrated by unwanted viruses,…
 
Log in