Network Security

  • Most Topular Stories

  • Posting other places

    Network Security Blog
    netsecpodcast@mckeay.net (Martin McKeay)
    21 Oct 2014 | 9:49 am
    I’ve been blogging for some other sources lately.  It’s interesting to be creating articles for someone other than myself, because I put more thought into it and spend more time trying to organize my thoughts and outline the article before I put virtual pen to paper.  I’m writing for IBM’s Security Intelligence blog (they’re an Akamai partner) and InfoSecurity Magazine regularly and contributing to other venues as opportunity comes up and time allows.  Blog post, articles, webinars, presentations, or just shooting the breeze about security, I do it all.
  • Intelligence Hired Guns?

    Dark Reading:
    31 Oct 2014 | 9:00 pm
  • Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark

    Techworld.com security
    31 Oct 2014 | 7:56 am
    Pirate Bay co-founder Gottfrid Svartholm Warg was sentenced Friday by the Court of Frederiksberg in Denmark to three and a half years in jail for hacking and serious vandalism.
  • PS Vita Level 1 Webkitties Exploiting a Webkit vulnerability on PS Vita

    SecurityNewsPortal.com latest breaking computer security, anti virus and hacking news
    31 Oct 2014 | 4:12 pm
    PS Vita Level 1 Webkitties Exploiting a Webkit vulnerability on PS Vita
  • Planning Considerations for BYOD and Consumerization of IT (Part 6)

    Feed: Articles & Tutorials
    Deb Shinder
    29 Oct 2014 | 2:05 am
    In this, Part 6, we’re going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to demonstrate compliance.
  • add this feed to my.Alltop

    Network Security Blog

  • Posting other places

    netsecpodcast@mckeay.net (Martin McKeay)
    21 Oct 2014 | 9:49 am
    I’ve been blogging for some other sources lately.  It’s interesting to be creating articles for someone other than myself, because I put more thought into it and spend more time trying to organize my thoughts and outline the article before I put virtual pen to paper.  I’m writing for IBM’s Security Intelligence blog (they’re an Akamai partner) and InfoSecurity Magazine regularly and contributing to other venues as opportunity comes up and time allows.  Blog post, articles, webinars, presentations, or just shooting the breeze about security, I do it all.
  • Wake up to a POODLE puddle

    netsecpodcast@mckeay.net (Martin McKeay)
    14 Oct 2014 | 11:20 pm
    TL:DR – Disable SSL immediately. As of this morning SSL appears to be dead or at least dying.  The POODLE vulnerability in SSL was released last night, basically revealing a vulnerability in the way that SSL v3 uses ciphers and allows an attacker to make a plain-text attack against the encrypted traffic.  This makes the third major vulnerability released on the Internet this year and is another warning that this level of vulnerability discovery may be the new shape of things to come. I’m not going to try to explain POODLE in detail, or give you a nice logo for it.  Instead…
  • Understanding Apple’s new encryption model

    netsecpodcast@mckeay.net (Martin McKeay)
    5 Oct 2014 | 10:44 pm
    I understand enough about encryption to get myself in trouble, but not much more.  I can talk about it intelligently in most cases, but when we get down to the nitty gritty, bit by bit discussion of how encryption works, I want to have someone who’s really an expert explain it to me.  Which is why I’m glad that Matthew Green sat down to explain Apple’s claims of new encryption that they can’t open for law enforcement in great detail. The Too Long; Didn’t Read (I often forget what tl;dr means) version of it is that there is a unique ID that’s hidden deep…
  • “All we need to do is …. redo everything”

    netsecpodcast@mckeay.net (Martin McKeay)
    25 Sep 2014 | 11:04 pm
    I love listening to idealists.  In fact, I’d be one if it wasn’t for the crushing despair and cynicism that working in the security profession has instilled in me.  Or maybe I work in this field because the crushing despair and cynicism already existed.  In either case, I’ve lost the ability to even think “we could just fix all of our security problems if we just …”.  And when I see others saying the same thing, I have to shake my head in amusement at their naivete.  But it really makes me wonder when I see someone who’s been in security even…
  • Limiting online time

    netsecpodcast@mckeay.net (Martin McKeay)
    14 Sep 2014 | 10:55 pm
    I limit online time.  Not for me, for my children.  Apparently I’m among a fairly prestigious group of people who do so, since many of the C-level execs in Silicon Valley also limit their children’s time with tech.  Though it looks like many of them are even stricter than I am about how much time the children get to interact with their computers. We’ve always limited the amount of time our children can spend on the computer.  We found from an early age, they’d spend every waking moment playing games and surfing the internet if they could.  I wonder who…
 
 
 
  • add this feed to my.Alltop

    Tenable Network Security Blog

  • Breaking Cyber Kill Chains®

    Marcus J. Ranum
    29 Oct 2014 | 11:12 am
    The “cyber kill chain®”1 is a model for framing an incident response/analysis capability that was developed by Lockheed
  • Nessus Leverages Cybersecurity Coalition Research to Detect a Major Threat Actor

    Eileen Bator
    28 Oct 2014 | 1:16 pm
    In a pioneering cooperative effort, several industry security leaders, including Tenable, have been working on a project led by Novetta Solutions to investigate, report on, and take action against the major threat actor group dubbed “Axiom.” According to No
  • Addressing the New Threat Landscape with Continuous Network Monitoring

    Gavin Millard
    24 Oct 2014 | 7:00 am
    Since the creation of tools like Nessus, the pioneering technology written by Renaud Deraison back in 1996, vulnerability management tools have helped users gain an incredible amount of insight into the inner workings of their environments.
  • Black Hat Europe 2014

    Eileen Bator
    21 Oct 2014 | 11:52 am
    Black Hat Europe 2014, a premiere conference on information security, convened in Amsterdam this October. The Tenable EMEA team was there in full force, meeting customers and conversing with other security specialists.
  • Bashing Big Data

    Ron Gula
    13 Oct 2014 | 11:41 am
    Big data is everywhere. So is Bash, a command line interface found on most Linux and Unix machines. New Bash bugs are still being uncovered, with new patches coming out regularly. But hackers in the wild continue to look for and find ways to exploit Bash weaknesses.
 
  • add this feed to my.Alltop

    Spyware news

  • Critical Windows vulnerability is used to spread Sandworm malware

    16 Oct 2014 | 6:23 am
    One day it’s Shellshock, the other day it’s Sandworm. What should you know about this malware that was announced with fanfare several days ago? ISIGHT, the company that discovered this virus, says that Sandworm relies on a Windows zero-day vulnerability that is known as CVE-2014-4114. Fortunately, Microsoft patched this vulnerability in October, 2014. It has also been […]
  • What should I know about Shellshock?

    1 Oct 2014 | 5:56 am
    Everyone is now talking about Shellshock. What is that and what can you do about it? Here’s what you should remember: Shellshock is a software bug, which affects the Bash – the common command-line shell that is actively used in Linux/UNIX OS and Apple Mac OS X for controlling different programs and their features. It […]
  • Hackers relaunch multi-name rogues to steal people’s money!

    8 Sep 2014 | 11:52 pm
    Just imagine: you start your computer one day and see a window showing how Win 7 Antivirus 2014 scans your PC system. After performing it, this program informs you about a long list of viruses, including trojans, adware and other threats. Naturally, it offers you to remove these threats from your computer in exchange for […]
  • Good news from Google Chrome! We will be warned about deceptive downloads!

    22 Aug 2014 | 6:02 am
    Annoyed by adwares, browser hijackers and similar potentially unwanted programs? It seems that soon we will be capable of getting more power against infiltration of these programs. Of course, under one condition – we will have to choose Google Chrome web browser for doing our browsing on the Internet. We say so because of the […]
  • Got an email from Bank of America? It might be infected with Cryptowall virus!

    6 Aug 2014 | 5:25 am
    If you are interested in viruses, you must have heard about Cryptowall virus. This is a serious ransomware that has ability to encrypt specific files and then display a warning message asking people to pay a ransom for their decryption. At the moment of writing, this virus has ability to affect only those computers that […]
  • add this feed to my.Alltop

    Uncommon Sense Security

  • Introducing the Shoulders of InfoSec Project

    13 Oct 2014 | 12:19 pm
    "If I have seen further it is by standing on the shoulders of giants" Most famously attributed to Sir Isaac Newton, this quote reflects the sentiment of a new project.  In InfoSec we all stand on the shoulders of giants. It was just supposed to be a talk at DerbyCon, but as I dug into the topic I realized it needed to be more than just one talk. Another relevant quote is George Santayana’s oft-misquoted: “Those who cannot remember the past are condemned to repeat it.” In information security we have a very bad habit of ignoring the past; many times it isn’t even a…
  • What’s the best tool for the job?

    23 Jun 2014 | 7:54 am
    This year I’ve been thinking about fundamentals a lot.  That includes  patch management, and in preparing a presentation on the topic I pondered the question: “What is the best patch management tool?” I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses.  That reminded me of a lesson about tools I learned many years ago. What is the best [insert category here]?  I believe there are two answers: The one you have The one you know Note that these may not necessarily True, but…
  • Is OWASP broken?

    17 Jun 2014 | 11:00 am
    That’s a silly question.  I wasn’t going to comment on the current struggles of the Board of Directors for fear of adding to the Pointless InfoSec Drama, but I need to say a few things about it.  I am not an OWASP insider, but I do support their mission. OWASP has done a lot of great things, and continues to do so today.  As I said, I’m not an insider, but there appear to be some struggles at the global Board level and possibly organizationally at the national and international level.  And I don’t really care- I hope it gets sorted out soon, but the power of OWASP…
  • A small rant on presenting at conferences

    22 Apr 2014 | 9:31 am
    The more conferences I run the more sympathy I have for other conference organizers, even the big commercial ones, and the more inclined I am to follow their rules and requests- but I expect the conferences to have a clue about what’s involved in delivering a good presentation and facilitate that, not hinder it. If there are glitches at a BSides or other smaller, volunteer-run, or new events I’m OK with that.  It happens.  What I can’t stand are conferences which try to manage the speakers in ways that prevent delivering quality presentations. First and foremost, I hate having…
  • Threat Modeling, by Adam Shostack

    11 Apr 2014 | 5:57 pm
    Adam has a new book out, Threat Modeling: Designing for Security, and it is a great resource for anyone in security.  As with New School of Information Security, this is one to grab, read, and keep on the shelf (e-shelf?). The layout is great, after a short introduction Adam takes you into an easy, but informative practice exercise.  After the exercise there is a more in-depth introduction, which builds on what you learn in the exercise- and also answers some questions which inevitably come up during the exercise.  From the first couple of chapters the book gets progressively…
  • add this feed to my.Alltop

    cissp CISSP training Certified Information Systems Security Professional

  • MY FRIEND SHON HARRIS PASSED AWAY

    Posted by boss
    15 Oct 2014 | 12:09 am
    March 27th, 1968  ~  October 8th, 2014OUCH! A shockwave just hit me this morning.What a devastating news I hear this morning.  My long term friend passed away.  She was so young and such an inspiration to others.  It is a very sad day for sure.On the 16 of September we were trading emails and she did not let her sickness transpire and she did not ever complain once or even mention it.  She was dynamic in her response and she soldier on as long as she could.  I was aware she was very sick but never taught it was progressing that fast.Shon was a lot more to…
  • The Holistic CISSP CBT Tutorial for the BCP and DRP domain of the CBK

    Posted by boss
    8 Aug 2014 | 1:01 pm
    Dear members, The CCCure Learning Portal  is our new Learning Portal and it will eventually replaced CCCure.org.   The CCCure.Org has lots of legacy, it has some spammer posting within articles, and it is due for retirement.   Over the next months we will migrate the relevant content of CCCure.Org to CCCure.Training.  So far I have developed 38 Hours of thorough Computer Based Tutorial on our new portal and I will continue over the next week as well. You can visit the new site at:  The CCCure Learning Portal Good day to all, I have never read as many NIST…
  • The CCCure Holistic Computer Based Tutorials (CBT) for the CISSP Exam

    Posted by
    29 Jul 2014 | 4:57 am
    Good day to all, I am pleased to say that I have just uploaded Part 3 of my Telecommunication and Network Security CBT tutorial to our Learning portal at https://cccure.training/index.php a few minutes ago.   I am now working on the 4th and last portion and it should be ready soon. That's a total of 24 hours of tutorial developed by CCCure/Clement for the CISSP CBK alone. The tutorials are available to Gold and Siver members at: https://cccure.training//m/articles/browse/category/CISSP+Online+CBT The MP3 files were uploaded as well and you can download them to listen while mobile on…
  • Prevent Your Network Getting Hacked with a Free Acunetix Security Scan

    Posted by cdupuis
    18 Jun 2014 | 3:21 pm
    Acunetix Free Scan will identify network security issues including the feared Heartbleed to allow businesses to fix them in time London, UK - 17th June 2014 – The recent Heartbleed vulnerability has highlighted the urgent need for more network level security scanning. In view of this, Acunetix has announced that it will be offering 10,000 Free Network Security scans with Acunetix Online Vulnerability Scanner (OVS) in a bid to make it easier for businesses to take control of their network security. Acunetix Online Vulnerability Scanner is a hosted security scanner that will scan a…
  • Secure Coding and Advanced Android and IOS exploitation

    Posted by
    17 Jun 2014 | 9:03 am
    VIEW THIS MAIL IN BROWSER -- CLICK HERE NOW -->  --> NotSoSecure Trainings Secure Coding for Web Developers What can you expect from this class? Covers latest industry standards such as OWASP Top 10 (2013). Insight into latest security vulnerabilities like the heartbleed bug. Thorough guidance on security best practices. References to real world analogy. Hands-on labs. Taught by the Industry's leading expert and Black Hat Trainer. --> Advanced Android and iOS Exploitation What can you expect from this class? Learn advanced techniques to audit mobile apps for security…
 
  • add this feed to my.Alltop

    Schneier on Security

  • Friday Squid Blogging: 1,057 Squid T-Shirts

    schneier
    17 Oct 2014 | 3:17 pm
    That's a lot. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Commenting has been broken for the past few days. We hope to get it fixed on Monday.
  • Hacking a Video Poker Machine

    schneier
    17 Oct 2014 | 4:35 am
    Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine.
  • NSA Classification ECI = Exceptionally Controlled Information

    schneier
    16 Oct 2014 | 4:22 am
    ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography has been deliberately weakened by the NSA, or the names of agents who have infiltrated foreign IT companies. As part of the Intercept story on the NSA's using agents to infiltrate foreign companies and networks, it published a list of ECI compartments. It's just a list of code names and three-letter abbreviations, along with the group inside the NSA that is responsible for them. The descriptions of what they all mean would never be…
  • DEA Sets Up Fake Facebook Page in Woman's Name

    schneier
    15 Oct 2014 | 5:06 am
    This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent, they steal photos off of the phone (the article says they were "racy") and use it to set up a fake Facebook page in her name. The woman sued the government over this. Extra creepy was the government's defense in court: "Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to…
  • FOXACID Operations Manual

    schneier
    15 Oct 2014 | 4:29 am
    A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true. The citation is this: According to a top-secret operational procedures manual provided by Edward Snowden, an exploit named Validator might be the default, but the NSA has a variety of options. The documentation mentions United Rake, Peddle Cheap, Packet Wrench, and Beach Head-­all delivered from a FOXACID subsystem called Ferret Cannon. Back when I broke the QUANTUM and FOXACID programs, I talked with the Guardian editors about…
  • add this feed to my.Alltop

    Infosec Events

  • Week 43 In Review – 2014

    md
    27 Oct 2014 | 1:19 pm
    Events Related Hack.lu 2014 Wrap-Up Day #1 – blog.rootshell.be After attending BlackHat last week in Amsterdam, Xavier is now in Luxembourg until Friday to attend the 10th edition of Hack.lu. here is Xavier’s wrap-up for the first day. As usual, the first day started via a first bunch of workshops. Hack.lu 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier’s small wrap-up for the second day. There was again some Cisco forensics workshops on the schedule, that’s why he was not able to attend all that day’s talks. Hack.lu 2014 Wrap-Up Day #3 – blog.rootshell.be Here’s…
  • Week 42 In Review – 2014

    md
    20 Oct 2014 | 2:58 pm
    Events Related BlackHat Europe 2014 Wrap-Up Day #1 – blog.rootshell.be BlackHat is back in Amsterdam and here is Xavier’s wrap-up for the first day. The day started with the Adi Shamir’s keynote and some crypto. BlackHat Europe 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier’s small wrap-up for the second BlackHat day. His first choice was to attend a talk about IPv6. Resources SIM Card Forensics – 0xicf.wordpress.com The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is…
  • Week 41 In Review – 2014

    md
    13 Oct 2014 | 1:33 pm
    Resources nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle – youtube.com This talk will demonstrate practical techniques to identify, assess, and exploit a subclass of control systems found in your companies that use proprietary RF communications, such as fire alarms, proximity cards, automotive security gates, car alarms, conference rooms, and building automation systems. The Best DerbyCon 2014 Talks for Red Teams – blog.cobaltstrike.com DerbyCon is one of Raphael Mudge’s favorite conferences. Here is a list of talks from DerbyCon by Raphael that are…
  • Week 40 In Review – 2014

    md
    8 Oct 2014 | 2:00 am
    Resources SLouisville Infosec 2014 Videos – irongeek.com Here are the videos from the Louisville Infosec 2014 conference. You can download the videos from here. Derbycon 2014 Videos – irongeek.com These are the videos of the presentations from Derbycon 2014. You can watch and download the videos from here. Shellshocker! – Episode 029a – in-security.org You might have head something about Shellshock as the details unravel so InSecurityShow are trying to give you some insight into what you might be hearing in this important message from your friendly computer information security…
  • Information Security Events For October

    sheila
    3 Oct 2014 | 3:16 am
    Here are information security events in North America this month: Louisville Metro InfoSec Conference 2014 : October 2 in Shepherdsville, KY, USA     Rochester Security Summit 2014 : October 7 to 8 in Rochester NY, USA   MIRcon 2014 : October 7 to 8 in Washington, DC, USA     SIRACon 2014 : October 9 to 10 in Minneapolis, MN, USA     Microsoft BlueHat 2014 : October 9 to 10 in Seattle, WA, USA   Root66 Information Security Conference 2014 : October 9 in Oklahoma City, OK, USA     Learning from Authoritative Security Experiment Results (LASER)…
  • add this feed to my.Alltop

    Dr Anton Chuvakin Blog PERSONAL Blog

  • Links for 2014-10-06 [del.icio.us]

    Anton Chuvakin
    7 Oct 2014 | 12:00 am
    How a bank knows it has been hacked | Marketplace.org
  • Monthly Blog Round-Up – September 2014

    1 Oct 2014 | 8:20 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. “Top 10…
  • Links for 2014-09-26 [del.icio.us]

    Anton Chuvakin
    27 Sep 2014 | 12:00 am
    Chip and PIN: No panacea, but worth the effort – and the cost | CSO Online
  • Monthly Blog Round-Up – August 2014

    2 Sep 2014 | 10:46 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. My classic PCI…
  • Monthly Blog Round-Up – July 2014

    1 Aug 2014 | 8:10 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. My classic PCI…
 
  • add this feed to my.Alltop

    Security Blog

  • Weekly Intelligence Summary Lead Paragraph: 2014-10-31

    ssimpson
    31 Oct 2014 | 12:13 pm
    Halloween is here and the security space received its fair share of frights this week. Drupal made the ominous announcement that if you didn’t install its latest update to its content management software within seven hours of its release, you should operate under the assumption your website is compromised. There’s a basis for that statement; not long after Drupal patched a critical SQL injection vulnerability automated attacks began appearing in the wild. Victims with RIG EK in their Drupal include Popular Science and Typepad. Drupal’s announcement includes tips for remediation if your…
  • Criminals dress up as Apple Pay for Halloween

    kevin.thompson
    31 Oct 2014 | 9:01 am
    Last week, Apple launched it’s new mobile payment and digital wallet service called Apple Pay. The service allows you to store credit card details and securely transmit an authorization message to a retailer using your phone. Of course when you start doing things with credit cards and moving money around, criminals want their piece of the action. We wanted to look at how criminals were setting up their infrastructure to get a bite of that apple (see what I did there?). One really simple way for criminals to use Apple Pay for their own purposes is to launch phishing campaigns using the…
  • Healthcare Data Breaches: Using VCDB and Mongo to Find Answers (Part 3)

    Suzanne Widup
    29 Oct 2014 | 3:48 am
    In this final installment of the series, we will develop our script to provide even more detail on the incidents in the healthcare sector that the VERIS Community Database (VCDB) contains. If you missed Part One or Part Two, it is highly recommended that you review them.  They walk you through building the first and second scripts, which this current article expands upon.  Unless you are already familiar with the Mongo Aggregation Framework, you should begin there. As before, the script we develop in this article will be available on our GitHub repository in the Tools section. There are…
  • Weekly Intelligence Summary Lead Paragraph: 2014-10-24

    dkennedy
    28 Oct 2014 | 8:19 am
    It’s been a busy week especially for collecting risk intelligence on cyber espionage via malware.  Microsoft issued a security advisory after discovery of malicious PowerPoint files that are part of the Sandworm operation and are exploiting a similar, but new vulnerability in OLE.  We collected quality malware analysis on this development from Hewlett-Packard, McAfee and Trend Micro. “Operation Pawnstorm” according to Trend Micro, is a cyber-espionage campaign by the SEDNIT threat actors reported two weeks ago by ESET. This actor’s activities have been aligned with Russia’s…
  • Shellshock and Ebola: or How I learned to seek actionable intel and ignore the FUD

    Marc Spitler
    21 Oct 2014 | 8:32 am
    The information security community was thrown into a bit of a tizzy recently with the disclosure of the bash vulnerabilities grouped together under the catchy name “Shellshock”. Days later the first instance of the Ebola virus was diagnosed on American soil. Both announcements received (and continue to receive) a significant amount of news coverage and not without reason. Both also provide an opportunity to take a collective deep breath and filter out the actionable information from the hype.  Let’s start with the question “Are we vulnerable?” For both risks,…
  • add this feed to my.Alltop

    symantec.com

  • Trojan.Poweliks: A threat inside the system registry

    Symantec Security Response
    31 Oct 2014 | 5:11 pm
    Summary:  Trojan.Poweliks is a unique threat because it is located in a registry key on compromised computers. Symantec Security Response has seen an increase in the number of reports related to a threat known as Trojan.Poweliks. Poweliks is unique when compared to traditional malware because it does not exist on a compromised computer as a file. read more
  • Scammers pose as company execs in wire transfer spam campaign

    Sean Butler
    28 Oct 2014 | 11:04 pm
    Summary:  Innocent-looking payment requests could result in financial loss for companies as finance department employees targeted with fraudulent emails. read more
  • Attackers circumvent patch for Windows Sandworm vulnerability

    Symantec Security Response
    22 Oct 2014 | 10:15 am
    Summary:  Attackers continue to take advantage of the Sandworm vulnerability by using an exploit that bypasses its patch to send compromised PowerPoint documents as email attachments. At least two groups of attackers are continuing to take advantage of the recently discovered Sandworm vulnerability in Windows by using an exploit that bypasses the patch. read more
  • Denial-of-service attacks—short but strong

    Candid Wueest
    21 Oct 2014 | 5:07 am
    DDoS amplification attacks continue to increase as attackers experiment with new protocols. Summary:  DDoS amplification attacks continue to increase as attackers experiment with new protocols. read more
  • PDF invoices may cost more than you expect

    Bhaskar Krishna
    20 Oct 2014 | 9:45 am
    Misspelled invoice email claims to be looking for payment but steals confidential information instead. Summary:  Misspelled invoice email claims to be looking for payment but steals confidential information instead. Contributor: Joseph Graziano PDF invoices sent over email have become increasingly common in today’s business world. However, that doesn’t mean that there are no complications with the file format. Addressing these invoices without requiring verification from the recipient can lead to a compromised computer with the user’s confidential data in jeopardy. read more
 
  • add this feed to my.Alltop

    Optimal Security

  • Infosec Haiku

    Chris Merritt
    25 Oct 2014 | 3:36 pm
    Anata no joho sekyuritei konshu no haiku CryptoWall Strikes Org Encrypts All of Their Servers Hundreds Now Idled   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Hackers target military, embassy and defense workers in Operation Pawn Storm

    Graham Cluley
    25 Oct 2014 | 3:32 pm
    A group of organised criminal hackers, possibly backed by an unknown country, are targeting government, media and military organisations in the United States, Pakistan, and across Europe, according to new research [PDF] released by researchers at Trend Micro. In an operation dubbed “Pawn Storm”, the hackers have targeted computers belonging to – amongst others – the US Department of State, defense contractors and the ministries of defence in Hungary and France, as they seek to compromise systems and steal information. One of the main weapons in the attackers’…
  • Hackers exploit Windows zero-day flaw in targeted PowerPoint attacks

    Graham Cluley
    22 Oct 2014 | 6:19 pm
    Be on your guard. Another zero-day vulnerability has been uncovered that affects almost all supported versions of Windows, and it is being actively exploited by hackers in targeted attacks. Microsoft has issued a security advisory about a critical remote code execution flaw in all versions of Windows apart from Windows Server 2003. That would be bad enough. But what makes things worse is that malicious hackers are aware of the as-yet-unpatched security hole and are actively exploiting it in what Microsoft calls “limited, targeted attacks” through Microsoft PowerPoint. Fortunately,…
  • Infosec Haiku

    Chris Merritt
    18 Oct 2014 | 3:25 pm
    Anata no joho sekyuritei konshu no haiku Huge Month for Patches —   and Much More Time to Patch It Up   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Infosec Haiku

    Chris Merritt
    18 Oct 2014 | 3:24 pm
    Anata no joho sekyuritei konshu no haiku Vulns Galore This Week Oh So Many CERT Alerts Time to Patch It Up   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
 
  • add this feed to my.Alltop

    TRUSTe Blog

  • Women In Security & Privacy Event Packs TRUSTe Office

    kfreeman
    29 Oct 2014 | 4:25 pm
    On Oct. 28, a large group of privacy and security professionals — from lawyers to engineers to program managers — gathered for the “Women in Security & Privacy Networking Kickoff” event at the TRUSTe offices in San Francisco. The event was organized by representatives from six companies: Kenesa Ahmad of Promontory, Elena Elkina of McKesson, … Continue reading »
  • 73% Open to Wearables at Work but Potential Privacy Issues Could Be a Concern

    kfreeman
    27 Oct 2014 | 1:53 pm
    If you use wearables at home, it might be evident how these little tracking devices could be beneficial in the workplace. However, the potential for companies to collect this information without employee knowledge or consent raises the issue of transparency with regards to data collection. Whether monitoring our daily steps, using intelligent I.D. badges to … Continue reading »
  • Women in Privacy Leadership Roles: Interview with Joanne McNabb

    lgradman
    24 Oct 2014 | 8:00 am
    Guest Post: Alexandra Ross, The Privacy Guru interviews Joanne McNabb, Director of Privacy Education and Policy, California Attorney General Privacy is high-profile right now. From major retail and financial sector breaches to revelations over mobile device tracking and intrusive surveillance technologies, the question of whether or not we’ll submit to living in a “post-privacy” society is … Continue reading »
  • The Power of the Privacy Impact Assessment

    lgradman
    17 Oct 2014 | 8:59 am
    As technology has evolved, companies have realized that the data collection practices they deploy can often make the difference between success and failure. Depending on how this information is leveraged, the use of big data can push a company ahead of the competition through new data-driven strategies, uncovering numerous benefits. But the use of data … Continue reading »
  • CNIL comments on first findings from Cookie Sweep

    lgradman
    15 Oct 2014 | 1:19 pm
    Speaking at the Compliance Week Europe Conference in Brussels yesterday Sophie Narbonne, Deputy Director of Legal Affairs at the CNIL was one of the first to comment publicly following the recent European Cookie Sweep. Clarifying that they are still working on the results she said “It is clear that there is now a first layer … Continue reading »
  • add this feed to my.Alltop

    SecurityWeek RSS Feed

  • Feedback Friday: Hackers Infiltrate White House Network - Industry Reactions

    Eduard Kovacs
    31 Oct 2014 | 11:50 am
    Welcome back to Feedback Friday! An unclassified computer network at the White House was breached recently and the main suspects are hackers allegedly working for the Russian government. read more
  • Pirate Bay Co-founder Jailed in Denmark

    AFP
    31 Oct 2014 | 10:28 am
    STOCKHOLM - The Swedish co-founder of file-sharing website The Pirate Bay was sentenced to three years and six months in jail Friday in the largest hacking case in Denmark's history. Gottfrid Svartholm Warg, 30, was sentenced at a Copenhagen district court a day after he was found guilty of "hacking and aggravated vandalism". read more
  • New RAT Hijacks COM Objects for Persistence, Stealthiness

    Eduard Kovacs
    31 Oct 2014 | 9:48 am
    Researchers have uncovered a remote administration tool (RAT) that uses a novel technique to stay persistent on infected systems and avoid detection. read more
  • iOS App Vulnerability Exposed GroupMe Accounts

    Eduard Kovacs
    31 Oct 2014 | 7:01 am
    Until recently, cybercriminals could have hijacked the account of any GroupMe user simply by knowing the phone number connected to the targeted account, a researcher reported on Thursday. read more
  • Verizon Enterprise, FireEye Form Global Partnership

    Mike Lennon
    31 Oct 2014 | 6:16 am
    Threat prevention firm FireEye and Verizon Enterprise announced this week that they have teamed up to bring together Verizon managed services and FireEye threat protection offerings. The agreement will enable FireEye and Verizon to offer a combination of technology, intelligence, services and expertise to help protect enterprises, the companies said. read more
 
  • add this feed to my.Alltop

    Free IT - Security Magazines and Downloads from alltop.tradepub.com

  • Everything You Need To Know About A DDoS Attack

    26 Oct 2014 | 12:00 am
    Big companies and brands have been victims of attacks with the attacks themselves growing in size and complexity. While large corporations are often the topic of these stories, DDoS attacks can happen to companies of any size.Just a few things you’ll learn and understand:How downtime can mean big losses in revenueCreating a defense planWays to detect if you’re under attackMitigating DDoS attacks…and more!Request Free!
  • The 10 Reasons Guide: Choosing a File Sync and Share Solution

    24 Oct 2014 | 12:00 am
    Workers want access to business files from anywhere, on any device, and at any time. This presents a new range of corporate security and data leakage risk challenges to today’s IT organizations.Download the white paper that explores 10 reasons why each of Accellion, Anchor/eFolder, Box, Dropbox, Egnyte, Citrix ShareFile, Google Drive and Microsoft OneDrive are not for your business. Plus, one solution that is.Request Free!
  • Securing Your Future in the Cloud

    21 Oct 2014 | 12:00 am
    To help your organization be the one that does things right, here are 10 questions to consider asking potential cloud vendors, as well as what to look for in their answers. Asking these questions should be part of the due diligence process in evaluating the security practice of a cloud provider. Getting satisfactory answers will help in the decision-making process of selecting the best provider for you.Request Free!
  • 5 Essential Steps to Sustainable PCI DSS Compliance

    21 Oct 2014 | 12:00 am
    For many companies, Payment Card Industry Data Security Standard (PCI DSS) compliance seems so daunting and complex that they only follow the letter of the regulations, without focusing on the subtle areas that provide the most protection. This eBook describes the five “must-do” steps that help assure the effectiveness of a company's PCI DSS compliance program.Request Free!
  • The FDA are Taking Cybersecurity in Medical Devices Seriously and So Should You

    17 Oct 2014 | 12:00 am
    Medical devices are undergoing a technical transformation in terms of software, interconnectivity and interoperability. This increase of function comes with an increase in risk from cybersecurity threats which puts not only the patients with medical devices potentially at risk, but has wider implications for connected digital infrastructure too. The safety, security and privacy of patients must be protected and the providers of software for medical devices must work with regulators and the wider industry to ensure this.Request Free!
  • add this feed to my.Alltop

    IT-Security

  • Putting it to the Test: A Detailed Performance Review of the New HHS Security Risk Assessment (SRA) Tool

    Bob Chaput
    31 Oct 2014 | 10:00 am
    Recently, we provided an initial reaction to the new Security Risk Assessment (SRA) tool developed by the U.S. Department of Health and Human Services (HHS), the verdict being it was Much Ado About Nothing. That said, the team here at Clearwater celebrates OCR’s efforts to make more software enabled solutions available to the healthcare marketplace…but we advise caution. When we put the SRA tool to the test there turned out to be some very real limitations. Fundamentally, the tool and its deliverables do not meet the requirements of a Bona Fide Risk Analysis or set you up for much success…
  • Guest Post: Digital Fingerprinting—Do You Know Who You’re Doing Business With?

    Branden Williams
    30 Oct 2014 | 8:00 am
    The following is a guest post by Frank Stornello of Verifi. Online fraudsters benefit from the anonymity of a virtual medium. They can invent and reinvent who they are on any given day. And they do. They can change email addresses or IP addresses in just a few clicks. But it’s a little more expensive and time consuming to change the hardware that they’re using to make a purchase—the PC, laptop or smartphone. That’s why “digital fingerprinting” or “device fingerprinting” has become a popular means for fraud prevention. Just as good old-fashioned…
  • Business Associates Gone Bad – What’s a Covered Entity To Do?

    Bob Chaput
    29 Oct 2014 | 10:00 am
    With the HIPAA Omnibus Final Rule, expectations for Business Associate compliance have ramped up significantly. It seems many BAs have had trouble responding. It turns out BAs are to blame for almost 30 percent of breaches reported on the Department of Health and Human Services (HHS) Wall of Shame. In total, nearly 300 breaches have been triggered by BAs, affecting more than 31 million individuals. A timely example comes to us courtesy of Boston Medical Center, which recently fired a transcription vendor after the firm posted information on 15,000 patients to its unsecured website. BAs have…
  • The Role of Evidence-Based Management

    Branden Williams
    28 Oct 2014 | 8:03 am
    Evidence-Based Management (EBMgt) is a topic growing in popularity in both the academic and professional worlds for a number of reasons. We’ve never had access to the volume of data that we do today coupled with the processing power available to make sense of it. In addition, we’ve learned that while hunches give us a gut feel we are comfortable with, we like to confirm it with data (which can be challenging when coping with Confirmation Bias). The Data Center, by Tu Holmes One of the bigger lessons you learn when you continue past a Masters degree is that your opinion…
  • CEO-to-CEO – Top 5 Questions CEOs Should Ask About Information Risk Management

    Bob Chaput
    27 Oct 2014 | 10:00 am
    In this current climate, it’s an absolute necessity that CEOs become actively involved in business risk management in general and information risk management specifically.  This mandate crosses all industry sectors while the requirement in healthcare is especially important right now. In this brief post, I invite CEOs to start an important dialog in their businesses by asking these top five starter and related questions: Are you and your top team formally engaged in the process?   Is there a chartered risk management committee? Do you meet on a regular basis?  Have you articulated your…
  • add this feed to my.Alltop

    Infosec Communicator »

  • Shockproofing Your Use of Social Media eBook available!

    bwadmin
    17 Oct 2014 | 8:25 am
    My Shockproofing Your Use of Social Media: 10 Things You Should Know eBook is now available on Kindle! For those of you who have attended one of my Lightning Talks about Internet Safety, this book fleshes out my recommendations for … Continue reading →
  • The Secure Communicator

    bwadmin
    17 Aug 2014 | 1:39 pm
    I had the pleasure of discussing information security best practices for technical communicators through an STC webinar. Here’s the presentation: … Continue reading →
  • Updated Shock-proofing your Use of Social Media Presentation

    bwadmin
    15 Aug 2014 | 11:08 am
    I’ve updated my Shock-proofing your Use of Social Media presentation for the Fall 2014 New Student Orientation program at the Rochester Institute of Technology. I’ve changed the passphrase example, added a new cartoon, and generally worked to make the presentation … Continue reading →
  • A Techcomm Bestiary, Summit14 edition

    bwadmin
    7 May 2014 | 12:23 pm
    I’ve changed out one slide from the Spectrum14 presentation. Looking forward to presenting this to a crowd at the STC Summit in Phoenix. … Continue reading →
  • A Techcomm Bestiary, Spectrum 2014

    bwadmin
    21 Apr 2014 | 2:38 pm
    I thought this came together pretty well and I had a great time presenting my first revision of A Techcomm Bestiary at STC Rochester’s Spectrum 2014. I may make a couple of slide changes before the STC Summit, but this … Continue reading →
 
  • add this feed to my.Alltop

    Infosec Communicator »

  • Shockproofing Your Use of Social Media eBook available!

    bwadmin
    17 Oct 2014 | 8:25 am
    My Shockproofing Your Use of Social Media: 10 Things You Should Know eBook is now available on Kindle! For those of you who have attended one of my Lightning Talks about Internet Safety, this book fleshes out my recommendations for … Continue reading →
  • The Secure Communicator

    bwadmin
    17 Aug 2014 | 1:39 pm
    I had the pleasure of discussing information security best practices for technical communicators through an STC webinar. Here’s the presentation: … Continue reading →
  • Updated Shock-proofing your Use of Social Media Presentation

    bwadmin
    15 Aug 2014 | 11:08 am
    I’ve updated my Shock-proofing your Use of Social Media presentation for the Fall 2014 New Student Orientation program at the Rochester Institute of Technology. I’ve changed the passphrase example, added a new cartoon, and generally worked to make the presentation … Continue reading →
  • A Techcomm Bestiary, Summit14 edition

    bwadmin
    7 May 2014 | 12:23 pm
    I’ve changed out one slide from the Spectrum14 presentation. Looking forward to presenting this to a crowd at the STC Summit in Phoenix. … Continue reading →
  • A Techcomm Bestiary, Spectrum 2014

    bwadmin
    21 Apr 2014 | 2:38 pm
    I thought this came together pretty well and I had a great time presenting my first revision of A Techcomm Bestiary at STC Rochester’s Spectrum 2014. I may make a couple of slide changes before the STC Summit, but this … Continue reading →
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Use AT&T Toggle to switch between accounts

    Mario Armstrong
    29 Oct 2014 | 3:45 am
    With all of the boons to productivity offered by smart devices, for employees, it’s becoming increasingly harder for employees to separate work time from personal time. Checking email late at night and on the weekends used to mean you were an executive, but today many workers are expected to be on call, 24/7. How can businesses continue to support an economy where employees are able to be productive via smart devices all the time, but also keep those employees happy and satisfied with their work-life balances? A two-step program could be just what your smartphone rollout needs: 1.
  • With HID cards, a swipe is more than a swipe

    Rajat Swarup
    24 Oct 2014 | 3:45 am
    At AT&T Security Consulting, we get to do the coolest things! A few weeks ago, we were performing a social engineering test authorized by a client. In this test, user susceptibility to individually targeted threats — and how those threats impact the physical security of the organization — were evaluated. Typically after such a test, a social engineering awareness training is done for the client’s employees to educate them about the newest threats and how they can protect against such attacks. Testing threat protection AT&T Security Consulting has some very sharp…
  • Security audit and testing: Is your network secure?

    Jennia Hizver
    21 Oct 2014 | 3:45 am
    The media regularly features stories about hackers breaking into enterprise servers to steal sensitive data. One common scenario begins when an employee receives a phishing email that looks like a legitimate business email urging the recipient to click on a link or to open an attachment. A doorway for cyber criminals These emails are sent by attackers and typically contain a malicious program designed to attack a popular corporate desktop software. Once the program is executed, it allows the attacker to take control of the employee’s desktop, using it as a gateway into the enterprise. The…
  • The “Ice Bucket Challenge” and Cyber Security

    Jeff Huegel
    13 Oct 2014 | 3:45 am
    This summer’s The Ice Bucket Challenge took the world by storm with celebrities, executives, captains of industry, politicians, and everyday folks drenching themselves and calling out friends and colleagues to do the same to support ALS research. While this particular challenge targets a worthy cause and has raised over $100 million dollars for ALS research, “me-too-isms” in the field of security and risk management can be dangerous. Take compliance for example. We in the Security field often discuss the inappropriateness of thinking compliance is security. Some of the…
  • Proactive threat intelligence: The key to successful cybersecurity

    10 Oct 2014 | 6:45 am
    When most people think about data breaches, they think of the high-profile incidents that make international headlines. However, smaller data breaches happen every day. While these may not make headlines, they can still have a big impact on the bottom line. With so much at stake, and new advanced threats emerging daily, what can businesses do to become more proactive in their security efforts? Register for this live webinar on October 14 at 12 noon EDT to hear from Dr. Larry Ponemon, founder of the Ponemon Institute and one of the world’s most influential thinkers on data security. He’ll…
  • add this feed to my.Alltop

    Email management, storage and security for business email admins

  • Apple + U2: Worst. Spam. Ever.

    Malcolm James
    6 Oct 2014 | 7:30 am
    It was bound to happen. In a world where digital information is cheap, we bandy bits and bytes around like they’re kernels of popcorn inside a giant hot air popper. The bits and bytes, modern currency that trade for news, knowledge, and kitty pics, in and of themselves have no actual value, but how those bits and bytes are strung together determine the usefulness of their existence. They can combine to form a blog post or a nasty tweet. They can become humor or horror. They can morph into a grammatically incorrect meme or they can become music; and apparently, that’s where Apple users…
  • September Spam Roundup

    Sue Walsh
    3 Oct 2014 | 7:00 am
    Fall is here, and that means football, ghosts and goblins and preparing for winter. Spam is just heating up though, with the World Series, new gadget announcements, major world events and of course the holidays on the way, you can count on lots of new tricks from spammers. Here’s a look at September’s headlines.  Google’s War on Spam http://www.extremetech.com/extreme/190277-googles-war-on-spam-and-how-encryption-could-finally-win-it-for-the-spammers Phishers Want a Lot More Than Your Money http://securitywatch.pcmag.com/spam/327319-tasty-spam-phishing-isn-t-just-about-your-money…
  • FBI Issues Spam Warning!

    Sue Walsh
    30 Sep 2014 | 9:00 am
    The FBI has issued a warning about an email scam that attempts to extort money from unwitting recipients. The emails say the recipient is the subject of a criminal investigation and that charges will be pressed soon. The messages go on to say if the recipient doesn’t respond they will be arrested and if they send the requested amount via Western Union or MoneyPak prosecution will be avoided. Obviously it provides no information about the investigation or what the recipient is allegedly being accused of. That’s because it’s just another spam scam. Its goal is to scare recipients into…
  • SpamRankings.net Takes the Fight to Spammers

    Malcolm James
    29 Sep 2014 | 9:30 am
    I often characterize spam as a socially transmitted disease, because, well, it is. Without our computers, phones, and IOE (Internet of Everything) devices, we’d be faced with the grim task of actually knocking on a neighbors’ door for instructions on how to get rid of fruit flies. While that last statement might seem terribly arbitrary, it is in fact the first thing that appears in my Google-suggested list of ‘how tos,’ and isn’t that how we roll these days? Paper mail is a mere remnant of a glorious time when bills were received and paid using a strange yet elegantly sophisticated…
  • Two More Major Retailers Admit Data Breaches

    Sue Walsh
    25 Sep 2014 | 9:00 am
    Home Depot has finally confirmed what security experts have suspected for a while now: they were hacked. The company admitted their systems were compromised by malware and nearly 60 million credit card numbers are now for sale in an underground market. “This latest batch of cards is for sale from the same underground store that sold cards from P.F. Chang’s and Target,” said Trey Ford, a security strategist at Rapid7, a Boston-based computer security company. It’s not known how they got infected, but the Department of Homeland Security is investigating. The two most likely…
 
  • add this feed to my.Alltop

    Anti spam and general email security in a business environment

  • Apple + U2: Worst. Spam. Ever.

    Malcolm James
    6 Oct 2014 | 7:30 am
    It was bound to happen. In a world where digital information is cheap, we bandy bits and bytes around like they’re kernels of popcorn inside a giant hot air popper. The bits and bytes, modern currency that trade for news, knowledge, and kitty pics, in and of themselves have no actual value, but how those bits and bytes are strung together determine the usefulness of their existence. They can combine to form a blog post or a nasty tweet. They can become humor or horror. They can morph into a grammatically incorrect meme or they can become music; and apparently, that’s where Apple users…
  • September Spam Roundup

    Sue Walsh
    3 Oct 2014 | 7:00 am
    Fall is here, and that means football, ghosts and goblins and preparing for winter. Spam is just heating up though, with the World Series, new gadget announcements, major world events and of course the holidays on the way, you can count on lots of new tricks from spammers. Here’s a look at September’s headlines.  Google’s War on Spam http://www.extremetech.com/extreme/190277-googles-war-on-spam-and-how-encryption-could-finally-win-it-for-the-spammers Phishers Want a Lot More Than Your Money http://securitywatch.pcmag.com/spam/327319-tasty-spam-phishing-isn-t-just-about-your-money…
  • FBI Issues Spam Warning!

    Sue Walsh
    30 Sep 2014 | 9:00 am
    The FBI has issued a warning about an email scam that attempts to extort money from unwitting recipients. The emails say the recipient is the subject of a criminal investigation and that charges will be pressed soon. The messages go on to say if the recipient doesn’t respond they will be arrested and if they send the requested amount via Western Union or MoneyPak prosecution will be avoided. Obviously it provides no information about the investigation or what the recipient is allegedly being accused of. That’s because it’s just another spam scam. Its goal is to scare recipients into…
  • SpamRankings.net Takes the Fight to Spammers

    Malcolm James
    29 Sep 2014 | 9:30 am
    I often characterize spam as a socially transmitted disease, because, well, it is. Without our computers, phones, and IOE (Internet of Everything) devices, we’d be faced with the grim task of actually knocking on a neighbors’ door for instructions on how to get rid of fruit flies. While that last statement might seem terribly arbitrary, it is in fact the first thing that appears in my Google-suggested list of ‘how tos,’ and isn’t that how we roll these days? Paper mail is a mere remnant of a glorious time when bills were received and paid using a strange yet elegantly sophisticated…
  • Two More Major Retailers Admit Data Breaches

    Sue Walsh
    25 Sep 2014 | 9:00 am
    Home Depot has finally confirmed what security experts have suspected for a while now: they were hacked. The company admitted their systems were compromised by malware and nearly 60 million credit card numbers are now for sale in an underground market. “This latest batch of cards is for sale from the same underground store that sold cards from P.F. Chang’s and Target,” said Trey Ford, a security strategist at Rapid7, a Boston-based computer security company. It’s not known how they got infected, but the Department of Homeland Security is investigating. The two most likely…
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Use AT&T Toggle to switch between accounts

    Mario Armstrong
    29 Oct 2014 | 3:45 am
    With all of the boons to productivity offered by smart devices, for employees, it’s becoming increasingly harder for employees to separate work time from personal time. Checking email late at night and on the weekends used to mean you were an executive, but today many workers are expected to be on call, 24/7. How can businesses continue to support an economy where employees are able to be productive via smart devices all the time, but also keep those employees happy and satisfied with their work-life balances? A two-step program could be just what your smartphone rollout needs: 1.
  • With HID cards, a swipe is more than a swipe

    Rajat Swarup
    24 Oct 2014 | 3:45 am
    At AT&T Security Consulting, we get to do the coolest things! A few weeks ago, we were performing a social engineering test authorized by a client. In this test, user susceptibility to individually targeted threats — and how those threats impact the physical security of the organization — were evaluated. Typically after such a test, a social engineering awareness training is done for the client’s employees to educate them about the newest threats and how they can protect against such attacks. Testing threat protection AT&T Security Consulting has some very sharp…
  • Security audit and testing: Is your network secure?

    Jennia Hizver
    21 Oct 2014 | 3:45 am
    The media regularly features stories about hackers breaking into enterprise servers to steal sensitive data. One common scenario begins when an employee receives a phishing email that looks like a legitimate business email urging the recipient to click on a link or to open an attachment. A doorway for cyber criminals These emails are sent by attackers and typically contain a malicious program designed to attack a popular corporate desktop software. Once the program is executed, it allows the attacker to take control of the employee’s desktop, using it as a gateway into the enterprise. The…
  • The “Ice Bucket Challenge” and Cyber Security

    Jeff Huegel
    13 Oct 2014 | 3:45 am
    This summer’s The Ice Bucket Challenge took the world by storm with celebrities, executives, captains of industry, politicians, and everyday folks drenching themselves and calling out friends and colleagues to do the same to support ALS research. While this particular challenge targets a worthy cause and has raised over $100 million dollars for ALS research, “me-too-isms” in the field of security and risk management can be dangerous. Take compliance for example. We in the Security field often discuss the inappropriateness of thinking compliance is security. Some of the…
  • Proactive threat intelligence: The key to successful cybersecurity

    10 Oct 2014 | 6:45 am
    When most people think about data breaches, they think of the high-profile incidents that make international headlines. However, smaller data breaches happen every day. While these may not make headlines, they can still have a big impact on the bottom line. With so much at stake, and new advanced threats emerging daily, what can businesses do to become more proactive in their security efforts? Register for this live webinar on October 14 at 12 noon EDT to hear from Dr. Larry Ponemon, founder of the Ponemon Institute and one of the world’s most influential thinkers on data security. He’ll…
  • add this feed to my.Alltop

    The Redspin Report

  • Why Cyber Insurance Isn’t All It’s Cracked Up To Be

    mmak
    27 Oct 2014 | 12:57 pm
    With the number of breach victims in 2014 thus far reaching over 77 million, investing in a cyber insurance policy may sound like a good idea. But before latching on to this safety net and calling it a day, it is important to remember that cyber insurance policies are still in their early stages of development. While cyber insurance should be considered part of your risk management arsenal, it is not a substitute for regular penetration testing and vulnerability assessments. As it turns out, [ Read More ]
  • Helpful Reminders About HIPAA Security Risk Analysis

    mmak
    21 Oct 2014 | 1:20 pm
    If protecting the integrity of patient health care information were not already sufficient incentive to improve IT security, being HIPAA compliant comes with even more perks for most providers. Medicare and Medicaid Electronic Health Care Record (EHR) Incentive Programs have been implemented to provide financial incentives to eligible medical professionals and hospitals that demonstrate they have satisfied the requirements of the HIPAA Security Rule. The core objective of “Protect Electronic [ Read More ]
  • All Roads in the Digital Future Lead Through Security Says Gartner

    Dan Berger
    20 Oct 2014 | 11:09 am
    Gartner recently released their Top 10 Strategic Technology Trends for 2015. These aren't your run-of-the-mill trends mind you. These are the disruptive (and often distressing) realities that appear to be just 'round the corner and will require organizations and individuals to adapt and invest or risk being left in the evolutionary dust. While some trends have been percolating along quite nicely such as cloud computing and software-defined infrastructures and applications, I don't think the real [ Read More ]
  • 4 Things You Should Know About Social Engineering

    mmak
    16 Oct 2014 | 11:03 am
    No matter how many firewalls are put up or how complex passwords may be, if your employees are unknowingly giving out their credentials to strangers, your information security will never be immune to breach. A recent flash poll conducted on security professionals by Dark Reading found that the biggest social engineering threat to organizations is not a specific type of scam, but a general lack of employee awareness. Social engineering is a tactic by which intruders use psychological manipulation [ Read More ]
  • Redspin Events in September

    mmak
    29 Aug 2014 | 1:43 pm
    Redspin will be participating in several great healthcare and security conferences this September. Make sure you tune in to get useful information about IT security, policy compliance, and penetration testing! Stanford Medicine X  (Palo Alto, CA) "Practical Information and Security Risk Management for ePatients" by Redspin VP Chris Campbell September 6 @ 9:20am HIMSS Privacy and Security Forum (Boston, MA) Look for Redspin's co-exhibition with EMC September 8-9 The Summit of the Southeast [ Read More ]
 
  • add this feed to my.Alltop

    F-Secure Antivirus Research Weblog

  • Multi-language support: Not your everyday spam

    31 Oct 2014 | 8:07 am
    Sometime during the beginning of the year, we have encountered a surge in Fareit spams. Fareit is a downloader used to deliver Zeus and Cryptowall.Lately, we have been noticing yet another downloader being spammed. It seems that the spammer for this downloader has spent more effort to trick the user into believing that it’s a legitimate email.A recent spam was a fake KLM e-ticket which was tailored to pretend to come from the Sales & Service Center of Air France KLM.However, this spammer did not only tend to English language speakers. Recently, we also saw quite a number of its spam…
  • Terms of Service

    31 Oct 2014 | 8:07 am
    We recently published a report called "Tainted Love — How Wi-Fi Betrays Us" as part of a public Wi-Fi experiment.The project required a "terms of service" and so for a bit of fun we added something… out of the ordinary.Do you see it above?Your First Born ChildIn using this service, you agree to relinquish your first born child to F-Secure, as and when the company requires it. In the event that no children are produced, your most beloved pet will be taken instead. The terms of this agreement stand for eternity.One never knows what might be found in the fine print.The full terms of…
  • It's Not a Game - It's a Violation of Human Dignity

    31 Oct 2014 | 8:07 am
    Still don't set a passcode on your phone?From Matthias Gafni and Malaika Fraley at the Contra Costa Times:The California Highway Patrol officer accused of stealing nude photos from a DUI suspect's phone told investigators that he and his fellow officers have been trading such images for yearsThe five-year CHP veteran called it a "game" among officers, according to an Oct. 14 search warrant affidavit.Source: Contra Costa TimesA game?IT'S A CRIME. (Or it certainly ought to be.)Again from the Contra Costa Times:CHP Commissioner Joe Farrow said in a statement that his agency too has "active and…
  • NCR ATM API Documentation Available on Baidu

    31 Oct 2014 | 8:07 am
    A recent ATM breach in Malaysia has caused havoc for several local banks. According to reports, approximately 3 million Malaysian Ringgit (almost 1 million USD) was stolen from 18 ATMs. There is no detailed information on how the attack was performed by the criminals, but according to one local news report, police claimed the criminals installed malware with the file name "ulssm.exe" which was found on the compromised ATMs. Based on the file name, we know that the malware in question was first discovered by Symantec and it is known as "PadPin". The basic technical information of this malware…
  • 101 Bad Android Apps

    31 Oct 2014 | 8:07 am
    Flash Player installers, so-called Android security updates, pirated games, and XXX-video players… there's almost never a shortage of suspicious Android apps. We have automation which analyzes such apps and takes screenshots in the process.Some examples:101 Bad Android AppsHere's one particular example: Activate device administrator?Erase all data; Reset password; Limit password.China Mobile customers should select… "Cancel". On 28/10/14 At 12:54 PM
  • add this feed to my.Alltop

    Pcthreat.com

  • Health Alert

    30 Oct 2014 | 8:48 pm
    Health Alert is an application which might seem useful for those who are concerned about their health because it promises to provide the latest information regarding various risks to your health. Health Alert...
  • PC Optimizer Pro

    30 Oct 2014 | 8:48 pm
    Despite the best efforts of the online security industry to secure the exact opposite, many of its consumers continue to fall into the trap set by malicious rogue security tools like PC Optimizer Pro. This...
  • Qone8.com

    30 Oct 2014 | 8:48 pm
    Qone8.com is a search engine which returns search results from Google Search. The search engine is owned by Taiwan Shui Mu Chih Ching Technology Limited, and it very similar to such browser hijackers as...
  • Extended Update

    30 Oct 2014 | 8:48 pm
    Extended Update is not an actual program. It is an update task file that belongs to Hoolapp application. What is more, sometimes Extended Update can also be found in a number of potentially unwanted browser...
  • V9 Redirect Virus

    30 Oct 2014 | 8:48 pm
    V9 Redirect Virus is a malicious browser hijacker which infects the system while you are browsing insecure websites or when you download spam email attachments. Once the infection gets in the system, the...
 
  • add this feed to my.Alltop

    NSS Labs

  • Technology of the Future: BDS Market Set to Explode

    29 Oct 2014 | 12:00 am
    “Assume you have been breached” has become standard advice from information security professionals today. As organizations continue to be breached, the conventional approach to information security – in which layers of best-of-breed security technologies are used to protect an organization – is being challenged. Many organizations are beginning to acknowledge that in fact it is not possible to guarantee protection.
  • Add a Dash of Cloud for a More Robust Security Infrastructure

    14 Oct 2014 | 12:00 am
    As the hype around cloud computing settles, and as organizations begin to evaluate solutions, the ability of security as a service (SaaS) solutions to improve security infrastructure becomes apparent.
  • All’s Well That Ends Well

    9 Oct 2014 | 12:00 am
    In my previous blog about the Palo Alto Networks results in our recent NGFW test I expressed the hope that “Palo Alto Network executives will take this issue seriously and move quickly to protect their customers."
  • Seriously?

    1 Oct 2014 | 12:00 am
    We don’t follow up every NSS Labs test with a blog response to a vendor, but after the fun and games following our recent BDS test, we find ourselves in a similar position. This time it is Palo Alto Networks blogging about our NGFW group test, the results of which were published last week and can be found here.
  • Web Application Firewalls: Not just for PCI anymore

    30 Sep 2014 | 12:00 am
    Unlike most security technologies that attempt to identify a broad range of bad traffic by means of traditional detection methods, a web application firewall (WAF) is like a finely honed sword designed for a singular purpose: monitoring HTTP traffic between clients and web-servers. The payment card industry (PCI) accelerated the development of the WAF market since it provided a tangibly financial application of this technology. This made WAF a must-have in the arsenal of weapons for many of today’s security administrators.
  • add this feed to my.Alltop

    Private WiFi

  • CNN Meets With PRIVATE WiFi to Understand Public WiFi Exploits, Privacy Dangers

    Elaine Rigoli
    31 Oct 2014 | 1:35 pm
    CNN International sat down with PRIVATE WiFi's Intrusion Expert, Caleb Huff in Central Park this week to better understand the exploits and dangers on public WiFi networks. CNN aired its "Walk in the Park" segment on "The Business View with Nina Dos Santos" to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi. Calling WiFi hacking “extremely easy and readily available” – like a walk in the park – the CNN report shares some eye-opening realities about Internet…
  • ITRC Victim Impact Survey Findings LIVE Event

    Cristy Koebler
    23 Oct 2014 | 2:00 am
    The emotional impact of identity theft is far-reaching and extends well beyond the initial discovery and subsequent process of clearing the theft. The Identity Theft Resource Center routinely conducts focused surveys on identity theft, asking victims who have reached out for support from the organization to participate in the voluntary research to help the industry better understand the root causes, illicit methods, and recovery experience from this type of crime. The survey results are then compiled into a report that the ITRC shares with a wide variety of industry stakeholders to help…
  • Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

    Elaine Rigoli
    21 Oct 2014 | 1:55 am
    Technology is a part of our lives but it should not take over our lives – or ever compromise our children’s online safety. Because October is National Cyber Security Awareness Month (NCSAM), and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Although his day job is in the security and privacy fields, several years ago he launched Savvy Cyber Kids, a nonprofit to help keep children safer online. Last year Savvy Cyber Kids joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT.. campaign's…
  • WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

    Alok Kapur
    14 Oct 2014 | 2:53 am
    "WiFi footprint" is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality. According to Marcio Avillez, vice president of network services at a company called iPass, organizations ranging from platform players to independent coffee shops see opportunities in making WiFi available, while major telecoms operators are investing heavily in WiFi rollouts. "The proliferation of devices, especially tablets, the majority of which are WiFi only, has increased users' appetites for WiFi. These…
  • University of Maryland Professors to Study WiFi Hotspot Behavior

    Jared Howe
    13 Oct 2014 | 1:00 am
    Two University of Maryland professors, David Maimon, an expert in online criminal behavior, and Jonathan Katz, the Maryland Cybersecurity Center director, recently received a $200,000 grant from the National Science Foundation to study how people access and use public WiFi hotspots. The duo plans on visiting more than 100 locations that offer public WiFi hotspots, from coffee shops to libraries, and then study user behavior at each location, such as what websites users are visiting and what data they are exposing over the network. Other study variables include the time of day users tend to…
 
  • add this feed to my.Alltop

    Pivot Point Security

  • Don’t Put Your Cloud Security Cart Before Your ISO 27001 Horse

    BobB
    30 Oct 2014 | 4:00 am
    As businesses of all sizes rely more heavily on cloud and Software-as-a-Service (SaaS) solutions, cloud security architects are in short supply—and the demand and cost for that skill set are only going to escalate in the next few years. It seems unlikely to me that there will be enough security professionals with the right mix of skills and experience to effectively architect a secure move to the cloud for every organization that needs that service going forward. At the same time, more and more companies are seeking ISO 27001 certification as a “seal of approval” to show prospects,…
  • You Say Your Favorite Application Is No Longer Being Updated?

    Robert Oliver
    28 Oct 2014 | 12:44 pm
    Recently I attended a conference on information security sponsored by the International Legal Technology Association (ILTA) in Chicago. It was great to share perspectives with several hundred fellow information security professionals on risk, security and compliance. Many of those in attendance were IT managers and directors from law firms and financial institutions, as well as technology vendors and information security consulting companies like Pivot Point Security. The speakers and curriculum were terrific. At one point I was sitting in on a panel discussion that featured information…
  • 3 Simple Server-Side Tweaks to Improve Web Application Security

    Bob
    27 Oct 2014 | 4:00 am
    You can enhance your web application’s security simply by adding some headers to the responses that the server generates when pages are requested. Our team has increasingly been recommending these server-side changes to clients. These easy tweaks take very little time to implement and do not require any modification to the application code itself. However, they can significantly improve the security of the environment between your servers and your users’ browsers. One: HSTS The first tweak I’m suggesting is to require encrypted connections using HTTP Strict Transport Security (HSTS).
  • Recommended Reading – Threat Modeling: Designing for Security by Microsoft’s Adam Shostack

    Kelly Player
    23 Oct 2014 | 4:00 am
    For anyone charged with assessing information security risk—from newly-appointed project manager to veteran security geek— check out Adam Shostack’s recent book, Threat Modeling: Designing for Security. Though oriented towards software development, it’s one of the few books I’ve seen on this subject that offers useful tips and guidance to practitioners at all levels. Whether for audit, compliance, or certification (e.g., ISO 27001) purposes, the more proficient our clients are at risk assessment in their own environments, the easier the process and the better the outcome. In…
  • Here’s Why Using Information Security Policy Templates for ISO 27001 Certification Isn’t A Good Idea

    Mosi
    22 Oct 2014 | 4:00 am
    Clients often ask me whether they can make their lives easier by using information security policy templates to document compliance with the ISO 27001 standard for certification purposes. My answer is uniformly “No.” Here’s why. The ISO 27001 standard has over 50 requirements in clauses 4 through 10, and 114 controls in Annex A. None of those requirements mandates or even recommends the use of templates for security policies and procedures. So why do organizations seeking certification often want to use templates to document compliance with ISO 27001? Usually it’s because they’re…
  • add this feed to my.Alltop

    HOTforSecurity

  • Facebook Adds “Onion” Address for Anonymous Browsing. But Does It?

    Alexandra Gheorghe
    31 Oct 2014 | 11:15 am
    Facebook implemented a new way for users to access its site via Tor “without losing the cryptographic protections provided by the Tor cloud” and disclosing their location, according to a Facebook announcement. Users who have the Tor-enabled browser enabled can access Facebook directly through the https://facebookcorewwwi.onion/ URL, said Alec Muffett, software engineer at Facebook. Through an “.onion” address they can connect to Facebook’s Core WWW Infrastructure that provides a direct connection between the browser and a Facebook data center. Catalin Cosoi, Chief Security…
  • 7 Halloween Tricks You Shouldn’t Be Scared Of

    Alexandra Gheorghe
    31 Oct 2014 | 6:07 am
    Ghosts, goblins and vampires aren’t the only creepy things that come out on Halloween. This day is also notable for other kinds of creeps – the frightening fraudster, the spooky spammer and the horrible hacker. Let’s not forget that it’s a busy shopping day! We expect a wave of opportunistic scams to hit your inboxes and try to disrupt your whole online experience. Don’t let scammers mistreat you. Remember these Bitdefender tips and look out for: Unsolicited e-mails claiming to deliver Halloween-related jokes, allegedly hilarious PowerPoint documents or videos. These messages can…
  • Drupal Core SQL Injection Vulnerability Leveraged in Drive-by Attacks

    Lucian Ciolacu
    31 Oct 2014 | 2:57 am
    The Drupal Core SQL vulnerability disclosed two weeks ago has been recently leveraged in automated attacks aiming to compromise websites, according to an announcement by Drupal “Automated attacks began compromising Drupal 7 websites that were not patched or updated to Drupal 7.32 within hours of the announcement of SA-CORE-2014-005 – Drupal core – SQL injection,” Drupal advised. “You should proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC.” The SQL injection vulnerability lies in…
  • Alleged Baidu Spyware Gathering User Data From Sony Xperia Smartphones; “Unexpected Behaviour” Sony Says

    Lucian Ciolacu
    30 Oct 2014 | 4:21 am
    Sony Xperia Smartphones with Android 4.4.2 or 4.4.4 KitKat versions have been allegedly found to send user data back to China-based servers of Baidu, according to a post from XPERIA Blog. The alleged spyware was found after users reported a strange folder named “Baidu.” The folder appeared automatically with no user permission and it automatically reappears even if it is deleted with admin rights or from Safe Mode. Photo Credit: Reddit User Phapstronaught “Just unpacked my Sony Z3 compact, haven’t installed a single app and its connecting to China,” a Reddit user…
  • BlackEnergy Malware Compromises US SCADA Systems; US CERT Says

    Lucian Ciolacu
    29 Oct 2014 | 9:19 am
    The BlackEnergy malware toolkit has been compromising US SCADA (Supervisory Control and Data Acquisition) systems in a sophisticated campaign, according to the US Computer Emergency Response Team’s advisory. SCADA systems compromised with BlackEnergy included those of GE Cimplicity, Advantech/Broadwin WebAccess and Siemens WinCC, while there is still no evidence that the compromised systems were disrupted or damaged. “However, typical malware deployments have included modules that search out any network-connected file shares and removable media for additional lateral movement…
  • add this feed to my.Alltop

    Video Surveillance

  • How to use the Focus Assistant

    27 Oct 2014 | 12:12 pm
    For Axis cameras in the P13 line, like the Axis P1355 or Axis P1357, the focus assist can help you focus the camera without having to view live video, making the process easier and faster. This color coordinated process is simple to use, and this quick Axis Communications Academy video will show you how:
  • Another Unique Application for Video Surveillance: Counting Pedestrians

    17 Oct 2014 | 8:37 am
    New York City is leveraging its existing security camera system to the fullest by counting the number of footsteps of pedestrians in areas with the highest number of commuters. The city believes that the data, recorded by the surveillance cameras already installed in strategic locations, will give law enforcement and government officials valuable information to help curtail urban problems Some of these problems, among others, include public safety and trash collection. Watch the video below to learn more about the new citywide project:
  • Learn About Frame Rate and Shutter Speed with Axis

    16 Oct 2014 | 1:14 pm
    Do you know what the difference is between a camera's frame rate and its shutter speed? These settings are important to getting clear, steady videos and Axis is here to help you learn! Frame rate is the number of frames, or images, a camera captures per second. Shutter speed determines how much, or how little, light is let into the camera. Watch this 60-second video from Axis to learn more:
  • Suspects Accused of Stealing Valuable Office Equipment from Three Businesses

    9 Oct 2014 | 9:20 am
    It doesn't matter if you own or operate a retail business; regular office buildings and suites are also prime targets for thieves. According to a recent news report by ABC7news.com, three businesses in Fremont, California (Black Magic Design, Mac House Productions, and Core Microsystems) had hundreds of thousands of dollars of office equipment stolen by a group of suspects. Law enforcement claims that these were savvy thieves with experience in this type of theft by acting fast and knowledgeable in what they were doing. The good news is that Mac Productions' video surveillance cameras…
  • Learn About the Long-Distance Power of Wireless Surveillance

    1 Oct 2014 | 5:21 pm
    Whether you're securing a large college campus on need to keep an eye on remote buildings on your property, wireless surveillance systems make it easy to connect cameras over long distances. Using a system of wireless antennas and base stations, your system will send and receive data for up to 10 miles. To help you better understand this powerful technology and its uses, VideoSurveillance.com has released a new guide to wireless video surveillance. This guide covers how the systems work, what surveillance situations are ideal candidates for wireless systems, and how your business can benefit.
 
  • add this feed to my.Alltop

    Infosec Communicator »

  • Shockproofing Your Use of Social Media eBook available!

    bwadmin
    17 Oct 2014 | 8:25 am
    My Shockproofing Your Use of Social Media: 10 Things You Should Know eBook is now available on Kindle! For those of you who have attended one of my Lightning Talks about Internet Safety, this book fleshes out my recommendations for … Continue reading →
  • The Secure Communicator

    bwadmin
    17 Aug 2014 | 1:39 pm
    I had the pleasure of discussing information security best practices for technical communicators through an STC webinar. Here’s the presentation: … Continue reading →
  • Updated Shock-proofing your Use of Social Media Presentation

    bwadmin
    15 Aug 2014 | 11:08 am
    I’ve updated my Shock-proofing your Use of Social Media presentation for the Fall 2014 New Student Orientation program at the Rochester Institute of Technology. I’ve changed the passphrase example, added a new cartoon, and generally worked to make the presentation … Continue reading →
  • A Techcomm Bestiary, Summit14 edition

    bwadmin
    7 May 2014 | 12:23 pm
    I’ve changed out one slide from the Spectrum14 presentation. Looking forward to presenting this to a crowd at the STC Summit in Phoenix. … Continue reading →
  • A Techcomm Bestiary, Spectrum 2014

    bwadmin
    21 Apr 2014 | 2:38 pm
    I thought this came together pretty well and I had a great time presenting my first revision of A Techcomm Bestiary at STC Rochester’s Spectrum 2014. I may make a couple of slide changes before the STC Summit, but this … Continue reading →
  • add this feed to my.Alltop

    Seculert Blog on Advanced Threats and Cyber Security

  • Unpatchable BadUSB Malware Released by Security Researchers

    Liora R. Herman
    30 Oct 2014 | 4:20 am
    At the Black Hat conference in August, security researcher Karsten Nohl demonstrated an emerging risk on the cyber threat landscape that he dubbed “BadUSB”: virtually unpatchable malware that resides in the core of a USB device, rewrites its firmware to stay undetected by anti-virus products, and proceeds to infect everything that it attaches to. Once […] The post Unpatchable BadUSB Malware Released by Security Researchers appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Home Depot Hackers Already Draining Victims’ Accounts

    Liora R. Herman
    14 Oct 2014 | 11:00 pm
    The Wall Street Journal has reported that the hackers who’ve gotten their digital hands on payment card data from as many as 56 million Home Depot customers in the United States and Canada have already started draining the victims’ bank accounts, and purchasing electronics, prepaid cards (a.k.a. gift cards), and even groceries with their stolen […] The post Home Depot Hackers Already Draining Victims’ Accounts appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Backoff PoS Malware Victim Count Could Far Exceed 1000

    Liora R. Herman
    14 Oct 2014 | 5:02 am
    Kaspersky Labs is reporting that the number of victims infected by the notorious Backoff PoS malware could far exceed the approximately 1,000 estimated by officials from the US Department of Homeland Security and Secret Service. The revised damage projection is based on an analysis of intercepted traffic between infected systems and two Backoff command and […] The post Backoff PoS Malware Victim Count Could Far Exceed 1000 appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Goodwill Industries’ Security Breach- Undetected for 18 Months

    Liora R. Herman
    13 Oct 2014 | 5:00 am
    We previously wrote about a possible security breach affecting Goodwill Industries’ credit and debit card customers in 21 States; a breach that the company later confirmed and blamed on an unnamed third-party PoS vendor. Now, after obtaining some internal documents (ironically) meant to help individual Goodwill stores handle media inquiries, Brian Krebs – who broke […] The post Goodwill Industries’ Security Breach- Undetected for 18 Months appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Remotely Exploitable Vulnerability on the Loose

    Liora R. Herman
    8 Oct 2014 | 4:26 am
    A remotely exploitable vulnerability in GNU Bash dubbed “Shellshock” is on the loose, and targeting Debian and Linux distributions. Key details for CVE-2014-6271 uncovered by Akamai include: The vulnerability has existed for some time The vulnerability is exposed in SSH to authenticated sessions Key attack vectors identified so far include HTTP requests and CGI scripts, […] The post Remotely Exploitable Vulnerability on the Loose appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • add this feed to my.Alltop

    Managed File Transfer and Network Solutions

  • Preparing Trading Partner Servers For SFTP Automation

    John Carl Villanueva
    26 Oct 2014 | 3:55 pm
    Overview In order to keep transactions secure, you and your trading partners likely use SFTP and other encrypted protocols for your automated data exchanges. In this post, I'd like to share a method that can reduce the steps you typically take in applying SFTP automation to certain business processes. Here, you'll learn how to gather remote host credentials into a single entity, which you can later on reuse every time you need to construct another automated process.   Understanding the problem   Whenever you establish an SFTP connection with a trading partner, you need to specify a…
  • Poodle vulnerability (CVE-2014-3566) patched in JSCAPE MFT Server

    Van Glass
    24 Oct 2014 | 7:55 am
    The Poodle vulnerability (CVE-2014-3566) has been patched in the latest version of JSCAPE MFT Server (9.0.7.126) by disabling the SSLv3 protocol.  Customers using previous versions of JSCAPE MFT Server are encouraged to upgrade to the latest version.  For instructions on disabling SSLv3 or additional assistance please contact the Help Desk for a prompt reply. A patch for JSCAPE MFT Gateway will be made available shortly.    
  • Setting Up an SFTP Server

    John Carl Villanueva
    22 Oct 2014 | 11:39 pm
    Overview I've been going over our posts lately and just realised that, while we've managed to put together a decent collection of information regarding SFTP file transfers, we actually don't have an article that teaches how to set up an SFTP server. I'm sure some of you have been resourceful enough to go through the documentation and sift through all the relevant pages in there. But for those who just want one place for it all, this is the article for you. For this tutorial, I'll be using JSCAPE MFT Server, our managed file transfer server that supports SFTP as well as a number of other…
  • What Is An SFTP Key?

    John Carl Villanueva
    22 Oct 2014 | 12:08 am
    Overview What good is an encrypted data transfer if the information it protects still falls into the wrong hands in the end? SFTP is best known for its ability to encrypt data while in transit. But while data-in-motion encryption can secure confidential information as it traverses the network, encryption can't prevent an impostor from carrying out the download himself. For that purpose, you'll want your users to authenticate with the right password and the right SFTP key.     In this post, we'll talk about the role of SFTP keys (a.k.a. private keys) in the overall security…
  • Securing Trading Partner File Transfers w/ Auto PGP Encryption & FTPS

    John Carl Villanueva
    18 Oct 2014 | 8:50 am
    Overview PGP encryption can add another layer of protection to a trading partner file transfer already secured by FTPS. It can also provide data-at-rest encryption as soon as the file arrives at the other end. In this post, we'll show you how to set up a fully automated file transfer secured by OpenPGP and FTPS using JSCAPE MFT Server triggers.   What we'd like to do     Does that look like something you could use? Here are the steps to achieve that.   1. Import your trading partner's PGP public key   Before you can PGP encrypt a file which your trading…
 
  • add this feed to my.Alltop

    Radware Blog

  • Coming to the OpenStack Summit in Paris? Join my seminars

    Samuel Bercovici
    31 Oct 2014 | 9:07 am
    Infrastructure-as-a-Service based clouds and, in particular, OpenStack have matured.  This state of maturity involves “enterprise-grade” capabilities, in terms of features and manageability, which can be delivered as a service.  This, and many other topics, will be discussed and analyzed at length during next week’s OpenStack Summit in Paris, where I have the pleasure of speaking at two seminars. My first session,  Load Balancing as a Service v2.0 – Juno and Beyond  on Monday, November 3rd will share information about the new capabilities expected from LBaaS v2.0 and…
  • Speed, Showrooming, and the “Creepiness Line”: My Top 6 Takeaways from the 2014 Shop.org Summit

    Tammy Everts
    30 Oct 2014 | 7:19 am
    At Radware, we care about making our customers’ websites and web-based applications as secure, fast, and reliable as possible. When I go to conferences and events, this is the lens through which I view every session I attend and every conversation I have. Earlier this month, I had the privilege of being invited to lead a round table at the annual Shop.org Summit in Seattle. The Summit is one of the largest and most important ecommerce conferences in the world. If you work in the online retail space, it’s a must-attend event. As always, I learned at least as much as I shared with others.
  • Les Assises 2014 Conference Takeaways, Building a Yellow Brick Road in France

    Carl Herberger
    20 Oct 2014 | 9:18 am
    Recently, I had the good fortune to be invited to present the keynote speech at the 2014 Les Assises Security Conference held in the beautiful city state of Monaco. Les Assises is the largest information-security gathering in France and year-in and year-out it proves to be not only a huge information sharing opportunity, but also a time of self-reflection and strategy affirmation for the thousands of security executives that attend. The conference was brimming with a bursting-at-the-seams attendance and a full dance-card of top notch speakers and engaging topics to review.  I learned a lot…
  • CVE 2014-3566 POODLE: A New Vulnerability

    radware
    16 Oct 2014 | 7:33 am
    Radware’s Emergency Response Team (ERT) is reporting a new vulnerability published under CVE 2014-3566 named POODLE (Padding Oracle on Downgraded Legacy Encryption). This SSLv3 POODLE vulnerability can force a client to negotiate SSLv3 instead of TLS and then carry out BEAST (Browser Exploit Against SSL/TLS) attacks to obtain information from an encrypted stream. What Have We Learned? Unlike previous vulnerabilities we’ve seen this past year that allowed a hacker to access a server (Heartbleed and Shellshock), this new vulnerability targets clients. POODLE affects SSLv3, which…
  • REPORT: State of the Union for Ecommerce Page Speed & Web Performance [Fall 2014]

    Tammy Everts
    14 Oct 2014 | 4:08 am
    Cyber Monday is just around the corner, and early predictions point to holiday ecommerce sales hitting an all-time record of $72 billion. But retailers know that competition for this ecommerce spend will also be at an all-time high. Many will leverage aggressive strategies, ranging from rich visuals to geo-targeting campaigns, to earn their share of the holiday retail pie. These strategies, however, can come with a significant performance price tags, making pages slow to render — and ultimately driving away consumers. Today at Radware, we’ve released our latest research into the…
  • add this feed to my.Alltop

    pfSense Setup HQ

  • New Python Site Launched

    maximumdx
    28 Oct 2014 | 9:39 am
    Anyone who has an interest in the Python programming language might want to take a look at my latest site, pythonscript.net. I only have a few articles posted so far, but I am setting a goal of posting at least two articles a week. As someone whose forte is in C/C++ programming, I’m looking forward to using the site to further explore the world of Python. The post New Python Site Launched appeared first on pfSense Setup HQ.
  • HAProxy Load Balancing: Part One

    maximumdx
    27 Oct 2014 | 6:00 am
    Configuring HAProxy in pfSense 2.1.5. HAProxy is an application offering high-availability, load balancing and proxying for TCP and HTTP-based applications. It is particularly suited for high traffic web sites, and is used by a number of high-profile websites including GitHub, Stack Overflow, Reddit, Tumblr, and Twitter. Over the years, it has become the de facto standard open source load balancer, is shipped with most mainstream Linux distributions, and is often deployed by default in cloud platforms. It is written in C and has a reputation for being fast, efficient and stable. HAProxy is…
  • Bandwidth Monitoring with BandwidthD

    maximumdx
    20 Oct 2014 | 2:00 pm
    Configuring BandwithD in pfSense 2.1.5. BandwidthD tracks usage of TCP/IP subnets and builds HTML files with graphs to display utilization. Charts are built for individual IP addresses, and by default display utilization over 2 day, 8 day, 40 day, and 400 day periods. Furthermore, each IP address’s utilization can be logged at intervals of 3.3 minutes, 10 minutes, 1 hour or 12 hours in CDF format, or to a backend database server. HTTP, TCP, UDP, ICMP, VPN, and P2P traffic are color-coded. BandwidthD can produce output in two ways. The first is as a standalone application that produces…
  • Data Link Layer Advertising with ladvd

    maximumdx
    14 Oct 2014 | 2:00 pm
    Configuring ladvd under pfSense 2.1.5. ladvd sends LLDP (Link Layer Discovery Protocol) advertisements on all available interfaces. This makes connected hosts visible on managed switches. By default, it will run as a privilege-separated daemon. In addition to LLDP, ladvd also supports the following protocols: Cisco Discovery Protocol (CDP): This is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address. It can also be used for On-Demand Routing, which…
  • ModSecurity: Part Two

    maximumdx
    11 Oct 2014 | 4:00 pm
    Configuring site proxies in ModSecurity under pfSense 2.1.5. In the previous article, we covered installation of ModSecurity and began configuration. In this article, we continue our look at configuration. We had covered the first five settings on the “Proxy Server Settings” tab. The next setting, the “Use mod_mem_cache” checkbox, enables mod_mem_cache, which stores cached documents in memory. In the next edit box, “mod_mem_cache memory usage”, you can set the memory usage in megabytes. The next setting, the “Use mod_disk_cache” checkbox,…
  • add this feed to my.Alltop

    Tips4Tech Blog

  • Top 10 Tips to Share with Employees During Cyber Security Awareness Month (#NCSAM)

    Allan Pratt
    9 Oct 2014 | 7:28 pm
    There is no dispute that data breaches are becoming more common, and as a result, online safety and the protection of personally identifiable information (PII) are hot topics in the mainstream media. Therefore, the month of October presents an excellent opportunity for all businesses, especially midsize businesses, to remind employees about their responsibilities when it comes to protecting corporate data. Here are my top ten tips to share with employees during Cyber Security Awareness Month: [1] Complex Passwords All passwords should be at least 10 characters and include lower and upper case…
  • Are You Integrating Security into Your Celebration of #CXDay?

    Allan Pratt
    1 Oct 2014 | 7:47 pm
    Is the first Tuesday of October marked as a special date on your calendar? If not, the significance around social channels will alert you to this hashtag. The second Tuesday in October is #CXDay, and according to Annette Franz (@CXJourney on Twitter), “It’s a celebration of customer experience professionals, those folks who work tirelessly to design and deliver a great customer experience to their customers. The day is meant to continue to raise awareness of the importance of the customer experience.” My grad school studies were in marketing, so while my professional focus…
  • Don’t Forget Security When It Comes to E-Waste

    Allan Pratt
    24 Sep 2014 | 7:43 pm
    With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. But as you dream, what will you do with all your current devices? As you wonder where you’ll take your outdated smartphones, tablets, and desktops, either conduct a Google search for your nearest e-waste drop-off location or use a convenient app on your smartphone to find a location. But, whatever you do, take security precautions.
  • Don’t Forget Security When Developing Corporate Mobile Apps

    Allan Pratt
    9 Sep 2014 | 8:28 pm
    With the rise in mobile device usage, bring your own devices to work (BYOD), the Internet of Things (IoT), combined with the decline of personal computers, many corporate leaders believe that their businesses should develop a mobile application, or in tech lingo, an app. An Appcelerator survey of enterprise leaders released in January 2013 reported that 73% of enterprises built fewer than five applications, and 39% built none or just one. (1) (2) But does your business really need an app to be competitive, or do you simply want to be able to SAY you have one? Will an app fill a critical hole…
  • Privacy, Security and Voice Search: Does Your Company Know What It’s Getting Into?

    Allan Pratt
    22 Aug 2014 | 7:09 pm
    These days, everyone is using the voice search function across all platforms on all devices. Look no further than an iPhone to an Android phone to the Windows tablet, and you’ll see most people speaking questions instead of typing them. Without a doubt, it’s much easier to speak a request or question rather than typing it on a small keyboard. But do you know the reason that your device gets more accurate? The reason is because all of your voice commands are stored on servers that are owned by Microsoft, Apple or Google. As you speak, those servers are accessed and an algorithm is used…
 
  • add this feed to my.Alltop

    Milton Security

  • Are written policies still important?

    Milton Security Group
    30 Oct 2014 | 10:06 am
    With BadUSB still a big concern out in the world, many are trying to figure out how to battle it.  Even we here at Milton are working to better protect against this threat.  Up until now, our USBInformer has been able to mitigate the threat as it rejects unknown devices before they are able to be used.  This is a great step one, and reduces the chance of someone randomly plugging in a BadUSB device.  But this is not 100% foolproof.  At this point we still need one more thing: Written procedures and policies for your IT group. Say you are using our USBInformer to protect your USB ports…
  • Apple Pay competitor, MCX, reports hacked customer emails

    Milton Security Group
    29 Oct 2014 | 10:56 am
    Potential Apple Pay competitor, Merchant Customer Exchange (MCX) announced today that some its customers’ email addresses have been hacked. MCX is a conglomerate of more than fifty businesses, including giants like Sears, Walmart, and Lowe’s, that have been working on a competing product to Apple’s Apple Pay. They have been beta-testing their flagship product, CurrentC, an app that would allow customers to pay in physical retail stores with their phones. How does that differ from Apple Pay? CurrentC is Operating System agnostic due to it not being NFC enabled, and can therefore be used…
  • Verizon uses Identifiers to Track All Customer Traffic

    Milton Security Group
    27 Oct 2014 | 2:01 pm
    What is the one thing that U.S. citizens have tried to make very clear to the NSA, search engine companies, and small children? We highly value our privacy. Popular cellular communications giant, Verizon Wireless could care less, we suppose. They’ve added a token to web requests going through their network that tracks users’ traffic, and they do it for the most obvious reason: Marketing. We’d love to claim that this was a recent addition, but the reality is that they’ve been collecting this information for more than two years. Precision Market Insights, a division of Verizon launched…
  • Microsoft Discloses Zero-Day Attacks Using PowerPoint

    Milton Security Group
    22 Oct 2014 | 9:28 am
    You may remember that Microsoft patched three zero-day vulnerabilities in the last Update Tuesday that were being exploited by hackers. It turns out they’ll be patching yet another. This time the zero-day vulnerability uses malicious PowerPoint documents. A security advisory from Microsoft warns that the newly discovered flaw, which resides in the operating system’s code, is present in all supported versions of Windows with the exception of Windows Server 2003. They also added that they’ve already seen some targeted attacks attempting to exploit the flaw. “The vulnerability could…
  • Staples Investigating Potential Breach

    Milton Security Group
    21 Oct 2014 | 9:24 am
    Staples, a popular office supply chain, announced Monday afternoon that it would join the hoards of companies that would be accepting Apple Pay. Unfortunately, they had to follow that up mere hours later with the announcement that they are investigating a potential data breach involving customer credit card data. Has Staples gone the way of Target, Home Depot, and Kmart? It certainly sounds that way. Security reporter, Brian Krebs, wrote that multiple banks had been reporting signs of credit card fraud, and that those signs were pointing to a Staples breach. According to Krebs, the customer…
  • add this feed to my.Alltop

    Cyberoam : Securing You

  • SQL Injection vulnerability in Drupal leaves 2.1% of all websites worldwide exposed!

    Cyberoam Threat Research Labs
    31 Oct 2014 | 7:01 am
    CTRL brings you the Vulnerability report for Drupal Core database.inc ‘expandArguments’ SQL Injection Drupal, a leading Content Management Platform, recently warned all its users about automated attacks that have begun compromising Drupal 7 websites which were not patched or updated to Drupal 7.32 within hours of the announcement of SA-CORE-2014-005 – Drupal core – SQL injection. They have also recommended users to proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC that is 7 hours after the…
  • Attackers love celebrities. This time its Emma Watson..!!

    Kalpesh Devmurari
    31 Oct 2014 | 5:38 am
    Last month the actress and ‘UN Women Goodwill’ Ambassador Emma Watson spoke at a special event for the new ‘HeForShe’ Campaign. Her speech on the need for gender equity, was an exceptional one. Suddenly there was in surge in her popularity. Having sensed the same, the cyber attackers ensured they capitalised on her popularity. Leaked videos and images of celebrities have always excited netizens and hence finding a target wasn’t so difficult for Cyber Criminals. Within just a matter of days the social media was abuzz with news and articles talking about the leaked photos and videos…
  • Vulnerability Alert: Remote Code Execution via Windows OLE Packager

    Cyberoam Threat Research Labs
    15 Oct 2014 | 11:55 pm
    A remote code execution vulnerability has been reported in Microsoft Windows OLE (Object Linking and Embedding) Packager. OLE allows embedding and linking to documents and other objects and is proprietary technology developed by Microsoft. The vulnerability is due to insufficient validation of certain files which can cause the OLE packager to download and execute arbitrary code. CVE ID: CVE-2014-4114 CVSS Scoring CVSS Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVSS Temporal Score: 5.8 (E:U/RL:U/RC:C) Affected Software Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 Microsoft Windows…
  • Vulnerability Alert: SSL v3.0 Making Browsers Prone to Hacking

    Cyberoam Threat Research Labs
    15 Oct 2014 | 6:25 am
    Threat Description A major security flaw has been discovered in what is now recognised as an outdated Web Encryption Standard – SSL v3.0. Though, the protocol has been replaced by its succeeding TLS implementations, the backward compatibility feature still makes them vulnerable to the flaws of SSL v3.0. Google has termed the vulnerability in this 15 year old protocol as POODLE (Padding Oracle On Downgraded Legacy Encryption). This flaw can make encrypted data visible to a hacker with access to the network. POODLE has been identified as a major issue as it affects both websites as well as…
  • LimitLess KeyLogger – New Malware

    Anurag Singh
    15 Oct 2014 | 2:33 am
    A new malware was discovered by a Greek Researcher on the 20th last month, which uses a combination of AutoIT software programs[1] and a commercial keyboard logger called ‘Limitless Keylogger’. As soon as the malware infects a victim host, the keylogger records every input typed from the keyboard and sends it to a specified email address of the attacker. It can include email addresses, passwords, and confidential documents. It can lead to financial fraud, identity theft and data breach etc. This malicious software depends on AutoIT to stay undetected from end point AV. For the…
Log in