Sunday, May 31, 2015
Sections of USA Patriot Act hours away from expiration
from Latest topics for ZDNet in Security http://ift.tt/1PY1uHz
日本語によるワンクリック詐欺が、新しい手口で再登場
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1Fk6ACI
Saturday, May 30, 2015
The increasing cyberattack surface
Technology is always growing, particularly within the workplace. This is a good thing: It means progress is happening, and for businesses that adopt technological developments, it usually spells progress. However, the problem of cybercrime complicates matters somewhat. Just as organizational tech solutions are evolving, so too are the hackers who are always looking to carry out malicious intrusions. It’s not a pretty picture. The fact is that cyberattacks will only grow more common in the coming years – and not only that, but they’ll also rise in sophistication and scale. It’s a problem that no company can decide to ignore.
The first part of the problem: Businesses
Interestingly, the primary contributing factor to the elevating attack surface involves what businesses are doing – or, more accurately, what they aren’t doing. As Jon Oltsik highlighted in an op-ed for Network World, businesses are increasingly ill-equipped to deal with the many threats that can possibly pervade enterprise networks. The main issue is that while cybercrime has advanced, company approaches to defending against it haven’t. These are some of the ways organizations typically set themselves up for attack as far as hackers are concerned:
- Not educating staff in best cybersecurity practices: A business’ cybersecurity plan cannot begin and end with its IT department. That’s not realistic in an age when employees are accessing the company network all the time. Enterprises make a huge mistake in assuming that staffers have a baseline level of cybersecurity knowledge, when in fact this is almost never the case. As a result, many corporate breaches happen due to a single weak link – an employee who leaves his or her company-connected smartphone on the subway, or another who inadvertently downloads a phishing scheme.
- Using outdated endpoint security measures: Endpoint security, like the threats it guards against, is something that evolves. After all, yesterday’s computer security solutions weren’t built to handle next year’s threats. One common issue with businesses that secure their infrastructures is that they don’t take the proactive step of updating those security solutions. Thus, they’re left with a set of tools that may have been viable in years past, but which are no longer equipped to handle the malware sphere.
- Assuming that you won’t be the next victim: All too often companies operate with a stunning presumptuousness when it comes to cybertattacks. The prevailing feeling among many businesses is, “We haven’t been attacked yet, so we must be good.” This is such misguided thinking, and yet it’s present at organizations spanning industries. This problematic line of thought all but ensures that in fact you will be the next victim. After all, the most complacent businesses are never the ones with the cyber security software required to keep attackers at bay.
The second part of the problem: Actual threats increasing
Even for the most prepared organization out there, the cyberattack surface is getting harder to handle. That’s because strains of malware are growing in complexity as hackers devise new and more innovative tools for carrying out their dirty work. Here are a few of the ways the malicious sphere is expanding these days:
- Evolution of targeted attacks: Targeted attacks are becoming the new norm. Whereas in the past such intrusions were mainly manifested through spear-phishing emails and options like that, social media presents a lucrative point of infection for future incidents. Imagine an employee sitting at his or her desk and looking at Facebook. Not a hard situation to visualize, since the social media network represents the number one distraction for workers. Now imagine that simply by being on Facebook an employee could unwittingly allow a targeted attack into the business network. That’s the kind of disaster situation that’s going to become increasingly common, and it will call for more advanced means of cyber protection.
- Susceptibility of IoT devices to data theft: Smart technology is beginning to crowd the workplace. With mobile devices already commonplace in enterprise networks, there are new devices always being added to the fold, like the smartwatches that are now being introduced into the market. The growth of such connected devices, while promising innovation, also present threats and inherently open up vulnerabilities for businesses that choose to leverage them. Criminals are likely to experiment with many different ways of attacking these devices, but some of the methods that are likely to happen are denial-of-service attacks and man-in-the-middle attacks.
- Bigger and worse attacks: First, 2013 looked like a bad year for cybersecurity. Then 2014 blew it out of the water. That’s the trend with cybercrime: Each previous year pales in comparison to the next. In 2013, the Target hack was without precedent. It was devastating. Then 2014 rolled around and the Home Depot hack surpassed Target in terms of the biggest breach victim. The problem companies face these days is that potential attacks come from all angles. There are the ones carried out by cybercriminals – and these are the ones that get the most media exposure. But then there are attacks that arise from insider threats, which actually occur in greater numbers.
- Cybercriminals continuing to evade the law: The thing about cybercriminals that places them at an advantage over other criminals is that their malicious work takes place virtually, making them exceedingly hard to trace. The task of pinning down hackers and holding them accountable is something governments around the world are taking up with energy, but don’t hold your breath for that to pan out anytime soon. The reality is that due to their remote nature and aptitude at evading justice, malicious actors have the definite upper hand in the battle with law enforcement.
With issues like these facing all businesses, the need has never been greater for organizations to do everything possible to combat the cybercriminal threat. This means taking protective measures like implementing network security, mobile security and being cognizant of the threat posed by targeted attacks. The businesses that ignore the risks are the first ones that will get attacked, while those that prepare stand a much better chance of steering clear of cybercrime.
from Trend Micro Simply Security http://ift.tt/1AB8hQJ
via IFTTT
Vuln: WordPress ReFlex Gallery Plugin 'php.php' Arbitrary File Upload Vulnerability
from SecurityFocus Vulnerabilities http://ift.tt/1BwKOe9
How to Fix iPhone Crash Text Message Bug
from The Hacker News http://ift.tt/1J9OdHI
Friday, May 29, 2015
Silk Road Mastermind Ross Ulbricht Sentenced To Life In Prison
from The Hacker News http://ift.tt/1BvPO2L
IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM XIV Storage System Gen2 (CVE-2015-2808)
from IBM Product Security Incident Response Team http://ift.tt/1HBuUS5
IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM XIV Storage System Gen3 (CVE-2015-2808)
from IBM Product Security Incident Response Team http://ift.tt/1HBuRWm
IBM Security Bulletin: Vulnerability in SSLv3 affects IBM XIV Storage System Gen 3.0 (CVE-2014-3566)
from IBM Product Security Incident Response Team http://ift.tt/1HBuRWk
Angler Exploit Kit Loads Up CryptoWall 3.0, Flash Flaw
from http://ift.tt/1PTxFrv
Facebook Rolls Out Security Check
from http://ift.tt/1G9iPIN
NSA Snooping Faces Shutdown as Senate Convenes Sunday
from http://ift.tt/1Rwo5bA
Japanese one-click fraudsters give old trick a second chance
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1KCMOKq
How the EMV shift could impact online retailers
Protect Your Net: Shared Security Responsibility in the Cloud
It’s no secret why businesses small and large continue to move workloads to the cloud. The agility and flexibility it provides, combined with the ability to focus on their business versus running a data center means companies are now asking, “what can’t I move to the cloud” versus, “what can I?”
And now that you’re moving to the cloud – leveraging the secure cloud offerings from AWS or Azure and others – it’s imperative to understand how the security model changes.
Much like soccer, cloud security is a team sport. In soccer, each player on the team has her role, and in cloud security, you and your cloud provider each have specific security responsibilities.
Specifically, your cloud service provider, such as AWS or Microsoft Azure, is responsible for securing the cloud infrastructure up to the hypervisor layer, including:
- Physical infrastructure
- Network infrastructure
- Virtualization layer
While you, as the user of the cloud service, are responsible for securing everything you put in the cloud, including:
- Applications
- Data
- Operating systems/ platform
But how do you approach security now that you’re in the open field of the cloud, without physical perimeters on which to put your controls?
Trend Micro Deep Security has been built from the ground up to protect cloud workloads – without getting in the way. It helps you meet most of your shared security responsibilities, including:
- Preventing exploitation of vulnerabilities like Shellshock
- Protecting networks from attack
- Keeping malware off your workloads
- Providing actionable insight into system activity
- Augmenting AWS controls to help speed PCI-DSS compliance
Click here to learn more about how Deep Security can help secure your cloud environment. To dive into specific security information for the leading cloud service providers, visit:
- Amazon Web Services (AWS) – Security Centerhttp://ift.tt/TEHk7x
- Microsoft Azure – Trust Centre http://ift.tt/1iN78d3
from Trend Micro Simply Security http://ift.tt/1FRMkgn
via IFTTT
This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
The IRS Hack: What it means and what it means for you
The IRS announced that more than 100,000 U.S. taxpayers’ information was illegally accessed through the “Get Transcript” web application.
Trend Micro Gives Insight to USA TODAY on IRS Hack
The hackers who got access to over 100,000 personal records through the Internal Revenue Service’s Get Transcript site need lots of information to break in? Experts discuss.
Insider Data Breach at Medical Billing Company Hits Patients at Several Hospitals
A call center employee at billing company Medical Management, LLC stole thousands of patients’ names, birthdates and Social Security numbers.
Internet of Things: Whose data is it, anyway?
The Internet of Things can be a venue for innovation and new possibilities, but it can also be used to break basic notions of privacy and confidentiality.
Cyber Bank Heist has been tied to Russian Government IP Address
Researchers have tied a worldwide cyber bank heist to an IP address linked to the Russian Federal Security Service (FSB).
U.S. Government Proposes to Classify Cybersecurity or Hacking Tools as Weapons of War
The BIS, an agency of the U.S. Department of Commerce that deals with issues involving national security and high technology, has proposed tighter export rules for computer security tools.
UK Kids Set for Cybersecurity Computing Exams
The UK’s Oxford, Cambridge and RSA (OCR) exam board has drafted a new GCSE Computer Science course with a major focus on cybersecurity.
The Solo Cybercriminal has been Profiled
Are the one-man cybercrime operators in the shadowy online crime underground the evolved version of the petty thief?
Mr. CISO: Tear Down These Legacy Cybersecurity Walls!
CEOs, CIOs, and CISOs should aggressively identify areas where the organizational status quo is getting in the way of strong cybersecurity hygiene and tear down these legacy walls as soon as possible.
Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.
from Trend Micro Simply Security http://ift.tt/1Ktl8nV
via IFTTT
Bugtraq: [security bulletin] HPSBMU03223 rev.1 - HP Insight Control server provisioning running SSLv3, Remote Denial of Service (DoS), Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1HAqOtp
Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM System Networking Switch Center (CVE-2014-3566, CVE-2014-6512, CVE-2014-6457 CVE-2015-0410, CVE-2015-6593)
from IBM Product Security Incident Response Team http://ift.tt/1Bu3Jq7
IBM Security Bulletin: Ceilometer database access unrestricted in PowerVC (CVE-2015-1937)
from IBM Product Security Incident Response Team http://ift.tt/1d3sIe3
IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM SPSS Analytic Server (CVE-2015-0488, CVE-2015-0478, CVE-2015-2808)
from IBM Product Security Incident Response Team http://ift.tt/1HRG9Lp
IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Asset and Service Management
from IBM Product Security Incident Response Team http://ift.tt/1KtcPbH
IBM Security Bulletin: Vulnerability in javax.management API affects IBM License Metric Tool and IBM Tivoli Asset Discovery for Distributed (CVE-2015-1920)
from IBM Product Security Incident Response Team http://ift.tt/1KCt1dT
Zero Day Weekly: IRS blames Russia, a loose Moose, Megaupload malware
IBM Security Bulletin: Cross-site scripting vulnerabilities in IBM Business Process Manager (BPM) and WebSphere Lombardi Edition (WLE) error handling (CVE-2015-0193)
from IBM Product Security Incident Response Team http://ift.tt/1KCt1dP
Security Bulletin: Vulnerabilities in OpenSSL affect Integrated Management Module II (IMM2) (CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206)
from IBM Product Security Incident Response Team http://ift.tt/1KCt0Xx
Bugtraq: [security bulletin] HPSBMU03261 rev.2 - HP Systems Insight Manager running OpenSSL on Linux and Windows, Remote Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1PSkI1e
Bugtraq: [security bulletin] HPSBMU03263 rev.3 - HP Insight Control running OpenSSL, Remote Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1EDOxXx
Bugtraq: [security bulletin] HPSBMU03267 rev.2 - HP Matrix Operating Environment and HP CloudSystem Matrix running OpenSSL, Remote Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1PSkFT8
Bugtraq: [security bulletin] HPSBGN03332 rev.1 - HP Operations Analytics running SSLv3, Remote Denial of Service (DoS), Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1EDOw5M
IBM Security Bulletin: Users are not logged out of the Requirements Management (RM) application after the LTPA timeout period is reached (CVE-2015-0121)
from IBM Product Security Incident Response Team http://ift.tt/1LNMxlF
Security Bulletin: Multiple vulnerabilities in OpenSSL affect MegaRAID Storage Manager (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3510, CVE-2014-3567)
from IBM Product Security Incident Response Team http://ift.tt/1LNMupS
Bugtraq: JSPMyAdmin SQL Injection, CSRF & XSS Vulnerabilities
from SecurityFocus Vulnerabilities http://ift.tt/1LNE2GY
Bugtraq: [SECURITY] [DSA 3274-1] virtualbox security update
from SecurityFocus Vulnerabilities http://ift.tt/1PSfxyd
Hola — A widely popular Free VPN service used as a Giant Botnet
from The Hacker News http://ift.tt/1FHzzDO
'Tox' Offers Free build-your-own Ransomware Malware Toolkit
from The Hacker News http://ift.tt/1d3e0ng
Volatile Cedar — Global Cyber Espionage Campaign Discovered
from The Hacker News http://ift.tt/1GJ7qOL
Iran Blames US for Cyber-Attack on Oil Ministry
from http://ift.tt/1FHrhM6
Apple issues temporary workaround for iPhone crashing Messages bug
Hola: A free VPN with a side of botnet
Indian Music Site Gaana ‘Hacked’ by Researcher
from http://ift.tt/1LQfrRk
Leeds the UK Capital of Smartphone Theft
from http://ift.tt/1ED6nK9
Thursday, May 28, 2015
Grabit Spy Campaign Nabs 10,000 SMB Files
from http://ift.tt/1HzD1OU
パスワードの使い回しは危険: スターバックス利用者が口座から資金を盗まれる恐れ
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1HQpIiz
パッチ未適用のホストシステムで仮想マシンを危険にさらす VENOM 脆弱性
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1LMSJKv
China Preps 5-Year Cybersecurity Plan
from http://ift.tt/1FjPgi5
Companies Buy Good Security, But Fail to Deploy It Properly
from http://ift.tt/1SFi2CZ
CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper
By Frank Guanco, Research Analyst, CSA Consider this scenario: A CIO at a Fortune 500 company receives a call from a reporter asking how the company is responding to the announcement of the new commercially available quantum computer that can “break” RSA and Elliptic Curve Cryptography (ECC). This CIO has no plan, so he politely offers a […]
The post CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper appeared first on Cloud Security Alliance Blog.
from Cloud Security Alliance Blog http://ift.tt/1JXJjwE
New Email Security Release Adds Graymail Protection, Performance Monitoring Enhancements, and More
from Cisco Blog » Security http://ift.tt/1QdtkKM