Wednesday, November 19, 2014

320 breaches reported between July and September

From Help Net Security:

320 breaches reported between July and September

"Between July and September of this year, there were 320 breaches reported worldwide, an increase of nearly 25 percent compared to the same period last year, and more than 183 million customer accounts and data records containing personal or financial information were either stolen or lost, according to SafeNet."

Does cyber insurance help the CISO get a seat in the boardroom?

From Help Net Security:

Does cyber insurance help the CISO get a seat in the boardroom?

Remember we now live in an era where it is no longer "if" you suffer a data breach but "when" you do.  I've linked to a number of articles on cyber insurance & would strongly recommend it to organizations of all shapes & sizes.

Trojanized Android firmware found on inexpensive handhelds

From Help Net Security:

Trojanized Android firmware found on inexpensive handhelds

Google fined for not taking down "right to be forgotten" links worldwide

From Sophos Naked Security:

Google fined for not taking down "right to be forgotten" links worldwide

NIST: Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems

From NIST:

Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

Direct Link To PDF

US-CERT: Microsoft Releases Out-of-Band Security Bulletin for Windows Kerberos Vulnerability

From US-CERT:

Microsoft Releases Out-of-Band Security Bulletin for Windows Kerberos Vulnerability

US-CERT: IC3 Releases Scam Alert for Fraudulent Online Advertisements

From US-CERT:

IC3 Releases Scam Alert for Fraudulent Online Advertisements

US-CERT: Google Releases Security Update for Chrome

From US-CERT:

Google Releases Security Update for Chrome

Tuesday, November 18, 2014

A look back at 2014's data protection nightmare

From CSOOnline:

A look back at 2014's data protection nightmare

Court agrees that Google’s search results qualify as free speech

From arstechnica:

Court agrees that Google’s search results qualify as free speech

AT&T demands clarity: Are warrants needed for customer cell-site data?

From arstechnica:

AT&T demands clarity: Are warrants needed for customer cell-site data?

‘High risk’ cyber-crime is really a mixed bag of threats

From The Conversation:

‘High risk’ cyber-crime is really a mixed bag of threats

This is a great piece on cybercrime.  Prof. Wall does an excellent job of differentiating between individual vs corporate cybercrime.  He also breaks down the various permutations of cybercrime.  All in all an excellent read.

Deconstructing the Cyber Kill Chain

From DarkReading:

Deconstructing the Cyber Kill Chain

Damn good article by Giora Engel.  He's got it right, focusing too much on Steps 1 - 6 will only address a very narrow set of attacks.  In addition to the examples he's listed consider these.  Reconnaissance is near impossible to detect.  Weaponization only addresses direct attacks, i.e. malware attacks, not the other methods an attacker can use.  Neither of these are something a security professional can control.  In fact, it is best that a security professional works under the presumption that these attacks are already in progress or have been successful. 

Instead think outside the box for Indicators of Compromise (I blogged about them earlier today) that will let you know that you've been compromised.  Things like anomalous outbound traffic, SSH or RDP on port 80 or 443, multiple failed logins for a domain admin account are much better at threat detection.  Once you know you're compromised you can begin the remediation effort & address any blow back that may arise.

New, Free Certificate Authority to Dramatically Increase Encrypted Internet Traffic

Electronic Frontier Foundation (EFF) press release:

New, Free Certificate Authority to Dramatically Increase Encrypted Internet Traffic

ENCRYPT! ENCRYPT! ENCRYPT! Now that it's free you don't have any excuses.

https://letsencrypt.org/

Top 15 Indicators Of Compromise

This is an old article from DarkReading that I just came across.

Top 15 Indicators Of Compromise

Risk assessment benefits, best practices and pitfalls

From Help Net Security:

Risk assessment benefits, best practices and pitfalls

One-in-four have been victims of identity theft

From Help Net Security:

One-in-four have been victims of identity theft

Other research highlights:
  • Online purchases were the top reason that users thought they became victims of identity theft, underscoring the importance of confidence in one’s own online security.
  • The groups that are most likely to say they have been victims of identity theft are those that probably best understand and notice the signs of identity theft: IT workers, online shoppers, higher-salary workers, the tech-savvy, and those with a high digital footprint.
  • Those with the least confidence that their passwords are absolutely secure include, those that do less online shopping (12%), those aged 50-64 (11%), and those with a medium digital footprint (11%).
  • A plurality of consumers are only somewhat confident that their passwords for personal accounts could not be cracked by a computer program, but few are very confident.

Critical factors in preventing data breaches

From Help Net Security:

Critical factors in preventing data breaches

Key findings include:
  • 74% of respondents indicated that targeted attacks are a primary concern for their organizations.
  • 58% of organizations investigated 10 or more attacks last year.
  • Only 24% of companies are confident in their ability to detect an attack within minutes, and just under half said it would take days, weeks, or even months before they noticed suspicious behavior.
  • 78% of those able to detect attacks in minutes had a proactive, real-time Security Information and Event Management (SIEM) system.
  • Half of the companies surveyed indicated that they have adequate tools and technologies to deliver faster incident response, but often critical indicators are not isolated from the mass of alerts generated, placing a burden on IT teams to sift through threat data.

MasterCard promises (slow) death to online payment passwords

From Sophos Naked Security:

MasterCard promises (slow) death to online payment passwords

One Time Passwords (OTP), whether done via a key fob or sent as a text message to your phone would be my choice.  Not so sure I like the biometric options.  While fingerprints aren't a bad idea things like retina scans can facilitate the communication of flu/colds... and tying a heart monitor to authentication seems a bit error prone and fraught with potential liability.  What if you just finished at the gym?  Better yet, what's the liability if the monitor senses you're about to have a heart attack and DOESN'T notify you &/or 911 or your physician?

Jailed Twitter troll: 'It was disgusting what I did'

From Sophos Naked Security:

Jailed Twitter troll: 'It was disgusting what I did'

Anonymous e-hijacks KKK in wake of threats against Ferguson protesters

From Sophos Naked Security:

Anonymous e-hijacks KKK in wake of threats against Ferguson protesters

Can't really say I support the group or tactics but considering the target ...

Monday, November 17, 2014

Your smart TV could be the next target for hackers: Technology expert warns cyber criminals could infect millions of devices

From Mail Online:

Your smart TV could be the next target for hackers: Technology expert warns cyber criminals could infect millions of devices

How cyber-crime-as-a-service stays alive

From ITWebSecurity:

How cyber-crime-as-a-service stays alive

81 percent of Tor clients can be identified with traffic analysis attack

From Hackmageddon:

81 percent of Tor clients can be identified with traffic analysis attack

A fresh C93 phishing Scam targeting Microsoft’s Windows Outlook Users

From Security Affairs:

A fresh C93 phishing Scam targeting Microsoft’s Windows Outlook Users

1-15 November 2014 Cyber Attacks Timeline

From Hackmageddon:

1-15 November 2014 Cyber Attacks Timeline

Cool infographic included!

The top infosec issues of 2014

From CSOOnline:

The top infosec issues of 2014

Homeland Security alerts on end of Windows Server 2003 support

From ZDNet:

Homeland Security alerts on end of Windows Server 2003 support

Like Windows XP it is time for this venerable OS to retire.  Start making upgrade plans now or face a lot of headaches later.  Choice is yours.

Judges impose rare, stricter requirement for “stingray” use by police

From arstechnica:

Judges impose rare, stricter requirement for “stingray” use by police

I'm all for allowing law enforcement to perform legal surveillance on a suspect.  However these devices that "scoop up" all the cell data in an area go well beyond that.  While I am certainly not a lawyer let alone a Constitutional one it would seem to me using these devices clearly violates the Fourth Amendment.

Google’s secret NSA alliance: The terrifying deals between Silicon Valley and the security state

From Salon:
Google’s secret NSA alliance: The terrifying deals between Silicon Valley and the security state

OCC: Retailers Accountable for Breaches

From DataBreachToday:

OCC: Retailers Accountable for Breaches

Retailers you've been warned.  Start upgrading those damn POS systems that are still running Windows XP.

Alleged Creators of WireLurker Malware Arrested in China

From SecurityWeek:

Alleged Creators of WireLurker Malware Arrested in China

Research Finds 1 Percent of Online Ads Malicious

From SecurityWeek:

Research Finds 1 Percent of Online Ads Malicious

Retail Hacking: What To Expect This Holiday Season

From DarkReading:

Retail Hacking: What To Expect This Holiday Season

If you're SMB is in the retail sector you should attend this broadcast.

Cop tracks down one of LAPD’s most wanted fugitives after spotting him on Facebook

From Fox News:

Cop tracks down one of LAPD’s most wanted fugitives after spotting him on Facebook

Why Cyber Security Starts At Home

From DarkReading:

Why Cyber Security Starts At Home

Hats off to Cory Nachreiner for this one!  Great job explaining how security, or a lack thereof, affects everyone.

AT&T Drops Controversial Tracking Header

From ThreatPost:

AT&T Drops Controversial Tracking Header

Tracking users is NOT COOL!!!

FTC Scam Alert: Open season for identity thieves

From the FTC:

Open season for identity thieves

It's time for healthcare enrollment & cybercriminals have a plethora of ways to steal your money.

Most of the top 100 paid Android and iOS apps have been hacked

From Help Net Security:

Most of the top 100 paid Android and iOS apps have been hacked

Enabling secure file sharing in the enterprise

From Help Net Security:

Enabling secure file sharing in the enterprise

US State Department targeted by hackers

From Help Net Security:

US State Department targeted by hackers

Cybersecurity & the C-Suite

Great pdf from IDG.

Cybersecurity & the C-Suite

If you're an executive, or an IT Manager/Staff Member trying to explain to upper management, why cybersecurity is important for your organization you need to read this.

Spy in the sky? Flying surveillance devices are scooping up Americans' phone data

From Sophos Naked Security:

Spy in the sky? Flying surveillance devices are scooping up Americans' phone data

Why is it I'm not surprised at this?  The good ole USPS is looking better & better.

Friday, November 14, 2014

CoinVault Ransomware’s Free File Decrypt A Show of Good Faith

From ThreatPost:

CoinVault Ransomware’s Free File Decrypt A Show of Good Faith

How nice of them to decrypt one file.  Who says the bad guys don't have a heart?

Internet Voting Hack Alters PDF Ballots in Transmission

From ThreatPost:

Internet Voting Hack Alters PDF Ballots in Transmission

NOAA Compromised in Apparent Chinese Attack

From ThreatPost:

NOAA Compromised in Apparent Chinese Attack

Default ATM passcodes still exploited by crooks

From Help Net Security:

Default ATM passcodes still exploited by crooks

ISPs are removing encryption from customers' emails

From Help Net Security:

ISPs are removing encryption from customers' emails

Protect your teens: 7 apps and websites parents should be aware of

From Sophos Naked Security:

Protect your teens: 7 apps and websites parents should be aware of

Two-factor authentication: Understanding the options

From Sophos Naked Security:

Two-factor authentication: Understanding the options