Network Security

  • Most Topular Stories

  • Don’t Forget Security When It Comes to E-Waste

    Tips4Tech Blog
    Allan Pratt
    24 Sep 2014 | 7:43 pm
    With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. But as you dream, what will you do with all your current devices? As you wonder where you’ll take your outdated smartphones, tablets, and desktops, either conduct a Google search for your nearest e-waste drop-off location or use a convenient app on your smartphone to find a location. But, whatever you do, take security precautions.
  • Malware Exploits Network Security Weaknesses

    Seculert Blog on Advanced Threats and Cyber Security
    Liora R. Herman
    22 Sep 2014 | 5:00 am
    In its newly-released 2014 Midyear Security Report, Cisco is warning enterprises that, while they still need to focus on plugging high-profile vulnerabilities in their network defense system, they can’t afford to ignore more mundane weak links such as outdated software, flawed code, user errors, or abandoned digital properties – because doing so plays right into […] The post Malware Exploits Network Security Weaknesses appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Is an Ethical Hacking Certification Worth Earning?

    Dice News » Security
    Myra Thomas
    25 Sep 2014 | 9:53 am
    It seems like every other month that a major corporation suffers an epic hack, with millions of customers’ data stolen. In the aftermath of those attacks, many companies are turning to ethical or “white hat” hackers to test their defenses. But is ethical hacking an effective counter to unethical hacking, especially when those who practice the latter can do pretty much whatever they want with a wide variety of tools? Ethical hacking’s cause isn’t helped by the fact that the EC-Council, the Albuquerque, New Mexico-based organization that offers a certification in ethical hacking, was…
  • Tor warns its users about ‘relay early’ attack and says that they may have been unmasked

    Spyware news
    31 Jul 2014 | 6:57 am
    Tor has always been loved by those who seek to hide their location, protect information about their browsing habits and fight for their anonymity. However, if you have been using this program from February 2014 to July 4, you should be concerned because it has been announced that Tor software was probably deanonymizing its users during […]
  • Black Hat Trainings

    Dark Reading:
    30 Sep 2014 | 1:00 pm
    https://www.blackhat.com/tr-14/
  • add this feed to my.Alltop

    Network Security Blog

  • “All we need to do is …. redo everything”

    netsecpodcast@mckeay.net (Martin McKeay)
    25 Sep 2014 | 11:04 pm
    I love listening to idealists.  In fact, I’d be one if it wasn’t for the crushing despair and cynicism that working in the security profession has instilled in me.  Or maybe I work in this field because the crushing despair and cynicism already existed.  In either case, I’ve lost the ability to even think “we could just fix all of our security problems if we just …”.  And when I see others saying the same thing, I have to shake my head in amusement at their naivete.  But it really makes me wonder when I see someone who’s been in security even…
  • Limiting online time

    netsecpodcast@mckeay.net (Martin McKeay)
    14 Sep 2014 | 10:55 pm
    I limit online time.  Not for me, for my children.  Apparently I’m among a fairly prestigious group of people who do so, since many of the C-level execs in Silicon Valley also limit their children’s time with tech.  Though it looks like many of them are even stricter than I am about how much time the children get to interact with their computers. We’ve always limited the amount of time our children can spend on the computer.  We found from an early age, they’d spend every waking moment playing games and surfing the internet if they could.  I wonder who…
  • Buffer between Target and banks

    netsecpodcast@mckeay.net (Martin McKeay)
    8 Sep 2014 | 11:10 pm
    We all know that Target got compromised last year, but what some of you might not know is that the banks who issued the credit cards that were compromised are suing Target.  They’re saying that because Target didn’t take sufficient measures to protect the card data the banks had to spend millions of dollars in order to re-issue every one of the cards that were compromised.  It makes sense on the surface, since the banks incurred the cost due to the insecurity of Target’s systems.  But here’s the rub: there’s no direct relationship between the issuing banks and…
  • Is pay rising with demand in security?

    netsecpodcast@mckeay.net (Martin McKeay)
    7 Sep 2014 | 11:23 pm
    If you follow me on twitter, you know I like to throw out questions occasionally just to stir things up.  On Friday I asked the following question about jobs in the security realm: We keep hearing about how desperate companies are to hire infosec professionals. So how come we still see so many low ball salary offers? This hit a nerve with quite a few people, many of who mentioned that besides having low salaries for the apparent demand, we also see low stature in the company and that while there’s a demand, companies still don’t see how paying a security professional leads to…
  • Congratulations, Rich

    netsecpodcast@mckeay.net (Martin McKeay)
    4 Sep 2014 | 10:53 pm
    Wow, it’s been seven years since Rich Mogull left Gartner and started Securosis.  I met him shortly before he took the leap, introduced by a mutual friend, Richard Stiennon.  I worked with Rich and a host of others to organize the first Security Bloggers Meetup at RSA, which is still going, and when I heard he was leaving Gartner, I invited him to participate in the Network Security Podcast with me, a partnership that lasted over six years.  He’s  a good person, a good friend, and someone I truly feel lucky to have met in the security community. It’s interesting to see…
 
 
 
  • add this feed to my.Alltop

    Feed: Blogs

  • Three Steps The Home Depot Could Have Taken to Prevent Data Breach Devastation

    George Chetcuti
    1 Oct 2014 | 6:45 am
    Netwrix outlines top ways change and configuration auditing could have saved the Home Depot four months of costly breach activity.
  • Microsoft will provide critical updates for XP after April 2014 deadline - for Premier customers only

    Debra Shinder
    30 Sep 2014 | 5:48 am
    If your company is still running Windows XP systems, you probably know that next April marks the official end of extended support. But you might still be able to get critical security updates, if you're a Premier customer who purchases Custom Support.
  • Is Your Company Neglecting Application Security?

    Debra Shinder
    30 Sep 2014 | 12:37 am
    If so, the consolation prize is that you're not alone. According to a recent study by the Poneman Institute, there's a big disconnection between what managers believe about the state of their application security and what the tech people in the trenches know to be true.
  • How to Talk to the CEO about Security

    Debra Shinder
    30 Sep 2014 | 12:37 am
    So you have the opportunity to discuss security with top management . Whether it's a specific issue that has come to the chief executive's attention through the media or other channels, or a more generalized invitation to talk about the company's IT security strategy, this is your chance. Don't blow it.
  • "Spike" toolkit is behind big DDoS attacks

    Debra Shinder
    26 Sep 2014 | 5:45 am
    Distributed Denial of Service attacks throughout the summer have been linked by security researchers to a new toolkit that targets multiple platforms
 
  • add this feed to my.Alltop

    TaoSecurity

  • We Need More Than Penetration Testing

    16 Sep 2014 | 9:47 am
    Last week I read an article titled  People too trusting when it comes to their cybersecurity, experts say by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post:[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes. When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete…
  • A Brief History of Network Security Monitoring

    16 Sep 2014 | 9:07 am
    Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the network security monitoring (NSM) community.Doug asked me to present the history of NSM. To convey some of the milestones in the development of this operational methodology, I developed these slides (pdf). They are all images, screen captures, and the like, but I promised to post them. For example, the image at left is the first slide from a…
  • Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

    4 Sep 2014 | 8:41 am
    I'm pleased to announce that I will be teaching one class at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is Network Security Monitoring 101. I taught this class in Las Vegas in July 2013 and 2014, and Seattle in December 2013. I posted Feedback from Network Security Monitoring 101 Classes last year as a sample of the student commentary I received.This class is the perfect jumpstart for anyone who wants to begin a network security monitoring program at their organization. You may enter with no NSM knowledge, but when you leave…
  • Air Force Leaders Should Read This Book

    21 Aug 2014 | 6:56 pm
    I just finished reading The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. Builder makes many interesting points in the book, but in this brief post I'd like to emphasize one of his concluding points: the importance of a mission statement.Builder offers the following when critiquing the Air Force's mission statement, or lack thereof, around the time of his study:[Previous] Air Force of Staff, General John P. McConnell,…
  • On the Twenty Years Since My USAFA Graduation

    1 Jun 2014 | 4:00 pm
    Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy, commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that number is roughly the same today. Reaching the 20 year mark entitles my classmates still in uniform to retire with lifetime benefits, should they choose to do so. I expect some will, but based on patterns from earlier classes I do not expect a massive exodus. The economy is still in rough shape, and transitioning from the military to the private…
  • add this feed to my.Alltop

    Spyware news

  • What should I know about Shellshock?

    1 Oct 2014 | 5:56 am
    Everyone is now talking about Shellshock. What is that and what can you do about it? Here’s what you should remember: Shellshock is a software bug, which affects the Bash – the common command-line shell that is actively used in Linux/UNIX OS and Apple Mac OS X for controlling different programs and their features. It […]
  • Hackers relaunch multi-name rogues to steal people’s money!

    8 Sep 2014 | 11:52 pm
    Just imagine: you start your computer one day and see a window showing how Win 7 Antivirus 2014 scans your PC system. After performing it, this program informs you about a long list of viruses, including trojans, adware and other threats. Naturally, it offers you to remove these threats from your computer in exchange for […]
  • Good news from Google Chrome! We will be warned about deceptive downloads!

    22 Aug 2014 | 6:02 am
    Annoyed by adwares, browser hijackers and similar potentially unwanted programs? It seems that soon we will be capable of getting more power against infiltration of these programs. Of course, under one condition – we will have to choose Google Chrome web browser for doing our browsing on the Internet. We say so because of the […]
  • Got an email from Bank of America? It might be infected with Cryptowall virus!

    6 Aug 2014 | 5:25 am
    If you are interested in viruses, you must have heard about Cryptowall virus. This is a serious ransomware that has ability to encrypt specific files and then display a warning message asking people to pay a ransom for their decryption. At the moment of writing, this virus has ability to affect only those computers that […]
  • Tor warns its users about ‘relay early’ attack and says that they may have been unmasked

    31 Jul 2014 | 6:57 am
    Tor has always been loved by those who seek to hide their location, protect information about their browsing habits and fight for their anonymity. However, if you have been using this program from February 2014 to July 4, you should be concerned because it has been announced that Tor software was probably deanonymizing its users during […]
  • add this feed to my.Alltop

    Schneier on Security

  • Security Theater in China

    schneier
    1 Oct 2014 | 5:19 am
    The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear.
  • NSA Patents Available for License

    schneier
    29 Sep 2014 | 4:02 am
    There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings in the article, but I didn't find anything interesting in the catalog. Does anyone see something I missed? My guess is that the good stuff remains classified, and isn't "transferred" to anyone. Slashdot thread.
  • Friday Squid Blogging: Squid Fishing Moves North in California

    schneier
    26 Sep 2014 | 2:28 pm
    Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
  • Medical Records Theft and Fraud

    schneier
    26 Sep 2014 | 10:44 am
    There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals are looking for new ways to monetize stolen data.
  • Security Trade-offs of Cloud Backup

    schneier
    25 Sep 2014 | 12:17 pm
    This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This is, like almost everything in tech, a trade-off: Your data is far safer from irretrievable loss if it is synced/backed up, regularly, to a cloud-based service. Your data is more at risk of being stolen if it is synced/backed up, regularly, to a cloud-based service. Ideally, the companies that provide such services minimize the risk of your account being hijacked while maximizing the simplicity and ease of setting it up and using it.
 
  • add this feed to my.Alltop

    Infosec Events

  • Week 38 In Review – 2014

    md
    22 Sep 2014 | 8:02 am
    Events Related A first-timers view of the “Hacker Summer Camp” – blog.c22.cc The big “Hacker Summer Camp” took place in Las Vegas this August. This get-together describes the occasion of Black Hat, for the Business sponsored InfoSec employee, BSides Las Vegas, for the techies, and DEF CON, which apparently became object of both type of folks already years ago, and many more little side conventions. DEFCON 23 hotel block rate link is LIVE! – defcon.org The DEF CON rate is available at the following hotels: Paris, Bally’s, Ceasars Palace, Planet Hollywood, Flamingo…
  • Week 37 In Review – 2014

    md
    15 Sep 2014 | 4:46 pm
    Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the items that he wrote down. Inside the Super Bowl of lying – dailydot.com This is the 2014 Def Con hacker conference at the Rio Casino in Las Vegas. The people are in one of the tiniest rooms in the casino to see the Super Bowl of lying. Here is the wrap up of the event by…
  • Week 36 In Review – 2014

    md
    8 Sep 2014 | 6:56 am
    Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it’s usually always on and available. When he read that somebody had beat him to the punch he decided to start writing a powershell implementation. Alberto’s GSoC 2014 Project for ZAP: SOAP Scanner…
  • Week 35 In Review – 2014

    md
    1 Sep 2014 | 12:32 pm
    Resources InfowarCon TV – infowarcon.com Here are some of the amazing talks given in January. InfowarCon TV highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today. Shakacon LLC – www.youtube.com Shakacon, an Information Technology (IT) Security Conference. Here are some of the talks at the conference. You can watch and download the videos. Announcing Scumblr and Sketchy – Search, Screenshot, and Reclaim the Internet – techblog.netflix.com Netflix is pleased to announce the open source…
  • Information Security Events For September

    sheila
    1 Sep 2014 | 4:42 am
    Here are information security events in North America this month:   Day-Con 7 : September 3 to 9 in OH, USA   BSides Cape Breton 2014 : September 5 in Sydney, NS, Canada   BSides Ottawa 2014 : September 5 to 6 in Ottawa, ON, Canada   HP Protect 2014 : September 8 to 11 in Washington, DC,USA   BSides Los Angeles 2014 : September 11 to 12 in Los Angeles, CA, USA   BSides Augusta 2014 : September 13 in GA, USA   BSides Memphis 2014 : September 13 in TN, USA   New Security Paradigms Workshop (NSPW 2014) : September 15 to 18 in Victoria, BC, Canada  …
  • add this feed to my.Alltop

    Dr Anton Chuvakin Blog PERSONAL Blog

  • Monthly Blog Round-Up – September 2014

    1 Oct 2014 | 8:20 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. “Top 10…
  • Monthly Blog Round-Up – August 2014

    2 Sep 2014 | 10:46 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. My classic PCI…
  • Monthly Blog Round-Up – July 2014

    1 Aug 2014 | 8:10 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. My classic PCI…
  • Monthly Blog Round-Up – June 2014

    1 Jul 2014 | 8:15 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge.  Current emergence of open sources log search tools, BTW, does not break the logic of that post. “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth…
  • Monthly Blog Round-Up – May 2014

    2 Jun 2014 | 9:45 am
    Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people. “On Free Log Management Tools” is a companion to the checklist (updated version) “New SIEM Whitepaper on Use Cases In-Depth OUT!” (dated 2010) presents a whitepaper on select SIEM use cases described in depth with rules and reports [using now-defunct SIEM product]; also see this SIEM use case in depth and this for a more current list. “Why No Open…
  • add this feed to my.Alltop

    Latest articles from SC Magazine

  • The great communicator: Government policy

    SC Magazine
    1 Oct 2014 | 3:00 am
    It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.
  • ForeScout CounterACT

    SC Magazine
    1 Oct 2014 | 3:00 am
    The ForeScout CounterACT is a policy-based network access control product that allows for inventory, classification and regulation of endpoints and network devices.
  • Avatier Identity Management Suite

    SC Magazine
    1 Oct 2014 | 3:00 am
    Besides automating user creation, the Avatier suite of products offers seamless integration with HR software, enables IT departments to set up a web portal for users to reset their passwords, and it can also create workflows so that high-level IT personnel aren’t bogged down with lower-level requests.
  • PFU Systems iNetSec Smart Finder

    SC Magazine
    1 Oct 2014 | 3:00 am
    The iNetSec Smart Finder from PFU systems is an excellent network access control system for organizations of any size.
  • SUPERVALU and AB Acquisition LLC report being breached again

    SC Magazine
    30 Sep 2014 | 2:06 pm
    The breaches involved different malware and both companies are investigating whether payment card information was stolen.
 
  • add this feed to my.Alltop

    Security Blog

  • Wade Baker on C-SPAN Discussing Security Breaches

    Bob.Rudis
    26 Sep 2014 | 12:09 pm
    Wade was recently on C-SPAN talking about the scale and types of data breaches that have been occurring and discussing recommended ways to reduce the hacking attempts. He spoke about data breaches at Home Depot, Target, and J.P. Morgan Chase, as well as who was attacking the institutions and how they were doing it. Catch the recorded segment on C-SPAN and follow Wade’s C-SPAN Channel to catch future segments.
  • Weekly Intelligence Summary Lead Paragraph: 2014-09-26

    dkennedy
    26 Sep 2014 | 12:08 pm
    “Do not take counsel of your fears” – T.J. (Stonewall) Jackson.  With very rare exceptions such as the Morris (1988) and Slammer (2003) worms, the number of times the expression “Now!” is used in InfoSec is seldom proportional to the actual risk that information protectors face.  The VCIC assesses “Shellshock” is not going to join the exception list.  Still, we have been tracking threat activity since a few hours after the announcement. It is doubtlessly a risk that must be mitigated quickly.  It is similar to Heartbleed in that it’s serious and widely prevalent. Prior to…
  • Weekly Intelligence Summary Lead Paragraph: 2014-09-19

    ssimpson
    22 Sep 2014 | 8:12 am
    The bulk of the VCIC’s intelligence collections this week were updates surrounding some of 2014’s most noteworthy data breaches. JP Morgan Chase released a terse statement saying that it hasn’t observed any fraud connected to its data breach and that customers wouldn’t be liable if it did. Elsewhere, sources claiming to be close to the JPMC investigation continued to provide The New York Times with details about the breach. Home Depot issued a press release confirming its breach ran from April to September and about 56 million payment cards were “at risk.”  Sources close to the…
  • Weekly Intelligence Summary Lead Paragraph: 2014-09-05

    ssimpson
    5 Sep 2014 | 11:33 am
    Bad news from the retail sector yet again: Brian Krebs reported Home Depot may have suffered a breach of payment card data that may have originated from nearly all of its stores across the United States. The company says it’s investigating unusual activity but hasn’t yet confirmed a breach. That being said, Krebs’ track record is pretty good when it comes to announcing data breaches. The leak of celebrity photos this week, presumably from Apple’s iCloud, opened up the company’s cloud security to increased scrutiny from security researchers. While the attacks were limited to…
  • Regardless of the length or complexity, passwords can’t do it alone.

    Marc Spitler
    2 Sep 2014 | 10:39 am
    It is amazing to reminisce about my childhood and the lack of risk reduction applied to me as a potential victim of inertia while riding in a car. My typical seating arrangement was lowering the armrest between the two back seats of the Oldsmobile Delta 88 and sitting on top of it, providing an outstanding view. I am sure that many of you have similar memories, perhaps sitting in your parent’s lap (as they drove) or running around in the back without a care in the world. If we saw that type of behavior in 2014, we would have similar reactions to if we were witnessing the King of…
  • add this feed to my.Alltop

    Optimal Security

  • Shellshock Exploit Demo, and More

    Chris Merritt
    1 Oct 2014 | 6:31 am
    In my  previous post we discussed Shellshock, theGNU Bourne Again Shell(Bash) vulnerability which was made public last week. News continues to pour in as the researchers and vendors (and probably a few blackhats) try to understand the true scope of the problem. So today we’ll discuss a few updates to the situation since we published the other day. Exploiting the Bash Shellshock Vulnerability First, I want to share with you a video done by my colleague Dan Teal — in it, he demonstrates how to exploit the Bash Shellshock vulnerability, giving him full remote access to a vulnerable…
  • Some Common Sense Steps to Avoid Shellshock!

    Chris Merritt
    29 Sep 2014 | 2:39 pm
    “Something broke” That’s what the IT folks at a major aerospace engineering firm told my friend DS when he couldn’t log onto their intranet last week. That something shut down their entire system for an entire day. What was that something? It was Shellshock, the GNU Bourne Again Shell (Bash) vulnerability which came to light last week, based on research by Stéphane Chazelas. Based on my news feed since Wednesday afternoon, we probably don’t have to go into all the gory details here – if you’re so inclined, I would recommend reading Troy Hunt’s synopsis – so…
  • Infosec Haiku

    Chris Merritt
    27 Sep 2014 | 4:09 pm
    Anata no joho sekyuritei konshu no haiku Shellshock Vuln in Bash Gonna Bring Down All the Nets? Please Scan and Patch Now!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Infosec Haiku

    Chris Merritt
    22 Sep 2014 | 6:51 am
    Anata no joho sekyuritei konshu no haiku Home Depot Data Theft Caused by “Custom” Malware. AV Not Enough!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll send you a $20 Starbux card. Please DM me at infosec-haiku@lumension.com. Contest Rules: all rulings by the judge (me) are final, blah blah blah.
  • Critical Updates for Adobe Reader and Acrobat Released – You Can Breathe Again

    Graham Cluley
    18 Sep 2014 | 9:28 am
    You can stop holding your breath now, the wait is over. Adobe has released security updates for Acrobat and its PDF Reader software fixing critical vulnerabilities in its Windows and Mac software. Last week, on Patch Tuesday, Adobe explained that although it was releasing security patches for Flash Player and AIR, it was delaying its scheduled security updates for Reader and Acrobat, because of issues that had sprung up during testing. To be honest, it was hard not to feel grateful. After all, the last thing you want is for a vendor to push out a security update that causes conflicts and…
 
  • add this feed to my.Alltop

    Naked Security - Sophos

  • Head of 'StealthGenie' mobile stalking app indicted for selling spyware

    Lisa Vaas
    1 Oct 2014 | 8:02 am
    The indictment alleges that StealthGenie can and has recorded all incoming/outgoing voice calls; intercepted calls to be monitored in real time; allowed the buyer to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius; and allowed the buyer to monitor a target's incoming and outgoing e-mail messages and SMS messages, incoming voicemail messages, address book, calendar, photographs, and videos—all without the knowledge of the phone's user.
  • 3 more essential security tasks you can do for your family today

    Mark Stockley
    1 Oct 2014 | 4:55 am
    Fetch your cape, family tech support hero, you've got work to do! Update it, lock it, encrypt it, and keep your nearest and dearest cybersecure.
  • How to pick a proper password [VIDEO]

    Paul Ducklin
    1 Oct 2014 | 4:40 am
    Here's a short and straight-talking video that not only shows you how to pick a proper password, but also explains why you should bother...
  • 'Anti-Facebook' Ello: swamped with privacy-hungry refugees, bouncing back from DDoS

    Lisa Vaas
    1 Oct 2014 | 4:06 am
    Either somebody really, really hates the idea of a social media platform that doesn't sell ads based on user data, or Ello is so popular it got trampled. Either way, it's been an outage-plagued few days for the service that thinks ad-based social networks are corrupt.
  • Snapchat says fat spam is not its fault

    Lee Munson
    1 Oct 2014 | 3:09 am
    Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them - their suggestion that you pop a weight loss pill is probably the result of having their account hacked.
  • add this feed to my.Alltop

    Naked Security - Sophos

  • Head of 'StealthGenie' mobile stalking app indicted for selling spyware

    Lisa Vaas
    1 Oct 2014 | 8:02 am
    The indictment alleges that StealthGenie can and has recorded all incoming/outgoing voice calls; intercepted calls to be monitored in real time; allowed the buyer to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius; and allowed the buyer to monitor a target's incoming and outgoing e-mail messages and SMS messages, incoming voicemail messages, address book, calendar, photographs, and videos—all without the knowledge of the phone's user.
  • 3 more essential security tasks you can do for your family today

    Mark Stockley
    1 Oct 2014 | 4:55 am
    Fetch your cape, family tech support hero, you've got work to do! Update it, lock it, encrypt it, and keep your nearest and dearest cybersecure.
  • How to pick a proper password [VIDEO]

    Paul Ducklin
    1 Oct 2014 | 4:40 am
    Here's a short and straight-talking video that not only shows you how to pick a proper password, but also explains why you should bother...
  • 'Anti-Facebook' Ello: swamped with privacy-hungry refugees, bouncing back from DDoS

    Lisa Vaas
    1 Oct 2014 | 4:06 am
    Either somebody really, really hates the idea of a social media platform that doesn't sell ads based on user data, or Ello is so popular it got trampled. Either way, it's been an outage-plagued few days for the service that thinks ad-based social networks are corrupt.
  • Snapchat says fat spam is not its fault

    Lee Munson
    1 Oct 2014 | 3:09 am
    Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them - their suggestion that you pop a weight loss pill is probably the result of having their account hacked.
  • add this feed to my.Alltop

    TRUSTe Blog

  • Top 5 Qualities in a Great CPO

    lgradman
    29 Sep 2014 | 7:00 am
    By Alexandra Ross, The Privacy Guru (@sharemindfully) Guest Blog Whenever a new position emerges at the C-suite level, you can be certain substantial debate about exactly what the role encompasses and which skills are crucial for meeting an organization’s needs will follow. It’s understandable, as a new executive role is often a response to massive … Continue reading »
  • TRUSTe Appoints Privacy Pro Josh Harris as New Director of Policy

    lgradman
    25 Sep 2014 | 3:30 am
    TRUSTe today announced that privacy specialist Josh Harris has joined the team as the new Director of Policy. Josh has an extensive background in the privacy field with experience as a former Department of Commerce staffer and Future of Privacy Forum Policy Director. Josh will be responsible for driving programs that protect consumer privacy and … Continue reading »
  • TRUSTe Launches Data Privacy Management Platform to Help Manage Complex Privacy Initiatives

    lgradman
    18 Sep 2014 | 8:00 am
    With the explosion of big data, companies know that successful data collection is crucial to the success of their business.  If collected and analyzed properly, the use of big data can help companies outperform the competition by leveraging new data-driven strategies, uncovering new trends and benefits. However, the use of this data also brings significant … Continue reading »
  • Apple & Box Show Commitment to Cross-Border Data Privacy through APEC Certification

    lgradman
    17 Sep 2014 | 2:18 pm
    As Apple released the latest update to their privacy policy today, it included the new TRUSTe APEC Privacy Seal certifying that Apple abides by the Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules System. Apple joins Box as the latest in a growing list of companies who are choosing APEC Certification to demonstrate their commitment … Continue reading »
  • EU Cookie Inspections – Are You Ready?

    lgradman
    10 Sep 2014 | 8:00 am
    Many companies have been focused on preparing for the EU Cookie Inspections ever since the “Cookie Sweep” day was announced to determine compliance with cookie regulations across the EU on September 15-19 of this year. Given the recent fines due to violations in Spain and the Netherlands over the last few months, companies have been … Continue reading »
 
  • add this feed to my.Alltop

    iViZ Blog

  • Shellshock Bug: A Quick Primer

    Nilanjan De
    30 Sep 2014 | 5:27 am
    What is ShellShock Bug?  Shellshock is a security vulnerability(CVE-2014-6271) in the widely used Unix Bash Shell which was discovered by Stéphane Chazelas on 12 September 2014 and disclosed on 24 September 2014. Subsequently, various researchers have discovered multiple other vulnerabilities in bash. What is the Vulnerability? The Unix Bash Shell stores exported function definitions in environment variables. When a new instance of bash is launched, it reads these specially crafted environment variables, and interprets them as function definitions. Unfortunately, due to insufficient…
  • Anatomy of Heartbleed Bug

    Nilanjan De
    30 Apr 2014 | 5:46 am
    There has been a lot of buzz about Heartbleed[1] in the news recently. In this blog post, we have tried to put together the important things that one should know about Heartbleed. What is Heartbleed? Heartbleed is the popular name given to the recently found vulnerability(CVE-2014-0160) inOpenSSL - an open-source encryption library. More specifically, this is a bug in the OpenSSL Heartbeat protocol which results in a vulnerable server to leak or bleed confidential content in its memory space (and hence the name ‘Heartbleed’).  What’s Heartbleed bug? OpenSSL is the most popular…
  • Penetration Testing E-commerce Applications

    jitendra.chauhan
    25 Apr 2014 | 3:46 am
    Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Why a conventional application penetration testing is not enough for E-commerce Applications? E-Commerce applications are growing in complexity, as a result conventional application penetration is simply not enough. Conventional application…
  • How effective is your SIEM Implementation?

    jitendra.chauhan
    16 Apr 2014 | 4:10 am
    During the last few penetration testing conducted for certain organizations, we have discovered a surprising fact that almost all the SIEM implementation had gaps on the implementation levels. For example, in certain cases, SIEM did not even detect at all when the internal network was conducted with rigorous penetration testing. I am not saying that all the SIEM implements are as bad as stated; however, it is mandatory to find out if your SIEM implementation is actually as effective as you perceive it. (Read More:  Is STORM Better Than HADOOP For Real Time Security Big Data Analytics?) How…
  • 10 questions to ask before you start your Bug Bounty program…

    Bikash Barai
    11 Apr 2014 | 12:49 am
    Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However an organization should be mature and prepared enough to launch such a program. Here are some questions which shall tell you if you are prepared or not. You are ready only if all the answers to the questions are “Yes”. You are ready if you can... The post 10 questions…
  • add this feed to my.Alltop

    SecurityWeek RSS Feed

  • Research Examines Twitter Abuse by Attackers

    Brian Prince
    1 Oct 2014 | 9:03 am
    Twitter is a popular way for millions of people to connect online. It is also a popular way for attackers to spread malicious content. In a new paper, researchers at Trend Micro revealed the results of analyzing more than a half a billion tweets. The company found that millions of the messages linked to material ranging from phishing pages to malware. read more
  • Intel Lures Cisco Executive Chris Young to Head Security Business

    Mike Lennon
    1 Oct 2014 | 1:01 am
    Intel announced on Tuesday that it has hired Christopher Young as the company’s newest senior vice president and general manager of Intel Security. Young will report to Intel President Renée James and lead Intel's security business, including McAfee and Intel's other security assets, which generate revenue topping $3 billion. read more
  • Mobile Identity for the Enterprise: Pitfalls and Opportunities

    Travis Greene
    1 Oct 2014 | 12:39 am
    What is it about the human spirit that makes us fascinated with mobility? We don’t sit still very much anymore. We travel across the globe for an important meeting, even though the technology exists to telecommute. We vacation far from home to “get away from it all.” read more
  • DDoS Attacks Decline in Q2: Akamai

    Brian Prince
    30 Sep 2014 | 6:57 pm
    There may have been a decline in distributed denial-of-service attacks during the second quarter of 2014, but the private sector saw very little respite, according to a new report from Akamai Technologies. read more
  • Hackers Arrested for Cracking US Army Network

    AFP
    30 Sep 2014 | 11:23 am
    Hackers Charged in Software Theft from U.S. Army, Others - [UPDATE] SAN FRANCISCO - Four members of an international hacking ring were charged with cracking the networks of the US Army and developers of blockbuster war video games to steal software, prosecutors said Tuesday. read more
  • add this feed to my.Alltop

    Free IT - Security Magazines and Downloads from alltop.tradepub.com

  • Worse Than Heartbleed? Meet ShellShock: A New Security Threat For OS X and Linux

    30 Sep 2014 | 12:00 am
    A serious security issue with the Bash shell – a major component of both most UNIX-like operating systems – has been discovered, with significant implications for computer security worldwide. The issue is present in all versions of the Bash scripting language up to version 4.3, which affects a majority of Linux machines, and the entirety of computers running OS X. Curious about how it works and how to protect yourself? Read on for more information.Request Free!
  • The Password Management Guide

    29 Sep 2014 | 1:20 pm
    We are all overwhelmed by passwords. Everyone has an account for Google, Facebook, Twitter, LinkedIn, Outlook/Hotmail, Dropbox...the list goes on.  Unfortunately, most of us use either one password or a group of passwords for all of our major accounts. That’s dangerous. It doesn’t matter if the individual password is unique, or if it’s a long mix of numbers and letters; if you only use one password it won’t matter. When one account is compromised, all of your accounts will likely follow. The main reason people reuse passwords is that keeping track of many…
  • Store You Shop At Get Hacked? Here's What To Do

    29 Sep 2014 | 12:00 am
    Everyone seems to agree that companies should do more to protect the people who’ve entrusted them with valuable data, but the trend of high-profile hacks seems likely to continue in the near future. For now, consumers can do little but prepare and respond as threats occur. Here’s how you can protect yourself.Request Free!
  • The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook

    26 Sep 2014 | 2:20 pm
    The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.The following kit contents will help you get the most out of your Information Security research:PC Security Handbook - 2nd EditionThe Future of Backup as a Data Protection StrategyAdapting Security to the CloudDetecting Heartbleed With RSA Security AnalyticsRequest Free!
  • The Essentials of IT Security - Free Kit

    26 Sep 2014 | 2:20 pm
    The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.The following kit contents will help you get the most out of your IT Security research:The Future of Backup as a Data Protection StrategyAdapting Security to the CloudDetecting Heartbleed With RSA Security AnalyticsHow To Replace FTP and Increase File Transfer Efficiency by 98% With Biscom Secure File Transfer -- A Customer Success StoryRequest Free!
 
  • add this feed to my.Alltop

    IT-Security

  • Will this Band-Aid help?

    Branden Williams
    4 Sep 2014 | 8:01 am
    You know when you get a paper cut in the webbing of your fingers? How many of you just shuddered at the thought of such a minor, but memorable malady? Now, think about one of the times that you got in there really deep and had to find a band-aid. Those normal ones just don’t work! You need a special band-aid with the butterfly flaps on it. Then you can get on with your day without spreading more of your DNA on everything you touch. Insalt to Injury, by Uri Baruchin With all these POS breaches (like Home Depot this week), we need to address a paper cut. The paper cut here is the POS…
  • August 2014 Roundup

    Branden Williams
    3 Sep 2014 | 8:30 am
    Stay Classy, San Diego! We wrapped up the survival tips for young (and sometimes experienced) professionals series and got back to information security! While you are all still very interested in getting great customer service, my posts on the effectiveness of PCI DSS also made the rounds this time around. I hope this sets us up for a great discussion in a couple of weeks at the PCI Community Meeting in Orlando! Here’s what you folks liked the most last month: The Only Customer Service Script You Will Ever Need. The economy is humming along quite nicely. How do we know? Because people…
  • Guest Post: PCI Compliance Fees, Fines, and Penalties – What Happens After a Breach

    Branden Williams
    2 Sep 2014 | 7:45 am
    The following is a guest post by Mark Burnette. You can reach him directly here.   Transforming Nature Exhibition, by Val Kerry The PCI Data Security Standards are a set of rules designed by the credit card brands to enforce card data security. Though these are industry rules rather than laws, they can result in stiff fines and penalties for businesses, and even cost a business the ability to process credit cards. What’s more, these rules impact every business that collects, processes, or transmits card data – from mom and pop shops to retail titans. So what exactly happens…
  • So, uh, is PCI DSS effective?

    Branden Williams
    28 Aug 2014 | 7:22 am
    After the last post, I thought I’d describe some of the challenges with measuring the effectiveness of PCI DSS. Some camps argue it is absolutely effective because there has not been a compromise to date of an entity that was fully compliant with PCI DSS at the time of their breach. Others suggest extremely low compliance rates in certain groups of merchants indicate it’s not effective in helping the little guy. A few pick up headlines and just scream that it’s broken. An industry colleague of mine, Steve Levinson, is famous for a number of sayings. One he uses when faced…
  • Is PCI DSS Effective?

    Branden Williams
    26 Aug 2014 | 7:50 am
    Another week, another breach. SuperValu is the latest entity to suffer a breach involving credit cards, and I saw a tweet over the weekend that inspired this post. It was along the lines of “I’d hate to be the guy who has to explain how PCI DSS is effective against breaches.” While there is some humor in the tweet, there is more than just the standard in play here. Laugh as the Sun comes, Arnett Gill PCI DSS by itself is a good baseline for handling cardholder data. I’ve written articles, blogs, books, and given talks on the merits of PCI DSS1. PCI DSS also has flaws,…
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Penetration Testing: 5 Common Myths Explained

    Jennia Hizver
    22 Sep 2014 | 6:45 am
    Over the years of my career as a penetration tester, I have encountered many myths and misconceptions regarding penetration testing, some of which I’d like to share with you: Myth #1: Vulnerability scanning can identify all vulnerabilities in an organization’s environment, and hence, penetration tests are unnecessary. The vulnerability assessment is the process of identifying weaknesses in an IT environment by means of automated vulnerability scanners. Automated scanners are pre-loaded with “signatures” to detect known vulnerabilities. While known issues reported by vulnerability…
  • Protecting Big Data

    Paula Waldron
    22 Sep 2014 | 3:45 am
    When you’re embarking on any new business activity, it’s always more comfortable if you can leverage the knowledge of those who have successfully navigated the journey before you. That’s what best practices are all about. This approach can be especially true when it comes to big data security. While accessing, aggregating, and analyzing massive amounts of data from multiple sources can give you keen insight into your business, it can also raise security issues. The problem is, as data flows between structured and unstructured data silos that may also exist outside the protected realm of…
  • Cross-Silo Security and Governance

    18 Sep 2014 | 3:45 am
    For modern businesses, big data and analytics can transform operations, enabling better decision-making and offering previously unattainable customer or market insights. However, with the majority of big data initiatives being owned by individual lines of business, security considerations can often fall by the wayside. Join us for a live webinar on September 25 at 1 p.m. EDT and hear from Gartner’s Dr. Brian Lowans and AT&T’s Anne Wolfe, privacy and data management executive director, as they discuss how organizations can nurture an enterprise-wide culture of collaboration and…
  • The Importance of Security Event and Threat Analysis Services

    Andy Daudelin
    17 Sep 2014 | 6:45 am
    Today’s cyber world is plagued with never-ending security risks. We are all familiar with Distributed Denial of Service or DDoS attacks that can bring down a website. But far more dangerous are the silent attacks that slowly enter the environment, often sitting idle for weeks or months before taking action. With the growth of Bring Your Own Device or BYOD, along with cloud applications and storage options, IT departments are greatly challenged. It may seem a daunting task to sufficiently monitor security threats across today’s complex environment. More than ever, it is extremely important…
  • Shoring Up Your Mobile Application Security

    Jennia Hizver
    16 Sep 2014 | 3:45 am
    With the explosive growth of the mobile market, security of enterprise mobile platforms and applications has gained greater attention than ever before. New mobile vulnerabilities are constantly emerging, and new attacks are being developed to subvert existing security mechanisms, making it difficult for IT professionals to follow these developments. Some examples of the recently emerged attacks are discussed below. Attacks on smartphone users Most of today’s smartphones do not have a physical keyboard. The user is instead provided with an on-screen software-based keyboard implemented as a…
  • add this feed to my.Alltop

    AT&T Networking Exchange Blog » Security

  • Penetration Testing: 5 Common Myths Explained

    Jennia Hizver
    22 Sep 2014 | 6:45 am
    Over the years of my career as a penetration tester, I have encountered many myths and misconceptions regarding penetration testing, some of which I’d like to share with you: Myth #1: Vulnerability scanning can identify all vulnerabilities in an organization’s environment, and hence, penetration tests are unnecessary. The vulnerability assessment is the process of identifying weaknesses in an IT environment by means of automated vulnerability scanners. Automated scanners are pre-loaded with “signatures” to detect known vulnerabilities. While known issues reported by vulnerability…
  • Protecting Big Data

    Paula Waldron
    22 Sep 2014 | 3:45 am
    When you’re embarking on any new business activity, it’s always more comfortable if you can leverage the knowledge of those who have successfully navigated the journey before you. That’s what best practices are all about. This approach can be especially true when it comes to big data security. While accessing, aggregating, and analyzing massive amounts of data from multiple sources can give you keen insight into your business, it can also raise security issues. The problem is, as data flows between structured and unstructured data silos that may also exist outside the protected realm of…
  • Cross-Silo Security and Governance

    18 Sep 2014 | 3:45 am
    For modern businesses, big data and analytics can transform operations, enabling better decision-making and offering previously unattainable customer or market insights. However, with the majority of big data initiatives being owned by individual lines of business, security considerations can often fall by the wayside. Join us for a live webinar on September 25 at 1 p.m. EDT and hear from Gartner’s Dr. Brian Lowans and AT&T’s Anne Wolfe, privacy and data management executive director, as they discuss how organizations can nurture an enterprise-wide culture of collaboration and…
  • The Importance of Security Event and Threat Analysis Services

    Andy Daudelin
    17 Sep 2014 | 6:45 am
    Today’s cyber world is plagued with never-ending security risks. We are all familiar with Distributed Denial of Service or DDoS attacks that can bring down a website. But far more dangerous are the silent attacks that slowly enter the environment, often sitting idle for weeks or months before taking action. With the growth of Bring Your Own Device or BYOD, along with cloud applications and storage options, IT departments are greatly challenged. It may seem a daunting task to sufficiently monitor security threats across today’s complex environment. More than ever, it is extremely important…
  • Shoring Up Your Mobile Application Security

    Jennia Hizver
    16 Sep 2014 | 3:45 am
    With the explosive growth of the mobile market, security of enterprise mobile platforms and applications has gained greater attention than ever before. New mobile vulnerabilities are constantly emerging, and new attacks are being developed to subvert existing security mechanisms, making it difficult for IT professionals to follow these developments. Some examples of the recently emerged attacks are discussed below. Attacks on smartphone users Most of today’s smartphones do not have a physical keyboard. The user is instead provided with an on-screen software-based keyboard implemented as a…
 
  • add this feed to my.Alltop

    F-Secure Antivirus Research Weblog

  • Are malware authors targeting people via marketing services?

    28 Sep 2014 | 10:43 pm
    We spotted an interesting case of a person complaining about e-mail malware with social engineering content which hits home almost too well, and decided to investigate a bit.The person had been talking to his friend about possibly booking tickets to San Francisco in near future. And 6 hours after the phone call he got an e-mail about an electronic plane ticket to San Francisco with an attachment. The person was cautious enough not to touch the attachment, which was a good decision, as in our analysis it was identified as a variant of Trojan.Krypt.AU.This may be just a case of mass spammed…
  • Pitou Q&A

    28 Sep 2014 | 10:43 pm
    What is Pitou?A recently spotted spambot malware that shares many similarities from the notorious kernel-mode spambot Srizbi. After further analysis, we confirmed it is a revival of Srizbi. We named this latest malware Pitou. After some in-depth analysis, we found some other interesting technical features and wrote a whitepaper on it.Why it is called Pitou?The name Pitou came from our colleague's existing detection name for it. We decided to use this family name to avoid confusion. Another reason why we think this spambot deserves a new name (rather than continuing with the Srizbi moniker,…
  • BlackEnergy 3: An Intermediate Persistent Threat

    28 Sep 2014 | 10:43 pm
    We have a new white paper available.BlackEnergy & Quedagh: The convergence of crimeware and APT attacksThe paper's author, Broderick Aquilino, first wrote about BlackEnergy in June:  •  BlackEnergy Rootkit, Sort Of  •  Beware BlackEnergy If Involved In Europe/Ukraine DiplomacyBlackEnergy is a kit with a long history and this new analysis is quite timely. In fact, malware researchers Robert Lipovsky and Anton Cherepanov from ESET will present a BlackEnergy paper at Virus Bulletin today.Broderick's latest concurrent analysis includes details…
  • Security. Privacy. Identity.

    28 Sep 2014 | 10:43 pm
    Key components of digital freedom: This is F-Secure Labs. On 05/09/14 At 12:07 PM
  • Notice: Freedome v2.0.1 Issue on iOS 8

    28 Sep 2014 | 10:43 pm
    If you (like me) have an Apple device running iOS 8 and use F-Secure Freedome, please avoid updating to version 2.0.1.If you (like me) have already updated, you may see this after opening the app:Do not "Remove Old VPN configurations" — just close the app. Version 2.0.1 should work with its existing configurations.If you need to toggle Freedome on/off…Use: Settings, General, VPN. Click the info button for your configuration and toggle "Connect On Demand".You'll be limited to only the locations that you currently have installed. But the ones that you have should work based on my…
  • add this feed to my.Alltop

    Pcthreat.com

  • Shellshock bug attacks millions of systems worldwide

    30 Sep 2014 | 4:29 pm
    Shellshock is a software bug which affects the GNU Bourne Again Shell, generally referred to as Bash. Unfortunately, Bash is installed onto hundreds of millions of computers, servers, routers and mobile...
  • PC Optimizer Pro

    30 Sep 2014 | 4:29 pm
    Despite the best efforts of the online security industry to secure the exact opposite, many of its consumers continue to fall into the trap set by malicious rogue security tools like PC Optimizer Pro. This...
  • Qone8.com

    30 Sep 2014 | 4:29 pm
    Qone8.com is a search engine which returns search results from Google Search. The search engine is owned by Taiwan Shui Mu Chih Ching Technology Limited, and it very similar to such browser hijackers as...
  • Salus

    30 Sep 2014 | 4:29 pm
    Salus is an adware program that is promoted as a useful tool. It is supposed to improve your internet safety, but the problem is that the results of having this application on your system are quite the...
  • V9 Redirect Virus

    30 Sep 2014 | 4:29 pm
    V9 Redirect Virus is a malicious browser hijacker which infects the system while you are browsing insecure websites or when you download spam email attachments. Once the infection gets in the system, the...
  • add this feed to my.Alltop

    Threatpost | The first stop for security news

  • Schneider Electric Fixes Remotely Exploitable Flaw in 22 Different Products

    Dennis Fisher
    1 Oct 2014 | 8:01 am
    There’s a remotely exploitable directory traversal vulnerability in more than 20 individual products from Schneider Electric that can enable an attacker to gain control of an affected machine. The flaw allows attackers to bypass the authentication mechanism on the server and get access to resources that should be protected. Security researcher Billy Rios, a frequent […]
  • DARPA Working on Provably Secure Embedded Software

    Dennis Fisher
    1 Oct 2014 | 7:19 am
    DARPA is the birthplace of the network that eventually became today’s Internet, and the agency has spent the decades since it released that baby out into the world trying to find new ways defend it.  That task has grown ever more complex and difficult, and now DARPA is working on a new kind of software that […]
  • Google Ups Chrome Bug Bounty, Offers More Money For Exploits

    Dennis Fisher
    30 Sep 2014 | 11:10 am
    Google is again increasing the amount of money it offers to researchers who report vulnerabilities in Chrome as part of the company’s bug bounty program. Now, researchers will be able to earn $15,000 at the high end of the scale, and Google also is offering more cash for researchers who can submit a working exploit for […]
  • OpenVPN Vulnerable to Shellshock Bash Vulnerability

    Michael Mimoso
    30 Sep 2014 | 9:47 am
    OpenVPN was found to be vulnerable to the Shellshock vulnerability in Bash as well. Fredrik Stromberg of Mullvad said the vulnerability is dangerous because it's pre-authentication in OpenVPN.
  • New Signed Version of CryptoWall Ransomware On the Loose

    Dennis Fisher
    30 Sep 2014 | 7:37 am
    Researchers have discovered a variant of the CryptoWall ransomware that has a valid digital signature and is being distributed through malicious ads on several top-ranked Alexa Web sites. CryptoWall is one of the more successful ransomware strains in recent memory, with researchers estimating last month that the malware had grossed more than $1 million for […]
 
  • add this feed to my.Alltop

    VRT

  • Shellshock - Update Bash Immediately!

    Brandon Stultz
    26 Sep 2014 | 1:44 pm
    Shellshock is a serious vulnerability. Bash, arguably the most widely distributed shell on Linux systems, fails to correctly parse environment variables with function declarations. Why the fuss over environment variables? Because these variables are often set by programs that handle network data. Examples include dhcpcd which, through this vulnerability, more or less gives you a remote shell through DHCP option 114 (and potentially others) and Apache using mod_cgi or mod_cgid when CGI scripts are either written in Bash, or otherwise spawn subshells with exported data acquired from untrusted…
  • Looking Glasses with Bacon

    Mariano Graziano
    11 Sep 2014 | 10:37 am
    This is my first post on the VRT blog and I would like to introduce myself. I am Mariano Graziano, an Italian third-year Ph.D. student at the Software and Systems Security Group at Institut Eurecom in Sophia-Antipolis (France) under the supervision of professor Davide Balzarotti. My research interests are memory forensics and automated malware analysis and currently I am an intern at Cisco in the Talos Security Intelligence and Research Group under the guidance of Alain Zidouemba for the next three months. This post is not about my current project at Cisco but is about my DEF CON talk.At DEF…
  • Microsoft Update Tuesday September 2014: another generally light month but with a significant IE bulletin

    Yves Younan, PhD
    9 Sep 2014 | 10:04 am
    This month’s Microsoft Update Tuesday is pretty light save for the Internet Explorer bulletin. While there’s only a total of 4 bulletins, they cover a total of 42 CVEs. The IE bulletin, as is usual, has the most updates for bugs and is rated critical. It covers a total of 37 CVEs. The other three bulletins are rated as important and provide updates for the remaining five vulnerabilities.MS14-052 is the IE bulletin and is rated critical. It covers a total of 37 CVEs. Of these 37 CVEs, 36 are remote code execution vulnerabilities, the other one is an information disclosure vulnerability…
  • Malware Using the Registry to Store a Zeus Configuration File

    Shaun Hurley
    4 Sep 2014 | 10:00 am
    This blog was co-authored by Andrea Allievi. A few weeks ago I came across a sample that was reading from and writing a significant amount of data to the registry. Initially, it was thought that the file may be a binary, but after some analysis it was determined that the file is a configuration file for Zeus. Within this blog post we take a look at our analysis of the data I/O in the registry.Initial Stages of InfectionThe scope of this paper is the analysis of the registry write. This section is a brief overview of what happens when the malware is executed.UnpacksCreates a copy of…
  • Discovering Dynamically Loaded API in Visual Basic Binaries

    Angel M. Villegas
    20 Aug 2014 | 7:30 am
    Performing analysis on a Visual Basic (VB) script, or when Visual Basic is paired with the .NET Framework, becomes an exercise of source code analysis. Unfortunately when Visual Basic is compiled to a Windows Portable Executable (PE) file it can become a nightmare for many malware analysts and reverse engineers.Why is it used by malware?Visual Basic binaries have a reputation for making an analysts job difficult due to the many aspects of its compilation that differ from standard C/C++ binaries. To analyze a VB PE binary it helps to be familiar with the VB scripting syntax and semantics since…
  • add this feed to my.Alltop

    NSS Labs

  • Web Application Firewalls: Not just for PCI anymore

    30 Sep 2014 | 12:00 am
    Unlike most security technologies that attempt to identify a broad range of bad traffic by means of traditional detection methods, a web application firewall (WAF) is like a finely honed sword designed for a singular purpose: monitoring HTTP traffic between clients and web-servers. The payment card industry (PCI) accelerated the development of the WAF market since it provided a tangibly financial application of this technology. This made WAF a must-have in the arsenal of weapons for many of today’s security administrators.
  • Some systems getting BASHed, but the sky isn’t falling

    29 Sep 2014 | 12:00 am
    It has been barely 6 months since the Heartbleed vulnerability was revealed, but just as the global security community has recovered from this vulnerability, one that is more prevalent – and potentially far more damaging – has emerged. The Shellshock vulnerability exploits a weakness in the Bourne Again SHell (BASH) that is native to (and often the default for) many Unix derivatives across the globe. While the extent of the damage has yet to be determined, it is highly likely that any services running on a Unix distribution are exposed.
  • Next Generation Firewall: Firedrill or Firestop

    22 Sep 2014 | 12:00 am
    Next Generation Firewall (NGFW) technology has finally become a mainstay in the enterprise. End users are finding that NGFWs are no longer as limiting in their performance or capability trade-offs as they once were. In fact, in this most recent NGFW group test several vendors submitted products that exceeded 10Gb throughput under load, demonstrating that performance meets or exceeds that of many firewalls just a few years ago.
  • The IPS Market – The Technology Lives On, What About the Products?

    18 Sep 2014 | 12:00 am
    Along with firewalls, intrusion prevention systems (IPS) are among the most well understood security appliances available on the market today. As part of our recently announced Competitive Intelligence Research offering, NSS Labs has released its first Market Intelligence Brief on the IPS market.
  • Cyber Resilience – It’s Not the 98% You Catch That Matters, It’s the 2% You Miss!

    6 Aug 2014 | 12:00 am
    Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. Assuming that a breach is likely, cyber resiliency of systems and networks is needed to ensure mission survivability in a cyber-compromised environment.
  • add this feed to my.Alltop

    VRT

  • Shellshock - Update Bash Immediately!

    Brandon Stultz
    26 Sep 2014 | 1:44 pm
    Shellshock is a serious vulnerability. Bash, arguably the most widely distributed shell on Linux systems, fails to correctly parse environment variables with function declarations. Why the fuss over environment variables? Because these variables are often set by programs that handle network data. Examples include dhcpcd which, through this vulnerability, more or less gives you a remote shell through DHCP option 114 (and potentially others) and Apache using mod_cgi or mod_cgid when CGI scripts are either written in Bash, or otherwise spawn subshells with exported data acquired from untrusted…
  • Looking Glasses with Bacon

    Mariano Graziano
    11 Sep 2014 | 10:37 am
    This is my first post on the VRT blog and I would like to introduce myself. I am Mariano Graziano, an Italian third-year Ph.D. student at the Software and Systems Security Group at Institut Eurecom in Sophia-Antipolis (France) under the supervision of professor Davide Balzarotti. My research interests are memory forensics and automated malware analysis and currently I am an intern at Cisco in the Talos Security Intelligence and Research Group under the guidance of Alain Zidouemba for the next three months. This post is not about my current project at Cisco but is about my DEF CON talk.At DEF…
  • Microsoft Update Tuesday September 2014: another generally light month but with a significant IE bulletin

    Yves Younan, PhD
    9 Sep 2014 | 10:04 am
    This month’s Microsoft Update Tuesday is pretty light save for the Internet Explorer bulletin. While there’s only a total of 4 bulletins, they cover a total of 42 CVEs. The IE bulletin, as is usual, has the most updates for bugs and is rated critical. It covers a total of 37 CVEs. The other three bulletins are rated as important and provide updates for the remaining five vulnerabilities.MS14-052 is the IE bulletin and is rated critical. It covers a total of 37 CVEs. Of these 37 CVEs, 36 are remote code execution vulnerabilities, the other one is an information disclosure vulnerability…
  • Malware Using the Registry to Store a Zeus Configuration File

    Shaun Hurley
    4 Sep 2014 | 10:00 am
    This blog was co-authored by Andrea Allievi. A few weeks ago I came across a sample that was reading from and writing a significant amount of data to the registry. Initially, it was thought that the file may be a binary, but after some analysis it was determined that the file is a configuration file for Zeus. Within this blog post we take a look at our analysis of the data I/O in the registry.Initial Stages of InfectionThe scope of this paper is the analysis of the registry write. This section is a brief overview of what happens when the malware is executed.UnpacksCreates a copy of…
  • Discovering Dynamically Loaded API in Visual Basic Binaries

    Angel M. Villegas
    20 Aug 2014 | 7:30 am
    Performing analysis on a Visual Basic (VB) script, or when Visual Basic is paired with the .NET Framework, becomes an exercise of source code analysis. Unfortunately when Visual Basic is compiled to a Windows Portable Executable (PE) file it can become a nightmare for many malware analysts and reverse engineers.Why is it used by malware?Visual Basic binaries have a reputation for making an analysts job difficult due to the many aspects of its compilation that differ from standard C/C++ binaries. To analyze a VB PE binary it helps to be familiar with the VB scripting syntax and semantics since…
 
  • add this feed to my.Alltop

    Private WiFi

  • NCSAM 2014: PRIVATE WiFi Champions the Cause of Cybersecurity

    Elaine Rigoli
    1 Oct 2014 | 1:00 am
    Did you know that free WiFi is likely coming soon to a Coke vending machine near you? WiFi hotspots are ubiquitous – we can hop online easily at our schools, libraries, gyms, and of course at hotels and airports. While convenient, the truth about WiFi is simply frightening: it is not secure and anyone can listen in on your activity and potentially hack you. So while we may not have WiFi-enabled vending machines in the United States (yet), it is important that we raise awareness about the security threats. Today we do that by celebrating the launch of National Cyber Security Awareness Month…
  • Canadian Transit Systems to Get Free WiFi

    Jared Howe
    30 Sep 2014 | 1:24 am
    Canadian cities are the latest metropolitan areas to begin installing free public WiFi on their transit systems, following in the footsteps of New York and Boston. Three Metro Vancouver buses began offering free WiFi provided by Telus to its customers early this month, with a planned expansion to more buses and bus lines in the near future. The buses with WiFi access had signs with little flying piglets, a reference to the popular saying “when pigs fly,” presumably answering the question of when transit users would get WiFi access. The pilot will last for six months. Earlier this year,…
  • Are Phone Calls Over WiFi Hotspots Safe from Hackers?

    Jared Howe
    29 Sep 2014 | 1:10 am
    You might have heard that the new iPhone 6 supports making phone calls over WiFi networks. Using WiFi networks to make calls is the next big thing for mobile phones. But how safe is it to make phone calls using public WiFi hotspots? Are your calls being encrypted? And should you take any steps to protect yourself from WiFi hackers? Welcome to WiFi Calling Using WiFi networks to make mobile phone calls is known as WiFi Calling. WiFi Calling is the technology which allows packets of data from your cell phone to be transferred over the Internet, and then inserted back into your cellular network.
  • How Hackers Protect Themselves When Using Public WiFi

    Jared Howe
    24 Sep 2014 | 1:40 am
    Every year, thousands of hackers and security experts descend on Las Vegas for two of the world's largest annual hacker conventions: Defcon and Black Hat. The first Defcon took place in June 1993. This year’s Defcon 22 saw over fifteen thousand hackers and security experts gather in Las Vegas to discuss all the new hacking exploits and computer vulnerabilities. While attendees learn how to wage new attacks on many systems, the conference is mainly focused on teaching how to prevent these attacks. Black Hat started sixteen years ago to help provide security professionals with the latest news…
  • PRIVATE WiFi on Good Morning America: “The Hazards of Public WiFi”

    Jillian Ryan
    22 Sep 2014 | 3:18 pm
    A recent Good Morning America segment featuring PRIVATE WiFi begins with a startling truth: "Everyone is at risk; public WiFi can leave your most private information wide open." While these public hotspots are widespread and convenient, the free connection comes at a hidden price. As GMA's Mara Schiavocampo explains, an estimated 19 million Americans admit to using a public WiFi connection for a financial transaction. According to experts "one of the biggest risks [of using public WiFi] are your personal credit card and banking information." When Schiavocampo sits down with PRIVATE WiFi's…
  • add this feed to my.Alltop

    Pivot Point Security

  • When To Encrypt Data

    Bhaumik Shah
    23 Sep 2014 | 4:00 am
    A major mistake some organizations make is to consider data encryption as the solution for all their information security needs. “ENCRYPT EVERYTHING!!” is not a best-practice approach—not only is it impractical, but also it cannot eliminate all the risks to a company’s sensitive data. When is it appropriate to encrypt data? Anytime you want to reduce confidentiality risk. This basic maxim is applicable across a wide range of potential situations, especially these three: Encrypt data in motion. Encrypt data anytime it moves from one point to another, whether it’s within your…
  • How to Keep Mobile Communications Safe from Rogue Cell Phone Towers

    Robert Oliver
    9 Sep 2014 | 8:46 am
    From a risk management perspective, the increasingly inventive approaches taken by cyber criminals, foreign agencies, and business competitors to compromise information security place an organization’s data at escalating levels of risk. In particular, as more businesses adapt to a mobile workforce and institute Bring Your Own Device (BYOD) policies, significant questions arise about the security of mobile communications and the suitability of certain options. New mobile attack vectors make the news all the time. But a recent news clip in Forbes about the proliferation of rogue cell phone…
  • Leveraging an Existing SOC 2 to Simplify ISO 27001 Certification

    John
    9 Sep 2014 | 7:00 am
    What is the most efficient way to get ISO 27001 certified if you already have your SOC 2 attestation? It’s not uncommon for an organization that had previously used (somewhat incorrectly) SAS 70 as its primary means of demonstrating its security posture to have (correctly) migrated to a SOC 2 attestation when the American Institute of CPAs (AICPA) cleared up that issue by offering both SSAE 16 SOC 1 and SOC 2 auditing standards. While SOC 2 is a useful form of attestation, there are certain verticals (e.g., financial services, healthcare, technology, legal) and geographies (non-US) where…
  • Discussing ISO 27001 Concerns with Your Law Firm’s Partners

    John
    26 Aug 2014 | 4:00 am
    Law firms have a unique political environment.  I know that from working with many of them, yet somehow I was still a little surprised by what transpired at a Partners Meeting I recently attended.  I think there is a lesson to be learned here, which I thought was worth sharing. The ISO 27001 team thought it would be a good idea to update the Partners on its progress, as we were on the verge of finishing the first phase of the project.  Our Lead Implementer was travelling for another certification audit so he asked me to give the presentation on his behalf. Things started well.  We…
  • Ansel Adams and My Long-Lost Picture of Bigfoot

    John
    21 Aug 2014 | 4:00 am
    I don’t write many off-topic blog posts. But there were no blogs back when I took that picture and then lost it for twenty years… When I was in college I took up black-and-white photography. Part of the allure of it all came from fond childhood memories of working with my dad in our windowless bathroom developing pictures in the bathtub. Watching images emerge ghostlike as I rocked the paper in the film bath was akin to magic. But I was also drawn to black-and-white photography because I admired Ansel Adams’ landscape photographs, especially those he shot in Yosemite National Park. So…
 
  • add this feed to my.Alltop

    HOTforSecurity

  • Four Indicted for Stealing Helicopter Software and Gaming Technology

    Lucian Ciolacu
    1 Oct 2014 | 5:38 am
    Four people have been indicted by the US Department of Justice (DOJ) for allegedly stealing helicopter software and gaming technology worth over $100 million, according to a DOJ announcement Charges included copyright infringement, mail fraud, conspiracy to commit computer fraud, wire fraud, theft of trade secrets and identity theft. Two of the defendants pleaded guilty “As the indictment charges, the members of this international hacking ring stole trade secret data used in high-tech American products, ranging from software that trains U.S. soldiers to fly Apache helicopters to Xbox…
  • Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

    Bitdefender
    30 Sep 2014 | 8:00 am
    What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled for new gadgets and innovative technologies. You’ll simply love our pick!  When you run out of coffee for your espresso machine, Samsung and Apple may soon want you to tap a smartphone app for a refill. Amazon may soon persuade you to press a button on a device made for ordering supplies. And wrong-doers will scrutinize your decision. Here are some of the smart plans that will soon turn into smart devices…
  • StealthGenie – the app that helps jealous partners and stalkers spy on you and your online conversations

    Graham Cluley
    30 Sep 2014 | 4:48 am
    There’s a shady industry out there of businesses that sell spyware apps that market themselves to jealous partners, domestic abusers and stalkers, keen to spy upon others. Some market themselves as a way of easily keeping taps on your children, but there’s no doubt that many are used to abuse individual’s privacy and potentially put innocent people in danger. One example of such spyware is StealthGenie, sold online by a Pakistani company called InvoCode. Here is their promotional video: Invocode’s CEO Hammad Akbar was arrested in Los Angeles this last weekend in what…
  • EA and Activision Servers Hit by Lizard Squad; DDoS against FIFA, Madden, Sims 4, Call of Duty and Destiny

    Lucian Ciolacu
    30 Sep 2014 | 2:58 am
    The hackers collective Lizard Squad has disrupted a series of EA and Activision servers in the past two weeks, according to Forbes The distributed denial-of-service (DDoS) attack seems to have temporarily taken down popular titles such as EA’s FIFA, Madden and Sims 4, as well as Activision’s Destiny and Call of Duty: Ghosts. “We’re predicting a lot of mad gamers this weekend,” the hackers tweeted.”Woah, I think there are some Ghosts haunting Destiny,” they said on Twitter two days after. Destiny was hit worst, as all its functionality relies on live…
  • Shellshock Bug Exploited in the Wild, Now Patched by Apple

    Bianca Stanescu
    30 Sep 2014 | 12:08 am
    Apple has patched the Shellshock vulnerabilities almost a week after the first disclosure, according to media reports. The company said a “vast majority” of OS X users weren’t at risk, as the systems were safe “by default and not exposed to remote exploits of [GNU Bash] unless users configure advanced UNIX services.” Bitdefender’s analysis shows the typical attack scenario recalls a vulnerable script, together with passing the exploit code as the User-Agent string. Bitdefender advises Mac OS X users to update immediately. Initially identified and patched as a single issue…
  • add this feed to my.Alltop

    Video Surveillance

  • New HD Onboard Surveillance

    10 Sep 2014 | 4:26 pm
    Onboard recording is becoming a popular security measure by recording video evidence of altercations between passengers on public transportation, driver misconduct, and even police activity when pulling over cars. When it comes to onboard surveillance, there are a few key features to look for: HD quality, a protective housing, and audio recording. With 720p HD resolution, the Axis P3904-R M12 camera can record clear, detailed surveillance video. Ideal for use on city busses, subway trains, and cars, this camera comes with a rugged M12 connector to ensure that the bumps and shocks of driving…
  • 2014 VideoSurveillance.com Scholarship Winner

    20 Aug 2014 | 12:50 pm
    VideoSurveillance.com is pleased to announce that Jackson Kelner of Minnetonka, Minnesota is this year's winner of our annual college scholarship program. Jackson will be attending Washington University in St. Louis this fall as a freshman. The VideoSurveillance.com scholarship asked students to answer in a 250-word essay how surveillance cameras can help increase campus safety. Here's an excerpt from Jackson's essay: "I would assign multiple officers to the main control center to monitor cameras 24/7. Although it would certainly be difficult to monitor every single camera, I would implement…
  • VideoSurveillance.com Featured on Yahoo!

    4 Jun 2014 | 10:29 am
    Again and again, VideoSurveillance.com continues to fortify its reputation as a true expert in IP video technology. Yahoo Tech! featured an article on June 4, 2014 highlighting the domestication of surveillance cameras, and utilized VideoSurveillance.com as a source for information on the latest trends. You can read the article here - Yahoo Tech! Article.
  • VideoSurveillance.com Featured on GovernmentVideo News

    27 May 2014 | 10:05 am
    Public transit systems across the country are increasing the number of video surveillance cameras on buses and subways to deter criminal activity and reduce liability lawsuits. An article featured on GovernmentVideo.com highlighted how virtual security integrators like VideoSurveillance.com are playing a critical role in helping mass transit departments switch from less dependable analog video systems to IP surveillance. As a result, public transit systems are able to gather stronger video evidence, attributable to HD resolution, only found on IP camera systems. Read the full article on the…
  • New Pre-configured Video Surveillance Systems Now Available

    14 May 2014 | 4:49 pm
    Our pre-configured 4 and 8 camera video surveillance systems have been updated with new IP cameras and NVRs for easy installation and professional-level surveillance. Each system comes with cameras, a NVR featuring Milestone Essential VMS software, and all the cables you need to install the system. The 4-camera systems are specially designed to monitor a small business or home, and come with a variety of indoor and outdoor cameras. For larger businesses, our 8-camera systems make it easy to monitor a lobby, back room, and parking lot. Our wireless systems also received an update, with a new…
  • add this feed to my.Alltop

    Dice News » Security

  • Is an Ethical Hacking Certification Worth Earning?

    Myra Thomas
    25 Sep 2014 | 9:53 am
    It seems like every other month that a major corporation suffers an epic hack, with millions of customers’ data stolen. In the aftermath of those attacks, many companies are turning to ethical or “white hat” hackers to test their defenses. But is ethical hacking an effective counter to unethical hacking, especially when those who practice the latter can do pretty much whatever they want with a wide variety of tools? Ethical hacking’s cause isn’t helped by the fact that the EC-Council, the Albuquerque, New Mexico-based organization that offers a certification in ethical hacking, was…
  • Is Cyber-Liability Insurance Worth the Cost?

    Myra Thomas
    25 Sep 2014 | 8:06 am
    A growing number of companies ask vendors to buy cyber-liability insurance—and for a tech startup or an independent IT consultant, that cost can put a real dent in the bottom line. Cyber-liability insurance might include coverage for losses related to denial-of-service attacks, threats to intellectual property, business interruption, cyber extortion, and a variety of security breaches. An advisor such as an attorney or insurance agent can help firms properly assess the type and amount of cyber-liability insurance they might need, according to Veronica Somarriba, senior vice president and…
  • Can Defense Companies Hire Hackers on Their Terms?

    Mark Feffer
    13 Aug 2014 | 7:15 am
    Big-name aerospace and defense contractors like Boeing, Raytheon and Northrop Grumman are beginning to think that one answer to their cybersecurity recruiting needs  lies in the hacker community. After all, if you want to combat attacks from people who think out of the box, why not hire people who think out of the box? It’s ironic because all of these companies are known for being somewhat conservative—they work for the Defense Department, after all, and security to them is a high-stakes thing. The idea of recruiting from the ranks of the somewhat anarchic hacker community might seem…
  • IT Security Pros: Are You Worth a Million Dollars a Month?

    Nick Kolakowski
    30 Jul 2014 | 6:05 am
    Keith Alexander, former director of the National Security Agency (NSA), has decided to make money in retirement—a whole lot of money. According to reports, he wants corporations to pay him up to a million dollars a month for his IT security expertise. Alexander insists that he’s providing value for the money, in the form of proprietary technology that he claims will detect hackers who infiltrate corporate networks to steal everything from credit-card numbers to proprietary data. In a recent interview with Foreign Policy, he said that he and his business partners would file patents on the…
  • Internet of Things Increases Need for Security Pros

    Susan Hall
    21 Jul 2014 | 8:56 am
    The sheer number of “things” to be secured in the Internet of Things is expected to create a rash of jobs in cybersecurity over the next several years. “You’re going to have to secure the device or the sensor, you need to secure the data, and you’re going to have to secure that across an open network,” Intel’s head of business marketing, Stuart Dommett, told an IoT roundtable in May. “It really is a massive, massive change.” Click here to find cybersecurity jobs. Intel has argued previously that the IoT, which is expected to see 26 billion connected devices by 2020,…
 
  • add this feed to my.Alltop

    Seculert Blog on Advanced Threats and Cyber Security

  • Malware Abuses Virtual Machines

    Liora R. Herman
    24 Sep 2014 | 1:31 am
    As reported by Jeremy Kirk of IDG News Service, Symantec researchers have identified a rather unexpected – yet effective — new tactic that bad actors are using to avoid detection when infecting virtual machines with malware: shutting up. In the past, malware that found itself in a virtual machine operational environment typically fled for the […] The post Malware Abuses Virtual Machines appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Malware Exploits Network Security Weaknesses

    Liora R. Herman
    22 Sep 2014 | 5:00 am
    In its newly-released 2014 Midyear Security Report, Cisco is warning enterprises that, while they still need to focus on plugging high-profile vulnerabilities in their network defense system, they can’t afford to ignore more mundane weak links such as outdated software, flawed code, user errors, or abandoned digital properties – because doing so plays right into […] The post Malware Exploits Network Security Weaknesses appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Tiny Tinba Trojan Could Pose Big Threat

    Aviv Raff
    18 Sep 2014 | 6:46 am
    In July 2014, the original source code of Tinba was made public in an underground forum. This leaked version comes with complete documentation and full source code. This follows other source code leaks from much more infamous and prevalent threats, which researchers worry that attackers could use as the basis for new versions. Similar to […] The post Tiny Tinba Trojan Could Pose Big Threat appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Zeus Malware Variants Designed to Evade Client-Side Security Software

    Liora R. Herman
    18 Sep 2014 | 6:18 am
    As reported by Zero Day’s Charlie Osborne, threat actors are using new variants of the notorious Zeus malware Trojan in an email campaign designed to steal financial data from (so far) a Canadian bank and several US business targets. The Zeus malware variants, which were spotted by researchers at Websense Security Labs, are a fusion […] The post Zeus Malware Variants Designed to Evade Client-Side Security Software appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • Cyber Security Professionals are Sheep Awaiting Slaughter

    Liora R. Herman
    15 Sep 2014 | 1:20 am
    In a recent article, New York Times technology reporter Nicole Perlroth recounts a gag that, in one variation or another, is racing its way through the cyber security community as only droll jokes can. It goes like this: An eager young CISO meets the wise old predecessor who he replaced. This predecessor hands his successor […] The post Cyber Security Professionals are Sheep Awaiting Slaughter appeared first on Seculert Blog on Advanced Threats and Cyber Security. [[Read more...]]
  • add this feed to my.Alltop

    Managed File Transfer and Network Solutions

  • Setting SFTP Algorithms On Your SFTP Server

    John Carl Villanueva
    27 Sep 2014 | 12:43 am
    Overview In this post, we'll talk about the algorithms included in a typical SFTP server and explain their basic functions. We'll cover algorithms for key exchanges, ciphers, MACs, and compressions. After that, we'll dive into the JSCAPE MFT Server Manager Web GUI and show you where you can configure those SFTP algorithms there. Having a basic understanding of these algorithms and knowing where to configure them will enable you to strengthen your SFTP server's security or troubleshoot certain client connection issues.   What we'd like to do     Key exchanges,…
  • How To Set Up An SFTP Reverse Proxy

    John Carl Villanueva
    25 Sep 2014 | 12:11 am
    Overview An SFTP reverse proxy adds another layer of security to SFTP services. In addition to SFTP's ability to encrypt data in transit and provide 2-factor authentication, an SFTP reverse proxy brings in several other security-related benefits such as hiding user credentials and the identities of your internal servers. An SFTP reverse proxy can be easy to set up and this post will show you how.   What we'd like to do   How to do it   Believe it or not, assuming you already have an SFTP server running in the background, you'll only need 3 simple steps to set up an SFTP reverse…
  • How To Delete A File On Your Server After It’s Downloaded

    John Carl Villanueva
    20 Sep 2014 | 5:23 pm
    Overview Sometimes, for security reasons or simply just to save disk space, we want certain files to be automatically deleted from the server as soon as its intended recipient has already downloaded it. Today, you'll learn how to do that on JSCAPE MFT Server.   What we'd like to do     How to do it   This particular auto-deletion process entails creating a trigger that: 1. Responds to a "File Download" event, i.e., fires as soon as a file has been downloaded from the server; 2. Affects any downloaded file, regardless of type, user, time of download, etc.; and 3. Executes…
  • How To Automatically Decrypt PGP-Encrypted Files Upon Upload

    John Carl Villanueva
    16 Sep 2014 | 5:33 pm
    Overview Whenever PGP files uploaded to your server happen to contain data needed for business processes, you might want to have those files decrypted automatically. That way, they can then be forwarded to the applications waiting to process them. JSCAPE MFT Server has an easy way of doing that and it's what we're going to show you today.   What we'd like to do   Figure 1   How to do it   In a nutshell, this method consists of creating a trigger that: 1. Listens to a file upload event,  2. Limits the succeeding action to files that end with "pgp" (the file extension…
  • PGP Encrypting Every Single File Uploaded By Members Of A Group

    John Carl Villanueva
    14 Sep 2014 | 5:32 pm
    Overview Some company activities - such as product development or eDiscovery - require a high level of security. The people involved in these activities have to make sure the information they share with one another are kept confidential at all times. In JSCAPE MFT Server, it's possible to secure a group folder in such a way that all files uploaded to that folder are automatically encrypted with OpenPGP. In this post, we'll show you how to do that.   What we'd like to do   In our example, Sam is a member of TeamGold, a special group formed to handle a project involving sensitive…
  • add this feed to my.Alltop

    Radware Blog

  • Can Your Business Meet the Demands of Cyber-Ransom?

    David Hobbs
    25 Sep 2014 | 8:36 am
    Online criminality has become a big business and new faces of social engineering and fraud are sweeping the globe. News articles regularly report on major breaches and outages, but rarely, if ever, do we see the underlying ransom demands that are presented before a business is attacked. The stand that organizations often take is that they do not negotiate with terrorists or pirates. But this approach, while noble, can become costly to a business, some may lose everything. This year we learned the story of Code Spaces. This company went out of business in 2014 due to taking the non-negotiation…
  • Cyber Security Regulations Pull on the Purse Strings – and those Affected Agree it’s Necessary

    Carl Herberger
    22 Sep 2014 | 6:34 am
    Financial institutions, such as banks and credit unions, have long been a target of cyber and DDoS attacks. These attacks are designed to disrupt operations and access sensitive information, becoming a constant threat, to not only those businesses but to the customers they serve. In response to this threat, Federal and State bodies, such as the Federal Financial Institutions Examination Council (FFIEC) and New York’s Department of Financial Services (DFS), have enacted measures and procedures to help strengthen cyber security for financial institutions. These guidelines are expectations…
  • New Findings: The Wrong Image Format Measurably Hurts the User Experience

    Tammy Everts
    16 Sep 2014 | 6:52 am
    Faster load times correlate with improved business metrics (ranging from page views to revenues). With images comprising more than half of a typical page’s weight, it only makes sense that optimizing images so that they render more quickly in the user’s browser should be a priority for every site owner. Selecting the best image rendering format is the first step on the path toward fully optimized images, but even this first step is fraught with debate. At the core of the debate is this seemingly simple question: Should we use baseline or progressive images? If you’re not a…
  • My Takeaways from This Year’s AT&T Cyber Security Conference

    Carl Herberger
    11 Sep 2014 | 8:44 am
    Last week, I was invited to speak at the 16th annual AT&T Cyber Security Conference in NYC where over the span of two days, speakers kept the audience immersed with engaging topics.  Surrounded by security executives, I learned that we all share similar concerns.  There were resounding messages that resonated with me that I’d like to share as my key takeaways from the event. #1:  There is no singular problem when it comes to bolstering security The problems that plague information security are clearly distributed throughout the organization. Depending on where you sit and what…
  • Beyond Free Calls — Protecting Your Business from Phone System Fraud

    Patrick McNeil
    8 Sep 2014 | 7:08 am
    Denial of Service (DoS) has reigned as the most headline-grabbing network attack over the past three years.  However, the truth is that attacks come in all different flavors ranging from Distributed DoS (DDoS) to low-volume application-layer attacks that target user credentials, financial information, trade secrets, or abuse of services to commit fraud.  At the application layer we most often think of HTTP, however, there are almost an immeasurable number of Layer 7 applications available for exploit. While at a security conference early this year, I got into a discussion with a few fellow…
 
  • add this feed to my.Alltop

    pfSense Setup HQ

  • Greylisting Advantages and Disadvantages

    maximumdx
    1 Oct 2014 | 5:00 am
    In the previous two articles, we covered installation and configuration of spamd, a useful spam-referral daemon. In this article, we will examine some of the advantages and disadvantages of greylisting. The Greylisting Process Before we begin, it might be useful to review some of the basic concepts of spam deferral. The process involves, at its most basic level, dividing hosts into three categories: blacklisted hosts, whitelisted hosts, and greylisted hosts. Blacklisted hosts are hosts that are denied access, while whitelisted hosts are granted access. Greylisted hosts, as the name implies,…
  • spamd: Part Two

    maximumdx
    27 Sep 2014 | 7:00 am
    Configuring an external source in spamd within the pfSense GUI. In our first article covering spamd, we covered installation and configured maximum blacklisted connections, maximum concurrent connections, greylisting and expiration times. In this article, we will continue configuring basic settings, and then cover setting up external sources and whitelisting. Services -> SpamD is where we can configure spamd settings, and the third tab, “SpamD Settings“, is where we configure general settings. When we left off, we had not yet configured “Stutter Secs“. This is the…
  • spamd: Part One

    maximumdx
    23 Sep 2014 | 2:00 pm
    The spamd settings page in pfSense. spamd is a ISC-licensed lightweight spam-deferral daemon which is part of the OpenBSD project. It works directly with SMTP connections and supports such features as greylisting and minimizing false positives. It should be fully functional on any system where pf is available; conveniently, there is a package available for pfSense. spamd can be used to prevent inbound spam from reaching mail servers. It can also be used as an application-level proxy to ensure that external mail servers connecting to internal mail servers behave legitimately, and it can…
  • Suricata Intrusion Detection: Part Five

    admin
    21 Sep 2014 | 7:00 am
    Logs management in Suricata. In the previous articles on Suricata, we covered basic installation and configuration of this intrusion detection system, including deciding which rules to download and use, and setting up an interface, in this article, we take a look at log management. Log Management in Suricata The top level of tabs has 11 different tabs; click “Logs Mgmt” tab (in the current version of Suricata, it is the 9th tab). Under “General Settings”, there are two options. The first is the “Remove Suricata Log Files During Package Uninstall” check box,…
  • Suricata Intrusion Detection: Part Four

    admin
    16 Sep 2014 | 6:00 am
    Configuring app parser settings in Suricata. In the previous articles on Suricata, we covered installation, configuring global settings and pass lists, and began looking at setting up an interface. In this article, we will continue setting up our first Suricata interface. In this example, we are configuring the WAN interface. Configuring App Parsing The next tab after “WAN Flow/Stream” is “WAN App Parsers“. This tab deals with parsers that operate on the application layer of the TCP/P model, the layer that specifies certain protocols that cover major aspects of…
  • add this feed to my.Alltop

    Tips4Tech Blog

  • Don’t Forget Security When It Comes to E-Waste

    Allan Pratt
    24 Sep 2014 | 7:43 pm
    With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. But as you dream, what will you do with all your current devices? As you wonder where you’ll take your outdated smartphones, tablets, and desktops, either conduct a Google search for your nearest e-waste drop-off location or use a convenient app on your smartphone to find a location. But, whatever you do, take security precautions.
  • Don’t Forget Security When Developing Corporate Mobile Apps

    Allan Pratt
    9 Sep 2014 | 8:28 pm
    With the rise in mobile device usage, bring your own devices to work (BYOD), the Internet of Things (IoT), combined with the decline of personal computers, many corporate leaders believe that their businesses should develop a mobile application, or in tech lingo, an app. An Appcelerator survey of enterprise leaders released in January 2013 reported that 73% of enterprises built fewer than five applications, and 39% built none or just one. (1) (2) But does your business really need an app to be competitive, or do you simply want to be able to SAY you have one? Will an app fill a critical hole…
  • Privacy, Security and Voice Search: Does Your Company Know What It’s Getting Into?

    Allan Pratt
    22 Aug 2014 | 7:09 pm
    These days, everyone is using the voice search function across all platforms on all devices. Look no further than an iPhone to an Android phone to the Windows tablet, and you’ll see most people speaking questions instead of typing them. Without a doubt, it’s much easier to speak a request or question rather than typing it on a small keyboard. But do you know the reason that your device gets more accurate? The reason is because all of your voice commands are stored on servers that are owned by Microsoft, Apple or Google. As you speak, those servers are accessed and an algorithm is used…
  • Is Your Business Ready for the Cloud?

    Allan Pratt
    2 Aug 2014 | 10:17 am
    These days, wherever you go, there’s always someone extolling the virtues of cloud computing. How often has someone at your monthly C-Suite meeting said, “Cloud computing is the answer to XYZ?” But then the conversation takes an unintended turn, and the focus never returns to defining either the question or the answer. According to Wikipedia, cloud computing is “the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network…
  • Does Your Business Conduct Regular Security Audits? Here Are 3 Tips

    Allan Pratt
    15 Jul 2014 | 5:36 pm
    Thanks to the numerous security breaches in the news, the C-suite members of your business should be thinking about regular security audits. While size does matter, the more employees you have and the more data you generate, security audits are critical to the long-term stability of your business. And remember, no one is immune to a data breach. Wondering where to start? Check physical security first. Then work your way in. The simplest way to steal data is to steal the device where it’s stored. You would be surprised by the number of businesses that don’t do the easy things. They…
  • add this feed to my.Alltop

    Milton Security

  • Japan Airlines is The Target of a Major Data Breach

    Bethany Nolan
    30 Sep 2014 | 4:02 pm
    Japan Airlines (JAL) has become the latest company to discover that they’ve been the victim of a data beach.  The personal information of as many as 750,000 of its frequent-flier program members may have been compromised. The airline confirmed Monday that it had found evidence of unauthorized access on its Customer Information Management System in the form of a malware. Data, including names, birthdates, genders, home addresses, work addresses, job titles, phone numbers, fax numbers, email addresses, frequent flyer membership numbers, and enrollment dates may have been compromised. No…
  • Data Breach at Albertsons et al(Again)

    Milton Security Group
    30 Sep 2014 | 10:12 am
    AB Acquisition LLC, which operates Albertsons stores under Albertson’s LLC and ACME Markets, Jewel-Osco, and Shaw’s and Star Markets under New Albertson’s, Inc. has been hit with its second data breach in about a month. In late August, they announced that an attack had taken place between June 22nd and July 17th of 2014. It is believed that the attackers installed malware on the chain’s Point of Sale system, which was networked across the affected stores. This time around the scenario is eerily similar.  A different malware was placed on their Point of Sale system sometime in late…
  • Masterlink Sausage Celebrates 50 Years in Style!

    Bethany Nolan
    29 Sep 2014 | 4:58 pm
    Masterlink Sausage, a popular sausage and hot dog manufacturer right here in the city of Fullerton, will be celebrating 50 years in business this week! 50 years is an impressive milestone for a company that began as a small sausage plant back in 1964. Current owner, Randy Martin, worked at Demes Gourmet as it was known originally, for 16 years before purchasing the company himself. Randy had big dreams for the company, which included expanding beyond the local area. Today, Masterlink Sausage Company produces more than 84 kinds of raw, cooked and smoked sausage and meat products and has…
  • New WideSpread Vulnerability, Shellshock hits Linux

    Milton Security Group
    25 Sep 2014 | 9:22 am
    Now that the Heartbleed panic is winding down, let’s go ahead and bring in the newest threat: Shellshock(CVE-2014-6271). Shellshock is a flaw found in Bash, a standard Unix program used to connect with a computer’s operating system. The program provides a ‘shell’ that lets you execute commands on your system. The flaw was discovered by Stephane Chazelas, an Akamai security researcher who specializes in Unix/Linux and Telecom. Since the flaw exists in all versions up to 4.3, this could affect Linux, Mac OSX, Unix, and Windows (via web servers) machines. Since it is so widespread, it…
  • JQuery Website Redirected to RIG Exploit Kit

    Bethany Nolan
    24 Sep 2014 | 10:55 am
    The JQuery library has been compromised by an attack against the toolkit’s website which is redirecting visitors to a third-party site, which hosts the RIG exploit kit. The RIG Exploit pack is a way of hiding payloads in a compromised website. The code is obscured and decodes itself through a series of iframes. This eventually leads to a site with several scripts that will infect the user’s system. Several pop ups will appear asking to be downloaded. These malicious files are named something along the lines of “UpdateFlashPlayer_(random).exe”. An unsuspecting person clicks…
 
  • add this feed to my.Alltop

    Cyberoam : Securing You

  • Malvertising – The most preferred way of spreading Malware by Attackers

    Kalpesh Devmurari
    1 Oct 2014 | 3:48 am
    Trends exist everywhere. Even cyber criminals and attackers have their own trends. The most recent and popular of all is ‘Malvertising’ among the hackers…!! Malvertising means malicious advertising. The concept is very simple. It’s the use of online advertisements to spread malware. Malvertising involves injecting malicious or malware laden advertisements into legitimate online advertising networks and webpages. Although this form of spreading malware isn’t new, it’s extremely effective in this digital world of online marketing using Advertisements. There are only few major…
  • Cyberoam Secures Against GNU Bash Remote Code Execution Vulnerability

    Cyberoam Threat Research Labs
    26 Sep 2014 | 2:56 am
    The Bash remote code execution vulnerability which remained hidden from public eyes for 2 decades has suddenly exploded like a Bomb. Cyberoam has now released signatures for the vulnerability in its latest automatic IPS upgrade. Meanwhile, media has started comparing the vulnerability with Heartbleed and Honeypots have started catching attempts to exploit the vulnerability. Technical mechanism GNU Bash is a Unix shell replacing the Bourne shell (sh). It is distributed widely as the shell for the GNU operating system and as a default shell on Linux and Mac OS X systems. Bash is a command…
  • Vulnerability Alert – GNU Bash Remote Code Execution

    Cyberoam Threat Research Labs
    25 Sep 2014 | 5:53 am
    A remotely exploitable security vulnerability in bash has been reported recently which is related to the processing of environment variables. It has been reported that the vulnerability is due to insufficient validation of environment variables. CVE ID : CVE-2014-6271 CVSS Base Score : 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P) CVSS Temporal Score : 4.8 (E:U/RL:OF/RC:C) Affected Software GNU Bash 4.3 GNU Bash 4.2 GNU Bash 4.1 GNU Bash 4.0 GNU Bash 3.2 GNU Bash 3.1 GNU Bash 3.0 It is found that instead of stopping after processing the function definition which starts with symbols “ ” the bash…
  • Auction Giant eBay under XSS attack

    Kalpesh Devmurari
    25 Sep 2014 | 4:53 am
    I am a serious online shopper. I am used to buying things from online retailers like eBay and Amazon. They have made our lives a lot easier, haven’t they? I was planning to replace my smartphone which I had purchased two years ago. iPhone particularly was on top of my priority list. I checked on eBay and found some good purchase options with lower prices. I thought my search is over, but it wasn’t so. eBay had started making headlines for being under cyber-attack; hence, I had to stop at that point to prevent myself from being a victim of the online scam. Being curious by nature, I…
  • Vulnerability Alert: Universal XSS (UXSS) Vulnerability on Android

    Cyberoam Threat Research Labs
    22 Sep 2014 | 6:22 am
    Vulnerability Alert: Universal XSS (UXSS) Vulnerability on Android The last week of August saw a disclosure of the Universal XSS (UXSS) Vulnerability which bypasses Same Origin Policy (CVE-2014-6041). The vulnerability if exploited allows an attacker to read the contents of other tabs in a browser when a user visits a page. Cyberoam has made available an online tool to test this particular vulnerability and has released relevant IPS signatures. Threat Description About UXSS UXSS is basically an exploit type which in this case was used to achieve the Same Origin Policy bypass. It affects all…
Log in