Wednesday, November 30, 2016
Quantum Computing and Cybersecurity
from Quantum Computing and Cybersecurity
Paul Vixie, Compromised Security in IoT Caused by Market Pressure
from Paul Vixie, Compromised Security in IoT Caused by Market Pressure
Musings About Advanced Ransomware
from Musings About Advanced Ransomware
10 Attributes of a NextGen Security Program
from 10 Attributes of a NextGen Security Program
Secure Data Deletion
from Secure Data Deletion
Hackers reuse passwords to access 26,500 National Lottery accounts
from Hackers reuse passwords to access 26,500 National Lottery accounts
Real threats for business: Mischief, extortion and million-dollar frauds
from Real threats for business: Mischief, extortion and million-dollar frauds
Ten things you didn’t know about the Umbrella roaming client
Ten things you didn’t know about the Umbrella roaming client. You may already know that the Umbrella roaming client is a small endpoint agent that provides on and off-network protection for Windows and Mac laptops. Here are ten other things you probably didn’t know! 1. It handles most internal domains automatically. The roaming client automatically sends […]
The post Ten things you didn’t know about the Umbrella roaming client appeared first on OpenDNS Umbrella Blog.
from Ten things you didn’t know about the Umbrella roaming client
Fake WhatsApp email comes as a billing alert
Recently, we have received a report from one of our readers on Facebook regarding another criminal-driven campaign targeting WhatsApp users. It comes in the form of a phishing email, which our reader has forwarded for us to look into.
Categories: Tags: fake whatsapp billing alertfraudphishingphishing scamscamwhatsapp |
from Fake WhatsApp email comes as a billing alert
You need to embrace Straight Talk as more than communication to unlock the value
What is Straight Talk? Look it up (and move past the wireless plan in the US) to confirm Straight Talk is a direct, plain, and honest manner of speaking. We love it when someone talks straight. It’s refreshing. But it’s just a different way to communicate, right? Not everyone is ready for Straight Talk, are they? […]
The post You need to embrace Straight Talk as more than communication to unlock the value appeared first on Security Catalyst.
from You need to embrace Straight Talk as more than communication to unlock the value
Tuesday, November 29, 2016
You, Too, Can Rent the Murai Botnet
San Francisco Transit System Target of Ransomware
Monday, November 28, 2016
Tech support scams evolve, borrow tricks from ransomware creators
from Tech support scams evolve, borrow tricks from ransomware creators
Threat Intelligence – An Adaptive Approach to Information Security – Free Consultation Available
from Threat Intelligence – An Adaptive Approach to Information Security – Free Consultation Available
BSides Lisbon 2016, Diogo Mónica’s ‘MTLS in a Microservices World’
from BSides Lisbon 2016, Diogo Mónica’s ‘MTLS in a Microservices World’
Cerber Spam: Tor All the Things!
from Cerber Spam: Tor All the Things!
San Francisco Transit System Target of Ransomware
from San Francisco Transit System Target of Ransomware
A week in security (Nov 20 – Nov 26)
A compilation of notable security news and blog posts from the 20th of November to the 26th. This week, we talked about PrincessLocker, ransomware decryptors, malvertising on the Mac, and the Windows Firewall.
Categories: Tags: decryptorfirewallmalvertisingPrincessLockerransomwarerecapteslacryptweekly blog roundup |
from A week in security (Nov 20 – Nov 26)
test post for links
from test post for links
From my Gartner Blog – Comparing UEBA Solutions
As Anton anticipated, we’ve started working on our next research cycle, now with the intent of producing a comparison of UEBA (User and Entity Behavior Analytics) solutions. We produced a paper comparing EDR solutions a few months ago, but so far the discussion on how to compare UEBA solutions has been far more complex (and interesting!).
First, while on EDR we focused on comparing how the tools would fare related to five key use cases, for UEBA the use cases are basically all the same: detecting threats. The difference is not only on which threats should be detected, but also on how to detect the same threats. Many of these tools have some focus on internal threats (if you consider “pseudo-internal” too, ALL of them focus on internal threats), and there are many ways you could detect those. A common example across these tools: detecting an abnormal pattern of resource access by an user. That could indicate that the user is accessing data he/she is not supposed to access, or even that credentials were compromised and are being used by an attacker to access data.
But things are even more complicated.
Have you notice that “abnormal pattern of resource access” there?
What does it mean? That’s where tools can do things in very different ways, arriving on the same (or on vastly different results) results. You can build a dynamic profile of things the user usually access and alert when something out of that list is touched. You can also do that considering additional variables for context, like time, source (e.g. from desktop or from mobile), application and others. And why should we stop at profiling only the individual user? Would it be considered anomalous if the user’s peers usually access that resource? Ok, but who are the user peers? How do you build a peer list? Point to an OU on AD? Or learn it dynamically by putting together people with similar behaviors?
(while dreaming about how we can achieve our goal with this cool “Machine Learning” stuff, let’s not forget you could do some of this with SIEM rules only…)
So, we can see how one single use case can be implemented by the different solutions. How do we define what is “better”? This is pretty hard, especially because there’s not something like AV-TEST available to test these different methods (models, algorithms, rules…taxonomy alone is crazy enough).
So what can we do about it? We need to talk to users of all these solutions and get data from the field about how they are performing in real environments. That’s OK. But after that we need to figure out, for good and bad feedback, how those things map to each solution feature set. If clients of solution X are happy about how it’s great on detecting meaningful anomalies (oh, by the way, this is another thing we’ll discuss in another blog post – which anomalies are just that, and which ones are meaningful from a threat detection perspective), we need to figure out what in X makes it good for that use case, so we can find which features and capabilities matter (and which are just noise and unnecessary fluff). Do I need to say we’ll be extremely busy in the next couple of months?
Of course, we could also use some help here; if you’ve been through a bake-off or a comparison between UEBA tools, let us know how you’ve done it; we’d love to hear that!
The post Comparing UEBA Solutions appeared first on Augusto Barros.
from Augusto Barros http://ift.tt/2fFIQDF
via IFTTT
from From my Gartner Blog – Comparing UEBA Solutions
Tech support scammers up their game with ransomware
Ransomware is so popular that even tech support scammers have eventually adopted it. Now the ransom note asks you to call 'Microsoft' to get your encrypted files back.
Categories: Tags: microsoftransomwaretech supporttech support scamsTSSVindows Locker |
from Tech support scammers up their game with ransomware
Microsoft Debunks Top Cloud Myths of 2016
from Microsoft Debunks Top Cloud Myths of 2016
Sunday, November 27, 2016
BSides Lisbon 2016, Pedro Vilaça’s ‘Memory Corruption is for Wussies!’
from BSides Lisbon 2016, Pedro Vilaça’s ‘Memory Corruption is for Wussies!’
No, it’s Matt Novak who is a fucking idiot
The author, Matt Novak, is of the new wave of hard-core leftists intolerant of those who disagree with them. His position is that everyone is an idiot who doesn’t agree with his views: Libertarians, Republicans, moderate voters who chose Trump, and even fellow left-wingers that aren’t as hard-core.
If you carefully read his piece, you’ll see that Novak doesn’t actually prove Snowden is wrong. Novak doesn’t show how Snowden disagrees with facts, but only how Snowden disagrees with the left-wing view of the world. It’s only through deduction that we come to the conclusion: those who aren’t left-wing are idiots, Snowden is not left-wing, therefore Snowden is an idiot.
The question under debate in the piece is:
technology is more important than policy as a way to protect our libertiesIn other words, if you don’t want the government spying on you, then focus on using encryption (use Signal) rather than trying to change the laws so they can’t spy on you.
On a factual basis (rather than political), Snowden is right. If you live in Germany and don’t want the NSA spying on you there is little policy-wise that you can do about it, short of convincing Germany to go to war against the United States to get the US to stop spying.
Likewise, for all those dissenters in countries with repressive regimes, technology precedes policy. You can’t effect change until you first can protect yourselves from the state police who throws you in jail for dissenting. Use Signal.
In our own country, Snowden is right about “politics”. Snowden’s leak showed how the NSA was collecting everyone’s phone records to stop terrorism. Privacy organizations like the EFF supported the reform bill, the USA FREEDOM ACT. But rather than stopping the practice, the “reform” opened up the phone records to all law enforcement (FBI, DEA, ATF, IRS, etc.) for normal law enforcement purposes.
Imagine the protestors out there opposing the Dakota Access Pipeline. The FBI is shooting down their drones and blasting them with water cannons. Now, because of the efforts of the EFF and other privacy activists, using the USA FREEDOM ACT, the FBI is also grabbing everyone’s phone records in the area. Ask yourself who is the fucking idiot here: the guy telling you to use Signal, or the guy telling you to focus on “politics” to stop this surveillance.
Novak repeats the hard-left version of the creation of the Internet:
The internet has always been monitored by the state. It was created by the fucking US military and has been monitored from day one. Surveillance of the internet wasn’t invented after September 11, 2001, no matter how many people would like to believe that to be the case.No, the Internet was not created by the US military. Sure, the military contributed to the Internet, but the majority of contributions came from corporations, universities, and researchers. The left-wing claim that the government/military created the Internet involves highlighting their contributions while ignoring everyone else’s.
The Internet was not “monitored from day one”, because until the 1990s, it wasn’t even an important enough network to monitor. As late as 1993, the Internet was dwarfed in size and importance by numerous other computer networks – until the web took off that year, the Internet was considered a temporary research project. Those like Novak writing the history of the Internet are astonishingly ignorant of the competing networks of those years. They miss XNS, AppleTalk, GOSIP, SNA, Novel, DECnet, Bitnet, Uunet, Fidonet, X.25, Telenet, and all the other things that were really important during those years.
And, mass Internet surveillance did indeed come only after 9/11. The NSA’s focus before that was on signals and telephone lines, because that’s where all the information was. When 9/11 happened, they were still trying to catch up to the recent growth of the Internet. Virtually everything Snowden documents came after 9/11. Sure, they had programs like FAIRVIEW that were originally created to get telephone information in the 1970s, but these programs only started delivering mass Internet information after 9/11. Sure, the NSA occasionally got emails before 9/11, but nothing like the enormous increase in collection afterwards.
What I’ve shown here is that Matt Novak is a fucking idiot. He gets basic facts wrong about how the Internet works. He doesn’t prove Snowden’s actually wrong by citing evidence, only that Snowden is wrong because he disagrees with what leftists like Novak believe to be right. All the actual evidence supports Snowden in this case. It doesn't mean we should avoid all politics, only that if you are a DAP protester, use Signal instead of unencrypted messaging or phone.
from No, it’s Matt Novak who is a fucking idiot
Toolsmith – GSE Edition: Scapy vs CozyDuke
from Toolsmith – GSE Edition: Scapy vs CozyDuke
ATM Insert Skimmers: A Closer Look
from ATM Insert Skimmers: A Closer Look
BSides Lisbon 2016 – MTLS in a Microservices World by Diogo Mónica
The post BSides Lisbon 2016 – MTLS in a Microservices World by Diogo Mónica appeared first on BruteForce Lab's Blog.
from BSides Lisbon 2016 – MTLS in a Microservices World by Diogo Mónica
BSides Lisbon 2016, David Sopas’ ‘The Way of the Bounty’
from BSides Lisbon 2016, David Sopas’ ‘The Way of the Bounty’
Saturday, November 26, 2016
Can Configuration Manager manage Windows Defender in Windows 10?
from Can Configuration Manager manage Windows Defender in Windows 10?
Can Configuration Manager manage Windows Defender in Windows 10?
from Can Configuration Manager manage Windows Defender in Windows 10?
Can I use an Azure AD account with Cortana in Windows 10 Anniversary?
from Can I use an Azure AD account with Cortana in Windows 10 Anniversary?
Can I use an Azure AD account with Cortana in Windows 10 Anniversary?
from Can I use an Azure AD account with Cortana in Windows 10 Anniversary?
Solve remote PowerShell errors trying to enable cluster aware updating.
from Solve remote PowerShell errors trying to enable cluster aware updating.
Solve remote PowerShell errors trying to enable cluster aware updating.
from Solve remote PowerShell errors trying to enable cluster aware updating.
The Trouble With Recounts in the Name of Hacking
from The Trouble With Recounts in the Name of Hacking
Encrypted email service Riseup sparks worry after warrant canary ‘expires’
from Encrypted email service Riseup sparks worry after warrant canary ‘expires’
Encrypted email service Riseup sparks worry after warrant canary ‘expires’
from Encrypted email service Riseup sparks worry after warrant canary ‘expires’
BSides Lisbon 2016, Oliver Kunz’s ‘Semi-Offline Attack on the Android Full-Disk Encryption’
from BSides Lisbon 2016, Oliver Kunz’s ‘Semi-Offline Attack on the Android Full-Disk Encryption’
Friday, November 25, 2016
Friday Squid Blogging: Striped Pyjama Squid
Here's a nice picture of one of the few known poisonous squids.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
from Friday Squid Blogging: Striped Pyjama Squid
Hacking and the 2016 Presidential Election
Was the 2016 presidential election hacked? It's hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting machines were tampered with in three states that Donald Trump won this month: Wisconsin, Michigan and Pennsylvania.
The researchers behind these reports include voting rights lawyer John Bonifaz and J. Alex Halderman, the director of the University of Michigan Center for Computer Security and Society, both respected in the community. They have been talking with Hillary Clinton's campaign, but their analysis is not yet public.
According to a report in New York magazine, the share of votes received by Clinton was significantly lower in precincts that used a particular type of voting machine: The magazine story suggested that Clinton had received 7 percent fewer votes in Wisconsin counties that used electronic machines, which could be hacked, than in counties that used paper ballots. That is exactly the sort of result we would expect to see if there had been some sort of voting machine hack. There are many different types of voting machines, and attacks against one type would not work against the others. So a voting anomaly correlated to machine type could be a red flag, although Trump did better across the entire Midwest than pre-election polls expected, and there are also some correlations between voting machine type and the demographics of the various precincts. Even Halderman wrote early Wednesday morning that "the most likely explanation is that the polls were systematically wrong, rather than that the election was hacked."
What the allegations, and the ripples they're causing on social media, really show is how fundamentally untrustworthy our hodgepodge election system is.
Accountability is a major problem for U.S. elections. The candidates are the ones required to petition for recounts, and we throw the matter into the courts when we can't figure it out. This all happens after an election, and because the battle lines have already been drawn, the process is intensely political. Unlike many other countries, we don't have an independent body empowered to investigate these matters. There is no government agency empowered to verify these researchers' claims, even if it would be merely to reassure voters that the election count was accurate.
Instead, we have a patchwork of voting systems: different rules, different machines, different standards. I've seen arguments that there is security in this setup an attacker can't broadly attack the entire country but the downsides of this system are much more critical. National standards would significantly improve our voting process.
Further investigation of the claims raised by the researchers would help settle this particular question. Unfortunately, time is of the essence underscoring another problem with how we conduct elections. For anything to happen, Clinton has to call for a recount and investigation. She has until Friday to do it in Wisconsin, until Monday in Pennsylvania and until next Wednesday in Michigan. I don't expect the research team to have any better data before then. Without changes to the system, we're telling future hackers that they can be successful as long as they're able to hide their attacks for a few weeks until after the recount deadlines pass.
Computer forensics investigations are not easy, and they're not quick. They require access to the machines. They involve analysis of Internet traffic. If we suspect a foreign country like Russia, the National Security Agency will analyze what they've intercepted from that country. This could easily take weeks, perhaps even months. And in the end, we might not even get a definitive answer. And even if we do end up with evidence that the voting machines were hacked, we don't have rules about what to do next.
Although winning those three states would flip the election, I predict Clinton will do nothing (her campaign, after all, has reportedly been aware of the researchers' work for nearly a week). Not because she does not believe the researchers - although she might not - but because she doesn't want to throw the post-election process into turmoil by starting a highly politicized process whose eventual outcome will have little to do with computer forensics and a lot to do with which party has more power in the three states.
But we only have two years until the next national elections, and it's time to start fixing things if we don't want to be wondering the same things about hackers in 2018. The risks are real: Electronic voting machines that don't use a paper ballot are vulnerable to hacking.
Clinton supporters are seizing on this story as their last lifeline of hope. I sympathize with them. When I wrote about vote-hacking the day after the election, I said: "Elections serve two purposes. First, and most obvious, they are how we choose a winner. But second, and equally important, they convince the loser - and all the supporters - that he or she lost." If the election system fails to do the second, we risk undermining the legitimacy of our democratic process. Clinton's supporters deserve to know whether this apparent statistical anomaly is the result of a hack against our election system or a spurious correlation. They deserve an election that is demonstrably fair and accurate. Our patchwork, ad hoc system means they may never feel confident in the outcome. And that will further erode the trust we have in our election systems.
This essay previously appeared in the Washington Post.
Edited to Add: Green-party candidate Jill Stein is calling for a recount in the three states. I have no idea of a recount includes forensic analysis to ensure that the machines were not hacked, but I doubt it. It would be funny if it wasn't all so horrible.
Also, here's an article from 538.com arguing that demographics explains all the discrepancies.
from Hacking and the 2016 Presidential Election
The malicious iPhone video with a silver lining
from The malicious iPhone video with a silver lining
Black Friday Purchases Could Deliver Malware to Your Network
from Black Friday Purchases Could Deliver Malware to Your Network
Tesla cars can be stolen by hacking the app
Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered. Such a hack gives criminals total control of the vehicle, providing additional functionality to that exposed by Keen Security Labs in a different hack in late September.... Read more
The post Tesla cars can be stolen by hacking the app appeared first on VASCO Data Security - Blog.
from Tesla cars can be stolen by hacking the app
Lock down your Twitter: take care that rogue third-party apps don’t hijack your account
from Lock down your Twitter: take care that rogue third-party apps don’t hijack your account
BSides Lisbon 2016, Dima Bekerman ‘s ‘Brace YoSelf: DDoS is Coming’
from BSides Lisbon 2016, Dima Bekerman ‘s ‘Brace YoSelf: DDoS is Coming’
Don’t be a security turkey this Thanksgiving!
from Don’t be a security turkey this Thanksgiving!
Support Scams and Diagnostic Services
from Support Scams and Diagnostic Services
‘Compromised’ laptop implicated in US Navy breach of 130,000 records
from ‘Compromised’ laptop implicated in US Navy breach of 130,000 records
Dr Solly Yanks a Support Scammer’s Chain
from Dr Solly Yanks a Support Scammer’s Chain
Facebook ‘quietly developing censorship tool’ for China
from Facebook ‘quietly developing censorship tool’ for China
Thursday, November 24, 2016
Securing Communications in a Trump Administration
Susan Landau has an excellent essay on why it's more important than ever to have backdoor-free encryption on our computer and communications systems.
Protecting the privacy of speech is crucial for preserving our democracy. We live at a time when tracking an individual -- a journalist, a member of the political opposition, a citizen engaged in peaceful protest -- or listening to their communications is far easier than at any time in human history. Political leaders on both sides now have a responsibility to work for securing communications and devices. This means supporting not only the laws protecting free speech and the accompanying communications, but also the technologies to do so: end-to-end encryption and secured devices; it also means soundly rejecting all proposals for front-door exceptional access. Prior to the election there were strong, sound security arguments for rejecting such proposals. The privacy arguments have now, suddenly, become critically important as well. Threatened authoritarianism means that we need technological protections for our private communications every bit as much as we need the legal ones we presently have.
Unfortunately, the trend is moving in the other direction. The UK just passed the Investigatory Powers Act, giving police and intelligence agencies incredibly broad surveillance powers with very little oversight. And Bits of Freedom just reported that "Croatia, Italy, Latvia, Poland and Hungary all want an EU law to be created to help their law enforcement authorities access encrypted information and share data with investigators in other countries."
from Securing Communications in a Trump Administration
Kiwicon X: Pwning ML for Fun and Profit
from Kiwicon X: Pwning ML for Fun and Profit
SSD Advisory – CakePHP Multiple Vulnerabilities
from SSD Advisory – CakePHP Multiple Vulnerabilities
Showrooming this shopping season? Protect yourself with a VPN.
During Black Friday and the weeks leading up to Christmas, tech savvy shoppers visit brick-and-mortar stores to see the items they want to buy, but they use price comparison apps on their phones to check for the best deal. This is called “showrooming”. Shopping apps do things like scan barcodes for price comparisons between your local retailer and online stores, send alerts when the price drops, find money-saving coupons, and even tell which stores in the mall have a particular item on sale.
from Showrooming this shopping season? Protect yourself with a VPN.
Vicinity of obscurity! Fareit trojan spread via uncommon file type
from Vicinity of obscurity! Fareit trojan spread via uncommon file type
BSides DC 2016 – John Laycock and Monty St John’s YAYA (Yet Another YARA Allocution)
from BSides DC 2016 – John Laycock and Monty St John’s YAYA (Yet Another YARA Allocution)
DoD Opens .Mil to Legal Hacking, Within Limits
from DoD Opens .Mil to Legal Hacking, Within Limits
InfoSec and Actuarial Science – A Risky Alliance
I’ve been doing research lately into mergers & acquisitions, the exciting world of reps & warranties, insurance and cyber insurance in general. Interesting stuff. It has brought me to the conclusion that there is a real alliance between the work … Continue reading →
The post InfoSec and Actuarial Science – A Risky Alliance appeared first on AsTech Consulting.
from InfoSec and Actuarial Science – A Risky Alliance
Why Employees can be a Security Risk for Hospitals
from Why Employees can be a Security Risk for Hospitals
Video found freezing Apple devices
Wednesday, November 23, 2016
Headphones as Microphones
Surprising no one who has been following this sort of thing, headphones can be used as microphones.
from Headphones as Microphones
Government Propaganda on Social Media
Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting this.
from Government Propaganda on Social Media
"Security for the High-Risk User"
Interesting paper. John Scott-Railton on securing the high-risk user.
from "Security for the High-Risk User"
Tuesday, November 22, 2016
Deliveroo customers get hacked, go hungry and foot the bill
from Deliveroo customers get hacked, go hungry and foot the bill
TeleCrypt – the ransomware abusing Telegram API – defeated!
A new ransomware, TeleCrypt appeared recently carrying some new ideas. Telecrypt abuses the API of a popular messenger, Telegram.
Categories: Tags: malwareransomwareTeleCryptTeleCrypt DecryptorTelegram API |
from TeleCrypt – the ransomware abusing Telegram API – defeated!
Government Propaganda on Social Media
from Government Propaganda on Social Media
Conquering the Rising Threat of Malvertising
The recent shift in enterprise application platforms from desktop to mobile has brought with it many exciting benefits, which organizations have recognized and leveraged to provide a more flexible and convenient workplace. Unfortunately, individuals and groups with less honorable intentions have also taken notice of this shift. In fact, a report from ISACA predicts a…
The post Conquering the Rising Threat of Malvertising appeared first on Speaking of Security - The RSA Blog.
from Conquering the Rising Threat of Malvertising
Fareit Spam: Rocking Out to a New File Type
from Fareit Spam: Rocking Out to a New File Type
Is your SOC Intelligent?
Having a Threat Intelligence function isn’t a "go big or stay home" proposition.
from Is your SOC Intelligent?
Black Friday: What to watch out for when you hit the stores
from Black Friday: What to watch out for when you hit the stores
The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?
Advanced ransomware—malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release—is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining distributed denial-of-service…
The post The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files? appeared first on Speaking of Security - The RSA Blog.
from The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?
An overview of malvertising on the Mac
Mac users may face less malware attacks than their Windows counterparts, but it doesn't mean they are safe from online crooks. In this post we review the top malvertising attacks that target the OS X platform and how to stay safe.
Categories: Tags: Applemacmalvertisingmalwareos XPUPPUPsscam |
from An overview of malvertising on the Mac
Dumb Security Survey Questions
According to a Harris poll, 39% of Americans would give up sex for a year in exchange for perfect computer security:
According to an online survey among over 2,000 U.S. adults conducted by Harris Poll on behalf of Dashlane, the leader in online identity and password management, nearly four in ten Americans (39%) would sacrifice sex for one year if it meant they never had to worry about being hacked, having their identity stolen, or their accounts breached. With a new hack or breach making news almost daily, people are constantly being reminded about the importance of secure passwords, yet some are still not following proper password protocol.
Does anyone think that this hypothetical survey question means anything? What, are they bored at Harris? Oh, I see. This is a paid survey by a computer company looking for some publicity.
Four in 10 people (41%) would rather give up their favorite food for a month than go through the password reset process for all their online accounts.
I guess it's more fun to ask these questions than to poll the election.
from Dumb Security Survey Questions
Monday, November 21, 2016
3 million Android phones vulnerable due to pre-installed rootkit
from 3 million Android phones vulnerable due to pre-installed rootkit
Were your grandparents hacking in 1963?
from Were your grandparents hacking in 1963?
The Amplituhedron
from The Amplituhedron
Campaigners bid to delay Rule 41 ‘legal hacking’ bill
from Campaigners bid to delay Rule 41 ‘legal hacking’ bill
Beware: The business-class redefines “workaround” for inclusion of unsupported devices, apps, and online services
from Beware: The business-class redefines “workaround” for inclusion of unsupported devices, apps, and online services
Vulnerability Prioritization with Nessus Cloud
If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new vulnerabilities come out every day and old vulnerabilities can hide out on unknown and shadow assets or simply never make it to the top of the patching priority list.
Vulnerabilities that don’t get addressed cause problems. In last year’s Data Breach Investigations Report (DBIR), Verizon noted that 99.9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
Addressing 100% of vulnerabilities 100% of the time is not an achievable goal for most organizations. But being able to prioritize those that pose the highest risk is something that most organizations should be able to accomplish using a solution like Nessus® Cloud. Here are a few tips for using Nessus Cloud to prioritize your vulnerabilities list.
Scoring vulnerabilities with CVSS
The industry standard for communicating the severity of vulnerabilities is the Common Vulnerability Scoring System, or CVSS. The CVSS uses an algorithm based on metrics in three different areas that approximate the ease and impact of exploiting a vulnerability. Our EMEA technical director, Gavin Millard gives a good explanation of the three CVSS scoring areas (base, temporal, environmental) in this on-demand webcast if you’d like to learn more about CVSS.
Addressing 100% of vulnerabilities 100% of the time is not an achievable goal for most organizations
As an industry standard, Nessus Cloud uses CVSS in multiple ways. First, when Nessus Cloud identifies a vulnerability as Critical, High, Medium, Low or Informational, it uses CVSS scores to assign those categories:
You can also use the Nessus Cloud Advanced Search capability to identify vulnerabilities with specific CVSS characteristics. For example, many organizations rely on CVSS Base Scores, the metrics that measure how easy it is to access a vulnerability. In Advanced Search, it’s easy to identify vulnerabilities cataloged on your network that have a CVSS Base Score of 7.5 or higher. This search would list all of the High severity vulnerabilities:
Additional search filters
CVSS provides a number you can associate with each vulnerability; but by using Advanced Search, there are a few other search filters that provide additional context from the mountain of vulnerabilities.
Tenable announced several of these advanced search filters for Nessus Cloud last year. One of my favorites is the In the News filter. Your CISO may have just read about a big new vulnerability, such as Heartbleed, Shellshock, or Ghost, that has caught the attention of the media. The In the News filter can identify these high profile vulnerabilities and therefore help your security team mitigate the newsworthy questions so that when asked, you can confidently state that you have taken care of the big vulnerability that’s making headlines.
Identifying vulnerabilities on specific assets - or not
Earlier this year, Asset Lists and Exclusions were introduced in Nessus Cloud. Asset Lists are a way to organize hosts into groups. For example, hosts that fall under the same compliance area could be placed into a list, such as all hosts that fall under PCI DSS. Asset Lists have several benefits. You can scan similar assets using the most appropriate scan policies and frequencies. Asset lists also make it easier to share vulnerability information with the appropriate business group, which can simplify the remediation process.
Assets Lists can also be useful if and when you need to scan specific assets at a specific time. For example, you might want to scan all your PCI assets immediately before an annual PCI audit.
On the other hand, Exclusions enable you to restrict the scanning of specific hosts based on a given schedule. If there is a situation where one or many hosts do not need to be included in a scan, you can omit them and simplify your vulnerability results.
Dashboards
While CVSS, Advanced Search Filters, Asset Lists, and Exclusions are all useful ways to prioritize vulnerabilities, sometimes you just need to see the big picture. To accomplish this, Nessus Cloud offers dashboards that provide a graphical representation of vulnerability trending data over time.
You can use the dashboards to quickly get an overall view of vulnerabilities in your environment as well as to identify if you are meeting goals and policies set forth by your organization. Let’s say your organization has a policy that it will not tolerate more than 25 critical vulnerabilities open at any time. In the example below, even though there are 19 critical vulnerabilities open, you know you’re within policy; so maybe you could mix some vulnerability remediation work with another important project instead of just focusing on remediation efforts.
This same dashboard helps you track how long vulnerabilities have been open. As I noted earlier, last year’s Verizon DBIR highlighted how often old vulnerabilities end up being the path attackers take to gain access to networks. The dashboard could help you identify critical vulnerabilities that could lead to actual breaches.
Starting with the dashboard, you can access an interactive list of all vulnerabilities that are more than 30 days old and easily drill down to details for a specific host exhibiting an old security hole.
Try Nessus Cloud
Nessus Cloud provides insight into the vulnerabilities on your network that should be given your immediate attention
If you aren’t already using Nessus Cloud and would like to try any of these vulnerability prioritization techniques, you can request a free Nessus Cloud evaluation. Try out the ideas from this article and see even more ways that Nessus Cloud provides insight into the vulnerabilities on your network that should be given your immediate attention.
Continue the vulnerability prioritization conversation on Tenable’s Discussion Forums at https://community.tenable.com/welcome, or on Twitter @TenableSecurity.
Thanks to Diane Garey for assisting with this blog.
from Vulnerability Prioritization with Nessus Cloud
5 Things IT Pros Can Be Thankful For
from 5 Things IT Pros Can Be Thankful For
AdultFriendFinder network finally comes clean to members about hack
from AdultFriendFinder network finally comes clean to members about hack
Defeating Integer Overflow Attack
from Defeating Integer Overflow Attack
Midstream Security for Oil
from Midstream Security for Oil
Sunday, November 20, 2016
BSides DC 2016 – Timothy Allmon’s WCTF Magic as Told by a Clumsy Magician
from BSides DC 2016 – Timothy Allmon’s WCTF Magic as Told by a Clumsy Magician
BSides DC 2016 – Timothy Allmon’s WCTF Magic as Told by a Clumsy Magician
from BSides DC 2016 – Timothy Allmon’s WCTF Magic as Told by a Clumsy Magician
Hassles and concerns upgrading from Windows 10 Home to Pro
from Hassles and concerns upgrading from Windows 10 Home to Pro
More details emerge regarding the Three data breach
from More details emerge regarding the Three data breach
Analysis
from Analysis
An Introduction to Javascript for XSS Payloads
from An Introduction to Javascript for XSS Payloads
Les Carr Meeting 25 October 2016
from Les Carr Meeting 25 October 2016
Timour Meeting (Facebook audio)
from Timour Meeting (Facebook audio)
Saturday, November 19, 2016
Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify
Squid catch is down, so fisherman are trying to sell more processed product.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
from Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify
Smartphone Secretly Sends Private Data to China
This is pretty amazing:
International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear. The Chinese company that wrote the software, Shanghai Adups Technology Company, says its code runs on more than 700 million phones, cars and other smart devices. One American phone manufacturer, BLU Products, said that 120,000 of its phones had been affected and that it had updated the software to eliminate the feature.
Kryptowire, the security firm that discovered the vulnerability, said the Adups software transmitted the full contents of text messages, contact lists, call logs, location information and other data to a Chinese server.
On one hand, the phone secretly sends private user data to China. On the other hand, it only costs $50.
from Smartphone Secretly Sends Private Data to China
Using Wi-Fi to Detect Hand Motions and Steal Passwords
This is impressive research: "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals":
Abstract: In this study, we present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi-based side-channel information. WindTalker is motivated from the observation that keystrokes on mobile devices will lead to different hand coverage and the finger motions, which will introduce a unique interference to the multi-path signals and can be reflected by the channel state information (CSI). The adversary can exploit the strong correlation between the CSI fluctuation and the keystrokes to infer the user's number input. WindTalker presents a novel approach to collect the target's CSI data by deploying a public WiFi hotspot. Compared with the previous keystroke inference approach, WindTalker neither deploys external devices close to the target device nor compromises the target device. Instead, it utilizes the public WiFi to collect user's CSI data, which is easy-to-deploy and difficult-to-detect. In addition, it jointly analyzes the traffic and the CSI to launch the keystroke inference only for the sensitive period where password entering occurs. WindTalker can be launched without the requirement of visually seeing the smart phone user's input process, backside motion, or installing any malware on the tablet. We implemented Windtalker on several mobile phones and performed a detailed case study to evaluate the practicality of the password inference towards Alipay, the largest mobile payment platform in the world. The evaluation results show that the attacker can recover the key with a high successful rate.
That "high successful rate" is 81.7%.
News article.
from Using Wi-Fi to Detect Hand Motions and Steal Passwords
Friday, November 18, 2016
Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs
TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/). SEDs, available from all major drive makers and many others, now are embedded into almost all new drives and enterprise storage systems. These drives … Continue reading "Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs"
The post Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs appeared first on Trusted Computing Group.
from Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs
Webcast: Save the Data: How to Protect Data Wherever It Lives
Data has exploded across devices and anything with memory. No matter where it lives and whatever it is – sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to … Continue reading "Webcast: Save the Data: How to Protect Data Wherever It Lives"
The post Webcast: Save the Data: How to Protect Data Wherever It Lives appeared first on Trusted Computing Group.
from Webcast: Save the Data: How to Protect Data Wherever It Lives
NIST Publishes Cybersecurity Framework Specifically for Small Businesses
NIST recently published NISTIR 7621, a cybersecurity framework specifically for small business. Most small businesses do not have the resources that large corporations have to implement a cybersecurity program. The guide was developed in conjunction with the small business administration … Continue reading →
The post NIST Publishes Cybersecurity Framework Specifically for Small Businesses appeared first on AsTech Consulting.
from NIST Publishes Cybersecurity Framework Specifically for Small Businesses
Cyber News Rundown: Edition 11/18/16
Alarming Number of Sites Still Using SHA-1 Certificates The January deadline for switching over to SHA-2 rapidly approaching. For the vendors that are still lagging behind, they will begin to see browser warnings...read more
The post Cyber News Rundown: Edition 11/18/16 appeared first on Webroot Threat Blog.
from Cyber News Rundown: Edition 11/18/16
BSides DC 2016 – Gordon MacKay ‘s Vulnerability Management Systems Flawed – Leaving your Enterprise at High Risk
from BSides DC 2016 – Gordon MacKay ‘s Vulnerability Management Systems Flawed – Leaving your Enterprise at High Risk
Liquidmatrix Security Digest TV – mini0x1E
Samy Kamkar – PoisonTap – https://samy.pl/poisontap/ RCMP want an iphone unlocker – http://www.cbc.ca/news/investigates/police-power-privacy-encryption-1.3856375 Discussion paper – https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-scrt-grn-ppr-2016-bckgrndr/index-en.aspx
The post Liquidmatrix Security Digest TV – mini0x1E appeared first on Liquidmatrix Security Digest.
from Liquidmatrix Security Digest TV – mini0x1E
OK, so it’s called “BlackNurse”. But *why*? [Chet Chat Podcast 255]
from OK, so it’s called “BlackNurse”. But *why*? [Chet Chat Podcast 255]
Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify
from Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify
From my Gartner Blog – Deception Technologies – The Paper
After some very fun research, we’re finally publishing our paper on deception technologies:
Applying Deception Technologies and Techniques to Improve Threat Detection and Response
18 November 2016 | ID: G00314562
Augusto Barros | Anton ChuvakinSummary: Deception is a viable option to improve threat detection and response capabilities. Technical professionals focused on security should evaluate deception as a “low-friction” method to detect lateral threat movement, and as an alternative or a complement to other detection technologies.
It was a very fun paper to write. We’ve been using and talking about honeypots and other deception techniques and technologies for ages, but it seems that it’s finally the time to use those in enterprise environments as part of a comprehensive security architecture and strategy. Here are some fun bits from the paper:
- Many organizations report low-friction deployment, management and operation as the primary advantages of deception tools over other threat detection tools (such as SIEM, UEBA and NTA).
- Improved detection capabilities are the main motivation of those who adopt deception technologies. Most have no motivation to actively engage with attackers, and cut access or interaction as soon as detection happens.
- Test the effectiveness of deception tools by running a POC or a pilot on a production environment. Utilize threat simulation tools, or perform a quality penetration test without informing the testers about the deceptions in place.
(overview of deception technologies – Gartner (2016)
The corporate world has invested in many different technologies for threat detection. Yet, it is still hard to find organizations actively using deception techniques and technologies as part of their detection and response strategies, or for risk reduction outcomes.
However, with recent advances in technologies such as virtualization and software-defined networking (SDN), it has become easier to deploy, manage and monitor “honeypots,” the basic components of network-based deception, making deception techniques viable alternatives for regular organizations. At the same time, the limitations of existing security technologies have become more obvious, requiring a rebalance of focus from preventative approaches to detection and response
[…]
Although a direct, fact-based comparison between the effectiveness of deception techniques and the effectiveness of other detection approaches does not exist, enough success reports do exist to justify including deception as part of a threat detection strategy.
The post Deception Technologies – The Paper appeared first on Augusto Barros.
from Augusto Barros http://ift.tt/2g3fjnR
via IFTTT
from From my Gartner Blog – Deception Technologies – The Paper
Invincea Labs: FireEye FLARE On 2016 Challenges Write Up (Pt. 1)
After some very fun research, we’re finally publishing our paper on deception technologies:
Applying Deception Technologies and Techniques to Improve Threat Detection and Response
18 November 2016 | ID: G00314562
Augusto Barros | Anton ChuvakinSummary: Deception is a viable option to improve threat detection and response capabilities. Technical professionals focused on security should evaluate deception as a “low-friction” method to detect lateral threat movement, and as an alternative or a complement to other detection technologies.
It was a very fun paper to write. We’ve been using and talking about honeypots and other deception techniques and technologies for ages, but it seems that it’s finally the time to use those in enterprise environments as part of a comprehensive security architecture and strategy. Here are some fun bits from the paper:
- Many organizations report low-friction deployment, management and operation as the primary advantages of deception tools over other threat detection tools (such as SIEM, UEBA and NTA).
- Improved detection capabilities are the main motivation of those who adopt deception technologies. Most have no motivation to actively engage with attackers, and cut access or interaction as soon as detection happens.
- Test the effectiveness of deception tools by running a POC or a pilot on a production environment. Utilize threat simulation tools, or perform a quality penetration test without informing the testers about the deceptions in place.
(overview of deception technologies – Gartner (2016)
The corporate world has invested in many different technologies for threat detection. Yet, it is still hard to find organizations actively using deception techniques and technologies as part of their detection and response strategies, or for risk reduction outcomes.
However, with recent advances in technologies such as virtualization and software-defined networking (SDN), it has become easier to deploy, manage and monitor “honeypots,” the basic components of network-based deception, making deception techniques viable alternatives for regular organizations. At the same time, the limitations of existing security technologies have become more obvious, requiring a rebalance of focus from preventative approaches to detection and response
[…]
Although a direct, fact-based comparison between the effectiveness of deception techniques and the effectiveness of other detection approaches does not exist, enough success reports do exist to justify including deception as part of a threat detection strategy.
The post Deception Technologies – The Paper appeared first on Augusto Barros.
from Augusto Barros http://ift.tt/2g3fjnR
via IFTTT
from Invincea Labs: FireEye FLARE On 2016 Challenges Write Up (Pt. 1)
Hacking Password-Protected Computers via the USB Port
PoisonTap is an impressive hacking tool that can compromise computers via the USB port, even when they are password-protected. What's interesting is the chain of vulnerabilities the tool exploits. No individual vulnerability is a problem, but together they create a big problem.
Kamkar's trick works by chaining together a long, complex series of seemingly innocuous software security oversights that only together add up to a full-blown threat. When PoisonTap -- a tiny $5 Raspberry Pi microcomputer loaded with Kamkar's code and attached to a USB adapter -- is plugged into a computer's USB drive, it starts impersonating a new ethernet connection. Even if the computer is already connected to Wifi, PoisonTap is programmed to tell the victim's computer that any IP address accessed through that connection is actually on the computer's local network rather than the internet, fooling the machine into prioritizing its network connection to PoisonTap over that of the Wifi network.
With that interception point established, the malicious USB device waits for any request from the user's browser for new web content; if you leave your browser open when you walk away from your machine, chances are there's at least one tab in your browser that's still periodically loading new bits of HTTP data like ads or news updates. When PoisonTap sees that request, it spoofs a response and feeds your browser its own payload: a page that contains a collection of iframes -- a technique for invisibly loading content from one website inside anotherthat consist of carefully crafted versions of virtually every popular website address on the internet. (Kamkar pulled his list from web-popularity ranking service Alexa's top one million sites.)
As it loads that long list of site addresses, PoisonTap tricks your browser into sharing any cookies it's stored from visiting them, and writes all of that cookie data to a text file on the USB stick. Sites use cookies to check if a visitor has recently logged into the page, allowing visitors to avoid doing so repeatedly. So that list of cookies allows any hacker who walks away with the PoisonTap and its stored text file to access the user's accounts on those sites.
There's more. Here's another article with more details. Also note that HTTPS is a protection.
Yesterday, I testified about this at a joint hearing of the Subcommittee on Communications and Technology, and the Subcommittee on Commerce, Manufacturing, and Trade -- both part of the Committee on Energy and Commerce of the US House of Representatives. Here's the video; my testimony starts around 24:40.
The topic was the Dyn attacks and the Internet of Things. I talked about different market failures that will affect security on the Internet of Things. One of them was this problem of emergent vulnerabilities. I worry that as we continue to connect things to the Internet, we're going to be seeing a lot of these sorts of attacks: chains of tiny vulnerabilities that combine into a massive security risk. It'll be hard to defend against these types of attacks. If no one product or process is to blame, no one has responsibility to fix the problem. So I gave a mostly Republican audience a pro-regulation message. They were surprisingly polite and receptive.
from Hacking Password-Protected Computers via the USB Port
Thursday, November 17, 2016
PoisonTap, The Ransacker
from PoisonTap, The Ransacker
How a $5 Raspberry Pi Zero can hack your locked laptop
from How a $5 Raspberry Pi Zero can hack your locked laptop
RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events
from RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events
Securing Your Branch Network
from Securing Your Branch Network