Network Security

  • Most Topular Stories

  • 4 Things You Should Know About Social Engineering

    The Redspin Report
    mmak
    16 Oct 2014 | 11:03 am
    No matter how many firewalls are put up or how complex passwords may be, if your employees are unknowingly giving out their credentials to strangers, your information security will never be immune to breach. A recent flash poll conducted on security professionals by Dark Reading found that the biggest social engineering threat to organizations is not a specific type of scam, but a general lack of employee awareness. Social engineering is a tactic by which intruders use psychological manipulation [ Read More ]
  • How Safe Is Cloud Security?

    blackstratus.com
    Rich Murphy
    18 Nov 2014 | 9:49 am
    Over the past year, the initial wave of enthusiasm for all things cloud-based has generally subsided, with a growing tide of skepticism emerging about the limits of its usefulness as a platform. Inspired by a number of high-profile security breaches, there is also skepticism about its security. While part of this is the inevitable backlash that occurs whenever something becomes trendy in tech, the security issue in particular is one that merits further investigation. While it’s reasonable to question whether or not your important data is safe in the cloud, it’s equally important to not…
  • POS malware: Potent threat remains for retailers

    symantec.com
    Symantec Security Response
    20 Nov 2014 | 9:14 am
    The retail industry continues to be a low-hanging fruit for attackers and attacks are likely to continue until the full transition to more secure payment technologies. Twitter Card Style:  summary As Americans gear up for another holiday shopping season, the threat posed by point-of-sale malware remains high. More than a year after the discovery of the first major attacks against POS networks, many US retailers are still vulnerable to this type of attack and are likely to remain so until the complete transition to more secure payment card technologies in 2015.  read more
  • Nessus v6 is Now Available

    Tenable Network Security Blog
    Paul Asadoorian
    18 Nov 2014 | 7:00 am
    Today Tenable has released Nessus v6 for download. This latest version helps reduce your attack surface by enforcing compliance and system hardening policies.
  • Privacy Groups Release 'Detekt' Tool to Spot Spyware

    Dark Reading:
    Brian Prince
    21 Nov 2014 | 1:25 pm
    Privacy advocates have joined together to release a tool for identifying cyber espionage malware.
 
 
 
  • add this feed to my.Alltop

    Feed: Blogs

  • Enterprise-Scale Data Protection for Microsoft Hyper-V Environments

    George Chetcuti
    20 Nov 2014 | 8:10 am
    Unitrends Bolsters Enterprise-Scale Data Protection and Leadership for Microsoft Hyper-V Environments. Release 8.0 software features NDMP backups for EMC and NetApp arrays, complete protection and recovery for Hyper-V, and performance and deduplication advances.
  • IT Security Best Practices for Educational Organizations

    George Chetcuti
    20 Nov 2014 | 7:28 am
    Netwrix Releases Top IT Security Best Practices for Educational Organizations to Ensure Integrity of IT Infrastructure. Three steps academic institutions can take to enable advanced protection of IT systems against security incidents.
  • Security updates available for Adobe Flash Player

    George Chetcuti
    14 Nov 2014 | 6:37 am
    November 11, 2014 Adobe recommends users to update their product installations to the latest versions.
  • Ensuring IT Infrastructure Security for Government Agencies

    George Chetcuti
    13 Nov 2014 | 7:10 am
    Netwrix Corporation outlines the best practices for government agencies to secure IT infrastructure and adhere to compliance requirements.
  • Belkin n750 buffer overflow

    George Chetcuti
    10 Nov 2014 | 7:56 am
    Vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root access to the operating system of the affected device.
  • add this feed to my.Alltop

    TaoSecurity

  • Response to "Can a CISO Serve Jail Time?"

    17 Nov 2014 | 8:30 am
    I just read a story titled Can a CISO Serve Jail Time? Having been Chief Security Officer (CSO) of Mandiant prior to the FireEye acquisition, I thought I would share my thoughts on this question.In brief, being a CISO or CSO is a tough job. Attempts to criminalize CSOs would destroy the profession.Security is one of the few roles where global, distributed opponents routinely conduct criminal acts against business operations. Depending on the enterprise, the offenders could be nation state adversaries largely beyond the reach of any party, to include the nation state hosting the…
  • Thank You for the Review and Inclusion in Cybersecurity Canon

    10 Nov 2014 | 2:27 pm
    I just read The Cybersecurity Canon: The Practice of Network Security Monitoring at the Palo Alto Networks blog. Rick Howard, their CSO, wrote the post, which marks the inclusion of my fourth book in Palo Alto's Cybersecurity Canon. According to the company's description, the Canon is:a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in a cybersecurity professional’s education that will make the practitioner incomplete.The Canon candidates include both fiction and…
  • We Need More Than Penetration Testing

    16 Sep 2014 | 9:47 am
    Last week I read an article titled  People too trusting when it comes to their cybersecurity, experts say by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post:[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes. When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete…
  • A Brief History of Network Security Monitoring

    16 Sep 2014 | 9:07 am
    Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the network security monitoring (NSM) community.Doug asked me to present the history of NSM. To convey some of the milestones in the development of this operational methodology, I developed these slides (pdf). They are all images, screen captures, and the like, but I promised to post them. For example, the image at left is the first slide from a…
  • Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

    4 Sep 2014 | 8:41 am
    I'm pleased to announce that I will be teaching one class at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is Network Security Monitoring 101. I taught this class in Las Vegas in July 2013 and 2014, and Seattle in December 2013. I posted Feedback from Network Security Monitoring 101 Classes last year as a sample of the student commentary I received.This class is the perfect jumpstart for anyone who wants to begin a network security monitoring program at their organization. You may enter with no NSM knowledge, but when you leave…
 
  • add this feed to my.Alltop

    Spyware news

  • Using expired anti-spyware can be as dangerous as having no anti-spyware!

    21 Nov 2014 | 5:54 am
    We have been saying for ages that you should always keep your anti-spyware up-to-date. No matter how insignificant it seems, it can easily save your time that you might need when trying to fix your infected computer. Of course, money is also a great factor because there are lots of viruses that can’t be eliminated […]
  • What is FBI Android virus and how to get rid of it?

    6 Nov 2014 | 12:52 am
    If you have ever been infected with FBI virus, you will definitely know how serious this infections is. For those who have never heard about it we must say that FBI virus is a dangerous cyber threat that was released several years ago. It was labeled as ransomware because it seeks to trick people into […]
  • Critical Windows vulnerability is used to spread Sandworm malware

    16 Oct 2014 | 6:23 am
    One day it’s Shellshock, the other day it’s Sandworm. What should you know about this malware that was announced with fanfare several days ago? ISIGHT, the company that discovered this virus, says that Sandworm relies on a Windows zero-day vulnerability that is known as CVE-2014-4114. Fortunately, Microsoft patched this vulnerability in October, 2014. It has also been […]
  • What should I know about Shellshock?

    1 Oct 2014 | 5:56 am
    Everyone is now talking about Shellshock. What is that and what can you do about it? Here’s what you should remember: Shellshock is a software bug, which affects the Bash – the common command-line shell that is actively used in Linux/UNIX OS and Apple Mac OS X for controlling different programs and their features. It […]
  • Hackers relaunch multi-name rogues to steal people’s money!

    8 Sep 2014 | 11:52 pm
    Just imagine: you start your computer one day and see a window showing how Win 7 Antivirus 2014 scans your PC system. After performing it, this program informs you about a long list of viruses, including trojans, adware and other threats. Naturally, it offers you to remove these threats from your computer in exchange for […]
  • add this feed to my.Alltop

    Schneier on Security

  • Friday Squid Blogging: Cephalopod Cognition

    schneier
    21 Nov 2014 | 2:09 pm
    Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently available in hardcover, and the paperback edition will be available next week.
  • Pre-Snowden Debate About NSA Call-Records Collection Program

    schneier
    20 Nov 2014 | 12:42 pm
    AP is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code-breaker who rose to top management, had just learned in 2009 about the top secret program that was created shortly after the Sept. 11, 2001, attacks. He says he argued to then-NSA Director Keith Alexander that storing the calling records of nearly every American fundamentally changed the character of the agency, which is supposed to eavesdrop on foreigners, not Americans. Hacker News thread.
  • Citadel Malware Steals Password Manager Master Passwords

    schneier
    20 Nov 2014 | 7:51 am
    Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target.
  • A New Free CA

    schneier
    18 Nov 2014 | 10:38 am
    Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely fantastic idea. The anchor for any TLS-protected communication is a public-key certificate which demonstrates that the server you're actually talking to is the server you intended to talk to. For many server operators, getting even a basic server certificate is just too much of a hassle. The application process can be confusing. It usually costs money. It's tricky to install correctly. It's a pain to update. Let's Encrypt is…
  • Whatsapp Is Now End-to-End Encrypted

    schneier
    18 Nov 2014 | 10:35 am
    Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper Systems, which scrambles messages with a cryptographic key that only the user can access and never leaves his or her device. I don't know the details, but the article talks about perfect forward secrecy. Moxie Marlinspike is involved, which gives me some confidence that it's a robust implementation. EDITED TO ADD (11/20): SlashDot thread.
  • add this feed to my.Alltop

    Infosec Events

  • Week 46 In Review – 2014

    md
    17 Nov 2014 | 11:02 am
    Events Related Amazon Fire Phone, iPhone, Nexus 5, Samsung S5 All Popped At Mobile Pwn2Own – forbes.com A slew of the world’s most popular smartphones have been prized open at the Mobile Pwn2Own hacking contest in Tokyo, Japan this week. Hosted by the HP Zero Day Initiative, the competition offered up big cash prizes for those who could successfully show off their exploits and a handful whitehats managed to break security protections on the Amazon Fire Phone, iPhone 5S, LG Nexus 5 and the Samsung S5. HP TippingPoint + Mobile Pwn2Own = Zero Day Filter Protection – h30499.www3.hp.com HP…
  • Week 45 In Review – 2014

    md
    11 Nov 2014 | 8:46 am
    Resources Secure messaging scorecard – eff.org Many companies offer “secure messaging” products—but are these systems actually secure? EFF decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto. Google Study: Email Users 36 Times More Likely To Get Scammed If Friends’ Accounts Get Hacked – consumerist.com So you think your job is done — you’ve secured your email against hackers by thinking up the best password in the entire world. You’re safe, or so you think. But a new study from Google says that if your friends and email contacts…
  • Week 44 In Review – 2014

    md
    3 Nov 2014 | 1:19 pm
    Events Related Inside BlackHat Europe 2014 – blog.fortinet.com The conference started with Adi Shamir’s keynote. Axelle Apvrille was really happy to listen to such a brilliant mind like Adi Shamir. In this blog post, Axelle has given his personal opinion on some of the best talks he attended. Resources Social-Engineer, Inc. Releases Annual Report on DEF CON 22 Social Engineering Capture the Flag (SECTF) Contest – social-engineer.org Social-Engineer, Inc., the leader in social engineering security testing, awareness and training, announced the release of the fifth annual…
  • Information Security Events For November

    sheila
    3 Nov 2014 | 1:16 am
    Here are information security events in North America this month:   21st ACM Conference on Computer and Communications Security : November 3 to 7 in Scottsdale, AZ,USA   7th International Symposium on Foundations & Practice of Security (FPS-2014) : November 3 to 5 in Montréal, Canada   CISO Executive Summit Boston : November 3 in Boston, MA, USA   SafeConfig 2014 : November 3 in Arizona, USA   TrustED 2014 : November 3 in Scottsdale, AZ, USA   CISO Executive Summit St. Louis 2014 : November 4 St. Louis, MO , USA   Cybercrime Prevention Summit 2014 :…
  • Week 43 In Review – 2014

    md
    27 Oct 2014 | 1:19 pm
    Events Related Hack.lu 2014 Wrap-Up Day #1 – blog.rootshell.be After attending BlackHat last week in Amsterdam, Xavier is now in Luxembourg until Friday to attend the 10th edition of Hack.lu. here is Xavier’s wrap-up for the first day. As usual, the first day started via a first bunch of workshops. Hack.lu 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier’s small wrap-up for the second day. There was again some Cisco forensics workshops on the schedule, that’s why he was not able to attend all that day’s talks. Hack.lu 2014 Wrap-Up Day #3 – blog.rootshell.be Here’s…
 
  • add this feed to my.Alltop

    Security Catalyst

  • Catalyst Weekly Rewind – Value in time and passwords

    Michael Santarcangelo
    17 Nov 2014 | 6:53 am
    As we start another week, take a moment to pause, rewind, and replay the highlights from last week. This captures the work I published, elements I shared, and offers some insights in where I’m focusing some energy. Connection, context, and conversation are encouraged! Quote of the week This week I came across a word that really resonated with me: meraki: (verb) do something with soul, creativity, or love; to put something of yourself into your work I hope you get to experience some this week! Created: What I published this week To increase value, you need to know what your time is really…
  • ICYMI Nov 10 – Weekly Rewind – 3 questions

    Michael Santarcangelo
    10 Nov 2014 | 4:09 am
      Welcome to the weekly rewind – a chance to play last week again. This is my latest attempt to figure out the right way to blend various writing efforts — now spreading over more platforms — together. It also captures the content I shared last week in one convenient place. I’ll try this for a few weeks – feedback welcomed! I’ll include some notes about what I’m working on below, too. Check ‘em out. Quote of the week Don’t judge each day by the harvest you reap but by the seeds that you plant. – Robert Louis Stevenson Created: What I published this…
  • DtR Security Newscast: why CISOs get no respect, how many passwords?, and more

    Michael Santarcangelo
    12 Aug 2014 | 9:34 am
    Recording the Security Newscasts is a real blast. Hopefully that comes through when you listen in! I invite you to listen to the latest episode of the Down the Rabbithole (DtR) Security Newscast for August 11, 2014– with Raf Los (@Wh1t3Rabbit) and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. More than a run-down of the news, it’s our unfiltered (but safe for work) discussion of top stories. We usually inject some passion and and some divergent thinking to fuel your week. This…
  • Monday Motivation – the power of perspective

    Michael Santarcangelo
    11 Aug 2014 | 7:50 am
      Something to think about Perspective is essential. Similar to context, our perspectives change. Evident from the top of a tall building, where everything below looks like a model, and people the size of ants. Or gazing out at the vastness of the ocean. Sometimes our perspectives shift based on location. Other times experience does the trick. A key to success is to accept and embrace other perspectives. Location, experience, and the views of the people we serve, work with, and share our world with. Those perspectives give us depth. They inform decisions. They allow us to understand…
  • Monday Motivation – Be a Beginner Every Day

    Michael Santarcangelo
    4 Aug 2014 | 3:24 am
    Something to think about Sometimes we get so bogged down with reality that we stop seeing the possibilities. Lately I’ve learned to delight in the joy of our youngest when she spots a squirrel or bird in the back yard (it happens often). I love listening to the majestic and unfettered plans of her older siblings. They don’t see the bounds that many of us have placed on ourselves. Sometimes what holds us back is the way we see things. Our experience, our scars, or discomfort narrows the path until we see few options. This week, consider a reboot. In some small way — or…
  • add this feed to my.Alltop

    Dr Anton Chuvakin Blog PERSONAL Blog

  • Links for 2014-11-12 [del.icio.us]

    Anton Chuvakin
    13 Nov 2014 | 12:00 am
    How Enterprises Can Get The Most From Threat Intelligence
  • Monthly Blog Round-Up – October 2014

    1 Nov 2014 | 11:11 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: My classic PCI DSS Log Review series is always popular! The series of 18 posts cover a comprehensive log review approach (OK for PCI DSS 3.0 as well), useful for building log review processes and procedures , whether regulatory or not. It is also described in more detail in our Log Management book. “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the…
  • Links for 2014-10-06 [del.icio.us]

    Anton Chuvakin
    7 Oct 2014 | 12:00 am
    How a bank knows it has been hacked | Marketplace.org
  • Monthly Blog Round-Up – September 2014

    1 Oct 2014 | 8:20 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. “Top 10…
  • Links for 2014-09-26 [del.icio.us]

    Anton Chuvakin
    27 Sep 2014 | 12:00 am
    Chip and PIN: No panacea, but worth the effort – and the cost | CSO Online
 
  • add this feed to my.Alltop

    Security Blog

  • Twitter and Information Security awareness

    Bhaskar karambelkar
    18 Nov 2014 | 10:02 am
    Wow! If Heartbleed was an 11 (on scale of 10) Shellshock is probably a 12 as it will affect many more computers! http://t.co/c7ivKcdMHa — William H. Saito (@whsaito) September 25, 2014 Twitter is giving traditional media a run for its money in many aspects, especially when it comes to getting the news out. Over the last few years a common pattern has emerged where news breaks first over Twitter or a comparable social media platform only to be picked up later by traditional media such as TV/Radio/Newspapers. In fact, most of the traditional media powerhouses have started incorporating social…
  • Weekly Intelligence Summary Lead Paragraph: 2014-11-14

    ssimpson
    14 Nov 2014 | 1:42 pm
    The majority of intelligence collected by the VCIC this week could easily be organized into two categories: serious vulnerabilities and noteworthy attacks. Microsoft released its hefty November patch update on Tuesday, but the attention wasn’t on the cumulative Internet Explorer update or the patch for a second Windows OLE vulnerability that’s being exploited in a small number of attacks. The focus was on a remote code execution vulnerability in SChannel, which is Microsoft’s SSL/TLS implementation in Windows. Add it to the long list of crypto bugs we’ve seen this year and be sure to…
  • Context Graph Based Analysis of Apple Pay Domains – Part 3 of 3

    Gabe Bassett
    10 Nov 2014 | 6:44 am
    In our previous posts we identified Apple Pay domains created after the Apple Pay announcement here.  We then aggregated them in a context graph and analyzed the features of the graph here.  We then statistically analyzed the individual clusters here.  Companion posts explaining Verum, the context graph system, can be found here and here.  In this post we will manually validate the results of the previous analysis by looking at the individual clusters previously identified through statistical analysis. Manual Cluster Validation To this point in the analysis, everything can be automated.
  • Weekly Intelligence Summary Lead Paragraph: 2014-11-07

    dkennedy
    7 Nov 2014 | 7:30 pm
    Microsoft announced intentions to release sixteen security bulletins next week.  Sixteen is the most the company has released in one month since June 2011 and one under April 2011’s high water mark.  The VCIC dedicates extra effort to targeted attacks.  Not because they are currently prevalent among our clients, but because the methods that succeed today will almost certainly be used on Verizon Enterprise clients in the future.  This week those attacks include “TooHash” (GData), “Poisoned Handover” (FireEye), “BlackEnergy 2” (and 3 from Kaspersky) and “Rotten Tomato”…
  • Context Graph Based Analysis of Apple Pay Domains – Part 2 of 3

    Gabe Bassett
    7 Nov 2014 | 10:37 am
    In our previous post, we looked at the initial creation and enrichment of a Context Graph centered around newly created Apple Pay domains.  We looked at the distribution of the Apple Pay topic throughout the graph.  In this post we will statistically compare and contrast individual clusters.  The companion post Introducing Verum: A Context Graph System – Part 2 of 2 provides additional insight into the Verum context graph system for those interested. Cluster Analysis To make the data easier to analyze with traditional means, I’ve provided a dataframe with the statistics for…
  • add this feed to my.Alltop

    symantec.com

  • POS malware: Potent threat remains for retailers

    Symantec Security Response
    20 Nov 2014 | 9:14 am
    The retail industry continues to be a low-hanging fruit for attackers and attacks are likely to continue until the full transition to more secure payment technologies. Twitter Card Style:  summary As Americans gear up for another holiday shopping season, the threat posed by point-of-sale malware remains high. More than a year after the discovery of the first major attacks against POS networks, many US retailers are still vulnerable to this type of attack and are likely to remain so until the complete transition to more secure payment card technologies in 2015.  read more
  • Annual G20 summit is attractive target for Flea attack group

    Symantec Security Response
    13 Nov 2014 | 3:44 pm
    Attackers attempt to steal information from targeted officials through spear-phishing emails. Twitter Card Style:  summary Each year, as world leaders come together to discuss a variety of global economic issues at the G20 summit, organizations with a vested interest in the event are the recipients of malicious emails from threat actors. read more
  • The four most important online security events of 2014

    Kevin Haley
    13 Nov 2014 | 1:56 am
    From major vulnerabilities to cyberespionage, Symantec looks at what the past year has brought and what it means for the future. read more
  • Operation CloudyOmega: Ichitaro zero-day and ongoing cyberespionage campaign targeting Japan

    Symantec Security Response
    12 Nov 2014 | 9:49 pm
    The campaign was launched by an attack group that has communication channels with other notorious attack groups including Hidden Lynx and the group responsible for LadyBoyle. JustSystems has issued an update to its Ichitaro product line (Japanese office suite software), plugging a zero-day vulnerability. read more
  • Microsoft Patch Tuesday – November 2014

    PraveenSingh
    11 Nov 2014 | 3:14 pm
    This month the vendor is releasing fourteen bulletins covering a total of 33 vulnerabilities. Fourteen of this month's issues are rated ’Critical’. read more
  • add this feed to my.Alltop

    Optimal Security

  • Infosec Haiku

    Chris Merritt
    22 Nov 2014 | 10:45 am
    Anata no joho sekyuritei konshu no haiku Citadel Trojan Now Targeting Your Password Managers – Beware!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Infosec Haiku

    Chris Merritt
    15 Nov 2014 | 3:03 pm
    Anata no joho sekyuritei konshu no haiku US CERT Warns That Server Twenty-Oh-Three Is Going End-of-Life   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • 14 Bulletins This Patch Tuesday and IE Cumulative Update Is Not Your Most Critical

    Russ Ernst
    11 Nov 2014 | 10:25 am
    While we enjoyed a relatively low number of patches each month so far this year, November definitely takes a big jump up with 14 total bulletins released today. 4 are critical, 8 important and 2 moderate. While this is two less than what we thought we would have today according to last week’s ANS, we still have to go back to September of last year for the last time Microsoft released this many bulletins in a single month. The good news however is the CVE count. Just 33 CVEs means fewer opportunities for the bad guys but because the software impacted is widespread, this Patch Tuesday is…
  • Infosec Haiku

    Chris Merritt
    9 Nov 2014 | 9:58 am
    Anata no joho sekyuritei konshu no haiku ‘Tis the Season to Watch Out for Phishing Email. Do Not Click That Link!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • A Whopping Patch Tuesday

    Russ Ernst
    6 Nov 2014 | 10:25 am
    IT pros will be thankful for some holiday time off at the end of this month because November Patch Tuesday will certainly keep them busy. Microsoft is set to release 16 bulletins next week, 5 are critical, 9 important and 2 moderate. We have enjoyed a relatively low number of patches each month in 2014 but November definitely takes a big jump up. We have to go back to June 2011 for the last time Microsoft released this many bulletins in a single month, although in that month there were 9 critical bulletins. The most recent monthly update that included nearly this many bulletins was when…
 
  • add this feed to my.Alltop

    TRUSTe Blog

  • TRUSTe Wins Silver 2014 US Mobile & App Design Award

    lgradman
    20 Nov 2014 | 9:49 am
    We’re excited to announce that the TRUSTe Privacy App has won the silver 2014 US Mobile & Design Award in the Utilities category! This award program acknowledges the shift in the importance of mobile apps in our everyday lives and celebrates the courage of innovators in one of the great design nations of the world. … Continue reading »
  • TRUSTe’s Agreement with the FTC

    kfreeman
    17 Nov 2014 | 11:19 am
    Chris Babel, CEO At TRUSTe we take very seriously the role we play in the privacy ecosystem and our commitment to supporting our customers. And if we fall short, we admit it, we address the issue, and we move forward. Today, an agreement was announced with the Federal Trade Commission (FTC) settling a complaint about … Continue reading »
  • Rise in Privacy Investment Evident as Companies Rush to Join New DPM Platform Beta Program

    kfreeman
    13 Nov 2014 | 7:00 am
    Today we’re excited to announce that the beta program for our Data Privacy Management Platform has reached full capacity. Numerous well-known international brands have signed-up to participate in this program, which will give them access to this comprehensive and intuitive privacy solution. The interest we’ve seen since announcing this program is a strong indicator that … Continue reading »
  • Survey Shows Growing Data Privacy Concerns In the Farming Community

    kfreeman
    10 Nov 2014 | 11:45 am
    “As the Internet of Things expands and data collection remains a multi billion dollar business, we’ll see concerns about data privacy in every sector, industry and profession,” says TRUSTe CEO Chris Babel. A recently published survey of 3,380 farmers from The American Farm Bureau Federation (AFBF) conducted from late July to September this year found that … Continue reading »
  • November Monthly Spotlight — IAPP Data Protection Congress, pii2014

    kfreeman
    4 Nov 2014 | 1:22 pm
    November 6, 11 a.m. PT/ 2 p.m. ET When Worlds Collide – Redefining the Relationship Between Privacy and Compliance  Webinar Privacy and compliance no longer exist in separate worlds — these areas are fast becoming inter-related and the relationship is being redefined. It’s crucial for governance, risk, and compliance professionals to understand data privacy as changing … Continue reading »
 
  • add this feed to my.Alltop

    iViZ Blog

  • SaaS-based Security Testing Provider iViZ being Acquired by Cigital

    admin
    7 Nov 2014 | 2:02 am
    Cigital to leverage iViZ products and technologies to introduce 3D Unlimited Application Security Testing. iViZ Security, an IDG Ventures funded pioneering cloud-based “Web and Mobile Application Security Testing” provider, is getting acquired by Cigital Inc, a leader in software security services and solutions. Founded in 2006 by former IITians Bikash Barai (CEO) and Nilanjan De (CTO), iViZ Security is a pioneer in taking penetration testing or ethical hacking to the cloud and launching its proprietary Software-as-a-Service Platform’. The innovative, 60-people product company with…
  • Shellshock Bug: A Quick Primer

    Nilanjan De
    30 Sep 2014 | 5:27 am
    What is ShellShock Bug?  Shellshock is a security vulnerability(CVE-2014-6271) in the widely used Unix Bash Shell which was discovered by Stéphane Chazelas on 12 September 2014 and disclosed on 24 September 2014. Subsequently, various researchers have discovered multiple other vulnerabilities in bash. What is the Vulnerability? The Unix Bash Shell stores exported function definitions in environment variables. When a new instance of bash is launched, it reads these specially crafted environment variables, and interprets them as function definitions. Unfortunately, due to insufficient…
  • Anatomy of Heartbleed Bug

    Nilanjan De
    30 Apr 2014 | 5:46 am
    There has been a lot of buzz about Heartbleed[1] in the news recently. In this blog post, we have tried to put together the important things that one should know about Heartbleed. What is Heartbleed? Heartbleed is the popular name given to the recently found vulnerability(CVE-2014-0160) inOpenSSL – an open-source encryption library. More specifically, this is a bug in the OpenSSL Heartbeat protocol which results in a vulnerable server to leak or bleed confidential content in its memory space (and hence the name ‘Heartbleed’).  What’s Heartbleed bug? OpenSSL is the most…
  • Penetration Testing E-commerce Applications

    jitendra.chauhan
    25 Apr 2014 | 3:46 am
    Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Why a conventional application penetration testing is not enough for E-commerce Applications? E-Commerce applications are growing in complexity, as a result conventional application penetration is simply not enough. Conventional application…
  • How effective is your SIEM Implementation?

    jitendra.chauhan
    16 Apr 2014 | 4:10 am
    During the last few penetration testing conducted for certain organizations, we have discovered a surprising fact that almost all the SIEM implementation had gaps on the implementation levels. For example, in certain cases, SIEM did not even detect at all when the internal network was conducted with rigorous penetration testing. I am not saying that all the SIEM implements are as bad as stated; however, it is mandatory to find out if your SIEM implementation is actually as effective as you perceive it. (Read More:  Is STORM Better Than HADOOP For Real Time Security Big Data Analytics?) How…
  • add this feed to my.Alltop

    SecurityWeek RSS Feed

  • Backdoored CMS Plugins Used to Hijack Web Servers

    Eduard Kovacs
    21 Nov 2014 | 12:40 pm
    Malicious CMS Plugins Used to Hijack Web Servers For Black Hat SEO Thousands of backdoored plugins and themes for popular content management systems (CMS) are being leveraged by a threat group to abuse Web servers on a large scale. read more
  • Radware Launches Hybrid DDoS Attack Protection Solution

    Mike Lennon
    21 Nov 2014 | 12:08 pm
    Radware, a company best known for its DDoS attack mitigation and application deliver appliances, this week announced a new hybrid solution designed to help enterprise organizations detect and protect against sophisticated and volumetric DDoS attacks. read more
  • WordPress 4.0.1 Released to Address Critical XSS, Other Vulnerabilities

    Eduard Kovacs
    21 Nov 2014 | 5:21 am
    With the release of WordPress 4.0.1, the developers of the popular blogging tool and a content management system (CMS) have addressed several vulnerabilities, including a critical flaw that could have been exploited to compromise websites. read more
  • Siemens Fixes Critical Vulnerabilities in WinCC SCADA Products

    Mike Lennon
    21 Nov 2014 | 5:08 am
    Vulnerabilities Expose SCADA Systems to Remote Attacks Siemens has released software updates to address two critical vulnerabilities in its SIMATIC WinCC supervisory control and data acquisition (SCADA) system, one of which could be exploited remotely by an unauthenticated attacker. read more
  • Windows RCE Vulnerability Exploited in the Wild

    Eduard Kovacs
    21 Nov 2014 | 3:40 am
    Security companies have started detecting attacks that leverage a critical remote code execution (RCE) vulnerability in Windows, which Microsoft patched last week. read more
 
  • add this feed to my.Alltop

    Free IT - Security Magazines and Downloads from alltop.tradepub.com

  • Isn't The Cloud Already Secure?

    18 Nov 2014 | 12:00 am
    Successful innovations invariably reach a transitional point at which the general population stops viewing them as shiny toys and realizes these advances are valuable assets. Eventually, like email, it becomes a tool that society can't live without.The adoption of the cloud, however, hasn't been as rapid as experts predicted. Find out who's really responsible for these cloud apps, and the benefits of having a vendor that can protect your corporate data.Request Free!
  • Why Some Things Shouldn't Go Viral

    18 Nov 2014 | 12:00 am
    Email is the most used application in any modern enterprise, yet it remains the primary avenue for sensitive corporate data to leave your network. Securing email becomes even more challenging when BYOD is introduced.Employees love using a single mobile device for work and life. On the surface, this makes a lot of sense – not only is the employee already familiar with the device, but BYOD can also help cut costs.The problem? The fact that employees are using their own devices, running a variety of operating systems, and connecting over insecure Wi-Fi networks makes data security difficult to…
  • When Worlds Collide: Cloud Apps and Financial Services

    18 Nov 2014 | 12:00 am
    Trends suggest that cloud services will soon be the new norm for financial institutions. However, there are two major hurdles to clear when moving financial data out of an on-premises network to public cloud applications: security and compliance regulations. This white paper discusses cloud access security brokers and how they can help the finance industry stay secure in the cloud as well as be compliant.Request Free!
  • Top Six Things to Consider with an Identity as a Service Solution

    17 Nov 2014 | 12:00 am
    IT doesn't like it either. After all, they're just trying to ensure the security of your enterprise but they're often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employees have work to do, and they're suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.Is there a better way?Absolutely: unified identity management with an Identity…
  • The Essentials of IT Security - Free Kit

    15 Nov 2014 | 9:20 am
    The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.The following kit contents will help you get the most out of your IT Security research:Citrix NetScaler: A Powerful Defense against Denial of Service AttacksThe Future of Backup as a Data Protection Strategy10 Network Security Tools and Tests Everyone Should UseDetecting Heartbleed With RSA Security AnalyticsRequest Free!
  • add this feed to my.Alltop

    IT-Security

  • Trust – Are You Building It or Breaking It?

    Bob Chaput
    21 Nov 2014 | 10:00 am
    In a recent edition of The Keckley Report, Paul Keckley, PHD, tackles the issue of trust within healthcare. He opens with the truism that public trust is hard to build and easy to lose. We have seen this firsthand in healthcare, as a growing number of data breaches and subpar privacy, security and compliance efforts have consistently put protected health data at risk.  Highly publicized instances at retailers such as Target and Michael’s have crippled consumer confidence with the offending brands and more broadly have influenced a declining public perception of the healthcare industry.
  • CEO-to-CEO – Top 5 Questions CEOs Should Ask Themselves & Board About Risk Management

    Bob Chaput
    19 Nov 2014 | 10:00 am
    Governance is usually defined as a system of processes and controls that ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-upon enterprise objectives to be achieved; setting direction through prioritization and decision making; and, monitoring performance and compliance against agreed-upon direction and objectives. Risk Management Governance is a strategic business practice area that is part of overall governance and ensures that: Risk management activities align with the enterprise’s opportunity and loss capacity and leadership’s…
  • How to Supercharge Your Content Marketing Strategy with RSS

    Eric Cole
    18 Nov 2014 | 7:56 am
    Content Marketing is one of those ever-changing fields of study that is constantly evolving with the demands of the masses. Historically speaking, the very first form of mass content dispersal was made possible with the printing press. Large, human operated mechanical machines printed the very first ‘copy’. Today, reaching out to a nation is reduced […] The post How to Supercharge Your Content Marketing Strategy with RSS appeared first on WP RSS Aggregator.
  • Don’t Forget the Paper! Offline Security Risks Are Alive and Well

    Bob Chaput
    17 Nov 2014 | 10:00 am
    A lost backpack retrieved in a deli in Connecticut recently provided us with a timely reminder that security risks associated with protected health information are not limited to electronic threats. Many times, good old-fashioned paper is the culprit. In this case, the lost backpack contained four notepads with handwritten sensitive information on about 400 participants in Access Health CT, the health insurance exchange operated by Connecticut under the Affordable Care Act. It’s easy to get caught up in the complexities of cybersecurity. And of course, technology presents significant…
  • Catalyst Weekly Rewind – Value in time and passwords

    Michael Santarcangelo
    17 Nov 2014 | 6:53 am
    As we start another week, take a moment to pause, rewind, and replay the highlights from last week. This captures the work I published, elements I shared, and offers some insights in where I’m focusing some energy. Connection, context, and conversation are encouraged! Quote of the week This week I came across a word that really resonated with me: meraki: (verb) do something with soul, creativity, or love; to put something of yourself into your work I hope you get to experience some this week! Created: What I published this week To increase value, you need to know what your time is…
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Topics » Security

  • Use AT&T Toggle to switch between accounts

    Mario Armstrong
    29 Oct 2014 | 3:45 am
    With all of the boons to productivity offered by smart devices, for employees, it’s becoming increasingly harder for employees to separate work time from personal time. Checking email late at night and on the weekends used to mean you were an executive, but today many workers are expected to be on call, 24/7. How can businesses continue to support an economy where employees are able to be productive via smart devices all the time, but also keep those employees happy and satisfied with their work-life balances? A two-step program could be just what your smartphone rollout needs: 1.
  • Proactive threat intelligence for successful cybersecurity

    AT&T
    10 Oct 2014 | 6:45 am
    The threats to organizations’ data grow in volume and sophistication every day – and traditional cybersecurity can struggle to keep up. A new approach is needed to meet emerging threats; one that can help predict when and where threats are likely to occur, enabling you to adopt a more effective security posture. Watch our webinar on-demand now and hear from Dr. Larry Ponemon, founder of leading industry think-tank the Ponemon Institute, and AT&T security expert Todd Waskelis as they discuss why moving from post-attack damage control to pre-attack defense is essential to help stay…
  • Threat intelligence tops the new cybersecurity agenda

    Bindu Sundaresan
    9 Oct 2014 | 3:45 am
    Security intelligence is the component missing from many organizations’ defensive arsenals. Intelligence places IT security threats in context, adding information about “who” and “why” to the technical details of “how.” Applied intelligence reinforces an organization’s security posture and directs its response in productive ways. It provides a framework for aggregation, correlation, and prediction of threats and outcomes, giving organizations an earlier warning and a guide to implementing countermeasures. Security intelligence delivers business value only when it is timely and…
  • Are you at risk of identity fraud?

    Craig Leonardi
    7 Oct 2014 | 3:45 am
    Consumers are almost twice as likely to have their identity stolen online as they are to have anything else stolen from their homes or vehicles, including the vehicle itself. Identity fraud affects over 12.6 million U.S. consumers yearly compared to physical theft which impacts 6.7 million victims per year. Over 300 million passwords were stolen last year and the count is already over a billion this year, costing business hundreds of millions of dollars in fraud and lost productivity. It is clear that relying solely on current password schemes to protect customer accounts is no longer…
  • Protect expiring domain names from malicious purposes

    Jennia Hizver
    6 Oct 2014 | 3:45 am
    Imagine a world where your name may expire if you don’t pay renewal fees! Inconceivable with respect to people, name expiration in the computer world is a commonplace. Similar to people addressing each other by easily memorizable names, computers on the Internet can also be identified using easily memorizable domain names, such as att.com. Thousands of domain names expire daily due to organizations failing to renew them. To initially obtain a domain name, an organization submits a domain registration request to an accredited entity, a domain registrar. The domain registrar confirms…
 
  • add this feed to my.Alltop

    Email management, storage and security for business email admins

  • ITU and Internet Society Join Forces to Combat Spam

    Malcolm James
    11 Nov 2014 | 7:00 am
    Partnership in the war against spam is nothing new, but it’s curious that when we do hear about countries, organizations, and law enforcement agencies teaming up, it’s usually in the context of taking down a botnet or taking a group of cybercrooks into custody. So it’s worth mentioning when a group of organizations enters a formal agreement to fight spam, if only because we’re not entirely used to seeing a proactive approach when it comes to dealing with the nasty blighter. Such is the case this week, as the International Telecommunications Union and the Internet Society announced…
  • California Court Sides With Email Marketer

    Sue Walsh
    6 Nov 2014 | 7:00 am
    Well-known marketer Guthy-Renker LLC, the masterminds behind just about every TV infomercial you can think of,  has claimed a huge victory in a California court of appeals. The court ruled that they were not in violation of the state’s anti-spam law despite the fact that their emails were sent from names like “Proactiv Special Offer” or “Wen Healthy Hair.” and from domains that could not be traced back to Guthy-Renker. California Business & Professions Code Section 17529.5(a)(2) makes it unlawful “for any person or entity to advertise in a commercial e-mail…
  • Malicious Spam Campaign Uses Fake Ebola News

    Sue Walsh
    5 Nov 2014 | 7:00 am
    Not surprisingly, spammers have latched on to the current Ebola crisis in Africa and the fears it has prompted around the world and are exploiting it for their own gain. The messages claim to be from the World Health Organization (WHO) and urge recipients to read the attached file to learn how to protect themselves. “The information and prevention listed in the attached file will help you and those around you stay safe,” claims one email. “There is an outbreak of Ebola and other diseases around that you know nothing about. Download the World Health Organization file for more information…
  • New Spam Campaign Uses Fake Wire Transfer Notices

    Sue Walsh
    31 Oct 2014 | 8:30 am
    Experts have discovered a new spam campaign aimed at corporate finance departments. The messages are made to look like invoices to be brought to the attention of the accounts payable departments, and pretend to be from the company’s CEO or another senior executive. The goal is to trick the accounting staff into paying the invoice and initiating the requested wire transfer. By the time it is discovered to be fraudulent, the scammers and the money are long gone.  “The scammers will usually send the fake wire transfer emails to employees working in the finance department of a company, as…
  • Dropbox Phishing Campaign Hosted on Dropbox Itself

    Sue Walsh
    31 Oct 2014 | 8:00 am
    Still stinging from an alleged data breach they blamed on a third party service (if you were affected, you should have been contacted by now, but they claim all of the stolen passwords were expired), Dropbox has a new security issue to deal with. This time a phishing attack targeting Dropbox users has been discovered, and the fake Dropbox login page its emails direct to is hosted on Dropbox itself. The messages claim the recipient has had a large file shared with them and tell them to visit the site and log in to view it. Clicking the included link leads to the fake login page, which also has…
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Topics » Security

  • Use AT&T Toggle to switch between accounts

    Mario Armstrong
    29 Oct 2014 | 3:45 am
    With all of the boons to productivity offered by smart devices, for employees, it’s becoming increasingly harder for employees to separate work time from personal time. Checking email late at night and on the weekends used to mean you were an executive, but today many workers are expected to be on call, 24/7. How can businesses continue to support an economy where employees are able to be productive via smart devices all the time, but also keep those employees happy and satisfied with their work-life balances? A two-step program could be just what your smartphone rollout needs: 1.
  • Proactive threat intelligence for successful cybersecurity

    AT&T
    10 Oct 2014 | 6:45 am
    The threats to organizations’ data grow in volume and sophistication every day – and traditional cybersecurity can struggle to keep up. A new approach is needed to meet emerging threats; one that can help predict when and where threats are likely to occur, enabling you to adopt a more effective security posture. Watch our webinar on-demand now and hear from Dr. Larry Ponemon, founder of leading industry think-tank the Ponemon Institute, and AT&T security expert Todd Waskelis as they discuss why moving from post-attack damage control to pre-attack defense is essential to help stay…
  • Threat intelligence tops the new cybersecurity agenda

    Bindu Sundaresan
    9 Oct 2014 | 3:45 am
    Security intelligence is the component missing from many organizations’ defensive arsenals. Intelligence places IT security threats in context, adding information about “who” and “why” to the technical details of “how.” Applied intelligence reinforces an organization’s security posture and directs its response in productive ways. It provides a framework for aggregation, correlation, and prediction of threats and outcomes, giving organizations an earlier warning and a guide to implementing countermeasures. Security intelligence delivers business value only when it is timely and…
  • Are you at risk of identity fraud?

    Craig Leonardi
    7 Oct 2014 | 3:45 am
    Consumers are almost twice as likely to have their identity stolen online as they are to have anything else stolen from their homes or vehicles, including the vehicle itself. Identity fraud affects over 12.6 million U.S. consumers yearly compared to physical theft which impacts 6.7 million victims per year. Over 300 million passwords were stolen last year and the count is already over a billion this year, costing business hundreds of millions of dollars in fraud and lost productivity. It is clear that relying solely on current password schemes to protect customer accounts is no longer…
  • Protect expiring domain names from malicious purposes

    Jennia Hizver
    6 Oct 2014 | 3:45 am
    Imagine a world where your name may expire if you don’t pay renewal fees! Inconceivable with respect to people, name expiration in the computer world is a commonplace. Similar to people addressing each other by easily memorizable names, computers on the Internet can also be identified using easily memorizable domain names, such as att.com. Thousands of domain names expire daily due to organizations failing to renew them. To initially obtain a domain name, an organization submits a domain registration request to an accredited entity, a domain registrar. The domain registrar confirms…
  • add this feed to my.Alltop

    The Redspin Report

  • Why Cyber Insurance Isn’t All It’s Cracked Up To Be

    mmak
    27 Oct 2014 | 12:57 pm
    With the number of breach victims in 2014 thus far reaching over 77 million, investing in a cyber insurance policy may sound like a good idea. But before latching on to this safety net and calling it a day, it is important to remember that cyber insurance policies are still in their early stages of development. While cyber insurance should be considered part of your risk management arsenal, it is not a substitute for regular penetration testing and vulnerability assessments. As it turns out, [ Read More ]
  • Helpful Reminders About HIPAA Security Risk Analysis

    mmak
    21 Oct 2014 | 1:20 pm
    If protecting the integrity of patient health care information were not already sufficient incentive to improve IT security, being HIPAA compliant comes with even more perks for most providers. Medicare and Medicaid Electronic Health Care Record (EHR) Incentive Programs have been implemented to provide financial incentives to eligible medical professionals and hospitals that demonstrate they have satisfied the requirements of the HIPAA Security Rule. The core objective of “Protect Electronic [ Read More ]
  • All Roads in the Digital Future Lead Through Security Says Gartner

    Dan Berger
    20 Oct 2014 | 11:09 am
    Gartner recently released their Top 10 Strategic Technology Trends for 2015. These aren't your run-of-the-mill trends mind you. These are the disruptive (and often distressing) realities that appear to be just 'round the corner and will require organizations and individuals to adapt and invest or risk being left in the evolutionary dust. While some trends have been percolating along quite nicely such as cloud computing and software-defined infrastructures and applications, I don't think the real [ Read More ]
  • 4 Things You Should Know About Social Engineering

    mmak
    16 Oct 2014 | 11:03 am
    No matter how many firewalls are put up or how complex passwords may be, if your employees are unknowingly giving out their credentials to strangers, your information security will never be immune to breach. A recent flash poll conducted on security professionals by Dark Reading found that the biggest social engineering threat to organizations is not a specific type of scam, but a general lack of employee awareness. Social engineering is a tactic by which intruders use psychological manipulation [ Read More ]
  • Redspin Events in September

    mmak
    29 Aug 2014 | 1:43 pm
    Redspin will be participating in several great healthcare and security conferences this September. Make sure you tune in to get useful information about IT security, policy compliance, and penetration testing! Stanford Medicine X  (Palo Alto, CA) "Practical Information and Security Risk Management for ePatients" by Redspin VP Chris Campbell September 6 @ 9:20am HIMSS Privacy and Security Forum (Boston, MA) Look for Redspin's co-exhibition with EMC September 8-9 The Summit of the Southeast [ Read More ]
 
  • add this feed to my.Alltop

    F-Secure Antivirus Research Weblog

  • Video: R.I.P. Internet #Slush14

    20 Nov 2014 | 2:53 am
    Mikko gave an excellent presentation at Slush 2014 on Tuesday. Check it out!R.I.P. InternetAdditional Slush videos are available on YouTube. On 20/11/14 At 12:46 PM
  • RATs threatening democracy activists in Hong Kong

    20 Nov 2014 | 2:53 am
    Hong Kong has been in the headlines lately thanks to the Occupy central campaign (#occupycentral, #OccupyHK) and the umbrella revolution (#umbrellarevolution, #UmbrellaMovement). DPHK, Democratic Party Hong Kong and Alliance for True Democracy (ATD) are central players in this movement. Recent development has turned this into more than a fight for democracy. The sites of these organizations were infected with malware, and that turned it into a fight for #digitalfreedom as well. Volexity has the story with all the technical details. It seems to be RATs (Remote Access Trojans) that could be…
  • OnionDuke: APT Attacks Via the Tor Network

    20 Nov 2014 | 2:53 am
    Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies. The malware used in this case is, however, not a version of MiniDuke. It is instead a separate,…
  • A Tale of Two Powerpoint Vulnerabilities

    20 Nov 2014 | 2:53 am
    It's been already a week after the announcement of the CVE-2014-4114 vulnerability, and the tally of the exploiters have only increased.There are even files where the metadata has remained the same, which clearly shows that they have been copied from the original as in the case of Mirtec and Cueisfry (a trojan linked to Japanese-related APT attacks). Authors behind these malware copied the PowerPoint Document originally used by BlackEnergy and just replaced the payload and the content with legitimate material found online.BlackEnergy, Mirtec, Cueisfry document metadata, respectivelyWell, if…
  • What grade does your favorite app get?

    20 Nov 2014 | 2:53 am
    Forbes' Parmy Olson published a short article about PrivacyGrade on Tuesday. What is PrivacyGrade?From PrivacyGrade's FAQ:The goal of PrivacyGrade.org is to help raise awareness of the behaviors that many smartphone apps have that may affect people's privacy. PrivacyGrade provides detailed information about an app's privacy-related behaviors. We summarize these behaviors in the form of a grade, ranging from A+ (most privacy sensitive) to D (least privacy sensitive).Here's our App Permissions' grade:Grading apps can be a very subjective thing.For example, social network integration might be of…
  • add this feed to my.Alltop

    Pcthreat.com

  • PepperZip

    22 Nov 2014 | 7:30 pm
    PepperZip is a program that creates, unpack, and compress various archive files. The program is advertised alongside PepperPdF and PepperPlayer at pepperware.net. The program may seem to be appealing; however,...
  • PC Optimizer Pro

    22 Nov 2014 | 7:30 pm
    Despite the best efforts of the online security industry to secure the exact opposite, many of its consumers continue to fall into the trap set by malicious rogue security tools like PC Optimizer Pro. This...
  • Qone8.com

    22 Nov 2014 | 7:30 pm
    Qone8.com is a search engine which returns search results from Google Search. The search engine is owned by Taiwan Shui Mu Chih Ching Technology Limited, and it very similar to such browser hijackers as...
  • Your Operating System Has Errors pop-up

    22 Nov 2014 | 7:30 pm
    When annoying pop-ups appear on your screen, it either means that you accessed an adware-related website or you have installed a potentially unwanted program on your computer. Your Operating System Has Errors...
  • V9 Redirect Virus

    22 Nov 2014 | 7:30 pm
    V9 Redirect Virus is a malicious browser hijacker which infects the system while you are browsing insecure websites or when you download spam email attachments. Once the infection gets in the system, the...
  • add this feed to my.Alltop

    Threatpost | The first stop for security news

  • FTC Shutters $120 Million Tech Support, Bogus Software Scam

    Brian Donohue
    21 Nov 2014 | 1:09 pm
    The FTC and a Florida federal court issued temporary restraining orders against a number of organizations and individuals involved in a massive telemarketing operating selling bogus software and support.
  • Threatpost News Wrap, November 21, 2014

    Brian Donohue
    21 Nov 2014 | 10:20 am
    In this week's news wrap podcast, Threatpost editors discuss an out-of-band Microsoft patch, the compromised Joomla and WordPress plug-inattack campaign and the Detekt anti-surveillance tool.​
  • Buffer Overflow Haunts Advantech WebAccess SCADA Product

    Dennis Fisher
    21 Nov 2014 | 8:00 am
    The ICS-CERT is warning users about a stack buffer overflow in the Advantech WebAccess SCADA product that could lead to arbitrary code execution. Advantech WebAccess is a SCADA and human-machine interface product that’s accessible over the Web. It’s used in a variety of industries, including energy, manufacturing, government and the commercial sector. The vulnerability affects […]
  • WordPress 4.0.1 Update Patches Critical XSS Vulnerability

    Michael Mimoso
    21 Nov 2014 | 6:52 am
    The latest version of WordPress, 4.0.1, patches a critical cross-site scripting vulnerability in comment fields that enables admin-level control over a website.
  • Most Targeted Attacks Exploit Privileged Accounts

    Brian Donohue
    20 Nov 2014 | 1:51 pm
    Most targeted attacks exploit privileged account access according to a new report commissioned by the security firm CyberArk.
 
  • add this feed to my.Alltop

    NSS Labs

  • Unicorn Just Got Real: Malware Analysis

    20 Nov 2014 | 12:00 am
    Analysis of the Dropped Malware Name: v3k.exe MD5: 74CE6CB9F8B983297F936936BCABC698 SHA1: B76B514707CD560F973DD66124D2C1101D75078A SHA-2/256: 11F5F243E07BFD173F8EEC248ADF457540926CD7E0725381DA04C46E8C39A15B The malware is a little different to that which is typically dropped from regular exploit kits and malware campaigns. The difference lies in the way in which this malware is packaged, and in its method of operation.
  • Unicorn Just Got Real

    18 Nov 2014 | 12:00 am
    Through the Cyber Advanced Warning System, NSS Labs is already observing reliable exploits for CVE-2014-6332 in the wild. Microsoft released security updates on November 11, 2014 to patch this vulnerability.
  • Having Your Virtual Cake and Eating It Too

    18 Nov 2014 | 12:00 am
    Today’s continuously evolving threat landscape and the need for business continuity mandate the need to rethink security workflows. Robust virtual data centers and considerable computing power are the ingredients for a new approach to securing critical data. With an adaptive approach, mission and business functions can continue at the same time that malware is encapsulated and monitored.
  • Technology of the Future: BDS Market Set to Explode

    29 Oct 2014 | 12:00 am
    “Assume you have been breached” has become standard advice from information security professionals today. As organizations continue to be breached, the conventional approach to information security – in which layers of best-of-breed security technologies are used to protect an organization – is being challenged. Many organizations are beginning to acknowledge that in fact it is not possible to guarantee protection.
  • Add a Dash of Cloud for a More Robust Security Infrastructure

    14 Oct 2014 | 12:00 am
    As the hype around cloud computing settles, and as organizations begin to evaluate solutions, the ability of security as a service (SaaS) solutions to improve security infrastructure becomes apparent.
  • add this feed to my.Alltop

    Private WiFi

  • Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

    Jillian Ryan
    20 Nov 2014 | 7:32 am
    As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important! This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic below to learn more about the the threats of holiday shopping and why the proliferation of mobile shopping is good for online commerce but potentially risky for…
  • CNN Meets With PRIVATE WiFi to Understand Public WiFi Exploits, Privacy Dangers

    Elaine Rigoli
    31 Oct 2014 | 1:35 pm
    CNN International sat down with PRIVATE WiFi's Intrusion Expert, Caleb Huff in Central Park this week to better understand the exploits and dangers on public WiFi networks. CNN aired its "Walk in the Park" segment on "The Business View with Nina Dos Santos" to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi. Calling WiFi hacking “extremely easy and readily available” – like a walk in the park – the CNN report shares some eye-opening realities about Internet…
  • ITRC Victim Impact Survey Findings LIVE Event

    Cristy Koebler
    23 Oct 2014 | 2:00 am
    The emotional impact of identity theft is far-reaching and extends well beyond the initial discovery and subsequent process of clearing the theft. The Identity Theft Resource Center routinely conducts focused surveys on identity theft, asking victims who have reached out for support from the organization to participate in the voluntary research to help the industry better understand the root causes, illicit methods, and recovery experience from this type of crime. The survey results are then compiled into a report that the ITRC shares with a wide variety of industry stakeholders to help…
  • Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

    Elaine Rigoli
    21 Oct 2014 | 1:55 am
    Technology is a part of our lives but it should not take over our lives – or ever compromise our children’s online safety. Because October is National Cyber Security Awareness Month (NCSAM), and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Although his day job is in the security and privacy fields, several years ago he launched Savvy Cyber Kids, a nonprofit to help keep children safer online. Last year Savvy Cyber Kids joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT.. campaign's…
  • WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

    Alok Kapur
    14 Oct 2014 | 2:53 am
    "WiFi footprint" is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality. According to Marcio Avillez, vice president of network services at a company called iPass, organizations ranging from platform players to independent coffee shops see opportunities in making WiFi available, while major telecoms operators are investing heavily in WiFi rollouts. "The proliferation of devices, especially tablets, the majority of which are WiFi only, has increased users' appetites for WiFi. These…
 
  • add this feed to my.Alltop

    Pivot Point Security

  • 5 Security Metrics That Don’t Work – And Why

    Mosi
    20 Nov 2014 | 4:00 am
    Awhile back I blogged about “Making Your Security Metrics Work For You.” That post explained why many organizations need some time to settle on the right security metrics, and often end up redefining at least a few of the metrics they originally establish. This post offers more specific guidance on metrics, which will hopefully save you time and effort. Here’s a list of 5 security metrics that haven’t worked in my experience, along with an explanation of why they failed. Metrics tied to a specific technology or system Metrics tied to specific technologies or systems will fail when the…
  • Could ISO 27001 Have Prevented the Home Depot Breach – and $3 Billion in Costs?

    John
    18 Nov 2014 | 4:00 am
    This morning I was speaking with a potential client in the retail space who was calling based on a question a board member had asked: “Would ISO 27001 have prevented the Home Depot breach?” My answer was “Probably,” which of course required explanation. ISO 27001 is an Information Security Risk Management framework.  If Home Depot was ISO 27001 certified and had considered the specific risk(s) that resulted in the breach, and if they had selected controls that mitigated those risks to an acceptable level, and if they had operated those controls properly, the breach wouldn’t have…
  • Why Personal Health Information is Worth More Off the Black Market than On It

    Robert Oliver
    17 Nov 2014 | 4:00 am
    What is the value of information? It can be hard to quantify. Organizations and society at large generally regard information as a commodity and an asset. One classic valuation of information is the amount you’d be willing to pay for it prior to making a decision. Conversely, the value of an information asset could be seen as equal to the cost of losing that asset to a competitor. In the case of personal information like names, addresses, and social security numbers, one way to reckon value is by what the market will bear. For example, I recently took note of this rather disconcerting…
  • Why You Absolutely Need SSL Certificates for Your Web Services

    Mike
    13 Nov 2014 | 4:00 am
    Recently I’ve had conversations about SSL certificates with security professionals working for a couple of Pivot Point Security’s clients. I don’t want to say that these folks flat-out didn’t care about SSL certificates, but both conversations went nowhere pretty fast. I find this attitude baffling. SSL certificates are a fundamental and vital security element for any company that offers web-based services to clients, partners or other external entities. Failing to provide valid SSL certificates to the browsers that access your web servers is like locking your front door but leaving…
  • 5 Audit Prep Suggestions for HIPAA Business Associates

    BobB
    11 Nov 2014 | 4:00 am
    The permanent HIPAA audit program that federal regulators have been promising began on October 1, 2014. OCR officials have indicated that not only covered entities (CEs), but also business associates (BAs) will be audited in the permanent program. This is not unexpected given that BAs are liable for HIPAA compliance under the HIPAA Omnibus Rule. In fact, the OCR has indicated that the upcoming audits will target BAs because the OCR believes they have more compliance problems and are inordinately at risk for breaches. Organizations with HIPAA compliance obligations—including law firms,…
  • add this feed to my.Alltop

    HOTforSecurity

  • WordPress Fixes Critical Cross-Site Scripting Flaw; WordPress 4.0.1 Released

    Lucian Ciolacu
    21 Nov 2014 | 5:09 am
    WordPress has fixed in its newest version (4.0.1) a critical cross-site scripting vulnerability that could allow anonymous attackers to compromise WordPress web sites, according to its security release. The cross-site scripting flaw, which occurs on versions from 3.0 to 3.9.2, was discovered by Jouko Pynnonen from Klikki Oy IT company. “The JavaScript injected into a comment is executed when the target user views it, either on a blog post, a page, or in the Comments section of the administrative Dashboard,” Klikki’s advisory said. “In the most obvious scenario the…
  • Thousands Fall with Each Hour for Free Audi R8 Facebook Scam

    Bianca Stanescu
    20 Nov 2014 | 9:39 am
    Over 200,000 Facebook users have fallen prey to a like-farming scam promising two free Audi R8 cars, and thousands join the victim list with each hour, according to antivirus software provider Bitdefender. The bait spreads on fraudulent web pages and Audi communities, and also targets car lovers with malicious videos picturing Audi R8 in a race against Nissan GT-R. Bitdefender was already detecting the malware spreading within the videos as JS:Trojan.JS.Likejack.A. As the name suggests, the Trojan can grab likes without users’ knowledge, making them accomplice in further cyber-crime…
  • FBI Offers $1 Million Reward for Romanian Cybercriminals

    Alexandra Gheorghe
    20 Nov 2014 | 5:16 am
    The FBI is offering a bounty of up to $1 million for information about two Romanian fugitives involved in a massive cyber fraud scheme, the bureau announced in a press release. Nicolae Popescu and Dumitru Daniel Bosogioiu made it to the FBI’s Most Wanted Cyber Fugitive List after participating in a long-term cyber-fraud conspiracy that inflicted losses of over $3 million on US businesses. “As alleged, while hiding behind international borders, Popescu and Bosogioiu engaged in a systematic cyber fraud scheme targeting primarily American consumers through U.S.-based websites,” the FBI…
  • WhatsApp Rolls Out End-to-End Encryption for Millions of Users

    Alexandra Gheorghe
    19 Nov 2014 | 6:17 am
    WhatsApp has started to fully encrypt communications by default in what may be “the largest deployment of end-to-end encryption in history,” according to news reports. The company will integrate Textsecure, an open-source software created by Open Whisper Systems. The encryption protocol will cypher messages using a key that only the user can access and is found exclusively inside the user’s device. “For the past three years, we’ve been developing a modern, open source, strong encryption protocol for asynchronous messaging systems, designed to make seamless end-to-end encrypted…
  • Alleged Backdoor Leaking Hashes in BitTorrent Sync; BitTorrent Says There’s no Backdoor

    Lucian Ciolacu
    18 Nov 2014 | 6:57 am
    Popular sharing app BitTorrent Sync has been allegedly found to contain a backdoor that was leaking hashes, according to an analysis by Hackito Ergo Sum hackers. BitTorrent Sync, which has been downloaded some 10 million times, is said to be 16 times faster than its competitors. The researchers at Hackito alleged that the apps’ backdoor was put in after the first release at NSA’s request. Photo Credit: Hackito Ergo Sum “This may be the result of NSL (National Security Letters, from US Government to businesses to pressure them in giving out the keys or introducing…
  • add this feed to my.Alltop

    Video Surveillance

  • How to use the Focus Assistant

    27 Oct 2014 | 12:12 pm
    For Axis cameras in the P13 line, like the Axis P1355 or Axis P1357, the focus assist can help you focus the camera without having to view live video, making the process easier and faster. This color coordinated process is simple to use, and this quick Axis Communications Academy video will show you how:
  • Another Unique Application for Video Surveillance: Counting Pedestrians

    17 Oct 2014 | 8:37 am
    New York City is leveraging its existing security camera system to the fullest by counting the number of footsteps of pedestrians in areas with the highest number of commuters. The city believes that the data, recorded by the surveillance cameras already installed in strategic locations, will give law enforcement and government officials valuable information to help curtail urban problems Some of these problems, among others, include public safety and trash collection. Watch the video below to learn more about the new citywide project:
  • Learn About Frame Rate and Shutter Speed with Axis

    16 Oct 2014 | 1:14 pm
    Do you know what the difference is between a camera's frame rate and its shutter speed? These settings are important to getting clear, steady videos and Axis is here to help you learn! Frame rate is the number of frames, or images, a camera captures per second. Shutter speed determines how much, or how little, light is let into the camera. Watch this 60-second video from Axis to learn more:
  • Suspects Accused of Stealing Valuable Office Equipment from Three Businesses

    9 Oct 2014 | 9:20 am
    It doesn't matter if you own or operate a retail business; regular office buildings and suites are also prime targets for thieves. According to a recent news report by ABC7news.com, three businesses in Fremont, California (Black Magic Design, Mac House Productions, and Core Microsystems) had hundreds of thousands of dollars of office equipment stolen by a group of suspects. Law enforcement claims that these were savvy thieves with experience in this type of theft by acting fast and knowledgeable in what they were doing. The good news is that Mac Productions' video surveillance cameras…
  • Learn About the Long-Distance Power of Wireless Surveillance

    1 Oct 2014 | 5:21 pm
    Whether you're securing a large college campus on need to keep an eye on remote buildings on your property, wireless surveillance systems make it easy to connect cameras over long distances. Using a system of wireless antennas and base stations, your system will send and receive data for up to 10 miles. To help you better understand this powerful technology and its uses, VideoSurveillance.com has released a new guide to wireless video surveillance. This guide covers how the systems work, what surveillance situations are ideal candidates for wireless systems, and how your business can benefit.
 
  • add this feed to my.Alltop

    Seculert Blog on Cyber Security

  • HP Revokes Digital Certificate Used to Sign Malware

    Liora R. Herman
    20 Nov 2014 | 4:00 am
    As reported by Krebs on Security, HP has performed the cyber security equivalent of a “my bad” by quietly advising customers of a digital certificate that had been used to sign malware in May 2010. The certificate, which was initially signed in error, was revoked by Verisign at HP’s request on October 21, 2014. HP […] The post HP Revokes Digital Certificate Used to Sign Malware appeared first on Seculert Blog on Cyber Security. [[Read more...]]
  • DGAs: A Domain Generation Evolution

    Aviv Raff
    18 Nov 2014 | 5:00 am
    You may remember hearing about Domain Generating Algorithms, aka DGAs, from our coverage of the PushDo malware or from the malware we dubbed DGA.Changer, or more recently from our post on the Tinba Trojan. Malware threats that contain DGAs are not new, but they are more difficult to prevent and detect. The experts in Seculert’s […] The post DGAs: A Domain Generation Evolution appeared first on Seculert Blog on Cyber Security. [[Read more...]]
  • Better Results, More Incident Format Options [Product Update]

    Liora R. Herman
    17 Nov 2014 | 5:09 am
    What’s New in Seculert Version 2.1.1 New Information in Elastic Sandbox Analysis Results Seculert’s Elastic Sandbox analysis results now indicate if a communication was found to a known Command and Control (C&C) server. In addition, to ensure that you always access the most up-to-date data, every time you view the results it is checked against the […] The post Better Results, More Incident Format Options [Product Update] appeared first on Seculert Blog on Cyber Security. [[Read more...]]
  • SECURITY INFOGRAPHIC: Why the US Needs More Cyber Security Professionals

    Liora R. Herman
    11 Nov 2014 | 10:00 pm
    In a blog post published in back in May, my colleague Doug McLean wrote that an enterprise’s attempt to find experienced, knowledgeable, and (reasonably) affordable Security Analysts these days is no longer a traditional human resource effort, but more like “searching for unicorns”. Well, fast forward a few months, and a new infographic from Norwich […] The post SECURITY INFOGRAPHIC: Why the US Needs More Cyber Security Professionals appeared first on Seculert Blog on Cyber Security. [[Read more...]]
  • More Incident Options, More Profiles [Product Update]

    Liora R. Herman
    10 Nov 2014 | 6:57 am
    What’s New in Seculert Version 2.1.0 Classify & Prioritize Incidents You can now teach Seculert to detect more important malware incidents, and classify them into different “Rings”. This function is based on information supplied by the enterprise regarding its use of web applications (portals): Employee portals used for Internal Access Employee portals used for External […] The post More Incident Options, More Profiles [Product Update] appeared first on Seculert Blog on Cyber Security. [[Read more...]]
  • add this feed to my.Alltop

    Managed File Transfer and Network Solutions

  • Preparing Trading Partner Servers For SFTP Automation

    John Carl Villanueva
    26 Oct 2014 | 3:55 pm
    Overview In order to keep transactions secure, you and your trading partners likely use SFTP and other encrypted protocols for your automated data exchanges. In this post, I'd like to share a method that can reduce the steps you typically take in applying SFTP automation to certain business processes. Here, you'll learn how to gather remote host credentials into a single entity, which you can later on reuse every time you need to construct another automated process.   Understanding the problem   Whenever you establish an SFTP connection with a trading partner, you need to specify a…
  • Poodle vulnerability (CVE-2014-3566) patched in JSCAPE MFT Server

    Van Glass
    24 Oct 2014 | 7:55 am
    The Poodle vulnerability (CVE-2014-3566) has been patched in the latest version of JSCAPE MFT Server (9.0.7.126) by disabling the SSLv3 protocol.  Customers using previous versions of JSCAPE MFT Server are encouraged to upgrade to the latest version.  For instructions on disabling SSLv3 or additional assistance please contact the Help Desk for a prompt reply. A patch for JSCAPE MFT Gateway will be made available shortly.    
  • Setting Up an SFTP Server

    John Carl Villanueva
    22 Oct 2014 | 11:39 pm
    Overview I've been going over our posts lately and just realised that, while we've managed to put together a decent collection of information regarding SFTP file transfers, we actually don't have an article that teaches how to set up an SFTP server. I'm sure some of you have been resourceful enough to go through the documentation and sift through all the relevant pages in there. But for those who just want one place for it all, this is the article for you. For this tutorial, I'll be using JSCAPE MFT Server, our managed file transfer server that supports SFTP as well as a number of other…
  • What Is An SFTP Key?

    John Carl Villanueva
    22 Oct 2014 | 12:08 am
    Overview What good is an encrypted data transfer if the information it protects still falls into the wrong hands in the end? SFTP is best known for its ability to encrypt data while in transit. But while data-in-motion encryption can secure confidential information as it traverses the network, encryption can't prevent an impostor from carrying out the download himself. For that purpose, you'll want your users to authenticate with the right password and the right SFTP key.     In this post, we'll talk about the role of SFTP keys (a.k.a. private keys) in the overall security…
  • Securing Trading Partner File Transfers w/ Auto PGP Encryption & FTPS

    John Carl Villanueva
    18 Oct 2014 | 8:50 am
    Overview PGP encryption can add another layer of protection to a trading partner file transfer already secured by FTPS. It can also provide data-at-rest encryption as soon as the file arrives at the other end. In this post, we'll show you how to set up a fully automated file transfer secured by OpenPGP and FTPS using JSCAPE MFT Server triggers.   What we'd like to do     Does that look like something you could use? Here are the steps to achieve that.   1. Import your trading partner's PGP public key   Before you can PGP encrypt a file which your trading…
  • add this feed to my.Alltop

    Radware Blog

  • The Rise of Thingbots

    David Monahan
    19 Nov 2014 | 8:34 am
    The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it…
  • The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service

    Carl Herberger
    18 Nov 2014 | 6:58 am
    Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence in approach is needed. Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short. What was realized…
  • DDoS 2.0: Hackers Getting a Taste of their Own Medicine

    Oren Ofer
    17 Nov 2014 | 10:15 am
    Cybercrime and hacktivism are on the rise and commercial and governmental organizations are common attack targets.  But, based on recent evidence, an increasing number of cyber-attack targets are other attackers.  That’s right – attackers attacking other attackers. Recently, Radware security researchers have analyzed samples of a potentially new attack tool called “ddos.exe”.  This tool challenges the concept of honor among thieves. The alleged Denial of Service (DoS) attack tool, “ddos.exe” as implied by its name, is actually a new variant of NJRAT agent…
  • Radware at Amazon Re:Invent

    Prakash Sinha
    12 Nov 2014 | 9:04 am
    If you’re attending this week’s AWS re:Invent, check out our session on Alteon VA for AWS at AWS Marketplace – Booth 228 at 2:15 pm on Thursday, November 13, 2014. At the session, we’ll discuss and demonstrate Alteon VA for AWS. Here at Radware, we recently announced the availability of Alteon Virtual Appliance (VA)® for Amazon Web Services (AWS). Alteon VA is a cloud-based application delivery controller that enables organizations to run applications across private and public cloud infrastructures, while improving overall quality of experience for users accessing…
  • How Cloud Migration and Pay-Per-Use Can Solve Your Network Infrastructure SIZING Challenge

    Yaron Azerual
    4 Nov 2014 | 8:32 am
    During the past year, I have had a few conversations with the CIO of one of our e-commerce customers in Europe. And like many online shops, his company was challenged by seasonal peaks of web traffic. I have often heard about these seasonal peaks, but I could never grasp how high they can go and their cost implications to an organization! Through our partnership with Amazon Web Services and the addition of our newest “Pay as you Go” model, we are helping customers to easily scale their network to meet such demands and ultimately, to improve their user’s experience quality.
 
  • add this feed to my.Alltop

    pfSense Setup HQ

  • netio: A Network Benchmark Tool

    maximumdx
    17 Nov 2014 | 2:00 pm
    netio in action under pfSense 2.1.5. netio is a network benchmark utility for OS/2 2.x, Windows, Linux and Unix. It measures the net throughput of a network via TCP and UDP protocols using various different packet sizes. For netio to run a benchmark, one instance has to be run on one computer as a server process, while another instance is used on another computer to perform the benchmark. Starting with version 1.20, multi-threading support is required. While this does not affect anyone using the program under Linux or BSD, it did mean that DOS was no longer supported. netio: Installation and…
  • HAProxy Load Balancing: Part Three

    maximumdx
    11 Nov 2014 | 3:00 am
    Editing the HAProxy pool under pfSense 2.1.5. In the previous two articles in this series, we introduced HAProxy and began looking at configuration of HAProxy under pfSense. In this article, we conclude our look at HAProxy configuration. In the HAProxy Listener configuration tab, we had gotten as far as “Balance“. The next setting is “Stats Enabled“, which simply enables the saving of HAProxy statistics. If this check box is checked, 4 additional settings will appear: “Stats Realm“, “Stats Uri“, “Stats Username“, and “Stats…
  • Amazon Affiliate Purchases: October 2014

    admin
    8 Nov 2014 | 9:35 am
    Here are some of the items readers bought through my Amazon affiliate links: Coolerguys Programmable Thermal Fan Controller with LED Display EnGenius Technologies Dual Band 2.4/5 GHz Wireless AC1200 Router with Gigabit and USB (ESR1200) Fan Controller FC5V2 Black, Version 2, Changeable Display Colors, 30W per Channel, Controls up to 4 fans, RPM and TempretureDisplay Samsung Electronics 840 EVO-Series 1TB 2.5-Inch SATA III Single Unit Version Internal Solid State Drive MZ-7TE1T0BW The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall A special thanks to everyone who used my affiliate…
  • HAProxy Load Balancing: Part Two

    maximumdx
    3 Nov 2014 | 2:00 pm
    Listener configuration in HAProxy under pfSense 2.1.5. In the previous article, we introduced HAProxy as a load balancing solution for TCP and HTTP-based applications. In this article, we will continue our look at HAProxy configuration. The next setting in the “Settings” tab is “Global Advanced pass thru“, which is for text that you would like to pass through to the global settings area. The next section is “Configuration synchronization“. The first check box allows you to synchronize the HAProxy configuration to back up CARP members via XML-RPC, a remote…
  • New Python Site Launched

    maximumdx
    28 Oct 2014 | 9:39 am
    Anyone who has an interest in the Python programming language might want to take a look at my latest site, pythonscript.net. I only have a few articles posted so far, but I am setting a goal of posting at least two articles a week. As someone whose forte is in C/C++ programming, I’m looking forward to using the site to further explore the world of Python. The post New Python Site Launched appeared first on pfSense Setup HQ.
  • add this feed to my.Alltop

    Tips4Tech Blog

  • Is Privacy More Important to the Media, Businesses or Consumers?

    Allan Pratt
    17 Nov 2014 | 9:19 pm
    There is no denying that businesses need to be more diligent in protecting their customers’ data, but with all the data breaches publicized in the mainstream media, who cares more about privacy? What do you think: businesses or consumers? Despite the many data breaches, consumers continue to provide their Personally Identifiable Information (PII) to medium size businesses. At the top of the list, this confidential information may include full name (first and last), home address, phone numbers, and email address. Depending on the business, requested information may also include social…
  • What Can Your Business Learn about #Privacy from the UK Direct Marketing Association?

    Allan Pratt
    1 Nov 2014 | 4:03 pm
    It seems as if a day doesn’t go by without notification by the media of a major data breach. If you’re a member of the C-Suite of a midsize business, you probably spend a good deal of time thinking about how to protect your data as well as your business reputation. I recently read some surprising news from a British marketing group (1) and offer it as a lesson for all businesses – no matter where your corporate headquarters may be located and how many offices you may have. In August 2014, the UK Direct Marketing Association released a new privacy code of practice to address customer…
  • Top 10 Tips to Share with Employees During Cyber Security Awareness Month (#NCSAM)

    Allan Pratt
    9 Oct 2014 | 7:28 pm
    There is no dispute that data breaches are becoming more common, and as a result, online safety and the protection of personally identifiable information (PII) are hot topics in the mainstream media. Therefore, the month of October presents an excellent opportunity for all businesses, especially midsize businesses, to remind employees about their responsibilities when it comes to protecting corporate data. Here are my top ten tips to share with employees during Cyber Security Awareness Month: [1] Complex Passwords All passwords should be at least 10 characters and include lower and upper case…
  • Are You Integrating Security into Your Celebration of #CXDay?

    Allan Pratt
    1 Oct 2014 | 7:47 pm
    Is the first Tuesday of October marked as a special date on your calendar? If not, the significance around social channels will alert you to this hashtag. The second Tuesday in October is #CXDay, and according to Annette Franz (@CXJourney on Twitter), “It’s a celebration of customer experience professionals, those folks who work tirelessly to design and deliver a great customer experience to their customers. The day is meant to continue to raise awareness of the importance of the customer experience.” My grad school studies were in marketing, so while my professional focus…
  • Don’t Forget Security When It Comes to E-Waste

    Allan Pratt
    24 Sep 2014 | 7:43 pm
    With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. But as you dream, what will you do with all your current devices? As you wonder where you’ll take your outdated smartphones, tablets, and desktops, either conduct a Google search for your nearest e-waste drop-off location or use a convenient app on your smartphone to find a location. But, whatever you do, take security precautions.
  • add this feed to my.Alltop

    blackstratus.com

  • How Safe Is Cloud Security?

    Rich Murphy
    18 Nov 2014 | 9:49 am
    Over the past year, the initial wave of enthusiasm for all things cloud-based has generally subsided, with a growing tide of skepticism emerging about the limits of its usefulness as a platform. Inspired by a number of high-profile security breaches, there is also skepticism about its security. While part of this is the inevitable backlash that occurs whenever something becomes trendy in tech, the security issue in particular is one that merits further investigation. While it’s reasonable to question whether or not your important data is safe in the cloud, it’s equally important to not…
  • Traditional and Software-Defined Networking

    Rich Murphy
    5 Aug 2014 | 3:00 am
    Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud computing. What Is Software-Defined Networking? Software-defined networking was pioneered between 2008 and 2011 by work done at Stanford University and the Nicira Company (now part of VMware). The basic premise behind SDN is that by separating control of network functions from hardware devices, administrators acquire more power to route and direct traffic in response to changing requirements. As…
  • Understanding Cloud Security Models

    Don Carfagno
    22 Jul 2014 | 2:00 am
    When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach to software-as-a-service and can have different security implications. The public cloud — Public cloud service is delivered over the Internet, typically on a pay-per-use model, meaning a business is charged only for the storage it needs. Public cloud models are ideal for small- or medium-sized organizations that prioritize collaboration. Because public cloud service providers rely on…
  • How to Implement Server Virtualization in Your Business

    Rich Murphy
    1 Jul 2014 | 3:00 am
    In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server virtualization has gained popularity in recent years, there’s still some confusion about how it works, what the benefits are and how to get started. Let’s take a look at some of the best ways to implement server virtualization in a small or medium sized business environment. What Is Server Virtualization? Server virtualization is a process when a physical server is segmented into a number of…
  • Security and Operational Efficiency

    Don Carfagno
    27 Jun 2014 | 11:47 am
    Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy and cost-effective to maintain while still providing complete protection of your data, applications and other valuable assets. In fact, the key to efficient, effective security is not necessarily to throw money at the problem, but to prioritize how and when resources are deployed. Some areas to focus on include: User training: Many IT managers assume that users will know how to securely access…
 
  • add this feed to my.Alltop

    Milton Security

  • DerpTrolling releases large number of Username and Passwords

    Bethany Nolan
    21 Nov 2014 | 9:53 am
    Hacker Group, DerpTrolling, are claiming to be responsible for the massive Denial of Service attack on Blizzard’s servers last week during the release of the expansion pack, Warlords of Draenor. They have published a lengthy list of customer account information from the PlayStation Network, 2K Game Studios and Windows Live. The Pastebin document reads, “Dear Internet, the following is a very small portion of Lord Gaben and the rest of his crew’s glorious raids across the high seas of the Internet.” The Pastebin document includes usernames and passwords for 2,131 PSN users;…
  • Suspected WireLurker Creators Arrested in China

    Milton Security Group
    18 Nov 2014 | 10:25 am
    Two weeks after the WireLurker malware was revealed, three suspects have been arrested as possible authors of the Mac and iOS-based malware, and for distributing the WireLurker malware through a Chinese third-party online app. The Beijing Bureau of Public security announced, after an investigation done with the help of local security firm, Qihoo 360, the arrest of the three suspects. They have also said that the website that responsible for spreading the malware has been shut down. WireLurker is a hybrid malware, originally discovered earlier this month by Palo Alto Networks. It was found to…
  • Fingers Point At China After Cyber Attacks on Weather Network

    Milton Security Group
    12 Nov 2014 | 1:26 pm
    The Washington Post ran a story today alleging that China had launched a successful cyber attack on the Federal Weather Network, sending cyber security teams in to a scurry as they attempted to isolate data regarding disaster planning, aviation and shipping. On top that, they are alleging that the National Oceanic and Atmospheric Administration (NOAA) kept the breach under wraps instead of reporting it in a timely manner. Despite the fact that the breach is believed to have occurred in late September, NOAA gave no indication of a problem until October 20, and even then did not disclose the…
  • USPS Hacked! 800,000+ Could be Affected

    Milton Security Group
    10 Nov 2014 | 11:11 am
    The United States Postal Service announced today that they have been the victims of a data breach. 800,000+ people may have been affected, including current and former employees, regulators, and customers. The potentially compromised information of employees includes: names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment, and emergency contact information. “Postal Service transactional revenue systems in Post Offices as well as on usps.com where customers pay for services with credit and debit cards have not been affected by this incident,” said…
  • Flaw in Visa Contactless Card Discovered

    Milton Security Group
    5 Nov 2014 | 10:56 am
    A flaw has been discovered in Visa’s contactless credit cards that could allow nearly limitless cash transactions without a pin number, as long as the transaction is in a foreign currency. Researchers at Newcastle University in the United Kingdom have discovered that the flaw can be exploited while the card is still in the owner’s pocket or bag! “With just a mobile phone we created a POS terminal that could read a card through a wallet,” says Martin Emms, the lead researcher on the project, “All the checks are carried out on the card rather than the terminal so at the point of…
  • add this feed to my.Alltop

    Cyberoam : Securing You

  • Kerberos Vulnerability affecting Windows Servers

    Cyberoam Threat Research Labs
    19 Nov 2014 | 3:39 am
    A privilege escalation vulnerability has been found in implementations of Kerberos Key Distribution Center (KDC) in Microsoft Windows, which supplies session tickets and temporary session keys to users and computers in an Active Directory domain. It has been found that Microsoft Kerberos KDC implementations fail to properly validate signatures, which can allow for certain aspects of a Kerberos service ticket to be forged. Exploiting the vulnerability, an attacker with valid domain credentials can gain domain administrator privileges, which can be used to further compromise any computer in the…
  • Schannel Remote Code Execution Vulnerability puts users as risk

    Cyberoam Threat Research Labs
    18 Nov 2014 | 9:39 pm
    A remote code execution vulnerability has been found in Microsoft Schannel – the security support provider package for internet applications running on HTTP. It is Microsoft’s implementation of SSL/TLS encryption. The vulnerability is due to improper processing of specially crafted packets. A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the target machine. Successful exploitation could result in arbitrary code execution on the affected system. The vulnerability has widely been considered highly critical and users are advised…
  • The Windows OLE flaw taken down after 2 decades of hiding

    Cyberoam Threat Research Labs
    13 Nov 2014 | 5:46 am
    A code execution vulnerability has been reported in Microsoft Windows Object Linking and Embedding (OLE).  OLE allows embedding and linking to documents and other objects and is proprietary technology developed by Microsoft. The vulnerability is due to Internet Explorer improperly accessing OLE objects in memory. It has been found that during Array Resize using redim preserve keyword, the size of the array can be changed. The problem occurs when error is encountered while allocating the new array size, as a result the old array size is not restored, which can be used to read/write access to…
  • Yet again Microsoft Internet Explorer is vulnerable!

    Cyberoam Threat Research Labs
    12 Nov 2014 | 2:07 am
    Once again Microsoft Internet Explorer is vulnerable. A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user. Microsoft has issued an advisory regarding this vulnerability: https://technet.microsoft.com/en-us/library/security/MS14-056 The…
  • How good is your perception of security?

    Cyberoam Threat Research Labs
    5 Nov 2014 | 5:18 am
    The security at enterprises depend to a great extent on how the security appliances are configured.For this purpose, Cyberoam has streamlined its policy management with simplified and pre-configured policies based on server or client side threats. However, for optimum security, a layered approach is required with proper modules in place providing security at all layers. Though, customers can find all the modules for comprehensive security at Cyberoam, sometimes there can be difficulty in recognising what modules are effective in which situation. For this purpose, we have prepared a ready…
  • add this feed to my.Alltop

    blackstratus.com

  • How Safe Is Cloud Security?

    Rich Murphy
    18 Nov 2014 | 9:49 am
    Over the past year, the initial wave of enthusiasm for all things cloud-based has generally subsided, with a growing tide of skepticism emerging about the limits of its usefulness as a platform. Inspired by a number of high-profile security breaches, there is also skepticism about its security. While part of this is the inevitable backlash that occurs whenever something becomes trendy in tech, the security issue in particular is one that merits further investigation. While it’s reasonable to question whether or not your important data is safe in the cloud, it’s equally important to not…
  • Traditional and Software-Defined Networking

    Rich Murphy
    5 Aug 2014 | 3:00 am
    Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud computing. What Is Software-Defined Networking? Software-defined networking was pioneered between 2008 and 2011 by work done at Stanford University and the Nicira Company (now part of VMware). The basic premise behind SDN is that by separating control of network functions from hardware devices, administrators acquire more power to route and direct traffic in response to changing requirements. As…
  • Understanding Cloud Security Models

    Don Carfagno
    22 Jul 2014 | 2:00 am
    When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach to software-as-a-service and can have different security implications. The public cloud — Public cloud service is delivered over the Internet, typically on a pay-per-use model, meaning a business is charged only for the storage it needs. Public cloud models are ideal for small- or medium-sized organizations that prioritize collaboration. Because public cloud service providers rely on…
  • How to Implement Server Virtualization in Your Business

    Rich Murphy
    1 Jul 2014 | 3:00 am
    In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server virtualization has gained popularity in recent years, there’s still some confusion about how it works, what the benefits are and how to get started. Let’s take a look at some of the best ways to implement server virtualization in a small or medium sized business environment. What Is Server Virtualization? Server virtualization is a process when a physical server is segmented into a number of…
  • Security and Operational Efficiency

    Don Carfagno
    27 Jun 2014 | 11:47 am
    Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy and cost-effective to maintain while still providing complete protection of your data, applications and other valuable assets. In fact, the key to efficient, effective security is not necessarily to throw money at the problem, but to prioritize how and when resources are deployed. Some areas to focus on include: User training: Many IT managers assume that users will know how to securely access…
 
Log in