Network Security

  • Most Topular Stories

  • Users face serious threat as hackers take aim at routers, embedded devices

    Computerworld Network Security News
    3 Apr 2014 | 7:48 am
    Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks.
  • Satellite Communications Wide Open To Hackers

    Dark Reading:
    Kelly Jackson Higgins
    17 Apr 2014 | 11:50 am
    Satellite terminals widely used in transportation, military, and industrial plants contain backdoors, hardcoded credentials, weak encryption algorithms, and other design flaws, a new report says.
  • Samsung Galaxy S5 Fingerprint Scanner also susceptible to ordinary spoofs

    Feed: Blogs
    George Chetcuti
    16 Apr 2014 | 8:32 am
    Security Research Labs demonstrates in this video how flaws in the implementation of fingerprint authentication in the Samsung Galaxy S5 expose users' devices, data, and even bank accounts to thieves or other attackers.
  • Performing the Heartbleed Attack After the TLS Handshake

    VRT
    Patrick Mullen
    10 Apr 2014 | 12:34 pm
    Over the past several days, many IPS rules for detecting the Heartbleed attack have been suggested that attempt to compare the TLS message size to the heartbeat message size.  This method works with most of the Proof-of-Concept attacks out there, which perform the Heartbleed attack before the TLS handshake has occurred.  Performing the attack before the TLS handshake results in both the attack and response data being sent in plaintext.  However, if a TLS handshake is performed first, all heartbeat data is encrypted, meaning that this type of detection comparing ciphertext…
  • Teen arrested in Heartbleed attack against Canadian tax site

    Techworld.com security
    16 Apr 2014 | 3:31 pm
    Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
 
 
  • add this feed to my.Alltop

    Network Security Blog

  • NSP Microcast – BSides London 2014

    netsecpodcast@mckeay.net (Martin McKeay)
    6 Apr 2014 | 8:40 am
    This afternoon I had a chance to talk to two of the main organizers of one of the biggest security events of the year, BSides London.  Paul Batson and Thomas Fisher have been working tirelessly (or maybe tiredly) for months to bring together all of the disparate elements required to make a conference come together.  And it’s no mean feat when the people you’re working with are all volunteers and the money comes from sponsors, both of whom believe in your cause.  This year will be my first chance to go to BSides London (this is the fourth) and I’m really looking forward…
  • Hack my ride

    netsecpodcast@mckeay.net (Martin McKeay)
    6 Apr 2014 | 12:31 am
    Important:  Read the stuff at the end of this post.  I got a lot of feedback and I’ve added it there.  Unlike some people, I actually want to be told when I’m wrong and learn from the experience. I don’t own a Tesla S and probably never will.  They’re beautiful cars, they’re (sort of) ecologically friendly, and they show that you have more money than common sense.  I use a car to get my family from point A to point B and showing off my wealth (or lack there of) has never actually been part of the equation in buying a car.  And one more reason I don’t…
  • Network Security Podcast, Episode 330

    netsecpodcast@mckeay.net (Martin McKeay)
    31 Mar 2014 | 2:09 pm
    It only took 4+ weeks, but Martin and Zach are back on the air. Rich is back to his “(Inter)National Man of Mystery” routine, so he missed out on the somewhat lively discussion about drones, “secure” browsers, PCI, and, of course, the NSA. Network Security Podcast, Episode 330 Time: 37:27 Show Notes: WhiteHat Aviator Beta for Windows Obama’s move to relieve snooping fears This drone can steal what’s on your phone (see also: Snoopy and STALKER – Analyzing [Your] Wireless Data) Trustwave plans to fight “baseless allegations” over Target…
  • NSPMicrocast – RSAC2014 – DoSArrest

    netsecpodcast@mckeay.net (Martin McKeay)
    23 Mar 2014 | 1:44 pm
    Most of the time my competitors are afraid to talk to me on the podcast.  I’m a nice guy to the people I interview, so I don’t know why they’d be afraid.  And this year at RSAC, Jag Bains the CTO at DoSArrest took a chance and talked to me.  While I did bring up that we’re competitors, I let Jag explain to me how his company works and what they protect their customers from DDoS.  I still think we do it better, but it’s good to hear what other people in the same field are doing. NSPMicrocast – RSAC2014 – DoSArrest
  • NSP Microcast – RSAC2014 – BeyondTrust

    netsecpodcast@mckeay.net (Martin McKeay)
    23 Mar 2014 | 4:03 am
    I had a chance to sit down with BeyondTrust CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average enterprise.  As with all my interviews at RSAC, I asked Marc how he felt the spying revelations of the last year have affected the security landscape, his company and him personally. NSPMicrocast-RSAC2014-BeyondTrust
 
  • add this feed to my.Alltop

    Network Security Podcast

  • NSPMicrocast BSides London 2014

    martin
    6 Apr 2014 | 8:39 am
    This afternoon I had a chance to talk to two of the main organizers of one of the biggest security events of the year, BSides London.  Paul Batson and Thomas Fisher have been working tirelessly (or maybe tiredly) for months to bring together all of the disparate elements required to make a conference come together.  And it’s no mean feat when the people you’re working with are all volunteers and the money comes from sponsors, both of whom believe in your cause.  This year will be my first chance to go to BSides London (this is the fourth) and I’m really looking forward to…
  • Network Security Podcast, Episode 330

    quine
    31 Mar 2014 | 2:08 pm
    It only took 4+ weeks, but Martin and Zach are back on the air. Rich is back to his “(Inter)National Man of Mystery” routine, so he missed out on the somewhat lively discussion about drones, “secure” browsers, PCI, and, of course, the NSA. Network Security Podcast, Episode 330 Time: 37:27 Show Notes: WhiteHat Aviator Beta for Windows Obama’s move to relieve snooping fears This drone can steal what’s on your phone (see also: Snoopy and STALKER – Analyzing [Your] Wireless Data) Trustwave plans to fight “baseless allegations” over Target…
  • NSP Microcast – RSAC2014 – DoSArrest

    martin
    23 Mar 2014 | 1:44 pm
    Most of the time my competitors are afraid to talk to me on the podcast.  I’m a nice guy to the people I interview, so I don’t know why they’d be afraid.  And this year at RSAC, Jag Bains the CTO at DoSArrest took a chance and talked to me.  While I did bring up that we’re competitors, I let Jag explain to me how his company works and what they protect their customers from DDoS.  I still think we do it better, but it’s good to hear what other people in the same field are doing. NSPMicrocast – RSAC2014 – DoSArrest
  • NSP Microcast – RSAC2014 – BeyondTrust

    martin
    23 Mar 2014 | 4:02 am
    I had a chance to sit down with BeyondTrust CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average enterprise.  As with all my interviews at RSAC, I asked Marc how he felt the spying revelations of the last year have affected the security landscape, his company and him personally. NSPMicrocast-RSAC2014-BeyondTrust
  • NSP Microcast – RSAC2014 – Denim Group

    martin
    20 Mar 2014 | 4:08 am
    I caught up with John Dickson and Dan Cornell from the Denim Group to talk about creating secure coding environments within companies, the importance of having trainers who are themselves coders and, of course, a little bit about spying.  Which turned into a lot of bit about spying.  I should have asked them where the name ‘Denim Group’ comes from. NSP Microcast – RSAC2014 – Denim Group
 
  • add this feed to my.Alltop

    About.com Internet / Network Security

  • What to do About Heartbleed

    13 Apr 2014 | 12:23 pm
    If you haven't heard about the Heartbleed vulnerability by now then you must have had your TV,  computer, and phone turned off for the last week. Heartbleed is probably one of the scariest, most far reaching vulnerabilities, of recent times. Why is it so scary? The main reason is because it's related to a core security technology that is used by a ton of companies, governments, and other folks....Read Full Post
  • Can Your Cordless Phone Be Hacked?

    30 Mar 2014 | 4:28 pm
    Cordless phones. You use them every day in your home. Did you ever stop to wonder if there was any way that someone could listen in on your conversations? In this week's featured article: Is Your Cordless Phone Being Hacked? We'll discuss how various types of cordless phones might be prone to eavesdropping and look at some ways of mitigating the risk of someone listening in....Read Full Post
  • Tips for Locking Down Your Portable Hotspot

    30 Mar 2014 | 4:15 pm
    Portable Wi-Fi hotspots are all the rage these days. Most modern smartphones even have them built-in. People are a lot more cautious with their mobile hotspot bandwidth, as the days of unlimited bandwidth seem to be behind us. In this week's featured article, we'll show you How to Secure Your Portable Hotspot....Read Full Post
  • Kick Those Pesky Wi-Fi Freeloaders Off Your Network

    30 Mar 2014 | 4:00 pm
    Are you tired of your neighbors getting a free ride off of wireless network? Their not only getting free Internet, they're also eating up your bandwidth. In our featured article: How to Detect and Remove Wi-Fi Freeloaders from Your Network, we'll show you how to end their gravy train....Read Full Post
  • 6 Security Tips For Telecommuters

    30 Mar 2014 | 3:43 pm
    Are you a telecommuter? Does your company provide adequate security for your work-at-home PC or do they rely on you to take some of the burden on yourself? This week, our featured article will provide some Security Tips for Telecommuters. We'll show you how to help ensure that you don't become your companies weakest link....Read Full Post
  • add this feed to my.Alltop

    Feed: Articles & Tutorials

  • How to Achieve an Effective Patch Management System

    Ricky M. & Monique L. Magalhaes
    16 Apr 2014 | 2:00 am
    In this article the author looks at ways to achieve an effective Patch Management System.
  • Web Browser Security Revisited (Part 6)

    Deb Shinder
    9 Apr 2014 | 2:18 am
    In this article we'll look at some tips on how to best secure Mozilla Firefox.
  • Video: Auditing vs Advanced Auditing Configurations - Part 1

    Derek Melber
    2 Apr 2014 | 2:25 am
    Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this first part video we will look at the configurations of each audit policy to know where we can configure them.
  • Web Browser Security Revisited (Part 5)

    Deb Shinder
    26 Mar 2014 | 3:13 am
    In this article we’ll look at the special features Google provides for enterprise administrators with its Chrome for Business.
  • Securing Active Directory with PowerShell

    Derek Melber
    19 Mar 2014 | 12:58 am
    In this article, we’re going to look at security as it relates to AD. In particular, we’ll look at how you can use PowerShell to ensure that several different security aspects of AD don’t drift. These scripts are designed for you to run them on a periodic basis to determine whether anything has changed with respect to your AD security posture.
  • add this feed to my.Alltop

    Tenable Network Security Blog

  • Cybersecurity Is About Attitude, Culture -- Not Strictly Compliance

    Jeffrey Man
    10 Apr 2014 | 7:10 am
    Posted originally on Wired, InnovationInsights blog
  • Tenable Facilitates Detection of OpenSSL Vulnerability Using Nessus and Nessus Perimeter Service

    Jeffrey Man
    9 Apr 2014 | 1:49 pm
    Facilitate easy detection of the OpenSSL Heartbeat vulnerability in your enterprise
  • Beware of Bleeding Hearts (Updated)

    Ken Bechtel
    8 Apr 2014 | 3:26 pm
    A recently discovered vulnerability, identified as Common Vulnerabilities and Exposures (CVE) CVE-2014-0160, but more commonly called HeartBleed Vulnerability, has been acknowledged by the Open SSL Organization and the Finnish Cert Team. This is an attack against the transport layer security protocol (TLS/DTLS) hearbeat extension.
  • Understanding NIST’s Cybersecurity Framework

    Cris Thomas
    8 Apr 2014 | 7:45 am
    NIST’s Cybersecurity Framework (CSF) is likely to become the basis for what's considered commercially reasonable in regards to securing an organization’s infrastructure. For this reason alone companies should pay close attention to the CSF and, even if they don’t follow it completely, should at least understand where they are deficient and why.
  • PVS 4.0.2 is now available for download

    Sherry Quinn
    2 Apr 2014 | 12:59 pm
    This maintenance release addresses the following issues: An expired PVS license or activation code sends the user to the Quick-Setup wizard to allow entry of the new license Hosts with Internet facing vulnerabilities were missing the “External Access” tag Filtering issue on the “Affected Host List” was fixed Dependency issue causing some false positives was fixed Improvements were also made including:
 
  • add this feed to my.Alltop

    Spyware news

  • What is this heartbleed and how to protect yourself against it?

    2-spyware.com Support
    16 Apr 2014 | 3:07 am
    Everyone is now discussing about the Heartbleed Bug, which was detected in the beginning of April, 2014. If you are an IT expert, you will easily understand those talks about OpenSSL, encryption systems and similar things. However, if you are just an ordinary PC user, you may have some hard time to realize what this bug really is and how to protect yourself against it. According to security experts, Heartbleed is a recently discovered security vulnerability, which puts people’s login data at many popular websites at risk. It is related to the piece of software known as OpenSSL, which…
  • SpyHunter in the news

    2-spyware.com Support
    10 Apr 2014 | 7:58 am
    Certifications OPSWAT Certified Partner and Bronze Certified Antispyware  SpyHunter has successfully passed OPSWAT Antispyware test and has been awarded OPSWAT’s certified partner. Go to OPSWAT Certified Products page   West Coast Labs Checkmark Certification SpyHunter is proudly certified by West Coast Labs, a leading independent research and test center. Go to West Coast Labs Checkmark Certification page       Press Mentions Crooks Use Royal Baby To Attack Computers Eyes and ears around the world are anxiously awaiting news out of England – that the royal…
  • Bought Virus Shield app from the Play Store? You’ve been scammed!

    2-spyware.com Support
    9 Apr 2014 | 5:11 am
    It seems that nowadays you must be focused on your security no matter what you do. The latest detection of Android Police reveals that even such places as Play Store can offer you to install a scamware. According to these researchers, the misleading program that was offered in this store was a fake antivirus Virus Shield. Even more, it was priced at $3.99, what means that people had to pay for a something that doesn’t work at all! As Android Police notifies, 10,000 of users have already installed this fake anti-virus. If you are one of them, you should definitely get rid of Virus Shield…
  • Stay safe by ignoring fake emails that notify about nonexistent Facebook comments!

    2-spyware.com Support
    7 Apr 2014 | 7:12 am
    Thanks to several of our users, we can warn you about fake email messages that are circulating around at the moment. They look like real warnings from Facebook, so they have already tricked hudreds of people from different world’s countries. If you happen to receive a notification that reports about Facebook comments from some ‘men’ and, of course, includes a link, you should delete it. By clicking on that link you easilyagree to download the malicious .scr file, which is commonly involved in malware campaigns. The fake Facebook message, which has been reported to us,…
  • How to stay protected after Microsoft ends support for Windows XP?

    2-spyware.com Support
    31 Mar 2014 | 4:53 am
    Like it or not, April is just around the corner. It should be especially important for those who are still using Windows XP OS. If you are one of those people who keep relying on this operating system, beware that April 8, 2014 is the date when Microsoft will stop supporting it. That means that the company will stop providing its technical assistance for Windows XP, including security patches for critical vulnerabilities and other updates that keep computers secure. So, how can you stay protected after Microsoft ends its support? Basically, you should pay attention to these things: Install a…
  • add this feed to my.Alltop

    Uncommon Sense Security

  • Threat Modeling, by Adam Shostack

    11 Apr 2014 | 5:57 pm
    Adam has a new book out, Threat Modeling: Designing for Security, and it is a great resource for anyone in security.  As with New School of Information Security, this is one to grab, read, and keep on the shelf (e-shelf?). The layout is great, after a short introduction Adam takes you into an easy, but informative practice exercise.  After the exercise there is a more in-depth introduction, which builds on what you learn in the exercise- and also answers some questions which inevitably come up during the exercise.  From the first couple of chapters the book gets progressively…
  • Missing the (opportunity of) Target

    20 Mar 2014 | 5:04 am
    You may have heard that some companies lost some credit card data recently.  I think it was in the news.  Come to think of it, a couple of weeks ago I featured a great guest post by Jeff Man on the topic. In recent stories it has come out that some of the compromised companies “ignored thousands of alerts”, and many folks are heaping scorn and derision on the compromised companies because victim-blaming is easier than looking inward and securing their own stuff.  Also, unless we have a historical record of “normal” alert levels for these environments, and average false…
  • Recovered yet?

    10 Mar 2014 | 8:32 pm
    I think I have.  I am, of course, talking about the annual week of madness in San Francisco. Security BSides San Francisco was another great event, lots of diverse and thought-provoking content, and plenty of good conversations- as we expect from BSides.  The planned lead organizer for BSides San Francisco had a change in career path, and a few of the BSides regulars had to step up and make the event happen- it is amazing working with the folks who make BSides happen, it looked easy from the outside.  And there are new folks ready to take the lead for BSidesSF 2015, so we’ll…
  • Target and PCI: Talking About the 800 lb. Gorilla (a guest post)

    13 Feb 2014 | 1:34 pm
    Today I present a guest post, writing by my friend Jeffrey Man.  This is a very well thought out piece on Target, PCI, and surrounding issues.   There has been much discussion online and in the media as to whether or not Target was compliant with PCI DSS at the time of their breach. Details of the compromise are still not completely known, but there have been some new details released that –while not definitive – are starting to give us at least an idea of the path that the attackers took to gain access to Target’s network, the cardholder data environment, and ultimately the…
  • When is a patch not a patch?

    18 Nov 2013 | 4:43 pm
    When is a patch not a patch?  When it is not a patch.  That seems rather obvious, but sometimes we lose sight of the obvious when talking about patching and vulnerability management (and a lot of other things). In my “day job” at Tenable, we think about vulnerability management a lot, it is what we do.  We also think about patching and patch management a lot, even though that is not what we do.  (I often wish companies who sell patching and patch management systems were similarly honest about their core competencies, but that’s a rant for another day- it is not quite…
 
  • add this feed to my.Alltop

    Schneier on Security

  • Tails

    schneier
    17 Apr 2014 | 11:38 am
    Nice article on the Tails stateless operating system. I use it. Initially I would boot my regular computer with Tails on a USB stick, but I went out and bought a remaindered computer from Best Buy for $250 and now use that.
  • Book Title

    schneier
    16 Apr 2014 | 7:32 am
    I previously posted that I am writing a book on security and power. Here are some title suggestions: Permanent Record: The Hidden Battles to Capture Your Data and Control Your World Hunt and Gather: The Hidden Battles to Capture Your Data and Control Your World They Already Know: The Hidden Battles to Capture Your Data and Control Your World We Already Know: The Hidden Battles to Capture Your Data and Control Your World Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World All About You: The Hidden Battles to Capture Your Data and Control Your World Tracked: The…
  • Auditing TrueCrypt

    schneier
    15 Apr 2014 | 4:56 am
    Recently, Matthew Green has been leading an independent project to audit TrueCrypt. Phase I, a source code audit by iSEC Partners, is complete. Next up is Phase II, formal cryptanalysis. Quick summary: I'm still using it.
  • Schneier Talks and Interviews

    schneier
    14 Apr 2014 | 2:12 pm
    Here are three articles about me from the last month. Also these three A/V links.
  • Schneier Speaking Schedule: April–May

    schneier
    14 Apr 2014 | 12:11 pm
    Here's my upcoming speaking schedule for April and May: Stanford Law School on April 15. Brown University in Providence, RI -- two times -- on April 24. The Global Summit for Leaders in Information Technology in Washington, DC, on May 7. The Institute of World Politics on May 8. The University of Zurich on May 21. IT Security Inside in Zurich on May 22. University of Oregon Eugene on May 28, and then Portland on May 29 Information about all my speaking engagements can be found here.
  • add this feed to my.Alltop

    Infosec Events

  • Week 15 In Review – 2014

    md
    14 Apr 2014 | 3:39 pm
    Events Related Enter to win an INFILTRATE security conference ticket worth $2,2000 from Hacker Warehouse – hackerwarehouse.com INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. Conference is being held on May 15 and 16 in Miami Beach. Resources Car Hacking 2: The Content – blog.ioactive.com Does everyone remember when those two handsome young gentlemen controlled automobiles with CAN message injection? However, what if…
  • Week 14 In Review – 2014

    md
    7 Apr 2014 | 12:28 pm
    Resources Everything You Always Wanted to Know About iTunes and iCloud Backups But Were Afraid to Ask – blog.crackpassword.com Do you think you know everything about creating and using backups of Apple iOS devices? Probably not. Here Vladimir Bezmaly (MVP Consumer security, Microsoft Security Trusted Advisor) shares some thoughts, tips and tricks on iTunes and iCloud backups. Published Beta version of “Thoughts on OWASP” eBook – blog.diniscruz.com This new eBook has 165 pages and is made of 67 blog posts published in the last couple years. You can download it for free, or…
  • Information Security Events For April

    sheila
    31 Mar 2014 | 11:32 pm
    Here are information security events in North America this month:   InfoSec Southwest 2014 : April 5 to 6 in Austin, Texas USA   CactusCon 2014 : April 4 in AZ, USA   BSides Orlando 2014 : April 5 to 6 in Orlando, Florida, USA   BSides Rochester 2014 : April 5 in NY, USA   InfoSec World Conference & Expo 2014 : April 7 to 9 in Orlando, Florida, USA   SOURCE Boston : April 8 to 10 in Boston, USA   9th Cyber and Information Security Research Conference (CISRC 2014) : April 8 to 10 in TN, USA   Philadelphia SecureWorld 2014 : April 8 to 9 in PA, USA…
  • Week 13 In Review – 2014

    md
    31 Mar 2014 | 8:48 pm
    Resources iOS Application Security Part 32 – Automating Tasks With iOS Reverse Engineering Toolkit (iRET) – highaltitudehacks.com In this article, we will talk about a new tool named iOS Reverse Engineering Toolkit (iRET) that has just been released to assist penetration testers in automating most of the tasks involved in a iOS penetration test. The project is developed and maintained by @S3Jensen. New Metasploit 4.9 Helps Evade Anti-Virus Solutions, Test Network Segmentation, and Increase Productivity for Penetration Testers – community.rapid7.com Metasploit 4.9 helps penetration…
  • Week 12 In Review – 2014

    md
    24 Mar 2014 | 1:45 pm
    Events Related Three Things to Take Away from CanSecWest, Pwn2Own – threatpost.com Browsers, brokers and BIOS: you could safely call that triumvirate the past, present and future of security, but you’d be wrong. If last week’s CanSecWest conference, and Pwn2Own and Pwnium contests are indeed a point-in-time snapshot of the technical side of information security, then after last week it’s a no-brainer all three merit more than a lackadaisical passing interest. Financial cryptography 2014 – lightbluetouchpaper.org Ross Anderson tried to liveblog Financial Cryptography 2014. The…
  • add this feed to my.Alltop

    Security Catalyst

  • Did you listen to my appearance on the Down the Rabbithole Security Newscast for April 7?

    Michael Santarcangelo
    9 Apr 2014 | 6:54 am
    What started as a guest spot to share some insights on the Target breach has turned into a regular appearance on the Down the Rabbithole (DtR) Security Newscast with Raf Los (@Wh1t3Rabbit)  and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. It marks a long-overdue return to podcasting for me. As a participant, I’m drawn to the combination of our energy and the ease with which we explore different perspectives. More bluntly, we don’t always run with the herd, and we’re happy…
  • How to use visualization to move faster and create more value

    Michael Santarcangelo
    5 Mar 2014 | 5:50 am
    Success is built on value. Value is realized when connected to people. The challenge is finding and focusing on the right elements in business that create value. Making the right decisions to advance the business, amplify value, and protect what is important means getting the right information and mutual understanding of what matters. The key to moving faster and creating value is visualization. This seemingly simple and often overlooked exercise allows people to actually “see” how things work. Done properly, individuals contribute their insight and experience to the process and…
  • 3 basic elements every good story needs

    Michael Santarcangelo
    18 Feb 2014 | 6:47 am
    Stories are an important way to connect people to value. A popular topic during my keynotes and training sessions, I usually explore the importance with a simple question: “What are the three essential parts a story must contain?” I smile as I pose the question. People shift uncomfortably in their chairs. Eyes dart away. Confident business leaders don’t want to be called on. They don’t know they’re safe; I don’t call on people (who does that?). As the silence builds, someone finally blurts out, “beginning, middle, and end?” More question than statement, the relief in the…
  • Security Catalyst February mid-month review & update

    Michael Santarcangelo
    17 Feb 2014 | 6:29 am
    With my writing  (and podcast appearances) spread over a few different platforms, including this blog, I wanted to put together a post capturing some insights that could prove useful for you. Please share this with anyone you think would benefit.  As we keep moving forward, hopefully the newsletter — including the curated aspects — will find a groove. Meanwhile, this is an attempt at keeping in touch. A way to share news on a more regular basis. An opportunity to outline some areas of research, and offer a heads-up about future writing topics. Maybe it affords us a reason to…
  • Why problems defined in terms of solutions decrease value and increase risk

    Michael Santarcangelo
    10 Feb 2014 | 12:52 pm
    We live in a world that demands action. Often action trumps results. The mere appearance of solving problems becomes more important than actually finding and addressing the right problems. This even happens to people with the best of intentions. Pressed for time, the search for solution takes precedence over defining the problem. When a suitable approach is discovered, the problem is hastily framed in terms of the solution. That’s if the problem is defined at all. Many times, it’s skipped in favor of making progress. Here’s the problem: while it satisfies the need to…
 
  • add this feed to my.Alltop

    Dr Anton Chuvakin Blog PERSONAL Blog

  • Monthly Blog Round-Up – March 2014

    1 Apr 2014 | 7:07 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and…
  • Our Team Is Hiring Again: Join Gartner GTP Now!

    19 Mar 2014 | 5:05 am
    It is with great pleasure that I am announcing that our team is HIRING AGAIN! Join Security and Risk Management Strategies (SRMS) team at Gartner for Technical Professionals (GTP)! Excerpts from the job description: Create and maintain high quality, accurate, and in depth documents or architecture positions in information security, application security, infrastructure security, and/or related coverage areas; Prepare for and respond to customer questions (inquiries/dialogues) during scheduled one hour sessions with accurate information and actionable advice, subject to capacity and demand;…
  • Monthly Blog Round-Up – February 2014

    3 Mar 2014 | 8:05 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and…
  • Monthly Blog Round-Up – January 2014

    1 Feb 2014 | 11:11 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. My classic PCI DSS Log Review series is popular as well. The series of 18 posts cover a comprehensive log review approach, useful for building log…
  • Annual Blog Round-Up – 2013

    1 Jan 2014 | 1:11 am
    Here is my annual "Security Warrior" blog round-up of top 10 popular posts/topics in 2013. “Simple Log Review Checklist Released!” was again the most popular this year. The checklist, a list of critical things to look for while reviewing  system, network and security logs when responding to a security incident (companion free log tool list) “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. PCI DSS Log Review series of posts takes the #3 spot; they are about planning and executing a complete log review process…
  • add this feed to my.Alltop

    Amrit Williams Blog

  • RSA Announces End of RSA Security Conference

    amritw
    31 Mar 2014 | 4:29 pm
    Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today announced their intentions to end the popular RSA security conference and establish a new cloud-security, cloud-only conference. RSA plans to leverage the increasing popularity and VC spending on cloud-security […]
  • Red Dawn: Unit 61398 – Now What?

    amritw
    21 Feb 2013 | 11:32 am
    Some of my ‘so-called’ friends that help organize the RSA Security Bloggers event have decided that folks that attend should actually have blogged something recently, well I haven’t so to make them happy… With the increasing frequency and severity of advanced threats perpetrated by highly-organized and sophisticated groups and nation-states, enterprises need to realize that […]
  • 20 Years in Infosec; Time to Party like its *1999

    amritw
    29 Feb 2012 | 12:48 am
    I am not a big fan of AT&T (here), but this video from AT&T released in 1990 is about the most insightful view into modern day infosec I’ve ever seen (here) and since it was produced pre-brick walls on fire and simple clouds to depict complex relationships it is more believable than most security marketing […]
  • Searching for Privacy in a World Without Secrets

    amritw
    8 Dec 2011 | 9:51 pm
    “I am not a number, I am a free man” IDC reported that we generated and replicated 1.8 zettabytes – that’s 1.8 trillion gigabytes – of data in 2011. To give you an example of scale you would need to stack CDs from Earth to the Moon and Back again – twice – to represent […]
  • Class-action Lawsuit Against HP for Not Disclosing Security Vulnerabilities Has Huge Implications

    amritw
    8 Dec 2011 | 1:58 am
    On December 1, 2011 a Class-action lawsuit was filed in United States District Court Northern District of California against Hewlett-Packard, alleging violations of The California Consumer Legal Remedies Act for Injunctive Relief and the California Unfair Competition Law based on non-disclosure of a known security vulnerability (read the filing here) Nature of the Action l. […]
 
  • add this feed to my.Alltop

    symantec.com

  • Highlights from the SyScan 2014 Conference

    David Maciejak
    16 Apr 2014 | 7:46 pm
    read more
  • Expect Beautifully Packaged Spam along with Your Easter Gifts!

    Binny Kuriakose
    16 Apr 2014 | 9:51 am
    Contributor: Azam Raza Easter, like all other celebrations is meant to be a day of jubilation, which of course means gifts, shopping, and spreading cheer. However, cheer is not the only thing that is being spread this holiday. Spammers have also started spreading their handiwork. With just a few days left before Easter, the volume of spam is on the rise. read more
  • Babies Offered for Adoption in 419 Scam

    Eric Park
    16 Apr 2014 | 5:58 am
    A variation on the 419 email scam is being used by fraudsters to take advantage of couples desperate to adopt a child. Once they are carefully lured into a fake adoption process, the victims are then asked for money to cover legal and administrative fees. read more
  • Heartbleed Poses Risk to Clients and the Internet of Things

    Eric Chien
    14 Apr 2014 | 6:50 am
    While most of the focus on Heartbleed has been on vulnerable public websites, the bug affects much more than this. While most popular sites are no longer vulnerable, this does not mean that end-users can drop their guard. read more
  • Heartbleed – Reports from the Field

    Symantec Security Response
    12 Apr 2014 | 4:13 pm
    It has been now five days since details emerged regarding the “Heartbleed” vulnerability in OpenSSL. During this time we have been researching the impact of the vulnerability, tracking the patch states of popular websites, and monitoring attacks. So what have we learned?   read more
  • add this feed to my.Alltop

    Optimal Security

  • Got Adobe Reader on your Android device? You Had Best Update it ASAP

    Graham Cluley
    16 Apr 2014 | 8:58 am
    A critical security vulnerability has been found in Adobe Reader Mobile, the version of the popular PDF Reader developed for the Android operating system, which could lead to remote hackers compromising documents stored on your Android device and its SD memory card. If you were feeling smug that you had managed to avoid the Heartbleed flaw affecting  up to 50 million Android users because you’re not running Android 4.1.1 of Jellybean, then perhaps you should wipe that smile off your face. Because there’s every possibility that you’re running a vulnerable version of Adobe…
  • Heartbleed and CRLs

    Daniel M. Teal
    14 Apr 2014 | 8:36 am
    The “Heartbleed” vulnerability in the OpenSSL cryptographic library released this week has impacted over a half million web sites and untold numbers of user accounts. Attackers can exploit this vulnerability to read the memory of affected systems to obtain secret keys, user passwords, and any other sensitive data stored in the memory of the web service.  Steps to mitigate this problem are (in order): Anyone using OpenSSL 1.0.1 through 1.0.1f and 1.0.2-beta should upgrade to the latest version. Companies should replace the certificates that were used on the vulnerable systems. Users…
  • Infosec Haiku

    Chris Merritt
    13 Apr 2014 | 5:29 pm
    Anata no joho sekyuritei konshu no haiku Heartbleed Bug — Hackers Peek at Memory Contents And Private Keys Too!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Windows 8.1 Update – Microsoft forces users to update OS if they want future security updates

    Graham Cluley
    9 Apr 2014 | 1:53 pm
    Most of the attention this week, from the patching point of view at least, has been directed towards the last ever security fixes for Windows XP. Microsoft warned in 2007 that it would no longer be supporting Windows XP after April 8th, 2014, and they have kept true to their promise – meaning that all XP users would be wise to either upgrade their XP installations to a more modern version of Windows or, if they’re feeling brave enough to make the leap, switch to a rival operating system. But amid all the talk of bidding adieu to Windows XP, there was another – much more…
  • Final Patch Tuesday Quietly Ushers Out XP and 2003

    Russ Ernst
    8 Apr 2014 | 10:57 am
    2 Critical 2 Important In the final Patch Tuesday for Windows XP and Office 2003, Microsoft released 4 patches today, two critical and two important that cover a total of just 11 CVEs. While an unusually small Patch Tuesday, it isn’t surprising Microsoft included final fixes in XP and Office 2003. For that reason, this is an important Patch Tuesday for users who rely on the outdated platforms and applications that move to self-support this month. First and foremost, Microsoft has closed the loop on the MS Word vulnerability addressed in last week’s advisory, 2953095 with MS14-017. This is…
 
  • add this feed to my.Alltop

    TRUSTe Blog

  • TRUSTe Welcomes Privacy Expert Ray Everett and Customer Operations Leader Elizabeth Blass

    mpereira
    14 Apr 2014 | 10:56 am
    TRUSTe today announced the appointment of privacy expert Ray Everett CIPP/US as Director of Product for Compliance Solutions and Elizabeth Blass as Vice President for Client Services. Everett has significant experience in the privacy industry gained from working in the sector for the past 15 years. He was one of the first US corporate privacy … Continue reading »
  • TRUSTe Doubles Mobile Ad Partner Base

    mpereira
    9 Apr 2014 | 7:49 am
    Today, TRUSTe announced that the global adoption of TRUSTed Ads has expanded with its mobile advertising partner base having more than doubled within the last year to include 33 leading mobile ad partners. Since it was first to market in 2012, TRUSTed Ads has powered billions of privacy safe mobile ads to help our clients … Continue reading »
  • DAA Releases Technical Guidelines for Implementing AdChoices Icon in Mobile

    mpereira
    8 Apr 2014 | 1:26 pm
    Joanne Furtsch Director of Product Policy @privacygeek Helen Huang Product Manager This week, the Digital Advertising Alliance (DAA) announced the first version of its DAA Ad Marker Guidelines for Mobile on how to comply with the enhanced notice requirements of the DAA Mobile Principles – The Application of Self-Regulatory Principles to the Mobile Environment. TRUSTe … Continue reading »
  • April Monthly Spotlight

    mpereira
    1 Apr 2014 | 6:30 am
     - April 3 Advertising Week Europe London TRUSTe is hosting a private dinner with TRUSTe including Rich Qiu, VP of Business Development, Mobile and Ken Parnham, Managing Director of Europe. For more details, please contact Eleanor Treharne-Jones – eleanor@truste.com - April 15 Privacy Innovation Forum San Francisco TRUSTe is hosting an exclusive invitation-only event bringing … Continue reading »
  • TRUSTe Unveils TRUSTed Interests – Puts Consumers in Control of Their Digital Experience

    mpereira
    25 Mar 2014 | 6:00 am
    Ahead of ad:tech SF this week, TRUSTe launched TRUSTed Interests – the first privacy-friendly interests management solution which puts consumers in control of their ad experience. Today, consumers feel inundated with irrelevant advertising and are concerned about their activity being tracked online. But, it’s also not easy for consumers to consumers to navigate how to … Continue reading »
  • add this feed to my.Alltop

    iViZ Blog

  • 10 questions to ask before you start your Bug Bounty program…

    Bikash Barai
    11 Apr 2014 | 12:49 am
    Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However an organization should be mature and prepared enough to launch such a program. Here are some questions which shall tell you if you are prepared or not. You are ready only if all the answers to the questions are “Yes”. You are ready if you can...The post 10 questions…
  • Checklist to assess the effectiveness of your Vulnerability Management Program

    Bikash Barai
    4 Apr 2014 | 3:17 am
    From our experience of helping organizations in building their vulnerability management program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously the management is extremely busy and has got too many priorities. It is natural to get into managing whirlwinds. So, I wanted to define a few questions which can help you to find out how robust is your application security management program? Not just that, by asking the questions you will also be able to formulate your vulnerability management strategy better.
  • “The Art of Starting Small” for implementing secure SDLC

    Bikash Barai
    27 Mar 2014 | 12:09 am
    I have seen several organizations trying to adopt secure SDLC and failing badly towards the beginning. One of the biggest reason is they try to use “Big Bang Approach”. Yeah, there are several consultants who will push you to go for a big project use the classical waterfall model to adopt secure SDLC. But that’s asking too much. Changing the habits of a group is not very easy. Typically there is a big push back and depending on how determined you are and the amount of dedicated resource you have either the exercise will be a half hearted success or...The post “The Art of Starting…
  • Assessment of SAP-ERP Security

    jitendra.chauhan
    19 Mar 2014 | 7:48 am
    ERP needs no introduction and so is ERP security. However, let me start with some of the Myths & Realities about ERP security. Some Myths related to ERP Security are: ERP is available only internally so there are no threats from internet. ERP Security is a Vendor Problem. ERP application is very specific and not known to attackers. ERP security is all about Segregation of Duties (SoD). Actually the reality is: ERP is not really an internal application for major organizations. A simple google search will show thousands of ERP URLs available publicly. Moreover, attacking internally is…
  • Business Logic Testing for SaaS and Cloud Applications

    jitendra.chauhan
    12 Mar 2014 | 2:23 am
    The conventional application penetration testing guidelines as provided by OWASP and many similar standards like WASC are simply not sufficient for SaaS applications. SaaS Applications require specialized test cases to cover the areas of Multi-tenancy, Data Segregation, and Enhanced Availability Requirements etc. The Cloud Security Alliance [CSA] captures the critical areas for SaaS applications in their CSA Security Guide. As a result, a penetration testing service specifically designed for SaaS solutions is the need of the hour that incorporates these critical areas, is essential for…
 
  • add this feed to my.Alltop

    SecurityWeek RSS Feed

  • GAO Report Knocks SEC for Cybersecurity Failings

    Brian Prince
    17 Apr 2014 | 4:36 pm
    A new report from the U.S. Government Accountability Office (GAO) criticizes the Securities and Exchange Commission (SEC) for failing short in the area of cybersecurity. While noting the SEC had made progress in strengthening security controls, the report took the agency to task for several security gaps, including failing to consistently identify and authenticate users and encrypt sensitive data. The GAO also criticized the SEC for other issues as well, such as not consistently applying software patches intended to fix vulnerabilities to servers and databases in a "timely manner." Other…
  • Attackers Less Reliant on Botnets to Launch Powerful DDoS Attacks: Akamai

    Fahmida Y. Rashid
    17 Apr 2014 | 12:19 pm
    Akamai Publishes Prolexic Q1 2014 Global DDoS Attack Report Attackers are shifting away from traditional botnet-based distributed denial of service (DDoS)attacks in favor of other techniques to launch larger attacks, Akamai Technologies said in its latest report. In the first quarter of 2014, attackers continued the trend of relying less on botnets and more on various reflection and amplification techniques to launch DDoS attacks, Akamai researchers found in its Prolexic Q1 2014 Global DDoS Attack Report, released Thursday. Attackers are taking advantage of new toolkits available on…
  • Satellite Telecom Vulnerable to Hackers: Researchers

    AFP
    17 Apr 2014 | 10:26 am
    WASHINGTON - Security flaws in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors, security researchers said Thursday. A paper released by the security firm IOActive found "multiple high risk vulnerabilities" in all the satellite systems studied. "These vulnerabilities have the potential to allow a malicious actor to intercept, manipulate, or block communications, and in some cases, to remotely take control of the physical device," the report said. Ruben Santamarta, author of the report, said he was…
  • Shaping the Threat Intelligence Management Market

    Chris Coleman
    17 Apr 2014 | 10:18 am
    There has been significant chatter recently about threat intelligence management – specifically how a platform for managing such should be defined. Two industry analysts, Dr. Anton Chuvakin, of Gartner and Rick Holland, of Forrester have weighed in early and often on this topic and are two of the more thoughtful analysts actively covering this space. Recently, Dr. Chuvakin blogged about what makes for a threat intelligence management platform (TIMP). Following Anton’s blog, Adam Vincent, CEO of ThreatConnect, blogged about how we should think about threat intelligence; the management of…
  • Snowden Questions Putin on Surveillance in Phone-in

    AFP
    17 Apr 2014 | 9:58 am
    MOSCOW -  Fugitive US intelligence leaker Edward Snowden on Thursday joined a phone-in with Russian President Vladimir Putin, quizzing him over the extent of Moscow's surveillance activities. Putin, a former KGB agent, greeted Snowden as a fellow "former agent" before assuring him that Russia's surveillance of the population was not on a mass scale and strictly controlled by laws. Snowden, a 30-year-old former United States National Security Agency contractor was granted asylum by Russia last August after shaking the American intelligence establishment to its core with a series of…
  • add this feed to my.Alltop

    Free IT - Security Magazines and Downloads from alltop.tradepub.com

  • Heartbleed -- What Can You Do To Stay Safe?

    17 Apr 2014 | 11:50 am
    The Heartbleed SSL vulnerability is making headlines around the world – and misreporting in the press and online is causing confusion. How can you stay safe and ensue your personal details aren't leaked?What Is Heartbleed? Well, It's Not A VirusYou've probably heard Heartbleed described as a virus. This isn't the case: in fact, it is a weakness, a vulnerability in servers running OpenSSL. This is the open source implementation of SSL and TLS, the protocols used for secure connections – those that begin https:// rather than the usual http://.This vulnerability – more commonly referred to…
  • The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook

    16 Apr 2014 | 8:50 pm
    The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.The following kit contents will help you get the most out of your Information Security research:PC Security Handbook - 2nd EditionBeginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security OptionsSecurity Trends 2014Top 10 Reasons to Strengthen Information Security with Desktop VirtualizationRequest Free!
  • How to Write a Privacy Policy for Your Website

    14 Apr 2014 | 12:00 am
    Launching a website? This guide goes through what you need to know about creating, and writing, a privacy policy for your website. Don’t know if you do need a privacy policy? A very simple question will answer this for you: do you collect any kind of personal data from your users? If yes, then you need a privacy policy – it’s required by law in most countries. What is a privacy policy? What are the legal requirements regarding privacy policies? What are the best practices for writing this agreement? The guide will answer these questions for you. Please note that this guide…
  • Knowledge is Power

    7 Apr 2014 | 12:00 am
    In 2012 Symantec performed more than 1,400 website vulnerability scans each day. More than half the websites scanned were found to have unpatched, potentially exploitable vulnerabilities. Of the vulnerable sites, a quarter were actually infected with malware that could infect visitors and lead to the sites being blacklisted by search engines. These figures show that millions of legitimate websites are at risk from serious attack and exploitation by internet criminals every day.And yet, a third of companies surveyed by Symantec in ‘The Vulnerability Knowledge Gap', said that they assume…
  • The Power to Destroy: How Malware Works

    7 Apr 2014 | 12:00 am
    However, with the number of web-attacks blocked per day rising from 190,370 to 247,350 between 2011 and 2012, it's vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community.Malware takes many different forms. It can log keystrokes, lead to data breaches, lock down hardware and use infected systems to spread malware to other victims. As a website owner it's your responsibility to not only protect your business and customers, but the safety of the Internet too. Consider the impact to your business and…
  • add this feed to my.Alltop

    IT-Security

  • Would you pay for a PCI DSS 2.0-3.0 class?

    Branden Williams
    25 Mar 2014 | 11:07 am
    Tower of Limes, by Darwin Bell The PCI Council released a training course on PCI DSS 3.0 (via Security Innovation) dubbed an “Insider’s Guide” to the new standard. The training has a price tag to get access to the materials, and some might deem it a bit hefty considering it is only a 90-minute course. In fairness, the Council is competing with free here as a number of experts have already built, delivered, and recorded courseware for on-demand viewing on these differences. So any price for materials might appear to be “hefty.” Also, don’t forget the Council…
  • HIPAA Audits Are Coming – Are you ready? – HHS has announced a plan to survey 1200 covered entities and business associates in preparation for audits

    Peter Hesse
    21 Mar 2014 | 7:23 am
    photo credit: Jamiesrabbits via photopin cc After the 2013 HIPAA Omnibus rules went into effect, there was a delay as the Department of Health and Human Services (HHS)’ Office for Civil Rights (OCR) brought their auditing program in line with the new requirements. Based on last month’s announcement in the Federal Register, it seems like they are about ready to start auditing organizations again. I suppose most healthcare covered entities and business associates don’t read the Federal Register regularly, so here are the pertinent details. OCR is planning an information…
  • Healthcare Industry Under Siege – Increasingly sophisticated cyberattacks are compromising healthcare organizations, and many remain unaware that their network is already compromised.

    Peter Hesse
    18 Mar 2014 | 12:37 pm
    photo credit: lydia_shiningbrightly via photopin cc Much of the focus in recent news is on attacks on retailers and the financial industry. It is easy to see the results of these money-motivated attacks in the form of large thefts of money or credit cards. As a result, it may surprise you to know your health care information is under attack. You are mistaken if you think that HIPAA’s data security protections are working to protect it. Health care organizations are not meeting the security table stakes. By rushing to implement electronic health records without minimum viable security,…
  • Subject to PCI DSS? Time for defense!

    Branden Williams
    18 Mar 2014 | 7:33 am
    For those of you that have been reading this since it was part of the VeriSign blogging program, you know that my posts tend to follow what is most important in my daily life. Or, if not most important, the loudest thing in my daily life that really needs a comment or two. After joining RSA, I spent quite a bit of time talking about advanced threats, especially after the breach. I also sat on the PCI Board of Advisors during that time, but the reality is that my daily work around information security and what the Board was tackling were very far apart. Given the release of 3.0 and the…
  • Preventing Risk? – Why it is important to think about the concept of risk the right way

    Peter Hesse
    14 Mar 2014 | 11:16 am
    I have spent my day in a forum dedicated to the security of classified information. Individuals attending are facility security officers, defense security service employees, and others caught in the orbit of U.S. Government classified information. One of the speakers made a comment that made me immediately jump to post something on Twitter: “I want you to walk away from this presentation with one thing you can do to prevent risk.” <- I don’t think you understand risk. — Peter Hesse (@pmhesse) March 14, 2014 Why did I say that the esteemed gentlemen who was…
 
  • add this feed to my.Alltop

    Infosec Communicator

  • The Secure Communicator–upcoming webinar

    bwadmin
    17 Apr 2014 | 5:16 am
    Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education … Continue reading →
  • Cyber Self Defense Reading List

    bwadmin
    16 Apr 2014 | 1:13 pm
    I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads. … Continue reading →
  • Speaking Schedule, Spring 2014

    bwadmin
    17 Feb 2014 | 1:21 pm
    24 February 2014, Security Awareness Panel, Upstate New York College Collaboration Information Technology Summit , Roberts Wesleyan College, 1200 Jefferson Road, Rochester, NY 23 March 2014, Empowering the Introvert Within: Becoming an Outstanding Leader, Mid Atlantic Technical Communication Conference, Philly Metro … Continue reading →
  • Beware of Good Ole Scammer Claus

    bwadmin
    20 Dec 2013 | 1:28 pm
    I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful. Beware of Good Ole Scammer Claus! As we head towards our holiday break, … Continue reading →
  • A Techcomm Bestiary–My Next Lightning Talk

    bwadmin
    6 Dec 2013 | 12:06 pm
    I’m developing a new lightning talk using the concept of a medieval bestiary. A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter. This … Continue reading →
  • add this feed to my.Alltop

    Infosec Communicator

  • The Secure Communicator–upcoming webinar

    bwadmin
    17 Apr 2014 | 5:16 am
    Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education … Continue reading →
  • Cyber Self Defense Reading List

    bwadmin
    16 Apr 2014 | 1:13 pm
    I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads. … Continue reading →
  • Speaking Schedule, Spring 2014

    bwadmin
    17 Feb 2014 | 1:21 pm
    24 February 2014, Security Awareness Panel, Upstate New York College Collaboration Information Technology Summit , Roberts Wesleyan College, 1200 Jefferson Road, Rochester, NY 23 March 2014, Empowering the Introvert Within: Becoming an Outstanding Leader, Mid Atlantic Technical Communication Conference, Philly Metro … Continue reading →
  • Beware of Good Ole Scammer Claus

    bwadmin
    20 Dec 2013 | 1:28 pm
    I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful. Beware of Good Ole Scammer Claus! As we head towards our holiday break, … Continue reading →
  • A Techcomm Bestiary–My Next Lightning Talk

    bwadmin
    6 Dec 2013 | 12:06 pm
    I’m developing a new lightning talk using the concept of a medieval bestiary. A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter. This … Continue reading →
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Mobile Security: A Force You Must Address

    Velera Wilson
    14 Apr 2014 | 4:00 am
    Mobile Security is the first force discussed in 4 Forces of Mobility, the new four-part series that addresses four forces, or challenges, organizations should address in order to thrive in a mobile world. Few will dispute that mobility is redefining when, where, and how often we engage colleagues and customers in the workforce today. And for the most part, that is good news. However, the flipside is cybercrime. As people become increasingly comfortable with the information they access, store, and share on their devices and across the network, tapping into a device to retrieve personal or…
  • Solving the Security Puzzle in the Age of the Cloud

    Andy Daudelin
    8 Apr 2014 | 6:10 am
    It’s the puzzle of the digital age – How do we protect the enterprise from security threats and continue to foster collaboration and innovation? Security challenges are mounting nearly as quickly as solutions emerge to thwart would be attacks. IT departments are asked to do more with fewer resources. Security professionals are tasked with reducing vulnerabilities presented by the rapid adoption of cloud services and the needs of an increasingly mobile and collaborative workforce. Traditional approaches simply cannot keep up. Cloud-based security solutions provide the flexibility,…
  • Are You Aware of Mobility Forces Shaping Your Organization?

    Velera Wilson
    7 Apr 2014 | 4:00 am
    There’s no denying that mobility has arrived in the workplace and is here to stay. It’s virtually impossible to ignore or avoid the mobility trends as end users gravitate to mobility as a means to increase productivity. The ever-changing nature of mobility makes it a force that remains to be subduedWhen you consider the rate in which mobility changes, multiplied by the number of mobile devices entering the workplace and the types of content being accessed and shared, it’s no surprise that businesses find themselves struggling to move from reactive to strategic mode just to effectively…
  • APT Risks on the Rise – Are You Prepared?

    Andy Daudelin
    31 Mar 2014 | 4:00 am
    Recent security breaches have made the headlines, but advanced persistent threats, or APTs, are now making headway as a data theft force to be reckoned with. While other types of threats cause annoying little blips in web access or even large-scale business disruptions, APTs can be far more devastating — calling for more protection than traditional security measures may provide. Understanding Advanced Persistent Threats Unlike attacks that break in and dash off with data in one fell, highly visible swoop, APTs distinguish themselves as being “low and slow” attacks. Capable of flying…
  • 4 Enterprise Mobile Prescriptions For 2014

    Maribel Lopez
    21 Mar 2014 | 4:00 am
    January normally brings a tidal wave of predictions from industry analysts. I’ve produced my own set, some of which were published on Networking Exchange. As we move into March, you should have an action plan that your company can execute against to improve business.During my Mobile Research Council webinar in February, I suggested there are four areas that a business must work on in 2014 in order to be successful.  While each of these items deserves a blog post of its own, I’ll describe the main themes here. 1. Build, understand and prioritize the app portfolio. Companies need a formal…
 
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Mobile Security: A Force You Must Address

    Velera Wilson
    14 Apr 2014 | 4:00 am
    Mobile Security is the first force discussed in 4 Forces of Mobility, the new four-part series that addresses four forces, or challenges, organizations should address in order to thrive in a mobile world. Few will dispute that mobility is redefining when, where, and how often we engage colleagues and customers in the workforce today. And for the most part, that is good news. However, the flipside is cybercrime. As people become increasingly comfortable with the information they access, store, and share on their devices and across the network, tapping into a device to retrieve personal or…
  • Solving the Security Puzzle in the Age of the Cloud

    Andy Daudelin
    8 Apr 2014 | 6:10 am
    It’s the puzzle of the digital age – How do we protect the enterprise from security threats and continue to foster collaboration and innovation? Security challenges are mounting nearly as quickly as solutions emerge to thwart would be attacks. IT departments are asked to do more with fewer resources. Security professionals are tasked with reducing vulnerabilities presented by the rapid adoption of cloud services and the needs of an increasingly mobile and collaborative workforce. Traditional approaches simply cannot keep up. Cloud-based security solutions provide the flexibility,…
  • Are You Aware of Mobility Forces Shaping Your Organization?

    Velera Wilson
    7 Apr 2014 | 4:00 am
    There’s no denying that mobility has arrived in the workplace and is here to stay. It’s virtually impossible to ignore or avoid the mobility trends as end users gravitate to mobility as a means to increase productivity. The ever-changing nature of mobility makes it a force that remains to be subduedWhen you consider the rate in which mobility changes, multiplied by the number of mobile devices entering the workplace and the types of content being accessed and shared, it’s no surprise that businesses find themselves struggling to move from reactive to strategic mode just to effectively…
  • APT Risks on the Rise – Are You Prepared?

    Andy Daudelin
    31 Mar 2014 | 4:00 am
    Recent security breaches have made the headlines, but advanced persistent threats, or APTs, are now making headway as a data theft force to be reckoned with. While other types of threats cause annoying little blips in web access or even large-scale business disruptions, APTs can be far more devastating — calling for more protection than traditional security measures may provide. Understanding Advanced Persistent Threats Unlike attacks that break in and dash off with data in one fell, highly visible swoop, APTs distinguish themselves as being “low and slow” attacks. Capable of flying…
  • 4 Enterprise Mobile Prescriptions For 2014

    Maribel Lopez
    21 Mar 2014 | 4:00 am
    January normally brings a tidal wave of predictions from industry analysts. I’ve produced my own set, some of which were published on Networking Exchange. As we move into March, you should have an action plan that your company can execute against to improve business.During my Mobile Research Council webinar in February, I suggested there are four areas that a business must work on in 2014 in order to be successful.  While each of these items deserves a blog post of its own, I’ll describe the main themes here. 1. Build, understand and prioritize the app portfolio. Companies need a formal…
  • add this feed to my.Alltop

    Redspin Security Blog

  • OpenSSL Vulnerability Discovered

    Dan Berger
    8 Apr 2014 | 11:35 am
    A two year old vulnerability in OpenSSL--the default cryptographic library used in many software applications (including web servers, operating systems, email, and instant-messaging clients)--has been discovered. This vulnerability could make it possible for external parties to mine server memory for data including private encryption keys, passwords, and other credentials. If you are hosting a web server using a vulnerable version of OpenSSL (including most variants of Linux), it is recommended [ Read More ]
  • Expect a HIPAA Security Audit – But Guess Who Will Conduct It?

    Dan Berger
    25 Mar 2014 | 10:04 am
    The 2009 HITECH Act deputized the Office of Civil Rights (OCR) to conduct HIPAA security audits under the auspices of the Department of Health and Human Services’ (HHS). But as it turns out, OCR is not the only HIPAA enforcer in town. State attorneys general can claim a similar right to audit; in fact several were initially trained by OCR to do so. In the second half of 2013, the Center for Medicare Services (CMS) began conducting audits of eligible hospitals and providers that had received payments [ Read More ]
  • Mobile Device Management: Protection But Not Panacea

    Dan Berger
    11 Mar 2014 | 2:29 pm
    A Mobile Device Management (MDM) solution is a single security tool that must work in concert with many other IT operations to achieve information security. Choosing the right MDM requires significant forethought. Implementing all the controls correctly for all end-users requires cooperation with system owners. Maintaining secure configurations and accurate device information requires ongoing support. Choosing, implementing, and maintaining your MDM are each complex tasks with their own inherent [ Read More ]
  • Why Risk an Incomplete HIPAA Risk Assessment?

    Dan Berger
    27 Feb 2014 | 1:39 pm
    Covered entities and their business associates must conduct periodic HIPAA risk assessments (aka: HIPAA risk analysis) under the HIPAA Security Rule and Omnibus Final Rule. For eligible covered entities, a HIPAA risk assessment is also a core requirement of their Stage 1 and Stage 2 attestations for the EHR Meaningful Use Incentive Program. Both HHS' Office of Civil Rights (OCR) and Center for Medicare Services (CMS) have conducted hundreds of HIPAA audits over the past 18 months. OCR, the lead [ Read More ]
  • The Biggest Oversight in HIPAA Security Risk Assessments – Security!

    Dan Berger
    23 Jan 2014 | 10:20 am
    There are many HIPAA consultants, law firms, software companies, cloud service providers, and others who will happily provide you with a quote for a HIPAA security risk analysis. Neither the HIPAA Security Rule nor the respective references in Meaningful Use prescribe the exact form or format of a HIPAA Security Risk Analysis. So it is not surprising that so many enterprising professionals will offer their “version” of how a third-party firm can address this scope of work. What is surprising [ Read More ]
  • add this feed to my.Alltop

    F-Secure Antivirus Research Weblog

  • xkcd: Heartbleed Explanation

    10 Apr 2014 | 11:54 pm
    xkcd: Heartbleed Explanation On 11/04/14 At 09:53 AM
  • Gameover ZeuS Jumps on the Bitcoin Bandwagon

    10 Apr 2014 | 11:54 pm
    We're always asking our analysts the following question: seen anything interesting? And yesterday, the answer to our query was this: Gameover ZeuS has some additional strings.Very interesting, indeed.Here's a screenshot of the decrypted strings:  •  aBitcoinQt_exe  •  aBitcoind_exe  •  aWallet_dat  •  aBitcoinWallet  •  aBitcoinWalle_0Bitcoin wallet stealing has really moved up from the bush leagues. Gameover ZeuS is a pro.Analysis is ongoing.Here's the SHA1:…
  • Lame "SEO" Android Apps Claim To Be Antivirus

    10 Apr 2014 | 11:54 pm
    On Sunday, Android Police (a popular news and review site) published a post on "Virus Shield" — an app which reached top ranking in Play, and yet, was a complete fraud. In a follow up, DailyTech did some digging and believes the app was written by a 17 year-old Texan. Apparently he's good at SEO.Whether he's the guy or not… it fits the typical profile. A young person with good SEO skills pushing a rather useless app.Lame "SEO apps" are prevalent on Google Play. They're easy to find if you look.For example:  •  Best Antivirus…
  • Gameover ZeuS Targets Monster

    10 Apr 2014 | 11:54 pm
    Recently, we obtained a current Gameover ZeuS configuration file and we noticed that in addition to CareerBuilder — Gameover now also targets Monster.Here's the legit hiring.monster.com URL:A computer infected with Gameover ZeuS will inject a new "Sign In" button, but the page looks otherwise identical:And then the following "security questions" are requested via an injected form:Here's the full list:  •  In what City / Town does your nearest sibling live?  •  In what City / Town was your first job?  •  In what…
  • Admins: why not review config standards as you fix Heartbleed?

    10 Apr 2014 | 11:54 pm
    As you have to update your SSL anyway, why not make sure your configuration is up to modern standards?There has been plenty of noise about Heartbleed, so if you're an admin, you already know what to do.1. Find everything you have using vulnerable versions of OpenSSL2. Update to the latest OpenSSL version3. Create new private keys and SSL certificates as the old ones may have leaked4. Revoke old certificatesBut since you have to touch your server configuration and create new SSL certificates, we would recommend that you also go through certificate generation settings and server configuration.
 
  • add this feed to my.Alltop

    Pcthreat.com

  • search.certified-toolbar.com

    17 Apr 2014 | 2:58 am
    Search.certified-toolbar.com is a suspicious search engine that might be distributed together with a browser hijacker; thus, do not be surprised if you notice that it has replaced your default search engine...
  • PC Optimizer Pro

    17 Apr 2014 | 2:58 am
    Despite the best efforts of the online security industry to secure the exact opposite, many of its consumers continue to fall into the trap set by malicious rogue security tools like PC Optimizer Pro. This...
  • QVO6.com Virus

    17 Apr 2014 | 2:58 am
    QVO6.com Virus is a malicious and clandestine browser hijacker which can take over your Internet Explorer, Mozilla Firefox and Google Chrome browsers. The infection has been developed by people who have highly...
  • HQ Video Profession

    17 Apr 2014 | 2:58 am
    There are quite a few adware applications that make use of different names to make an impression that it is a different program. However, such application as HQ Video Profession is just one version of HQ Video...
  • Wajam

    17 Apr 2014 | 2:58 am
    Wajam is a browser add-on which enables you to find what has been shared by your friends who use Facebook, Twitter, Google+, YouTube or other social networking websites. If your friend has not agreed to have...
  • add this feed to my.Alltop

    Threatpost - English - Global - threatpost.com

  • Like Apple’s TouchID, Galaxy S5 Vulnerable to Fingerprint Hack

    Chris Brook
    17 Apr 2014 | 12:03 pm
    Researchers published a video this week demonstrating how Samsung’s latest entry in the smartphone arena, the Galaxy S5, is vulnerable to a hack that involves lifting and copying fingerprints to trick the phone’s biometric sensor. Much like the Apple iPhone 5S, the smartphone, which first hit the market last week, boasts a fingerprint scanner as an added layer of security. Now the same research outfit that was able to hack the iPhone’s 5S’s Touch ID feature last year, Germany’s Security Research Labs (SRLabs), has managed to bypass a similar feature on the Galaxy S5. Like the iPhone…
  • Certificate Revocations Shoot Up in Wake of OpenSSL Heartbleed Bug

    Dennis Fisher
    17 Apr 2014 | 10:50 am
    The after effects of the OpenSSL heartbleed vulnerability continue to spread through the technology industry, nearly two weeks after the details of the flaw were disclosed. One of the latest repercussions is a huge increase in the number of SSL certificates being revoked, as site owners and hosting providers go through the process of replacing vulnerable certificates. Certificate authorities and other organizations maintain certificate revocation lists that browsers can use to determine whether a certificate on a given site has been revoked. Site owners will revoke certificates for a number…
  • Tor Begins Blacklisting Exit Nodes Vulnerable to Heartbleed

    Michael Mimoso
    17 Apr 2014 | 8:40 am
    The Tor Project has begun blacklisting exit nodes vulnerable to the Heartbleed vulnerability in OpenSSL. Researcher Collin Mulliner, with the Systems Security Lab at Northeastern University in Boston, published the results of an experiment he conducted using a publicly disclosed Heartbleed proof-of-concept exploit against 5,000 Tor nodes. Mulliner said that 1,045 nodes, or a little more than 20 percent, were vulnerable to the bug. Mulliner said only Tor exit nodes were leaking plaintext user traffic, including host names, credentials and web content. Mulliner conducted his experiment for…
  • Kurt Baumgartner on APT Attacks in the Enterprise

    Dennis Fisher
    17 Apr 2014 | 7:59 am
    Dennis Fisher talks with Kaspersky Lab security researcher Kurt Baumgartner about the specter of APT attacks in enterprises, what kind of tactics APT attackers are using now and the effect of the Heartbleed openSSL bug on the certificate  authority system. http://threatpost.com/files/2014/04/digital_underground_151.mp3
  • Federal Court Rejects Lavabit’s Contempt Appeal

    Chris Brook
    16 Apr 2014 | 12:33 pm
    A Federal court struck down Lavabit’s appeal today, affirming contempt of court sanctions against the now-shuttered secure email provider that was forced to release its SSL keys to the FBI last year. Those keys could have decrypted emails belonging to the company’s founder Ladar Levison along with Lavabit’s entire user base, a collective of 400,000 that reportedly included former National Security Agency contractor turned whistleblower Edward Snowden. Levison ultimately shut Lavabit down in August 2013 before disclosing the keys. According to the ruling, issued today by the Unites…
  • add this feed to my.Alltop

    VRT

  • Performing the Heartbleed Attack After the TLS Handshake

    Patrick Mullen
    10 Apr 2014 | 12:34 pm
    Over the past several days, many IPS rules for detecting the Heartbleed attack have been suggested that attempt to compare the TLS message size to the heartbeat message size.  This method works with most of the Proof-of-Concept attacks out there, which perform the Heartbleed attack before the TLS handshake has occurred.  Performing the attack before the TLS handshake results in both the attack and response data being sent in plaintext.  However, if a TLS handshake is performed first, all heartbeat data is encrypted, meaning that this type of detection comparing ciphertext…
  • Heartbleed Continued - OpenSSL Client Memory Exposed

    Brandon Stultz
    10 Apr 2014 | 10:59 am
    The Heartbleed vulnerability is bad. Not only does it pose a risk to servers running the vulnerable version of OpenSSL (1.0.1 through 1.0.1f) with heartbeats enabled, it also poses a serious risk to clients running the vulnerable versions.OpenSSL clients process heartbeats using the same vulnerable functions: tls1_process_heartbeat() and dtls1_process_heartbeat(). The same memcpy() overread detailed in our previous blog post allows malicious servers to read blocks of client memory. In internal testing we were able to extract memory from several client programs such as curl and wget, that…
  • Heartbleed Memory Disclosure - Upgrade OpenSSL Now!

    Brandon Stultz
    8 Apr 2014 | 1:33 pm
    Heartbleed is a serious vulnerability in OpenSSL 1.0.1 through 1.0.1f.   If you have not upgraded to OpenSSL 1.0.1g or installed a version of OpenSSL with -DOPENSSL_NO_HEARTBEATS it is strongly recommended that you do so immediately.This vulnerability allows the attacker to read up to 64KB of heap memory from the victim without any privileged information or credentials. How is this possible? In short, OpenSSL's heartbeat processing functions use an attacker controlled length for copying data into heartbeat responses. Both DTLS and TLS heartbeat implementations are vulnerable.The…
  • Microsoft Update Tuesday: April 2014, two final XP and Office 2003 fixes

    Yves Younan, PhD
    8 Apr 2014 | 10:06 am
    It’s the last Microsoft Update Tuesday before the end-of-life of both Windows XP and Office 2003 and Microsoft is patching two vulnerabilities that also impact XP and two that also impact Office 2003 this month. All-in-all it’s a relatively light month this time around with only four bulletins covering eleven CVEs.The first bulletin this month, MS14-017, deals with Word and covers three CVEs. One fix is for a 0-day vulnerability, CVE-2014-1761, that Microsoft previously addressed in advisory 2953095 and a “Fix it” that disables support for RTF completely in Word. The vulnerability…
  • CVE-2014-1761, Oh did you mean CVE-2012-2539?

    Alex McDonnell
    8 Apr 2014 | 6:26 am
    When the VRT first received word of a new Microsoft Word 0-day I anxiously awaited details and the ever important hash of the in-the-wild exploit to be able to research it and provide coverage through Snort, ClamAV and the FireAmp suite of products. I was especially interested when word came that it was an RTF vulnerability, as I have spent a lot of time looking at high profile RTF vulnerabilities such as the ever popular CVE-2012-0158.When the in the wild sample finally arrived I thought someone was playing an early April Fool's joke on us: I knew this vulnerability already. More than that,…
 
  • add this feed to my.Alltop

    PC1News.com

  • Browse2Save Removal Instructions

    admin
    17 Apr 2014 | 1:30 am
    Browse2Save is a browser add-on which is known to pose a risk to the security of user's PCs. As long as this potentially unwanted program is found on your computer, your machine will be vulnerable to attacks of hackers and their viruses. In order to avoid finding your system compromised with malicious infections, it is advised that you remove the hijacker as soon as possible. Browse2Save add-on is an adware tool developed to increase the traffic to online shops and to redirect users to third-party pages with the help of sponsored links and pop-up ads. By using this tool, you put your system…
  • Jdl.findpre.net Removal Guide

    admin
    17 Apr 2014 | 1:25 am
    Jdl.findpre.net web site is a page which is connected to a browser hijacker. In case that you are redirected to its site, you have to know that your browser has been probably hijacked. In case that the adware platform has been installed on your PC, your browsing sessions will be navigated to third-party sites and your information and system may be targeted by cyber criminals. The advice of computer experts is to remove the potentially unwanted program as soon as possible from your computer and thus protect the computer from being attacked by hackers. How does Jdl.findpre.net adware provider…
  • Ads by Yula Removal Guide

    admin
    16 Apr 2014 | 12:51 am
    Ads by Yula is said to be a potentially unwanted program. The tool is often found attached to browsers even if the user has not intended to download it. This is why it is known as a browser hijacker and its services are said to pose a risk to the security of your information and system. In case that you notice this add-on on your browser, make sure you remove it as soon as possible. This is what computer experts advise you to do in order to protect your computer and details from attacks of hackers and their viruses. What does Ads by Yula do? In case that you have Ads by Yula hijacker…
  • Api.paltip.com Removal Guide

    admin
    16 Apr 2014 | 12:46 am
    Api.paltip.com is a web site associated with a program developed to help people make a profit. The tool gives you the opportunity to recommend products to your friends and for every approved recommendation you are paid money. The problem is that this adware provider displays pop-up ads and banners which can redirect you to unreliable third-party sites and pages with an unknown reputation. This poses a serious risk to your security and this is the reason why it is advised to remove Api.paltip.com hijacker completely from your computer and stop using its services. How does Api.paltip.com work?
  • HQ-Video Removal Guide

    admin
    15 Apr 2014 | 6:18 am
    HQ-Video is a browser hijacker known to be installed on browsers without informing the users about its intentions to promote products available at third-party web sites. The tool is attached to browsers immediately and changes their settings without any delay. As a result, the program controls all browsing sessions of the user. This is not considered secure, because the user can be redirected to unknown web sites with an unreliable reputation and unknown intentions. Because of the problems that can be caused when using HQ-Video hijacker, it is recommended that you remove the potentially…
  • add this feed to my.Alltop

    NSS Labs

  • Interop 2014: Like sitting next to your great aunt at dinner – interesting, but a bit dry

    16 Apr 2014 | 12:00 am
    Interop is promoted as a technology conference and traditionally has covered a range of interoperability topics, from core infrastructure up to applications. The conference also provides attendees with information on current security trends. This year, keynotes spoke broadly of BYOD, cloud computing, the desire for options and in general, the importance of flexibility during change.
  • Browsing for an EPP Solution

    15 Apr 2014 | 12:00 am
    As socially engineered malware (SEM) becomes more and more complex, endpoint protection (EPP) products increasingly depend on cloud-based reputation systems to protect users. Both Internet Explorer and Chrome use cloud-based reputation systems to protect users from SEM. Application reputation technologies are ubiquitous among EPP products, and EPP products collect significantly more telemetry data from their user base than do browsers. Application reputation technologies by definition are much more proactive than blacklisting techniques – if they are well designed.
  • The Noise from Incident Response Can Hurt More Than Your Ears

    9 Apr 2014 | 12:00 am
    Incident response (IR) is a key process designed to provide context, priority, and ultimately, closure for the events associated with an attack. When enterprise defenses falter, an IR process should give the information security (IS) team enough information to efficiently clean up the mess from a breach. A good IR process reveals the attackers and their motives; a great IR process will consistently prevent serious damage while efficiently conserving enterprise time and resources.
  • Don't Shoot The Messenger

    3 Apr 2014 | 12:00 am
    Following publication of our new breach detection systems (BDS) test results, FireEye responded somewhat forcefully in a blog post by Manish Gupta. Not everyone can end up in the top right quadrant of the NSS Labs Security Value Map™ (SVM), so it is not unusual for someone to be unhappy. It is, however, unusual for someone to behave the way FireEye did in this instance. Normally we would not respond to such attacks, but there are a number of untruths and misdirections in their blog post that we feel we must address.
  • Breach Detection Systems – Precious Metal Projectile or Pale Pachyderm?

    2 Apr 2014 | 12:00 am
    NSS once asked: “Will breach detection systems become the latest security “silver bullet” – or a “white elephant?” To answer this question, we must review the NSS definition of a breach detection system (BDS), as seen in the Breach Detection System Buyer’s Guide:
  • add this feed to my.Alltop

    metaflowsblog.wordpress.com

  • Connecting the Dots

    metaflowsblogger
    8 Apr 2014 | 1:23 pm
    One of the most important lessons from cyber-war fighters is that relying on a single mechanism to defend your Enterprise is naive. In fact, the more disparate and heterogeneous, the better. MetaFlows fully embraces this concept by providing several detection mechanisms that work concurrently. IDS behavioral analysis looking for multiple symptoms that indicate a compromised host, Using up to 50 different Antivirus solutions at once to find bad content on the network, Honeypots continuously mining for new threats, and Flow/Log analysis are just a few things we do. Up to now, these mechanisms…
  • What’s Wrong with FireEye

    metaflowsblogger
    4 Mar 2014 | 5:29 pm
    How it works The latest hottest trend in cyber-security is sand-boxing. This is virus detection on steroids. Instead of relying on prior knowledge about particular viruses, this technique emulates the users’ workstations with a sandbox and flags anything that attempts to go out of the box (or attempts to infect). The process is straight forward: (1) Get all potentially infectious content coming into your organization, and (2) Emulate each piece of content as if it was executing on your hosts. Limitations Sand-boxing has low false positives but causes a lot of false negatives. In other…
  • Predictive Correlation — The Future of Cyber Security?

    metaflowsblogger
    26 Feb 2014 | 3:23 pm
    What is it? Research funded by the National Science Foundation has led to the development of a proprietary inter-domain correlation algorithm that is mathematically similar to Google’s Page ranking. Event scores are autonomously obtained from a global network of honeypot sensors monitored by the MetaFlows Security System (MSS). The honeypots are virtual machines that masquerade as victims; they open up dangerous ports/applications and/or browse dangerous websites. As the honeypots are repeatedly infected, the MSS records both successful and unsuccessful hacker URLs, files, bad…
  • Collaborate With and Audit Log

    metaflowsblogger
    26 Feb 2014 | 2:42 pm
    Audit Log The MetaFlows Security System allows organizations to grant access to multiple users for online collaboration in sharing sensor data and intelligence. This is a big advantage because it helps distribute workloads across departments and at different levels. One issue customers brought up was the lack of ability to know who did what at what time. This is why we added the Account Audit Log. You can find it under Account > Account Audit Log. With this new Audit Log, you can track most account actions, including: Changes to contact information and subscription All account accesses…
  • New packet Logging and File Carving

    metaflowsblogger
    26 Feb 2014 | 2:32 pm
    Packet Logging and File Carving Being able to go back and look at the payloads or files transmitted on a network is extremely useful for several reasons: If you do not have the payload, you cannot really prove malicious intent, and legally you are on the hook. Payloads/Files are the ultimate forensic tool to decide if a particular incident is a false positive or a true positive. In more advanced systems payloads can also be used to find false negatives (things should have caused a security event but did not). Obviously logging all data transferring on a network is challenging because disk…
 
  • add this feed to my.Alltop

    VRT

  • Performing the Heartbleed Attack After the TLS Handshake

    Patrick Mullen
    10 Apr 2014 | 12:34 pm
    Over the past several days, many IPS rules for detecting the Heartbleed attack have been suggested that attempt to compare the TLS message size to the heartbeat message size.  This method works with most of the Proof-of-Concept attacks out there, which perform the Heartbleed attack before the TLS handshake has occurred.  Performing the attack before the TLS handshake results in both the attack and response data being sent in plaintext.  However, if a TLS handshake is performed first, all heartbeat data is encrypted, meaning that this type of detection comparing ciphertext…
  • Heartbleed Continued - OpenSSL Client Memory Exposed

    Brandon Stultz
    10 Apr 2014 | 10:59 am
    The Heartbleed vulnerability is bad. Not only does it pose a risk to servers running the vulnerable version of OpenSSL (1.0.1 through 1.0.1f) with heartbeats enabled, it also poses a serious risk to clients running the vulnerable versions.OpenSSL clients process heartbeats using the same vulnerable functions: tls1_process_heartbeat() and dtls1_process_heartbeat(). The same memcpy() overread detailed in our previous blog post allows malicious servers to read blocks of client memory. In internal testing we were able to extract memory from several client programs such as curl and wget, that…
  • Heartbleed Memory Disclosure - Upgrade OpenSSL Now!

    Brandon Stultz
    8 Apr 2014 | 1:33 pm
    Heartbleed is a serious vulnerability in OpenSSL 1.0.1 through 1.0.1f.   If you have not upgraded to OpenSSL 1.0.1g or installed a version of OpenSSL with -DOPENSSL_NO_HEARTBEATS it is strongly recommended that you do so immediately.This vulnerability allows the attacker to read up to 64KB of heap memory from the victim without any privileged information or credentials. How is this possible? In short, OpenSSL's heartbeat processing functions use an attacker controlled length for copying data into heartbeat responses. Both DTLS and TLS heartbeat implementations are vulnerable.The…
  • Microsoft Update Tuesday: April 2014, two final XP and Office 2003 fixes

    Yves Younan, PhD
    8 Apr 2014 | 10:06 am
    It’s the last Microsoft Update Tuesday before the end-of-life of both Windows XP and Office 2003 and Microsoft is patching two vulnerabilities that also impact XP and two that also impact Office 2003 this month. All-in-all it’s a relatively light month this time around with only four bulletins covering eleven CVEs.The first bulletin this month, MS14-017, deals with Word and covers three CVEs. One fix is for a 0-day vulnerability, CVE-2014-1761, that Microsoft previously addressed in advisory 2953095 and a “Fix it” that disables support for RTF completely in Word. The vulnerability…
  • CVE-2014-1761, Oh did you mean CVE-2012-2539?

    Alex McDonnell
    8 Apr 2014 | 6:26 am
    When the VRT first received word of a new Microsoft Word 0-day I anxiously awaited details and the ever important hash of the in-the-wild exploit to be able to research it and provide coverage through Snort, ClamAV and the FireAmp suite of products. I was especially interested when word came that it was an RTF vulnerability, as I have spent a lot of time looking at high profile RTF vulnerabilities such as the ever popular CVE-2012-0158.When the in the wild sample finally arrived I thought someone was playing an early April Fool's joke on us: I knew this vulnerability already. More than that,…
  • add this feed to my.Alltop

    Private WiFi

  • Google Says Collecting Data From Unencrypted WiFi Networks Isn’t Illegal

    Jan Legnitto
    17 Apr 2014 | 1:32 am
    Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. That’s why it has petitioned the highest court in the land to rule on one of the most hotly debated legal issues of our time. This month, Google asked the U.S. Supreme Court to review an earlier federal appeals court decision that could make it liable for hijacking data from unencrypted WiFi networks in neighborhoods that were part of its Street View program. Between 2008 and 2010, Google’s photo-snapping Street View cars didn’t only capture street images. They sniffed private information…
  • Heartbleed: A Message From PRIVATE WiFi’s CEO

    Kent Lawson
    16 Apr 2014 | 1:30 am
    Let’s start with the good news: you are still safe. The latest Heartbleed situation -- which is a software bug, not a virus -- has not endangered the privacy and security of our customers' communications.  Although this was a serious global problem with severe impact on a large number of servers, websites, and web services (this cartoon explains it pretty well), our customers' communications remained safe. While our servers do use OpenSSL, they were safeguarded for the following reasons: Our VPN servers have multiple layers of encryption technology. We store no sensitive customer data on…
  • Digital by Design: Your Secret Consumer Scores and How They Are Used Against You

    Jared Howe
    14 Apr 2014 | 1:31 am
    How likely are you to lose your job? What are the odds that you will take that medication your doctor prescribed to you? Are you the kind of person who will take your business to a competitor? These are not just abstract questions. They are actual secret “consumer scores” that big data compiles on you and every adult in the U.S. to help companies and the government predict your behavior. Each data score contains thousands of individual data points. And there are hundreds of these scores, including how likely you are to pay your debts, if you are likely to commit fraud, as well as law…
  • Privacy and Your Facebook Photos, Round 4,524: FTC Charges Operators of Jerk.com With Deceiving Consumers

    Elaine Rigoli
    11 Apr 2014 | 1:19 am
    What if you found out your Facebook profile was labeling you as a jerk and compromising your online privacy at the same time? More than 73 million people have been unknowingly involved in something that seems so juvenile it's hard to believe this isn't a fictional tale. Napster co-founder John Fanning is one of the operators of a website called Jerk.com, now in hot water with the Federal Trade Commission for allegedly stealing personal information from Facebook to create profiles labeling people as either a "jerk" or "not a jerk," then falsely claiming that consumers could revise their online…
  • Meet Heartbleed: The Huge New Security Flaw for Secure Websites

    Jared Howe
    9 Apr 2014 | 1:05 pm
    Internet researchers have found a brand new, very serious vulnerability called the Heartbleed Bug, which makes it possible for hackers to steal encrypted information from secure websites that run certain versions of OpenSSL. This bug allows attackers to access the memory of the websites running vulnerable versions of OpenSSL software, including the secret keys used to encrypt messages sent by those websites. This gives attackers the ability to decrypt and steal supposedly secure data captured during an encrypted web session. A Quick Review of Secure Websites (HTTPS) Online retailers and banks…
  • add this feed to my.Alltop

    BullGuard’s Blog – Your Online Security Hub

  • What is software piracy: all there is to know about it

    Steve Bell
    17 Apr 2014 | 6:30 am
    Some years ago the US software behemoth Microsoft was planning to launch a bit of an advertising thing at a football match between Glaswegian football teams Rangers and Celtic. Anybody who knows their football will tell you that on the terraces, around the ground and in the city, a Rangers and Celtic game can lead to almost post-apocalyptic scenes such is the intense sectarian rivalry between the opposing sets of fans. On the surface, Microsoft’s decision might seem strange, after all the conforming chino-clad employees at its Redmond HQ couldn’t be further away from the sometimes bleak,…
  • What is spyware and how to remove it

    Steve Bell
    14 Apr 2014 | 3:19 am
    Spyware is a modern plague. It’s dastardly, devilish and insinuates itself into millions of computers without people being aware of it. Find out just what spyware is, what it does, where it comes from, how to avoid it and how to get rid of it by reading on. The term ‘spyware’ has a faintly exotic ring to it and for the imaginative it may call to mind tales of daring and espionage in the interests of national security.  Certainly, back in the 1970’s real life cold war NATO spies were using a form of spyware, keystroke loggers, to infiltrate Russian military networks. These keystroke…
  • NEWS ALERT! Massive security flaw threatens Internet

    Steve Bell
    9 Apr 2014 | 1:54 am
    Heart Bleed bug exploits popular encryption tool – most Internet servers affected – fix is available but needs to be applied swiftly – even cyber criminals are exposed. An enormous security flaw has been discovered that threatens the entire Internet. Dubbed Heart Bleed, its panicked internet services providers and sent many system administrators – the people who look after an organisation’s computer networks – into a bit of a frenzy. The vulnerability is in something called OpenSSL which is enormously popular open-source software that is broadly used to encrypt web communications.
  • German officials confirm 18 million emails and passwords stolen

    Steve Bell
    8 Apr 2014 | 7:19 am
    NEWS ALERT! 18 million email accounts hacked in Germany  – stolen details used to make online purchases – website available to check which email accounts have been compromised   Four German prosecutors in the German city of Verden have unearthed a mass hacking of private data, involving 18 million email addresses and passwords. The revelation follows a similar discovery in January of this year when the same four prosecutors revealed the theft of 16 million account details. The authorities are keeping quiet on the details at the moment other than saying that some of the email passwords…
  • Why is Internet running slow and how to speed it up

    Steve Bell
    3 Apr 2014 | 2:22 am
    Sometimes the speeds of our Internet connections are not what they could be. If you’re feeling a bit frustrated at your connectivity speed read on for a few tips on how to get things moving a little faster. Back in the day, when connecting to the Internet via a dial up modem was accompanied by an odd medley of electronic tweeting and whistling sounds, connections used to slow down in the late afternoon. It was often attributed to the fact that America was waking up and people on the other side of the Atlantic were yawning their way onto the Internet. This meant that the pipes that Internet…
 
  • add this feed to my.Alltop

    Pivot Point Security

  • ISO 27001 Certification Audits Versus Internal Audits: The Difference is Important

    Mosi
    7 Apr 2014 | 6:37 am
    Many of our clients at Pivot Point Security want to know whether the internal audit of their information security management system (ISMS), as required by the ISO 27001 standard, can be viewed as a “mock certification audit” or “dry run” to make sure they’re ready for a certification audit or surveillance audit. The answer is “yes and no.” Yes, you can use your ISO 27001 internal audit simply to prepare your organization for certification or surveillance audits conducted by a certification body—but this limits its business value, and could potentially compromise the…
  • Yet Another Example Of Why Automated Vulnerability Testing Alone Is Insufficient

    Bob
    1 Apr 2014 | 4:00 am
    Here’s a cautionary tale about how automated vulnerability scanning alone can leave you with a false impression about how secure your application is. During a recent application assessment for a client, I followed Pivot Point Security’s normal process of running an Application Vulnerability Assessment scan. That is, I started out with an automated tool before turning to manual testing. Looking at the results of our automated scan, I thought that this was going to be one of the most secure applications I had ever assessed. Most of the major vulnerabilities of the OWASP Top 10 for 2013 were…
  • Get This New ILTA Resource To Help Bring ISO 27001 To Your Law Firm

    John
    25 Mar 2014 | 4:00 am
    The International Legal Technology Association (ILTA) just published a great new PowerPoint presentation that makes it easy for a CIO/CISO level resource to learn and communicate the benefits and process of ISO 27001 to their firm. As a member of the ILTA’s LegalSEC Council, its exciting for me to see it achieve its mission of promoting security in the Legal vertical through education, and by delivering resources to make it simpler for law firms to know they are secure and prove they are compliant. With ISO 27001 quickly becoming a de facto standard for law firms, I think the presentation…
  • Banks: Here’s How to Secure Your Windows XP ATMs Until You Can Upgrade

    John
    19 Mar 2014 | 4:00 am
    I’ve had a number of interesting conversations with our banking clients over the last few days. Like most Information Security practitioners, I was painfully aware of the looming Windows XP security deadline (April 8), when Microsoft will end security support. I was also aware that this would impact the great majority of our banking clients’ ATMs.  What I was not aware of was that the cost to each bank measures in the $1,000-$8,000 range per ATM, depending upon whether the machines can be upgraded to Windows 7 or will need to be replaced. As you might imagine, banks everywhere want to…
  • Compliance Does Not Equal Information Security—In Healthcare or Any Other Industry

    BobB
    18 Mar 2014 | 4:00 am
    Compliance does not equal information security. Organizations in healthcare and other regulated industries may be compliant with applicable regulations, but this does not mean they’re secure from cyber attacks. The SANS Institute, a leading research and education organization for IT security professionals, just released a new report on cyber threats in the healthcare industry. And the news is disconcerting to say the least. It’s also no surprise to us here at Pivot Point Security, as we’ve been seeing these trends building “in the wild” for some time now. There’s no question that…
  • add this feed to my.Alltop

    HOTforSecurity

  • Hackers attempt to blackmail cosmetic surgery firm, after stealing up to 500,000 patients’ records

    Graham Cluley
    15 Apr 2014 | 12:31 pm
    The personal details of nearly half a million people, considering cosmetic surgery, may have been accessed by hackers who then attempted to blackmail a leading chain of clinics. The online criminals struck last month, breaking into servers belonging to the Harley Medical Group, which has 21 clinics across the United Kingdom. According to the company, the information stolen was extracted from its website enquiry form, meaning that the hackers could have accessed some 480,000 records containing potential clients’ names, addresses, dates of birth, email addresses and telephone numbers, as…
  • Are You Ready to Vote for HotforSecurity?

    Bitdefender
    15 Apr 2014 | 6:48 am
    We’re excited to share with you that HotforSecurity and Bitdefender Labs have been nominated at the European Security Blogger Awards 2014 in London, April 29, held during the InfoSec Europe security event. HotForSecurity is competing against leading security bloggers in three major categories: Best Corporate Security Blog Most Entertaining Blog Grand Prix Prize for the Best Overall Security Blog Do you enjoy reading hot security news powered by Bitdefender? Then we encourage you to vote for HotForSecurity! Vote here. Voting takes 1 minute and is open to everyone until Wednesday midnight…
  • Warlords of Draenor Pre-Install Phishes for WoW players’ accounts

    Loredana Botezatu
    14 Apr 2014 | 1:52 am
    World of Warcraft players need to ignore the unexpected e-mails that pop up into their inboxes offering professional skills, automatic upgrades for the role of class 60. Because they are bogus.   Spammers have launched a new campaign offering fake Warlords of Draenor expansion pack, gifts, gold and upgrades, to trick WoW fans into filling out a phishing form and singlehandedly providing crooks with their players’ accounts (e-mail and password). The message, signed Blizzard Entertainment, includes a link for gamers to access and get the serial number to pre-install game files and enable the…
  • The NSA knew about Heartbleed bug for two years, claims report

    Graham Cluley
    12 Apr 2014 | 6:03 am
    Has the United States’ National Security Agency (NSA) really known about the Heartbleed bug (and presumably exploiting it for surveillance purposes) for two years? That’s the claim being made by a Bloomberg report, which claims to have had the revelation confirmed to them by “two people familiar with the matter”. If the allegation is true then serious questions will be asked regarding the danger raised by a government agency choosing to keep the critical OpenSSL flaw secret so it could be exploited for national security purposes. Because, imagine if this *is* what the…
  • Facebook Follower Scam Prompts Victims to Inject Themselves with Dangerous Code

    Bianca Stanescu
    11 Apr 2014 | 9:08 am
    More than 17,000 Facebook users were tricked by a bold scam that promised them over 100,000 followers on the social network and made them willingly inject dangerous code in their browser. Bitdefender has started to analyze the dubious profile promoting the scam after several Facecrooks fans complained about the social engineering trick. Hackers behind the scam could be of Turkish origin. It all started with a freshly registered Facebook page. “Master of Hacking” promised to teach fans a new trick – “how to increase Facebook followers” to more then 100,000, 100,999 or 150,000…
 
  • add this feed to my.Alltop

    Data In Motion - a Managed File Transfer blog

  • What to Expect When You’re Managing File Transfers: Houston, Do We Have a Problem?

    Tom Scearce
    8 Apr 2014 | 8:30 am
    In just a few short years, a handful of consumer-grade, cloud-based applications have made significant inroads in the file transfer space. With companies like DropBox boasting a $10 billion valuation and Google continuously improving the interface for its popular Drive service, cloud apps are, along with email attachments and FTP, a prevailing standard for file […] What to Expect When You’re Managing File Transfers: Houston, Do We Have a Problem? is a post from: Data In Motion - a Managed File Transfer blog The post What to Expect When You’re Managing File Transfers: Houston, Do We…
  • How to Transfer Large Files Faster

    Tom Scearce
    28 Jan 2014 | 8:57 am
    On the surface, “file transfer” sounds pretty simple. Maybe you transfer files as email attachments or make them available to others in your organization via a data synchronization application like DropBox or Google Drive. But what about the really big files you might have to transfer? What if you have to send a large media […] How to Transfer Large Files Faster is a post from: Data In Motion - a Managed File Transfer blog The post How to Transfer Large Files Faster appeared first on Data In Motion - a Managed File Transfer blog.
  • Use Case Series: Translating Protocols On-The-Fly

    Tom Scearce
    21 Jan 2014 | 8:58 am
    As the world of data security changes, the number of transfer protocols in use continues to increase. Where insecure FTP once dominated file transfer, several secure alternatives are now widely used by enterprises around the world. For your business, being able to transfer data using every major protocol increases your agility when it comes to […] Use Case Series: Translating Protocols On-The-Fly is a post from: Data In Motion - a Managed File Transfer blog The post Use Case Series: Translating Protocols On-The-Fly appeared first on Data In Motion - a Managed File Transfer blog.
  • Pros and Cons of File Transfer in Enterprise Application Integration

    Tom Scearce
    14 Jan 2014 | 8:57 am
    In enterprise environments, integrating applications can help you meet business objectives and boost the value you receive from technology investments. But integrations nearly always involve file transfer – a process that, if not handled properly, could delay your project or even lead to a failed implementation. How can you address common file transfer problems – […] Pros and Cons of File Transfer in Enterprise Application Integration is a post from: Data In Motion - a Managed File Transfer blog The post Pros and Cons of File Transfer in Enterprise Application Integration appeared…
  • Use Case Series: Bringing Diverse Data Channels Together

    Tom Scearce
    7 Jan 2014 | 8:53 am
    Increasingly, enterprises need to send and receive data through a large number of different channels. Your data needs to be more flexible and more accessible than ever before. Where data was once fairly confined to the restraints of a single business, modern data transfer must work seamlessly with internal departments, external partners, and the Internet. […] Use Case Series: Bringing Diverse Data Channels Together is a post from: Data In Motion - a Managed File Transfer blog The post Use Case Series: Bringing Diverse Data Channels Together appeared first on Data In Motion - a Managed…
  • add this feed to my.Alltop

    Video Surveillance

  • VideoSurveillance.com Featured by Portland Business Journal

    27 Mar 2014 | 11:46 am
    VideoSurveillance.com was recently featured on the Portland Business Journal’s website, discussing the business’s growth and the IP camera industry. VideoSurveillance.com has customers in 48 countries worldwide, with 125 customers just in the Portland, Oregon area. According to President Josh Daniels, “If you think about how important smart phones and tablets have become, IP video surveillance plays right into that. It allows people to access their surveillance through these devices anywhere and anytime.” Along with providing professional IP camera surveillance systems, the…
  • New Cameras & NVRs on VideoSurveillance.com

    19 Mar 2014 | 12:14 pm
    If you’re looking for powerful new video surveillance cameras and NVRs, we recently added new products to the VideoSurveillance.com online store! For durable cameras, new Axis Q60-S PTZ dome cameras come in a special stainless steel housing that withstands corrosion from salt water and harsh cleaning chemicals. The Axis Q6044-S offers 720p HD resolution and 30x optical zoom, while the Axis Q6045-S model has 1080p HD resolution and 20x optical zoom. The camera domes can also be filled with pressurized nitrogen gas to prevent internal condensation and create a non-flammable environment. If…
  • Learn More about Smart Search, Tamper Detection, and Corridor Format

    6 Mar 2014 | 10:42 am
    We’ve added new technology pages to the VideoSurveillance.com Learning Center, so you can better understand how IP surveillance cameras work! These technology pages explain what the camera or software feature is, how it works, and some suggested applications. If you’re looking to save time while reviewing surveillance videos, our new Smart Search page explains how you can set up searches to look only for motion in the videos that matches you search settings. This helps you quickly find only relevant videos, and prevents time spent manually watching each clip. Worried about your…
  • What is Milestone’s Video Push Feature?

    24 Feb 2014 | 2:37 pm
    If your video surveillance system is managed by Milestone XProtect VMS software, then this feature might appeal to your organization or business. Video Push, a Milestone Mobile Client add-on feature, makes it even easier to collect video evidence by using your own mobile device’s camera. This feature is beneficial to several applications, including parking lot monitoring, building surveillance, event security, and more. As a way to obtain further video evidence, you can record an incident or investigation with your smartphone (i.e. an Android or iPhone) through Milestone Video Push. You can…
  • Auto Dealership Solves Theft Investigation thanks to HD PTZ Camera - Read More in Our Latest Case Study

    22 Jan 2014 | 8:35 am
    Just yesterday, VideoSurveillance.com released a new case study focusing on a car dealership's decision to arm its facility with high-definition IP cameras. With no surveillance system to watch over its dealership, showroom, and indoor offices, Instant Auto Finance sought out the expertise of VideoSurveillance.com to design a security solution that included eight outdoor cameras and two indoor cameras, including a PTZ camera with mobile viewing capability. Prior to investing in an IP camera system, Instant Auto Finance had a car stolen off its lot, prompting the need for outdoor security.
  • add this feed to my.Alltop

    Infosec Communicator

  • The Secure Communicator–upcoming webinar

    bwadmin
    17 Apr 2014 | 5:16 am
    Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education … Continue reading →
  • Cyber Self Defense Reading List

    bwadmin
    16 Apr 2014 | 1:13 pm
    I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads. … Continue reading →
  • Speaking Schedule, Spring 2014

    bwadmin
    17 Feb 2014 | 1:21 pm
    24 February 2014, Security Awareness Panel, Upstate New York College Collaboration Information Technology Summit , Roberts Wesleyan College, 1200 Jefferson Road, Rochester, NY 23 March 2014, Empowering the Introvert Within: Becoming an Outstanding Leader, Mid Atlantic Technical Communication Conference, Philly Metro … Continue reading →
  • Beware of Good Ole Scammer Claus

    bwadmin
    20 Dec 2013 | 1:28 pm
    I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful. Beware of Good Ole Scammer Claus! As we head towards our holiday break, … Continue reading →
  • A Techcomm Bestiary–My Next Lightning Talk

    bwadmin
    6 Dec 2013 | 12:06 pm
    I’m developing a new lightning talk using the concept of a medieval bestiary. A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter. This … Continue reading →
 
  • add this feed to my.Alltop

    Dice News » Security

  • Internet of Things Could Prove a Boon for Security Experts

    Kevin Fogarty
    8 Apr 2014 | 8:09 am
    Last week, Nest pulled its ultra-sleek Nest Protect smoke detector from the market after stumbling upon a potentially dangerous glitch in its software. “During recent laboratory testing of the Nest Protect smoke alarm, we observed a unique combination of circumstances that caused us to question whether the Nest Wave (a feature that enables you to turn off your alarm with a wave of the hand) could be unintentionally activated,” Nest CEO Tony Fadell wrote in an open letter to consumers. “This could delay an alarm going off if there was a real fire.” Nest (which was recently acquired by…
  • Snoopy Drone Shows Lax Smartphone Security

    Kevin Fogarty
    3 Apr 2014 | 7:11 am
    A remote-controlled quadcopter named “Snoopy” prowled the streets of London in late March, collecting confidential data from the smartphones of passersby at the rate of about 150 victims per hour. Included in the haul were usernames and passwords to PayPal, Amazon, Yahoo and other sites that represent concentration points for the financial and identity-management data of millions of users. Click here to find mobile security jobs. Snoopy is the cutting edge of mobile-security technology, but not in the way most might think. The drone was built and operated by Glenn Wilkinson and Daniel…
  • Changing Anti-Virus Models Spur New Hiring

    Myra Thomas
    3 Apr 2014 | 5:51 am
    If you expect that increasing malware and security threats means increased hiring at companies that combat them, you’d be both right and wrong. Among the industry stalwarts — the likes of Microsoft, AVAST, Symantec and McAfee – some are hiring while others are letting people go. The reason is the dramatic changes impacting the industry. First, there’s the financial: A crop of new companies is benefiting from lower costs of entry and cloud-based setups. For example, San Jose, Calif.-based Malwarebytes grew its staff by 70 percent in 2012 and 93 percent during the first 10 months of…
  • How to Become More Marketable in IT Security

    David Strom
    14 Mar 2014 | 8:53 am
    There are certainly plenty of opportunities for IT security professionals nowadays. They can get well-paid jobs that offer loads of advancement opportunity, as long as they’re motivated and have a deep interest in security. So what should you do to better position yourself? The Right Experience First, you should make sure that your technology experiences put you in contact with a wide assortment of IT and development teams. You don’t want to be a coder in a cubicle corner. The more interaction you have with various teams and working styles, the more well-rounded a security analyst you…
  • More Spies Needed in Silicon Valley

    Mark Feffer
    11 Mar 2014 | 8:01 am
    Increasing demand is giving cybersecurity engineers more options in terms of where and for whom to work. Where before many of the available jobs were government positions based in the Washington, D.C., area, today private companies in Silicon Valley are offering opportunities that didn’t exist before. Reporting on a story from the Information, Business Insider says engineers working for agencies like the NSA and CIA can take advantage of “fast-moving, non-bureaucratic environments” in the private sector. Besides that, they can earn better pay. In addition to security-focused…
  • add this feed to my.Alltop

    Seculert Blog on Advanced Threats and Cyber Security

  • Gartner Report “Reality Check on Big Data Analytics for Cybersecurity and Fraud”

    Debbie Cohen-Abravanel
    16 Apr 2014 | 6:48 am
    Gartner, the world’s leading information technology research and advisory company, has published an important report entitled “Reality Check on Big Data Analytics for Cybersecurity and Fraud”. Among the report’s key findings are: Criminals and other bad actors are rapidly evolving their hacking techniques, and are attacking quickly, making timely security and fraud analytics more critical [...] The post Gartner Report “Reality Check on Big Data Analytics for Cybersecurity and Fraud” appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Researchers Create Airborne Malware that Exploits Vulnerable Wi-Fi Networks

    Debbie Cohen-Abravanel
    10 Apr 2014 | 6:00 am
    Everyone knows that enterprises can be havens for germs, which can turn one employee’s common cold into a staff-wide cacophony of sneezing and sniffling. However, a new University of Liverpool study is warning against a different kind of airborne threat that enterprises should be even more vigilant about avoiding: airborne malware. Like something straight out [...] The post Researchers Create Airborne Malware that Exploits Vulnerable Wi-Fi Networks appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • A Lesson from the NSS Labs Report: There is No Magic Bullet

    Dudi Matot
    9 Apr 2014 | 6:29 am
    In a report published last week, NSS Labs revealed the findings of a comparative group product test. And while some security products scored better than others, essentially, the report affirmed what is already known, but is certainly worth being reminded of since it is so important and, perhaps as a result, easy to forget: there is [...] The post A Lesson from the NSS Labs Report: There is No Magic Bullet appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Report Warns Enterprises Lack Incident Response Readiness

    Debbie Cohen-Abravanel
    2 Apr 2014 | 7:58 am
    A new report has revealed that when it comes to cyber security incident response (IR), many enterprises are woefully unprepared to mitigate damage, remediate infection, figure out where the gaps are, and keep the bad guys from coming back. The report, which was co-sponsored by AccessData and The Ponemon Institute and entitled “Threat Intelligence & [...] The post Report Warns Enterprises Lack Incident Response Readiness appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • IT Analyst Highlights 6 IT Security “Worst Practices”

    Debbie Cohen-Abravanel
    1 Apr 2014 | 2:47 am
    In a new Network World article, prominent IT analyst and researcher Linda Musthaler is highlighting 6 “worst practices” that companies commit on their way to undermining, destabilizing, or just plain wrecking their IT security efforts: Failing to stay up-to-date with the latest technologies and techniques.  Neglecting to take a comprehensive network security approach that also [...] The post IT Analyst Highlights 6 IT Security “Worst Practices” appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • add this feed to my.Alltop

    Managed File Transfer and Network Solutions

  • JSCAPE products not affected by Heartbleed vulnerability

    Van Glass
    10 Apr 2014 | 9:20 am
    The Heartbleed vulnerability (CVE-2014-0160) was recently made public and has been known to affect a large number of applications (client and server) utilizing the OpenSSL library and SSL/TLS.  This vulnerability potentially exposes sensitive information stored in memory normally protected by SSL/TLS such as private encryption keys and user credentials. JSCAPE products that offer SSL/TLS services such as JSCAPE MFT Server, JSCAPE MFT Gateway, JSCAPE MFT Monitor and AnyClient do not rely on OpenSSL and are therefore not affected by the Heartbleed vulnerability. If you have any questions,…
  • How To Set Up and Login with OpenID SSO

    John Carl Villanueva
    9 Apr 2014 | 11:10 am
    Overview Over the past few weeks, we introduced you to the basic concepts and benefits of OpenID, SAML, and SSO in general. Today, we finally get our hands dirty as we dive into the JSCAPE MFT Server environment and teach you how to enable OpenID Web SSO there. After that, we'll show you how your users can login using their own OpenID account.  Ready? Let's get started. Setting Up OpenID Web SSO in JSCAPE MFT Server Before you set up OpenID Web SSO, make sure you've already enabled your JSCAPE MFT Server for web-based sessions. You can find instructions for enabling web-based sessions in…
  • What is OpenID?

    John Carl Villanueva
    7 Apr 2014 | 8:48 am
    Overview Web SSO support comes to JSCAPE MFT Server in the form of two widely accepted standards: OpenID and SAML. Earlier this month, we already talked about SAML. So now it's time to get acquainted with OpenID. Unless you're already familiar with Web SSO and the benefits it offers, we recommend you read these two articles before proceeding: SSO Simplified 5 Big Business Benefits of Using Single Sign-On OpenID in a nutshell OpenID refers to both a standard for Web SSO and a user identifier.  The OpenID Web SSO standard offers an environment wherein users can authenticate…
  • JSCAPE MFT Server Plugin for Outlook 3.0 Released

    Van Glass
    3 Apr 2014 | 9:42 am
    JSCAPE is pleased to announce the latest release of JSCAPE MFT Server Plugin for Outlook. This version (3.0) includes several improvements, the most notable being added support for Outlook 2013 and the ability to perform ad-hoc file transfers using either of the available REST or WebDAV services in JSCAPE MFT Server. JSCAPE MFT Server Plugin for Outlook is available for customers running JSCAPE MFT Server (Enterprise Edition) version 8.8.9 or above. Please contact the Help Desk for assistance on upgrading. About JSCAPE MFT Server Plugin for Outlook JSCAPE MFT Server Plugin for Outlook is a…
  • What is SAML?

    John Carl Villanueva
    10 Mar 2014 | 11:29 am
    Overview The latest version of JSCAPE MFT Server (8.8) already supports SAML Web SSO. Although we introduced SSO and its benefits in previous posts, we never went into the details of specific Web SSO standards like SAML and OpenID (also supported by 8.8). But in order to take advantage of any of our Web single sign-on features, you'll need to have at least some basic understanding of each of these two standards. Today, you can start with SAML. Recommended readings: SSO Simplified 5 Big Business Benefits of Using Single Sign-On What is SAML for? One of the basic motivations for creating SAML…
 
  • add this feed to my.Alltop

    Radware Blog

  • 7 Mobile Web Performance Myths Debunked

    Tammy Everts
    15 Apr 2014 | 7:26 am
    There are a handful of assumptions that frequently come up when we read and talk about mobile performance. Today, I want to review the most common myths, discuss why they persist, and explain why they are incorrect. Myth #1: People expect pages to be slower on mobile devices than on desktop computers. Not only is this untrue, but in fact the opposite is the case. Two out of three smartphone users say they expect pages to load in 4 seconds or less, and 85% expect pages to load as fast or faster than they load on the desktop. What people say they want doesn’t always correlate to what they…
  • Heartbleed Bug: A Deeper Dive on What You Should Do

    Motty Alon
    13 Apr 2014 | 5:50 pm
    What exactly is the Heartbleed vulnerability? On April 7, 2014, the OpenSSL community announced that it found a critical vulnerability in the TLS Heartbeat protocol. The nature of such an attack is very similar to a buffer overflow attack, where a remote attacker can exploit the protocol by sending a malformed “heartbeat” request with a payload size bigger than the actual request. In response, the vulnerable server would return a heartbeat response that contains a memory block of up to 64KB in the payload. This memory block can potentially reveal confidential information, including SSL…
  • The End of Windows XP

    David Hobbs
    11 Apr 2014 | 6:49 am
    Windows XP support has ended and there will be no more patches. This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer receive automatic security updates or protection against new viruses. This means that the 12 year-old system could leave behind security holes for users who haven’t upgraded. Who or What Uses XP? ATMs and Point of Sale Systems are the most public facing places, but what will the end of Windows XP mean for all of the unseen places it lives? In a recent article, we explored the vulnerabilities in…
  • Heartbleed Bug: Three steps on what to do next

    Motty Alon
    9 Apr 2014 | 11:37 am
    As you’ve most likely heard, a very serious threat called CVE-2014-0160, commonly referred to as “Heartbleed” has been threatening the ultra-popular open-source OpenSSL package. Heartbleed is unique in the collateral damage it can create. Heartbleed exposes the ugly side of open-source security components: In past events, where such Earth-shaking vulnerabilities were found, there was a vendor that would pay for the collateral damages that the vulnerability created. Who would pay for the collateral damages of this open-source vulnerability? It is likely be the users that are using…
  • Beating the Commoditization Curve

    Bill Lowry
    8 Apr 2014 | 7:08 am
    Many Colocation, Hosting, and Cloud Providers include Infrastructure as a Service (IaaS) as part of their base offering. These Providers are under increasing pressure to deliver this basic service with high quality at the lowest possible price – while still maintaining reasonable margins for their business. Every day I talk to Providers who face this challenge – they are required to deliver “table stakes” offerings – IaaS, “ping, power, and pipe”, managed hosting. All the while the wide availability of these services from a large number of sources is leading to a commoditization…
  • add this feed to my.Alltop

    pfSense Setup HQ

  • Nessus Features and Capabilties

    maximumdx
    17 Apr 2014 | 2:00 am
    In the previous article, we introduced the Nessus vulnerability scanner. In this article, we will discuss some of the additional Nessus features. Nessus Features: Scripting Language, Integration with Other Tools, Smart Testing To supplement the plug-in architecture, Nessus has its own scripting language called Nessus Attack Scripting Language (NASL), one of the more important Nessus features. This easy-to-learn utility language allows you to quickly and easily write your own custom security plug-ins without having to know C or all of the internal workings of the main program. Nessus can be…
  • Nessus Vulnerability Scanner: An Introduction

    maximumdx
    15 Apr 2014 | 2:00 pm
    Introducing the Nessus Vulnerability Scanner Modern computer networks have multiple potential areas of insecurity. How do you protect all these avenues of attack? You might feel that protecting your network is an impossible situation. You could spend all day, every day, just checking for these security holes manually. Even if you tried to automate it with scripts, would would seem to take dozens of programs. Fortunately, there are packages out there called vulnerability scanners that will automatically check all these areas and more. Nessus is an excellent program. It is a great example of…
  • Useless Services

    maximumdx
    14 Apr 2014 | 2:00 am
    Useless Services Like a vestigial tail, there are often applications running on our machines that no longer serve any useful purpose. These services may be part of an earlier set of libraries that the programmers built on and never bothered to take out. This is one of the downsides of ever-increasing processing power and memory capacity. Programmers used to carefully ration every byte they used and would never allow unnecessary lines in their code. However, in this age of bloatware and gigabyte-sized operating systems, it is often easier to leave legacy services in rather than risk breaking…
  • Uses for Nlog and Nmap

    admin
    12 Apr 2014 | 2:00 pm
    Uses for Nlog and Nmap So now you can port scan with Nmap and sort and analyze the results with Nlog. what can you do with these programs? There are, indeed, some interesting applications for port scanners. Here are some examples for you to try on your network: Scan for the least common services: if you have a service or port number that is only showing up on one or two machines, chances are that it is not something that is standard for your network. It could be a Trojan horse or a banned service (e.g. a file-sharing application). It could also be a misconfigured machine running an FTP server…
  • Nlog Add-Ons and Extensions

    maximumdx
    11 Apr 2014 | 2:00 am
    In the previous article, we discussed installing and using Nlog. In this article, we will discuss using add-ons and writing your own Nlog extensions. Nlog Add-Ons As mentioned earlier, Nlog is easily extensible and you can write add-ons to do other tests or functions on any protocols or ports found. In fact, there are several included with the program. If there is an add-on available, there will be a hypertext line next to the port and you can click on it to run the subprogram. Nlog Built-in Extensions Extensions Descriptions Nlog-rpc.pl This add-on takes any RPC services that are found and…
  • add this feed to my.Alltop

    Tips4Tech Blog

  • Backup Day is Every Day – Not Just Once a Year

    Allan Pratt
    17 Apr 2014 | 8:28 pm
    You may have heard the recent buzz in the tech world: “Don’t Be an April Fool. Be Prepared. Back up your files on March 31.” According to Backblaze, 30% of people have never backed up their systems. That’s a staggering statistic when you think of the horrifying repercussions of not backing up, such as, recreating Word documents, recreating Excel spreadsheets, researching and verifying data online, losing tax returns, etc. This is why you need to back up your business data (and personal data including photos also) on a regular basis. Data is the currency of any business…
  • Drones: The Next Great Hack

    Allan Pratt
    5 Apr 2014 | 10:30 am
    As a kid, one of my favorite hobbies was flying radio control airplanes. Back in the day, we used to hang a colored flag off our antennas to notify other hobbyists what frequency we were on. If someone nearby had the same frequency, the person with the stronger transmitter could take over your airplane and crash it or fly it on a different route. The same is true today – but now, there are much more severe consequences than crashing a toy airplane. The toys may be new, but the technology isn’t. So far, I have seen drones configured with cameras to show real estate (invasion of privacy), a…
  • Who Protects Your Corporate Digital Footprint?

    Allan Pratt
    13 Mar 2014 | 10:06 pm
    Business leaders must focus on many things every day. There are legal and compliance issues, personnel issues, product development issues, and much more. But in the era of Snowden vs. the NSA, Wikileaks, and a myriad of data breaches, who protects your corporate digital footprint? There may be someone in your marketing or IT department who conducts regular web monitoring with either Google Alerts or Talkwalker Alerts (or even better, with both) on your company name or main brand name, but is there a report generated from the results? If yes, who sees the report, and what action is taken if…
  • Could Your Business Survive If Everyone Telecommuted?

    Allan Pratt
    4 Mar 2014 | 11:19 pm
    While iPods and smartphones revolutionized the music and cell phone industries, could telecommuting totally revolutionize the workplace? This is a very interesting concept, but certainly, your industry will determine if this is possible. While some companies have stopped offering telecommuting as an option, others embrace it – but there are some security issues that cannot be ignored. What happens if your employee decides to work at home either in a spare bedroom or a room set up as an office? There is appropriate lighting, ergonomic furniture, and efficient equipment including desktop…
  • What Policies Appear On Your Website?

    Allan Pratt
    16 Feb 2014 | 11:03 am
    Like many businesses, you probably maintain Facebook, Twitter, YouTube, and LinkedIn accounts to promote your product or service. If your leadership and IT teams listen to your marketing and PR teams, these social sites link back to your main website. And like many others, you may refresh your website on a regular basis. But how often do you update the policies that sit along the footer of each page or appear in the small print in the sitemap? Depending on your specific industry, the size of your business, and your target audience, you may feature more than just a standard Privacy Policy and…
 
Log in