Quantcast
Channel: Security – Flarrio
Viewing all 41 articles
Browse latest View live

Network Security – A Process Perspective

$
0
0

Network Security

Network security is a big concern these days. Although one could classify the work behind network security as being an essential but non-value added effort, nevertheless it is mandatory. Network security can be classified, based on the area of origination, like liabilities, social engineering, proliferation and vulnerabilities. Liabilities constitute privacy concerns and identity theft. Social engineering constitutes phishing and secured area access by unauthorized entities. Proliferation and vulnerabilities constitute fraud email attachments, compromised websites, browser and software exploits.

The main challenge with network security is that the sophistication of threats increases over time and the fight between cyber-criminals and security vendors is almost a never ending one. Fraudsters either benefit by hacking into an individual or corporate monetary system or by gaining access to IPs and other documents of material or monetary importance. Different types of attacks include: attacks on corporate and personal data in the cloud, complex android malware, increased personal data danger from mobile apps and social networks, undermining hardware, infrastructure and software at the core, to name a few.

3 Levels

There are 3 levels at which network security is deployed in a company: Physical level, Policy level, and System level. Physical level security is about controlling  the entry-points where employees are checked for any data drives, unauthorized access to network areas, server rooms etc. System level security is about: providing timely updates on patches, having sufficient firewalls in place, having systems to detect threats, and having remote access security etc. The third level of security is the policy or procedural level intervention.

One of the concepts of process-streamlining could be found useful when one thinks of attacking the network security problem. The method calls for system wide approach to be coupled with a concept of runners, risers and strangers for different kinds of threats or frauds. Runners are those threats which are basic in nature and for which the system mostly has a fix already, especially those threats which have a history  in the system. Because of their feature of high volume and low complexity they can be attacked in a particular way. These kinds of threats are best for automatic elimination.

The second type of threats are repeaters. These could generally be classified as complex threats with a predictable frequency. Initially, these can be eliminated manually, but over time the analysts could come up with a generalized solution and try to automate the threat elimination process.

The third type of problem can be classified as strangers. These threats do not have a particular frequency of occurrence nor do they have a standard fix available. A lot of  manual effort needs to go into these fixes. Over the course of time, some of these also need to be automated and manual effort is only needed on complex and unpredictable threats.

A periodic exercise also needs to be conducted between network analysts and others responsible for network security to come up with a common understanding about the classification of the types of threats and the general approach to solutions. This can help in the standardization of approach for threat management and knowledge sharing. Rigor in analysis and deployment is very important for  successful threat management.

Machine Learning and Analytics

One other aspect of effective threat management is having an analytics solution like Simility. This type of solution combines a blend of manual learning and machine learning capabilities. The features include the ability to prevent unauthorized access, prevent stolen identity threat, protect websites and provide awareness on best practices etc. Fraud or threat alerts are analyzed using sophisticated data visualization features in order to visually identify patterns and relationships. Reputational indices are arrived at for IP’s and for names through the social network to gather more patterns and insights. Signals are deployed to fight the threat or fraud. Patterns developed over time are used for machine learning to evolve and scale. These features help customers match every move of the fraudsters and take action within minutes of an attack.

By the combination of analytics, machine learning and process interventions, a company could be positioned well to fight threats and frauds, respond quickly and learn over time to counter increasing levels of threats from the outside world.


Why Cybersecurity Should Be Your No 1 Priority #tech2016

$
0
0

More SCADA system exploits are likely to be reported. DDoS attacks and ransomware will continue to trouble organisations. Privacy issues will gain prominence, nationally and internationally, keeping policy makers busy.

Cloud-based cyber security technology will continue to erode traditional, appliance-based solutions. The realization of lowering OPEX and CAPEX costs, along with increased capacity, computation power, and effectiveness will become dominant.

We expect public cloud adoption to continue to grow. This will force companies to rethink the way they secure their resources, and will encourage service providers to develop new security and networking tools that are native to cloud platforms.

One word: litigation. And lots of it. 2016 will be the year that cybersecurity and data breach lawsuits reach new records. Unprepared businesses may take big losses or be driven into oblivion.

It’s the year of encryption. Encryption will be deployed by everyone, allowing personal and business data to be protected in transit and at rest, preventing data breaches in the cloud.

Analytics has become a powerful tool in the detection of cyber threats, but 2016 will focus on operationalizing these capabilities so detection can be tied to “next steps” in remediation.

I see autonomic data governance gaining momentum as a means for augmenting traditional information protection protocols. Best thing about it.. eliminates passwords and at the same time ENFORCES company governance policies at the data layer with little or no loss of performance.

Cybersecurity is the #1 concern in today’s environment. Enhanced Malware, Ransomware and Cyber Reconnaissance will become deeply enhanced moving forward. Adding Cyber Insurance will become mainstream.

As data breaches from third party suppliers increase, cybersecurity tech will extend beyond internal security perimeters to encompass security awareness and monitoring of outside vendors and partners.

There is a false perspective that sophisticated attacks are too difficult to prevent. But detection is NOT the new prevention. The mission must be to STOP them, not just become proficient at detecting them.

CISOs should assume hackers will find a way into the network, and shift from breach prevention to breach detection, monitoring the network in real time for signs of nefarious activity.

Businesses struggling to get adequate cyber security insurance coverage will look to cyber security solutions like secure communications clients and stress testing in order to save money on insurance rates.

The immediate future in cybersecurity is a shift to implement endpoint visibility as an augment to network-based observations. Scaling this requires significant levels of technology and human expertise.

Increasingly companies will offer consumer products through mobile platforms with the easiest access possible. “Ease of access” always comes at the cost of security therefore we’ll see increased data thefts.

Attacks via Internet of Things devices are going to become more and more commonplace as IoT reaches mainstream adoption, both at home and in the workplace.

A few years ago, security prophesiers were called paranoid. Now cybersecurity is business necessity. Security tech must shift from preventing vulnerabilities to making network intrusion significantly less fruitful for hackers.

We will move away from hardware-based security gateways, VPNs etc. toward cloud-based end-user encryption. The easiest path you give users to data protection, the more secure a network will be.

The attacks will evolve using polymorphic behaviors. We should also expect a development of complex adware in the next future. Highly effective and targeted attacks will replace large scale operations.

In 2016 we’ll see a headline compromise of a business, whether at the enterprise or consumer level, through low standards of security for mobile apps. It’s a ticking time bomb…

Cyber security will move toward an adaptive model where organizations correlate multiple sources of threat intelligence so they can deploy the right solutions for visibility, prevention, detection and response.

Not only will this kind of attack continue, but a change in it – “I will infect someone’s device with ransomware for you for a reasonable price”—will likely expand.

Preventive controls such as classic anti-virus will become more and more useless and organizations will focus on detective and corrective controls (e.g. monitoring and incident response).

I expect we’ll see Security and DevOps teams working together closely in a cohesive approach to achieve a continuous delivery framework that delivers faster, more secure applications.

Although an absolute pledge of protection against data loss is far-fetched, client-side encryption is quickly emerging as the most realistic alternative to end-to-end encryption.

The primary change in Cybersecurity will be a movement towards password replacement using several alternatives.

The challenge for Cybersecurity in 2016 is skills. Technology is moving faster than our skill set. Core education from school to university needs to adapt with the new World.

More and more organizations will be shifting away from the antiquated detection-based approach used in products like anti-virus, to the next generation isolation-based approach.

Most I.T. professionals and their bosses will discover (the hard way) exactly how little they know about Cybersecurity, much less implementing meaningful protective measures and staying accountable to leadership.

Expansion in new security solutions and services again, meaning overlap of great ideas (with some fakers). New technology and choices for organizations, but be wary…the market will inevitably contract.

Employees continue to bring their own devices (BYOD) into the workplace and efforts need to be made to secure these devices.

Cybersecurity is still mainly focused on prevention. Today the challenge is the ability to detect an active network attacker that has circumvented preventative security. Attackers will get in; one needs to find them before they can steal or cause damage.

Public key infrastructure and blockchain technology introduce a new method for creating secure organizational framework and ensuring data integrity across a network. PKI solutions for blockchains are one to watch for.

Enterprises need to strike an equal balance between their protect and defend approaches. Tilt the balance, and the security strategy will not be as effective to combat today’s cyber crime.

Understand adversaries WILL infiltrate organisations – focus on limiting the damage they can do once in. Micro-segmentation, dividing physical networks into hundreds of logical micro networks, or micro segments, is key.

Markets all over the world will see a rise in ‘insider breaches,’ with more public examples of data breaches occurring from the inside the company. Organisations that only focus on their perimeter, need to understand that threats can come from anywhere.

In 2016, we expect to see an increase in breaches of cloud services, and hackers will use credentials to cloud services as a major attack vector. Social engineering tactics will focus on mimicking cloud login screens to gain credentials.

Pay Attention To Your IoT Device Security

$
0
0

Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat – turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches… and so goes the list of fancy smart devices.

Slow down. Don’t buy a single smart device until you ask yourself these 15 questions. And frankly, there’s a lot of effort in some of these questions. But, security isn’t always easy. Check it out.

  • Was the company ever hacked? Google this to find out.
  • If so, did the company try to hide it from their customers?
  • Review the privacy policies and ask the company to clarify anything—and of course, if they don’t or are reluctant…hmmm…not good. Don’t buy a device that collects data from vendors that fail to explain data security and privacy.
  • Does the product have excellent customer support?
  • Is it hard to get a live person? Is there no phone contact, only some blank e-mail form? Easily accessible customer support is very important and tells a lot about the product’s security level.
  • Does the product have vulnerabilities that can make it easy for a hacker to get into? You’ll need to do a little investigation for this information on industry and government websites.
  • Does the product get cues for regular updates? The manufacturer can answer this. Consider not buying the device if there are no automatic updates.
  • Does the product’s firmware also automatically update? If not, it is not good.
  • Is the Wi-Fi, that the device will be connected to, secure? Ideally it should be WPA2 and have a virtual private network for encryption.
  • Will you be able to control access to the product? Can others access it? If you can’t control access and/or its default settings can’t be changed…then be very suspicious.
  • What data does the device collect, and why?
  • Can data on the device traverse to another device?
  • Ask the gadget’s maker how many open ports it has. Fewer open ports means a lower chance of malware slithering in.
  • Is stored data encrypted (scrambled)? If the maker can’t or won’t answer this, that’s a bad sign.
  • Ask the manufacturer how the device lets you know that its batteries are low.

When Mobile Meets Cloud: Why CASBs Matter

$
0
0

The perception in the industry seems to suggest that most businesses are overwhelmingly using the cloud these days. Surprisingly, the truth is that only 37% actually are. However, within the next four years – by the year 2020 – that number is expected to more than double to a whopping 80%. As  many businesses leave their outdated legacy networks behind, there’s inevitably going to be a scramble to address security challenges that arise from the confluence of cloud and mobile technology as it is widely adopted across companies. One solution for managing the overflow of data is to deploy a Cloud Access Security Broker, or CASB.

One of the biggest challenges, one faces while working with cloud, arises from the fact that data has become ever more accessible from mobile devices. Companies that adopt common cloud providers like Dropbox, Google Drive, or OneDrive can suddenly store, sync, and share data at will. Employees sync files to the cloud on their mobile devices in order to access them instantly even when they’re out of the office.

Of course, having data at the fingertips is a good thing. It helps employees to be more productive, efficient, and accessible. However, this genre of  boost to the workflow is a double-edged sword. After all, mobile devices are also one of the leading contributors to data breaches because files aren’t encrypted by default when they’re synced to these devices. This oversight leaves data vulnerable and easily accessible if the mobile devices get lost or stolen. And with 70 million smartphones stolen each year, it is  easy to see how that can amount to a lot of missing data – and why the widespread move to the cloud has the potential to become a massive security headache.

For example, say an engineer syncs several folders full of data to her Dropbox account to continue work at home and then accesses it on her tablet at an off-site meeting. Maybe some of those files contain confidential client information like Social Security Numbers and other identifying data. Also, some of the files can be trade secrets or intellectual property. Others may contain the company’s financial details. Maybe some of the folders have so many files in them that she’s not even sure what she’s syncing. Then, say she accidentally leaves her tablet in a taxi on the way back from the meeting. If her company is relying on the cloud provider’s default security measures (which don’t encrypt the synced files), the company has already suffered a data breach. Those files can be easily accessed by a malicious actor, which can lead to financial problems, client alienation, and massive damage to the company’s reputation.

It really is a challenge to monitor all files being synced between managed and unmanaged mobile devices, and to keep data safe when it’s proliferating on the cloud at a pace which is too quick to keep track of.

Enter the CASB

CASBs have conjured up an almost magical solution for companies seeking to bolster security, improve visibility, and make the confluence of mobile activity and the cloud more manageable. They are making waves in the market nowadays. A CASB provides a centralized location for administrators to monitor the movement of their teams’ data. The platform grants visibility into how files are being accessed and shared and by whom; enforces compliance with federal regulations; maintains data security; and deploys and enforces threat prevention measures. CASBs that access SaaS applications’ APIs, make it easy to monitor files on devices even when there’s a BYOD policy in place. That’s important when so much data is moving off the network and into the cloud, constantly being carried into and out of the office on smartphones and tablets. A CASB lets admins scan files for keywords and ensure that the files that need to be encrypted are actually encrypted. It also lets admins know when a file is being shared externally and when it’s being synced. The best part is that it doesn’t change the user experience at all, making it easy to deploy and easy for employees to use without the hassle of switching to a clunky platform for the sake of security.

So let’s revisit our hypothetical engineer who leaves her tablet in the cab. If her company had deployed a CASB, her team’s administrator could have seen that she was syncing company files to her mobile device, scanned them for keywords indicating confidential or sensitive information, and either stopped the process or ensured adequate encryption and security controls. What’s more, once the employee lost the tablet, admins could have easily revoked access to the files with the touch of a button to make sure that no data got into the wrong hands.

A CASB provides organizations with the kind of visibility and security measures they really need to keep track of their ever-changing, ever-mobile data. At a time when 74 percent of U.S. organizations allow or plan in the next year to allow their employees to use personal devices at work, maintaining control over corporate data is paramount. It is been clear for very long that protecting the perimeter is no longer enough.  Even deploying smart measures like encryption isn’t sufficient  anymore either. The sheer volume of files being created, synced, and shared in today’s workplace is effectively unmanageable without a CASB that lets you know exactly where all your sensitive files are and lets you keep them secure.

11 Ways to Mitigate Insider Security Threats

$
0
0

In today’s world, companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats. Here are 11 steps that all organizations should take in order to mitigate these threats and protect important company data:

Always encrypt your data If you want to minimize the impact of an insider threat, always encrypt your data. Not all employees need access to all data and encryption adds another layer of protection.

Know the different types of insider threats – There are different types of insider threats. Some are malicious, and some are simply due to negligence. Malicious threats may be identified by employee behavior, such as attempting to hoard data. In this case, additional security controls can be an effective solution.

Do background checks before hiring  Before you hire a new employee, make sure you are doing background checks. Not only will this show any suspicious history, it can stop you from hiring any criminals or those associated with your competitors. Personality tests can also red flag the propensity for malicious behavior.

Educate your staff  Educating your staff about best practices in network security is imperative. It is much easier for employees to use this information if they are aware of the consequences of negligent behavior.

Use monitoring solutions  There are monitoring solutions that you can use, such as application, identity and device data, which can be an invaluable resource for tracking down the source of any insider attack.

Use proper termination practices  Just as you want to be careful when hiring new employees, when terminating employees, you also must use proper practices. This includes revoking access to networks and paying attention to employee actions on the network in the days before they leave.

Go beyond the IT department  Though your IT department is a valuable resource, it cannot be your only defense against insider threats. Make sure you are using a number of programs and several departments to form a team against the possibility of threats.

Consider access controls – Access controls may help to deter both malicious and negligent threats. This also makes it more difficult to access data.

Have checks and balances for all staff and systems  It is also important to ensure there are checks and balances in place, i.e. having more than one person with access to a system, tracking that usage and banning shared usernames and passwords.

Analyze network logs – You should collect, store and regularly analyze all of your network logs, and make sure it’s known to everyone that you do this. This will show the staff that you are watching what they are doing, making them less likely to attempt an insider attack.

Back up your data  Employees may be malicious or more likely they make big mistakes. And when they do, you’d sleep better at night knowing you have redundant, secure cloud based backup to keep your business up and running in the face of all kinds of problems.

BYOD – Creating A Balance Between Flexibility And Safety

$
0
0

Personal mobile devices and external data access promotes flexibility and improves employee productivity. However, it opens up the possibility of security breaches.

Simple things like forgetting to log out or losing a device can spell disaster to any business. But appropriate security policies and mobile content management software help businesses to mitigate the risks without hindering employee productivity.

BYOD (bring your own device) trend toward the use of employee-owned devices is sweeping the world by storm. Higher internet speeds, widespread cloud adoption and the increasing number of mainstream software packages going mobile, bring up the functionality of mobile devices at par with desktop computers. Most text documents and spreadsheets can now be edited on a mobile device without any limitation. And custom-built apps mobilize business tools that were previously available only within the office.

“BYOD strategy is the most radical change to the economics and the culture of client computing in business in decades,” said David Willis, VP of the flagman research centre Gartner in a statement published on the company’s website. “The benefits of BYOD include creating new mobile workforce opportunities, increasing employee satisfaction, and reducing or avoiding costs.”

According to Gartner’s predictions, by 2017, half of employees will require staff to use their own devices for work purposes in a bid to increase productivity, employee satisfaction and provide a flexible working environment.

The benefits of BYOD programs, however, come with a number of challenges concerning data security and the security of devices from which this data is accessed.

Firstly, companies need to ensure that confidential data remains confidential and employees can only access what is relevant to their job. This means implementing a mechanism that is robust, yet not onerous on the user. It may also mean an update in the company’s data architecture in order to enable the simplification of  provisioning and the clarification of access level hierarchy.

Secondly, there is a need to enforce device security features. Things like requiring employees to enable screen locks, disabling password caching and removing questionable apps, all help to create a more secure working environment. An extra step would be to create a list of approved devices to streamline tech support and increase compliance.

Thirdly, employees need to become more vigilant in regards to physical safety of their devices. Phones and laptops often get stolen or damaged. Users can ensure data safety by installing backup software and uploading data to a secure cloud. In the event of device loss or accidental damage, backups can be restored on a new device thus providing business continuity.

In Australia alone, more than 100,000 mobile devices are reported lost or stolen every year. This equates to 2,000 each week or one device every six minutes, according to the data published on Australian Mobile Telecommunications Association website. While not all of these devices would be used for corporate data access, the statistics are staggering.

And finally, BYOD policies need to be applied to all staff without exception. Security policy may quickly become useless if it is ignored by people in leadership positions.

Acronis Data Protection Trends Research revealed that out of the 41% of surveyed organizations with a BYOD policy in place, 25% made exceptions to policy rules giving company executives access to the most sensitive data, placing the whole company at risk if their mobile device was compromised.

It is a given that BYOD is here to stay. It is also obvious that it came about with its own security challenges, giving companies no choice but address the issues in order to stay competitive in this increasingly mobile-focused world.

The good news is that help is now readily available. Data protection vendors have been working extra hard to develop turnkey solutions for enabling mobile environments, known as Mobile Content Management (MCM) systems. Many of them include ongoing technical support, making expert knowledge available to customers whenever they need it.

One such solutions is Acronis Access Advanced. It is specifically designed to enable BYOD while maintaining high standards of data security by way of managing the level of content collaboration needed to foster a productive workforce while ensuring secure access and sharing of vital corporate content. Its granular policy controls enable companies to manage users, apps and data and be responsive to the changing mobile environment.

If you don’t have any clear BYOD policies in place, you have to do some serious analysis and strategizing. Developing best practices for mobile devices and external data access may prove to be critical for the survival of your organization.

Key Trends Disrupting Messaging / Comms #tech2016

$
0
0

Messaging bots will become primary threat to traditional search. Users will be able to access information via conversation like exchange. SERPs will no longer exist, only top information will be used.

An abundance of text-based messaging channels (Slack, Facebook Messenger) and their popularity, coupled with the growing use of bots, will be used to help support smarter communications between businesses and consumers.

In 2017 and beyond we’ll see location-based messaging move to the enterprise so that organizations can keep their travelling and remote employees safe during critical events and global incidents.

A change from chat messaging disillusionment to an epiphany that tools are only as good as the people using them. Hence, we’ll generate chat messaging best practices for maximizing productivity.

Messaging is quickly becoming the core of mobile device utilization, with email losing primacy as a communication tool. Millennial users will seek more efficient (and fun) ways to organize who they are talking with and what they are talking about.

We seek to incorporate cross platform messaging between Facebook Messenger and our internal breaking news messenger, in a way that unlocks new value for members with contextually relevant news.

Messaging as an entry point to social is changing user expectation of consumer applications. Chatbots, and by extension AI, are a legitimate competitor and threat to our space.

I predict a drastic change in messaging bots. They will become increasingly dependent on natural language learning processing to automate workplace collaboration, travel booking, expense management and other similar tasks.

Messaging is easier than ever, now it needs to be more secure. Security and privacy will be the main concern this year, and we’ll see growing demand for encryption-based technologies.

Increasing number of brands are upgrading from plain text messaging to multimedia messaging. Using MMS enables marketers to deliver up to one minute of embedded video or an image plus unlimited characters to 90%+ of mobile phones.

Just as we’ve seen with Whatsapp, more and more messaging platforms will integrate encryption. As we increasingly communicate online and via our mobile devices, online privacy is an increasing concern.

MarTech outbound will adjust automated messages due to brand-damage from recipients angry over unsolicited emails. “Yes, we clicked your site — No, we don’t want a call or email.”

In messaging/ communications tech “AI-enabled” is the new buzzword. But, to paraphrase The Princess Bride, the way most are using the term AI doesn’t mean what they think it means.

The future of messaging and communications comes down to one word: encryption. Privacy is vital today, and individuals and companies are discovering that they need to take precautions.

Location-based push notifications to provide local information direct to your cell phone. Imagine passing a store and a coupon appears on your phone, this is coming, and very quickly.

Video will continue to rise as the preferred medium of workplace communication as Millennials and the “YouTube” generation enter the workforce.

Instant messaging will supersede email within the next decade, even hailing the decline of web browsing, as shopping, customer service and news feeds all come directly to your personal message stream.

A hyper-integrated multi-functionality messenger so that you don’t need to go to different websites/apps. E.g.., being able to book a cab / a to-go meal inside the messenger app.

We will see a prevalence of bots taking over the messaging & communications space in the next few quarters and indeed this year.

In the next few quarters, we will see more group livestreaming and Snapchat-like features to enhance visual storytelling and real-time engagement.

There will be a push to integrate various disparate communications channels to deliver a streamlined experience. One that tracks interactions across text, phone, email, and social to provide a holistic view of the customer experience.

In the next several months we will begin to see bots becoming a part of our friend lists: ping to fetch an uber or order-ahead a latte.

The phone number will continue its decline in importance as online identities replace it. Messaging apps will start to intercommunicate.

I believe that encryption level will be increasing as well as tech behind it will get more sophisticated with end users selecting only the most secure applications.

Generally there will be a transition away from email towards enterprise messaging apps for the internal communication of businesses. A similar transition has already happened in the consumer market.

Scareware Scam Almost Snags Victim

$
0
0

Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.

There are a lot of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending money on getting rid of the malware. The tactic of scaring users is called scareware.

  • A pop up tells you “Warning! Your Computer Has Been Infected with Malware!”
  • The pop-up can be triggered by visiting an infected website or by making a bad click.
  • The pop-up can’t be closed out, or if it can, another appears.
  • Additional information in the pop-up lures you into clicking a link inside it, such as buy some downloadable security software that will destroy the virus.
  • Once the alleged security software is downloaded/installed, it crashes your computer—even if you already have a legitimate security software program in place.
  • You’re screwed at this point. (Hope you had all your data backed up before this happened!)

Here’s another way the scam can unfold, from someone who wrote to me:

I was notified by a notice supposedly from Windows Security that my PC has been attacked.  They claim that all my PC ID numbers were stolen and that Russia had got about 8-12 other IDs.  They took control of my computer and said they scanned it to find this out. They claimed the only way that I could clear this problem was to have them clear it for $199.99 and security for 1 year (sic) for $149.99.  They said the only way to accomplish this was by check.  They said it couldn’t be done by credit card because (sic) numbers would be stolen too.  I refused to go along with that plan and closed them out.  

P.S. I checked my account and it is paid thru 6/2016. How do I know if I get a notice from Windows that it is legit? 

All windows notifications come via Windows Update. That “pop-up” emanates via your notifications area on your taskbar and NOT a popup via your browser. What a mess!

Protect Yourself

 

  • Use security software only from a name-brand company.
  • Keep it updated.
  • See a pop-up? Close it out. Never click inside it—which you can’t do if you close it out immediately.
  • Exit the site you think triggered it.
  • Play it safe and run a scan using your legitimate security software.


Why Are Cyber Hucksters So Successful?

$
0
0

Often, hucksters prey on the consumer’s desperation, which is why it is no surprise that the No. 1 rip-off (at least between 2011 and 2012) was the popular market of bogus products promising weight loss.

VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so successful—even with the most ridiculous sounding bait (Nigerian prince, anyone?).

The bait becomes more attractive when the target is receiving an influx of cyber attention. Sad to say, this trips up a person’s rationale, making them susceptible to the huckster’s plan.

Konnikova is quoted as stating, “Few things throw us off our game as much as so-called cognitive load: how taxed our mental capacities are at any given moment.” She explains that people are vulnerable when the con artist hits them up with their scheme while the victim is distracted with Twitter, texting, etc. In short, it’s cognitive overload.

Konnikova is the author of the book, “The Confidence Game: Why We Fall For It, Every Time.” In the book, she mentions that victims such as the U.S. Navy were too humiliated to prosecute the crooks who conned them. She tells vice.com: “Because admitting it [getting rooked] would mean admitting you’re a sap.”

And in this day of rapidly evolving cyber technology, the huckster’s job is becoming easier. With all kinds of pathways he can snag a victim. These pathways can be dating sites and pop-up ads which warn that your computer has been infected. But something else is on the crook’s side: the false sense of security that all this techy mumbo jumbo gives the common users—who thereafter let their guard down.

Despite all the parodies and mockeries surrounding the so-called Nigerian prince scam (aka 419 scam), it’s still out there in full force and effect. Look how technology has made it swell. And it will continue evolving as long as people want something for nothing. Why else would the Powerball swell to over 1.3 billon. “The basic contours of the story won’t change,” Konnikova tells vice.com.

Another factor is that some people equate online with credibility: “It’s online so it must be legitimate,” is the mindset. According to this mindset, the Loch Ness Monster must really exist, since there are many stories about it online. Despite how irrational this mindset is, scammers know that many people think this way and will design their ploys to look even more legitimate (with creative layouts, slogans, links, etc.).

Though it takes skill to be a successful huckster, they can’t get the job done without the victim being “vulnerablized” by cognitive overload.

Discover How Enterprise Mobile Technology Is Changing #tech2016

$
0
0

Enterprise mobile security is going to move from the top device and application layer to the bottom layer – data. Every data bit will be controllable by the enterprise.

Mobile devices will pose increased cyber risk to enterprises and as a result we will observe an increased focus on mobile security.

The obvious shift is in Industrial Automation. “Today” exist a few applications to supervise factories, but “tomorrow” comes standard for managers to control processes completely from their smart devices.

Shift from brochureware type apps to tools that empower users and provide monetary benefit back to the enterprise.

Mobile search. For enterprises, it’s no longer about returning results. Instead, people need answers. And returning those answers in a smart, customized fashion builds confidence and loyalty in your company.

Many organizations will continue deploying Enterprise Mobility Management (EMM) solutions to manage and control the full lifecycle of tablets and phones from sourcing to retirement.

Chatbots will become more of a priority for mobile enterprise tech, where application-specific bots developed to perform different enterprise functions will interface with consumer-facing virtual assistants such as Cortana/ Siri.

Enterprises will learn to deal with SaaS terms and contracts, as well as security management for a mobile fleet. It’s a hard change, but it’s required for them to survive.

Enterprise productivity and BI tracking tools to now be mobile and app centric. You see for instance tools like Google Analytics and Qlik already offering apps to help decision makers track while on the run. More will come.

The biggest shift or change we’ll see in Mobile Tech is the efficiency and speed of new advances of technology. Businesses of tomorrow will be the ones who embrace change and innovation today.

As enterprise perimeters expand, so will security vulnerabilities. Information that previously resided in internal hardware will be strewn across various devices and levels like mobile, social media, on-premises and public clouds.

A momentous shift in business dynamics to a sharing economy will happen in the future, supported by mobile technology across all sectors.

The change we see happening is enterprises moving towards in-house development using mobile platforms, and less outsourced professional services; to improve the scalability and sustainability of their mobile strategy.

Security will remain front and centre within enterprise, BYOD policies will become over restrictive if there not already. There needs to be a happy medium between users and the enterprise.

From the mobile to the cloud, businesses need to make it easy to create, edit, share, sign and collaborate with documents – on or offline.

In the near future, I see enterprise level companies diving into creating mobile apps for the main content. There are benefits for organic search as well as providing a more streamlined experience for existing customers.

Access denied, and what’s behind?

$
0
0

When surfing the web, all of us, every now and then, stumble upon the pages that fail to load. The browser tab may return some obscure references. This article reviews the most common instances.

Our target is 403 Forbidden message. It is getting gradually associated with adware invasion. That is, the message ‘403 Forbidden’ appears on your screen if the page you have requested fails to load. As experts try to get insight into some resources involved with unfair advertising practices, they face the obstacle. The page does not open.

Why does it happen? One may say there is no good reason. Nice try, but not in the case of adware backed pages. They do not load intentionally if requested by random IP’s. The only allowed visitors come from the IP’s listed in the advertisers’ databases. Which IP’s get listed that way? The ones with the adware onboarded. It is the adware that makes the browsers on affected PC’s request access to the page. Only in such cases the request gets satisfied.

Is it true that 403 Forbidden always designates the case of unfair advertisement? No. A website may actually need protection from hackers.  If so, some IP’s could be banned for security reasons. Should your IP be engaged into spamming or another Internet scam, you may be restricted from visiting the pages that apply enhanced security policy.

If affected by adware, you are basically unlikely to encounter the 403 Forbidden tab when opening the malvertising URL. Quite in contrary, you belong to the pool of the compromised, forced to visit the annoying resource on and on. Others, those free of the adware, would not be able to reach the page and be presented with 403 Forbidden notifications.

The restriction pursues two goals. First of all, it is meant to set up a refined traffic. The concept has lately been introduced by IT security observers. It describes the traffic moderation chiefly for the purposes of refining it so that it would meet the advertiser’s demands. What the advertisers would demand is that the visitors are more likely to buy what they promote. People are likely to buy what they need, and how can one possibly judge what others would need? In the Internet era, your online activities are logged into the browser history. Modern adware acts as spyware retrieving the history. The history is reviewed with automated tools so that the ads presented through the gateway of a restrictive page would be a likely match of the user’s demands.

People may be unable to see the page content and stare at the above error report, for their computers have not been hacked. Their browsing history and other details are unknown to the hackers so that they cannot ensure the ads match the visitors’ profile. It is important to note the match does not ensure the quality of ads whatsoever.

The controversy about 403 error may seem to rather increase as you read the above speculations. To sum it up and make thing clear, let us lay it down another way.

403 Forbidden informs you the page has recognized your request, but you have failed to satisfy its acceptance criteria. There are two basic cases for the failure. The first one is now tending to dominate; it is when the page is backed by certain adware. The advertising campaign does not welcome random visitors as they deteriorate the refined traffic. Hence, the users are banned as they have not been affected by the adware. If that is the case, your PC has not been hit by the adware. If you are an IT researcher or enthusiast, you need to be aware of the adware and may help the victims to understand why they encounter recurrent redirects to the pesky pages. They say, realizing the problem is halfway to resolving it.

The case 1 of 403 Forbidden is basically a good one. If you see 403 Forbidden under the circumstances of case 1, your PC is free of the adware.

Case 2 implies the opposite for the viewer. It happens as your IP or other details match certain criteria indicating you as unfair or otherwise unwanted actor. For instance, there is a website called stopforumspam.com. It runs a database of IP’s to be blamed for committing forum spam. If your IP gets listed, perhaps it has been hacked, and the spammers abused it so that certain forums may restrict your access to their threads. If you believe the URL you are trying to reach is a decent one, yet it bans you, you may try to contact its administrator. The simpler but somewhat tricky way to omit the restriction is to apply VPN services. The VPN basically provides one with a third party IP, which is hopefully not listed as the spammer’s one.

The spammer’s restriction is just one example. You may get blacklisted for other reasons. Perhaps, you do not try a black hat hacking yourself, but that means somebody has engaged your computer into certain indecent activities.

Schematically, the workflow of actions when stumbling upon 403 Forbidden notifications is as follows:

Forbidden report:

Case 1. The page is a reputable one: you are blacklisted. Check your PC for viruses, contact the blacklisted databases after ensuring the cleanup has completed, as appropriate. If reaching the blocking URL is critical, consider using a third-party IP as available with a range of redirecting services e.g. VPN.

Case 2. The website is actually or potentially tricky or otherwise malicious:  you are not allowed to visit it most likely due to the so-called refined traffic policy. Good news is there is no adware onboard. Other users are infected, though. You are encouraged to share the info on the misbehaving URL with IT security circles to prevent further development of annoying, virus backed advertisement.

Ransomware in the Wild: Statistical Overview

$
0
0

Ransomware is a continuously growing threat to individual computer users and organizations worldwide. It typically leverages an uncrackable combo of RSA and AES cryptosystems to deny the availability of one’s important files, subsequently demanding a fee for data recovery.

The ransoms range from $200 up to $10,000, depending on the malware family and the number of machines plagued in the course of an attack. Having originally targeted PCs running Windows, ransom Trojans have lately come to also hit Linux and Mac computers, as well as mobile devices.

According to the FBI’s Internet Crime Report, ransomware is one of the three hottest issues in the present-day cyber threat landscape, along with business email compromise and email account hacks. The losses reported by 2,453 victims in the U.S. last year amounted to $1.6 million. Compared to the corresponding statistics for 2014, the victim count nearly doubled in 2015. The actual expenditures, however, were much more impressive and reached $24 million, considering the total costs incurred in mitigating the damage.

Computer users compromised by a single strain called CryptoWall from April 2014 to June 2015 lost $18 million, with 992 complaints filed by those attacked. That’s just a breakdown based on cataloged incidents in the United States alone, whereas the big picture is certainly much more terrifying.

Researchers from Kaspersky Lab did their own research and came up with a report on ransomware assaults reflecting the global state of things on this arena. The company detected 2,900 new ransomware variants during the first quarter of 2016, which demonstrates a 14% increase compared to the fourth quarter of 2015. The prevalent ransomware families in Q1, 2016 were TeslaCrypt, Locky, CTB-Locker, Petya, and CryptoWall. As per the 2014 – 2015 comparative annual breakdown, there has been a 48.3% spike in the quantity of identified ransomware samples.

A total of 753,684 users around the globe fell victim to ransom Trojans in 2015. The infected users spent $300 on average to recover their frozen data. The impact tends to get much more disastrous if the crypto threat hits an organization with a large IT infrastructure. For instance, a compromised hospital in Los Angeles ended up paying the attackers a Bitcoin equivalent of $17,000 in February 2016. Another noteworthy fact is that the cybercriminals behind the notorious CryptoLocker strain have been reportedly earning an astonishing $30 million in ransoms every 100 days since 2014.

Meanwhile, most companies are ill-prepared for the challenge stemming from ransomware. According to a survey of 200 attendees of RSA Conference 2016, only 38% of IT executives claimed they were very confident that their company could recover from a ransomware attack without losing critical data. Furthermore, 73% of the respondents believe critical infrastructure providers are more vulnerable to these compromises than other organizations.

While the ransomware menace persists and keeps evolving, end users and companies should maintain secure data backups, steer clear of suspicious links, regularly install software patches and use reliable anti-malware suites.

Closing the Security Loopholes in Your IT Infrastructure

$
0
0

Breach. The word calls to mind all sorts of things, from Shakespeare to spy movies. Almost all involve attackers breaking in from outside. Tom Cruise suspended inches above the floor in Mission: Impossible is but a glamorized, Hollywood image. In reality, most data breaches today happen with help from the inside — unintentionally.

While headlines about intruders grab attention, the real turning points for data security are the little mistakes that users make. From mishandling devices to time-saving shortcuts, users create security loopholes that must be closed for meaningful data security to take place.

Learning from others’ mistakes

The news is filled with stories of massive data thefts these days. From the Target and Home Depot losses to the OPM debacle, we want to know who did it. But knowing who is not as important as figuring out how. To prevent the next breach, companies have to look at the security loopholes that were exploited in previous intrusions. No matter how much policing takes place, there will always be hackers lurking in the shadows. The smart organization works on preparation… not just prevention.

Here are the most common security loopholes that intruders depend on to practice their craft and the steps needed to close them.

Spam filters can’t save you now

Yes, after all these years, people are still opening questionable email attachments. Just ask Sony. Their astounding loss of intellectual property, privacy and profits all started by a worker pulling an email out of their junk folder and opening the malware-laden attachment. Consistent reminders about security protocols are important. Using recent news stories of breaches as examples can help employees stay interested and understand what is at stake. The problem occurs, however, when people unquestioningly open email attachments and click on links without a second thought because they simply trust the sender.

While many of the phishing attempts of yesteryear are quickly caught by spam filters, it’s the concerted effort put into methods like “spearphishing” that quickly surpass spam filters and land employees, and their companies, in hot water. Spearphishing is a method where a hacker studies their targets, gains context, and then sends an email that would be indistinguishable from a malicious attempt, all by cloaking itself in familiar and confidential details. That is, if a hacker gains access to the secretary’s email account, they can quickly study up on their communication with the CEO and use those details to dupe the CEO into clicking on a link and thereby giving away the keys to the kingdom.

Even the trusted hotspot is not to be trusted. From network intrusions to stolen credentials, WiFi is a dream for hackers and a nightmare for security-minded IT professionals. While best practice is just to avoid open wifi networks, VPNs can help—but only if used properly. And remember that even security protocols like WPA are beginning to crumble in the face of consistent efforts to break them. The biggest loophole here comes from the increasingly mobile, BYOD-dependant workforce that many companies rely on. Company BYOD policies can also include setting devices to ask permission when connecting to WiFi and mobile device management software that allows for locking or wiping data in case of loss or theft. Beyond the hazards of public WiFi, even those digital nomads with your own, personal WiFi hotspots are far less secure than you might have initially imagined. How so? First, an estimated majority of mobile hotspots that are out in the wild today have the password of the admin account on the device automatically set to be the same as last 6 chars of the IMEI address.

While many hotspots have seemingly secure passwords, the formula is actually getting simpler. Today’s technology for gaining the IMEI number is certainly expensive, however we all know that once this technology gets replicated, the price will dramatically drop and availability will rise.

That corporate “guest” WiFi? It’s a cesspool. While we’re on the topic of WiFi, even that unsecured, unmonitored guest WiFi you offer can be a source of security loopholes. While employees may behave, for fear of repercussions, on your regular company WiFi, they may treat the guest WiFi as their own, personal playground.

While employees may never think to visit those sites that sit on the darker side of the World Wide Web while on the primary network, that guest network gives them a feeling of anonymity. The problem here is that employees are then jumping back and forth from secure to insecure WiFi, and bringing with them the malware that goes along with those sites. The employees are doing this naively and the bosses are blind to the threats. So, if you must offer WiFi to guests, lock it down and make it subject to the same policies as that of your primary network.

What it all means

Cyber security boils down to effective layering. From end-user education, best practices and workstation protection to firewalls and system-wide antivirus protection, IT departments need to work actively to thwart attacks. But knowing when the threat has become a reality can make all the difference in closing those trust loopholes before the damage is done. Everyone wants your data. Some already have access. Only you can seal the breaches.

Cloud Security: 23 predictions you need to know

$
0
0

Cloud companies are struggling to balance security against availability and privacy. New innovative security methods are being developed to create this balance, but the future of Cloud Security is in the hands of data centers.

A significant change will be the continuous monitoring of applications. There will be a shift from periodic assessments to ongoing continuous audits of an entire environment’s security and compliance status.

Visualization alone can pour fuel on the fire. Goal-oriented visualization is critical to ensure you’re using the information to solve real problems. Even problems you don’t know you have.

Enterprise adoption of cloud-native infrastructure and microservices will require security controls to increasingly be built-in, automated, and capable of consistently and dynamically protecting distributed applications wherever they are deployed.

Adoption of SDN platforms is allowing companies to connect to cloud infrastructures in a more secure and compliant manner, instead of as carve-outs to existing security policies.

I expect to see technologies that deliver real-time distributed denial of service (DDoS) mitigation by automatically analyzing DDoS alerts and essentially stopping DDoS attacks before they do real damage.

Keeping data safe will gain greater focus over the next few quarters. Cloud service providers will need to balance security with usability to remain competitive.

We will continue to see less reliance on hardware and greater acceptance of security functions embedded in the network itself.

We’ll see an increase in companies prioritizing global compliance standards and certifications – like the International Organization for Standardization (ISO) – which protect personally identifiable information on the cloud.

Virtualization technologies such as NFV and SDN will provide communication service providers with the opportunity to deliver enhanced security services to their customers. Centralization, flexibility and agility are key to these improvements.

Administrators and end users will have the ability to proactively eliminate security issues before they happen. Cloud security is evolving quickly on all fronts through security dashboards and audit controls to make this possible.

Cloud-based Internet of Things (IoT) will become more familiar to the general public and will require additional technologies and security postures to re-bolster consumer confidence in the cloud environment.

The proliferation of IoT devices, which typically store and share data in the cloud, will lead to increased focus and pressure to ensure cloud data storage and transmission security.

The complexity of current security solutions limits their application. We expect a shift towards more homogenous security, simplifying cloud security infrastructure. This is critical as vastly more objects become connected.

The cloud security focus will shift from access control to infrastructure to access control for data. Apart from security and confidentiality there will be a major emphasis on integrity of data.

Ransomware attacks will increasingly attack not only primary systems but in addition will attack backup systems based upon Windows.

The biggest change: access. There is a lot of emphasis and innovation taking place now on ways to privately, reliably and securely connect to disparate cloud environments, infrastructures and applications.

I predict that cloud security will become more consumer-focused. The enterprise cloud security-as-a-service space is crowded, and a new generation of mobile internet consumers is looking to protect themselves.

A major focus in cloud security will be a push for better protection and detection at the endpoint. The endpoint still remains one of the most vulnerable and often-hacked areas of an online transaction.

How do we know who is accessing the cloud security tech? The tie-in of biometrics will provide greater security and usability with assurance of identity.

The focus will shift from “Do I keep security servers on-premises or use cloud services?” to “It’s critical to use cloud and on-premises security in a hybrid environment.”

As more traffic is encrypted—and thus indecipherable—we anticipate increased endpoint modeling technologies to analyze traffic patterns, and compare those to a baseline as a means to thwart cyberattacks.

We will continue to see organizations building private clouds, which offer more control and security than public cloud services. Having complete ownership of your cloud is the most secure option.

Moving to a Hosted PBX or On Site IP PBX?

$
0
0

Evolving technology in networking is allowing for significantly higher data throughput which translates to higher internet speeds available to consumers & organizations. For consumers it means high definition Netflix streaming without having to wait for buffering. For business, it unlocks a world of possibilities to move hardware, applications and servers that previously were run on site, into the Cloud. With this, many organizations are considering the opportunity to move their telecommunications hardware into the Cloud and take advantage of VoIP (Voice over Internet Protocol).

Communication is vital to any well run business. Continuously implementing new measures and techniques to improve communication within a business and with clients is essential for any growing business. VoIP phone systems come in a number of flavors- two of the main variations for a business are Hosted PBX systems and on-site IP PBX systems that use SIP trunking. There are positives and negatives with both systems so it is essential you comprehend them before converting to VoIP.

When planned and executed correctly, both a Hosted PBX or an on-site IP PBX system can help to reduce the bottom line of an organization’s communications expenses. They can also bring a variety of functionality benefits over outdated PSTN & ISDN telephony.

Ask your provider the below questions when considering the change to VoIP.

Does the system support your specific communications needs?

Generally speaking, VoIP phones are much more feature rich than the phones for traditional PABX systems however, these extra features mean nothing to the user if the VoIP system does not support the key functions that are required by an organization. Make a list how your organization uses your current phone system and how your call flows are currently set up. Ensure your provider can demonstrate how their proposed VoIP system will handle the same tasks. Ask for a live demonstration of the system and compare functionality side by side.

Does the VoIP system have a guaranteed uptime?

If the VoIP provider’s system is not accessible, it’s likely your system won’t be able to make or receive phone calls. Additionally, when using a Hosted PBX system, if the provider’s system isn’t working, you will not be able to use the phone system at all. This means simple tasks like accessing voicemail will not work. A guaranteed uptime of 99.99% is the equivalent of a possible 52 minutes of downtime over a 12 month period. Make sure you understand the exact implications of system downtime on the proposed VoIP solutions you are considering.

What happens if the system potentially goes down?

Many businesses will agree that missed calls can potentially result in thousands of dollars in lost revenue. When a VoIP system goes down, most businesses opt to have an automatic forward for phone calls to an alternate network. Ask your VoIP provider what backup actions are offered when either your local internet goes down or when there is a total internet network outage. There will also be different failover measures for a power blackout and a hardware failure on premise. It’s extremely important that you have pre-planned and pre-configured failover protocols in place that automatically activate during an outage. These backup measures can allow communications to continue and prevent the potentially expensive effects of missing important phone calls.

Does Fax work over VoIP?

Faxing over a VoIP can be hit and miss. This is because faxes were designed specifically for the outdated analog networks. If your organization depends on faxes, it is imperative to ensure you have a VoIP compatible fax service that meets your requirements. Some providers may offer fax conversion services that utilize your existing fax hardware whilst others offer a virtual fax service which runs off software or online applications. Make sure you have the necessary information about how faxes will work over your VoIP system before making any changes. This will avoid potentially irreversible problems arising in the future.

How easy is it to upgrade the system?

Many VoIP systems are brilliant for scalability and involve little if any upgrades to allow for increases in the number of users and higher call volumes. Most Hosted PBX phone systems can scale to complement any business size. When you are speaking with a VoIP provider, you should advise them how many users will be accessing the system at one time. This information is important to help determine whether an On-Premise IP PBX and or a Hosted PBX phone system will best suit your needs. It is imperative you continuously plan for the future when it comes to your communications strategy as your needs today will be very different to those in a few years.

Is the VoIP platform secure?

It is extremely important to ensure your VoIP provider has up-to-date and frequently upgraded security protocols in place. One potential weakness of a VoIP phone system is that, if not properly protected, hackers can find their way into your system and make unsolicited calls. These unwelcome intrusions can often go unnoticed and allow hackers to run up thousands of dollars in phone calls that you will be liable to pay. If you are considering a Hosted PBX solution, these security measures are completely up to your VoIP provider to manage for you. When opting for an on-site IP PBX, some of these security measures will be your responsibility and will require strict settings on your firewall to keep out unwanted intruders.


Phishing Attacks Two-Factor Authentication

$
0
0

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.

How a hacker circumvents two-factor authentication

 

  • First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
  • Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account.
  • The next phase is to send out a text message appearing to be from the recipient’s bank (or PayPal, Facebook, etc.).
  • This message tells the recipient that their account is about to be locked due to “suspicious” activity detected with it.
  • The hacker requests the victim to send the company (which is really the hacker) the unique 2FA code that gets texted to the account holder upon a login attempt. The victim is to wait for this code to be sent.
  • Remember, the hacker already has collected enough information (password, username) to make a login attempt. Entering this data then triggers a send of the 2FA code to the victim’s phone.
  • The victim then texts back the code—right into the hacker’s hands. The hacker then uses it to get into the account.
  • The victim made the cardinal mistake of sending back a 2FA code via text, when the only place the victim is supposed to enter this code is the login field of their account when wanting to access it!

So in short, the crook somehow gets your password (easy with brute force software if you have a weak password) and username or retrieved in a data dump of some hacked site. They spoof their text message to you to make it look like it came from the company of your account.

Red flags/scams/behaviors/requests to look out for:

Pay Attention!

  • You are asked via phone/email/IM etc to send someone the 2FA code that is sent to your mobile (prompted by their login attempt).
  • If you receive the 2FA code, this means someone is trying to gain access to your account. If it’s not you, then who is it?
  • Never send any 2FA code out via text, e-mail or phone voice. Never. Consider any such request to be a scam.

 

KeRanger Mac Ransomware Virus

$
0
0

KeRanger is the first working Mac ransomware virus, and it’s not theoretical, it’s real and in the wild. The attacked Transmission app was spread from the official Transmission webpage earlier this spring. It had a completely different code signature compared to the original one formerly issued to sign the Transmission app. It indicates the app in itself was changed and re-signed by the cyber attacker.

The revamped duplicate of Transmission contains a file called General.rtf that is, in fact, an executable but not the rich-text document it claims to be. Once the app is started, this file is reproduced to another file called kernel_service in the user Library folder. This kernel_service process continuously runs in the background environment, as well as generates more processes and files among which is kernel_time. This file possesses a timestamp, utilized to determine when three days have passed. After three days, the ransomware virus “explodes” and starts encrypting all documents.

It is going to encrypt every single file contained in the Users folder, together with data possessing typical document extensions located in the Volumes folder. This means that files situated on attached external hard disk drives, servers, etc. In each and every directory where files have been locked, a file dubbed README_FOR_DECRYPT.txt is formed, bearing guidelines for how one can purchase a decryption key.

The point that this ransomware virus will encrypt external hard disks and linked network volumes signifies it may encrypt backups such as Time Machine backups located on a Time Capsule. Even worse, there exists a smallscript in the app named _encrypt_timemachine. This indicates your backups, that you may wish to preserve unchanged in case of a ransomware attack, may as well fall prey to this virus.

Surprisingly, there are absolutely no persistence techniques used by this virus. The kernel_service process will continue working, however if you rereboot the PC, it will not launch again automatically. You should re-open the affected Transmission app to be able to re-activate the malicious process.

Apple has equally introduced detection of this ransomware virus to revoke the developer certificate utilized to sign the dangerous copy of Transmission. This implies new attacks are no longer possible without an upgrade of the KeRanger virus. Nevertheless, it’s worth mentioning that in case you launched the contaminated copy of Transmission on your Apple computer at least once, Apple detection procedures will not protect you from starting the infection ever again. Your Apple computer will regard it secure at this stage, as it has been successfully launched earlier.

Lots of people might be lured to pay the ransom to return their documents. Yet, it’s a terrifically bad approach. In the Windows environment, paying out the ransom often leads to receiving a key that may not properly decrypt the data files. On the other hand, it additionally can lead to transmitting funds to the hackers but receiving absolutely nothing in exchange, or getting a key that doesn’t really operate correctly just because the ransomware was poorly-written.

For those who have installed the Transmission app lately, it’s best to remove the app and restart your computer. This will put a stop to re-activation of the KeRanger virus.

It’s not the very first time that Apple customers have been attacked via a torrent client, but in past times this kind of problems have only been related to adware. Think thoroughly before dealing with torrent clients in the future.

3 Steps For Secure Cloud Deployment

$
0
0

Attacks on cloud-based services rose from 19 percent two years ago to 33 percent in 2015, according to Arbor Worldwide Infrastructure Security Report XI, 2016. As the number of enterprises moving data via cloud architecture rises, so do attacks on cloud-based services.

With 6 out of 10 network buyers planning to increase cloud-related spending this year, enterprises need to have a plan for security, both on-premise and in the cloud.

Enterprises should consider these three areas of security concern before undertaking a large-scale cloud deployment.

1. Cloud Access

Employees no longer sit at a desk in one location. They work remotely; they access the network from conferences and coffee shops. In fact, 95 percent of employees work from mobile locations — meaning any place other than their office — at least once a month, according to Forrester’s Business Technographics Telecom & Mobility Workforce Survey.

These users rely on a public internet connection, opening up a variety of vulnerability points.

Here are three ways to monitor and protect access when a public internet connection is key:

  • A managed cloud firewall with Network Address Translation (NAT) can be an easy way to protect internet connections. Outsourcing the management frees up internal resources for other projects and allows users to respond quickly to the demands of the business.
  • Secure Remote Access or other IPSec solutions are options for securing public internet ports used by mobile employees and provide access to the entire network. These solutions also provide a low cost, reliable avenue for remote global site expansion projects and cloud connections.
  • Secure Socket Layer (SSL) VPN can remove the need for client software compatibility and only provides access to pre-specified applications and services. If you’re serving a significant number of mobile users, check with your cloud provider to ensure client or SSL connections are feasible.

If users aren’t dependent on the public internet to access resources, migrate to a virtual private network (VPN) connection for cloud access. Reducing publically addressable end-points helps minimize the complexity of managing security and takes advantage of the inherent security aspects of private connections. Microsoft Azure, Amazon Web Services and Google Cloud all offer this option with various network partners.

2. Data Storage and Use

Data loss protection (DLP) and data encryption continue to be hotly debated security topics.

DLP provides a view of where data is stored across cloud, mobile and on-premise environments and helps enterprises with the use of that data. Some cloud service providers are starting to offer DLP content detection, monitoring and protection on their servers. In the future, DLP will become a feature in network-based security cloud gateways.

Another key to securing data is to take a full view of what data, and its value, is stored by your company.

Due to the complexity and cost of encryption, you need to prioritize what should be encrypted and the best method for your business.

An “encrypt everything” model in the cloud can interrupt application function, reporting and search functionality. For the user, encryption can seem too invasive to their daily work stream, which often results in creative circumvention of security systems.

Various data encryption models to consider include:

  • Full Disk Encryption
  • Container or Volume Encryption
  • File or Folder Encryption
  • Application Encryption

Traditional on-premise devices introduce a single point of failure and often lack the scalability that cloud applications require. Utilizing network-based security gateways and encryption offered by cloud providers are one way to scale this process.

3. End Users

Uneducated employees are a company’s biggest cyber risk. However, an educated user can be an asset for security, identifying and reporting anomalous situations like phishing attacks. Security initiatives should include employee training and security certification.

The challenge is assessing and prioritizing vulnerability points to use resources wisely for the biggest impact. The first step should be an independent vulnerability assessment and penetration test project.

This third-party tool will help assess areas of weakness — maybe phishing attempts to employees — and prioritize risk vulnerabilities.

By educating end users and identifying the biggest security risks, you can start to take action to remediate the issues and create a uniform security posture.

Connecting to applications in the cloud has become a networking way of life, and so too has the challenge of securing these deployments. It’s tough to stay ahead with the constant introduction of security technologies and both budget and staffing constraints.

While these three areas are key for 2016, we may see a noticeable shift in deployment or needs in 2017.

As we look toward our future in the cloud, we must also look toward avenues for securing our future.

Secure And Interconnected Smart Home

$
0
0

Smart Home Technologies will need to think about baking security into their systems, as hackers are increasingly seeing connected devices as a ‘weak link’ and easy way into a person’s network and stored data.

Smart Devices as standalone devices are virtually pointless. If one device cannot connect to multiple others it defeats its own purpose. In the next year smart devices will become more interconnected.

We are globally going to begin to harness Internet of Things as a whole. Currently our homes are full of internet connected devices, in 2017 we will merge the technologies and realise how they can better work together and in a smarter way.

What Your Competitors Know About Data-centric Security

$
0
0

Data-centric security, at its heart, is just another lock. But what happens when that lock is picked (keys stolen, credentials compromised)? Over the coming quarters, effective monitoring and access analytics will become key to ensuring the success of this promising initiative.

We will see data-centric security becoming more and more relevant and essential over other forms of security. Network security can be compromised, however data security will prevent data that is hacked, from being read.

At the moment, data-centric security is receiving a great deal of attention. However, in higher-risk environments, there is resistance to implementation. This speaks to education and change management that goes beyond next several quarters.

Data-centric approach to security is a double-edged sword. Focus on protecting what needs to be protected can also lead to sprawling complexity if overdone. The best approach is to focus on as few classes of data as possible.

Data-centric security will continue to be a hot area, but the amount of data shown to human analysts will decline. It’s all about machines surfacing the interesting information.

The primary change within Data-centric security will be a trend toward developer targeted Platform-as-a-Service security solutions and away from costly and custom security hardware infrastructure.

As we move increasingly to cloud models, thus releasing control of infrastructure, security providers will focus more on the data itself and how we can manage, classify, and protect it.

In relation to data-centric security we excel at authenticating data users and data encryption, but first we need to go back to the basics of data discovery and classification.

The dual phenomena of cybercrime and big data make it critical that enterprises understand provenance, governance and data management as part of a holistic security story.

Viewing all 41 articles
Browse latest View live




Latest Images