background preloader

Infosec Security

Facebook Twitter

Russia’s Propaganda Trolls Make an Impact in Cyberspace. Featured Articles Recent reporting reveals that the Russian government may be using online propagandists in order to project a positive Russian image to the global community, while attacking those perceived to be a threat to Russian government interests. Two individuals that used to work for an organization called the “Internet Research Agency” exposed the propaganda machine whose objective was to influence public opinion, and in some instances, discredit specific targets.

The Internet Research Agency is an organization that employees hundreds of online “trolls” – individuals whose job it is to create online discontent. Located in four floors of a building in St. Petersburg, these trolls logged twelve-hour days supporting the Russian government while attacking perceived enemies – the United States, political oppositionists, for example – on social networks, blogs, and comment areas for social media sites. References: Wi-Fi inflight information security best practices. When you are 30,000 feet in the air and your flight offers Wi-Fi, are you really thinking about hacker Jon who is sitting in seat 44C? Probably not. Most people do not even consider that in-flight Wi-Fi is just like public Wi-Fi at a coffee shop.

When you purchase time on an in-flight wireless network, your credit card transaction is encrypted. Once the transaction is complete, your laptop and devices are flying high in their birthday suits, again, if you do not take information security hygiene seriously. In the eye of a cybercriminal, in-flight Wi-Fi-gorging passengers are like a shiny tin of pungent tightly-packed sardines. Business travelers Though Wi-Fi may be one of the most sought-after amenities for business travelers, it may not be the best option for unsecured devices and laptops that harbor client data and company secrets.

Wi-Fi access point insecurity With most airline Wi-Fi providers there is no encryption between your device and the airplanes wireless access point. Resources. Wi-Fi inflight information security best practices. Never judge an information security professional solely by certification. Recently I attended a gathering where a litigation lawyer was giving a presentation and made the statement, “The defendant’s information security officer did not have any type of security certification, such as a CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager), which demonstrated lack of qualification for her position and negligence on the part of the hospital system that had hired her to fill that position.”

Hmm; that was a pretty bold statement. And one I do not agree. I know a lot of brilliant information security professionals without certifications who are some of the greatest experts in their specific areas of work. This incident motivated me to do a little research to see how many folks who are in information security leadership roles have an information security certification; in particular a CISSP or a CISM, since the lawyer had called those out specifically. IoT means IT teams and MSPs must focus on security - Power More. IT professionals share the same nightmare. After a productive and normal day at work, you head home, hang out with the family, then ultimately call it a day and roll into bed. But in the wee hours, your CIO (chief information officer) calls in a panic with the dreaded words, “There’s been a privacy breach.” Cue the cold sweats. The occurrence of data breaches is becoming all too commonplace, happening to all kinds of companies.

What makes them even more challenging is that there is often as much threat posed from alliances with vendors as from within your own organization. Just within the last year we’ve read about security breaches at a variety of major retail organizations, insurance companies, and even government agencies. According to a CompuCon survey of 431 technology professionals, 44 percent listed security and cyber attacks as their number one concern. What is privacy anyway? When we’re talking about privacy, what do we actually mean? Privacy of behavior and action. Protect. HowManyMillionBIOSesWouldYouLikeToInfect_Whitepaper_v1. Just-Metadata - Intel Gathering and Analysis of IP Metadata. Github Repo: For some time now, I’ve been working on a tool which aggregates data about IP addresses from publicly available sources.

Three separate events prompted this project. First, I began noticing a large number of IP addresses attempting to brute force their way into my mail server. Second, a large number of systems/IPs scanned my web server for vulnerable web applications (Tomcat, phpMyAdmin, etc). I wanted to see if there was anything I could learn about the systems/IPs targeting my server and the malware callback domains we were seeing. IP Whois InformationGeographical InformationShodan information (Ports, keys, certificates, etc.)VirusTotalVarious Threat Feedsetc… After a couple conversations with Justin, I decided to write a tool to do just that. Let’s walk through some of the features, and how Just-Metadata works. To start off using Just-Metadata, create a text file containing a list of IP addresses (each on a new line). Powermore.dell. Do you know how well your vendors, business associates and contracted third parties (who I will collectively call “contractors”) are protecting the information with which you’ve entrusted them to perform some sort of business activity?

You need to know. Late last year, a study revealed that 33 percent of breaches in the retail industry were due to vulnerabilities caused by third-party vendors having access to sensitive information. The largest healthcare breach in 2014, which affected 4.5 million patients, came from a contractor of a hospital system. The list of breaches caused by contractors throughout all industries could fill a large book. I’ve led more than 300 contractor information security and privacy assessments. As a start to your contractor information security and privacy management activities, here are five things to check on when contracting another company to perform services on your behalf, especially when it involves personal information. Training or awareness activities. Kaspersky releases decryption tool that unlocks ransomware.

Hacked! How safe is your data on Adult Sites? Darknet Evolution Marketplace’s $12 Million Exit Scam Mystery Deepens. White House Hacked, Possibly by Russians | LIFARS. ALERT: New Ransomware Spearphish Uses One-Click Dropbox Attack. Ransomware: How does your network fare? It’s time for a National Cybersecurity Safety Board (NCSB) In his book The Psychological Edge: Strategies For Everyday Living, clinical psychologist Dr.

Samuel Shein writes that while we have a National Transportation Safety Board (NTSB), there is no National Psychological Research Board (NPRB). A group like the NPRB could investigate national disasters caused by those with psychological issues. Even with tragedies such as the Columbine High School and Sandy Hook Elementary School massacres, to the Heaven's Gate mass suicide, 9/11 and more; the US still lacks a central agency that deals with psychological-based tragedies. Creating a NPRB could be crucial to avoid future tragedies and senseless deaths. With regards to information security, the Sony breach of 2014 shows that the time has arrived to create a National Cybersecurity Safety Board (NCSB).

As for the NTSB, in 1967, Congress established the NTSB as an independent agency placed within the Department of Transportation (DOT). What would a NCSB look like? Anthem Hacking Points to Security Vulnerability of Health Care Industry. Photo The cyberattack on , one of the nation’s largest health insurers, points to the vulnerability of health care companies, which security specialists say are behind other industries in protecting sensitive personal information. Experts said the information was vulnerable because Anthem did not take steps, like protecting the data in its computers though encryption, in the same way it protected medical information that was sent or shared outside of the database. The hackers gained access to up to 80 million records that included numbers, birthdays, addresses, email and employment information and income data for customers and employees, including its own chief executive.

Anthem officials say they do not know who is behind the attack, but several security consultants have noted that in the past Chinese hackers have shown an interest in going after health care companies. Mr. Continue reading the main story While experts like Mr. Still, Mr. Empowering More Women to Embrace Information Security. Last year Infosec Buzz posted the Top 25 Female Infosec Leaders to Follow on Twitter. I was intrigued with the list, (not only because I was included), but because the previous Buzz Twitter infosec leader listdid not include any females. Though the all-male Infosec original Buzz list was not compiled intentionally to exclude females; Infosec is ultimately a male-dominated field. According to a 2013 (ISC)2 Global Information Security Workforce Study, women only represent 11 percent of the Information-Security workforce globally. I ask this question coming from the baby boomer generation. I grew up during a time when newborn babies were not gender-neutral.

My brothers were not allowed to play with barbie dolls or wear any clothing that smacked of pink; and I was not allowed to play with my brothers train set (and consistently guided back to my playroom to play with girlie dress-up-dolls). Wind the clock forward a few decades. About Bev Robb. Rooms - Create Something Together. Data Security Incident. Most people think public Wi-Fi is safe. Seriously? Most people who use public Wi-Fi couldn't care less about security, according to the recent 2014 Communications Market Report from Ofcom - the UK's Office of Communications/regulatory authority for telecommunications. Researchers reported that more than three-quarters (77%) of people, when asked if they agreed with this statement: I am concerned about security when accessing Wi-Fi outside the home … said, "Nope! " While 75% are blissfully out of agreement with this one: There are certain things that I wouldn’t access/do on the internet when connected to public WiFi … which means that most people aren't afraid to do some or all of these things while on Wi-Fi away from home: Streaming/downloading films, TV programmes, video clips, music, etc.Playing games onlineDownloading appsShopping onlineOnline bankingContacting people via apps including Skype, WhatsApp, or ViberSocial networkingEmailing In addition, most (72%) of those who access public Wi-Fi disagreed with this statement:

Generate Password. 50,000 sites hacked through WordPress plug-in vulnerability. A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far. The security flaw is located in MailPoet Newsletters, previously known as wysija-newsletters, and was fixed in version 2.6.7 of the plug-in released on July 1.

If left unpatched, it allows attackers to upload arbitrary PHP files on the Web server and take control of the site. MailPoet Newsletters has been downloaded almost 2 million times from the official WordPress plug-in repository to date. Several days ago researchers from Web security firm Sucuri spotted an automated attack that injected a PHP backdoor file into many WordPress sites. “The backdoor is very nasty and creates an admin user called 1001001,” the Sucuri security researchers said Wednesday in a blog post. “On most shared hosting companies—GoDaddy, Bluehost, etc. Teksquisite : #infosec rogue DNS server [MitM?] ... Commons.

Why Are Twitter Followers Sending Strange DM's? - The Tekblog. The past two weeks I’ve noted an uptick in Twitter followers sending me strange DM’s. When I contacted them about these strange DM’s, they stated that their account had been compromised. Some valid (compromised) accounts have since been deleted by Twitter and the URLs included in the DMs appear docile at this time. [Pataloca DOT com | 64.87.26.222] Twitter Followers The original DM URL linked back to a tweet from an account that did not follow me. If you click on the URL in the tweet you would see something like this: Nasty Campaigns Then you will be whisked off to one of three separate scam campaigns: [78.138.99.160 | Germany] Work at home [91.233.116.8 | Finland] Platinum Garcinia Cambogia™ | Lose [46.165.244.106 | Germany] PhytoCeramide | Skin care It’s All About Internet Fraud Scam Sites Are Cloned.

30c3: To Protect And Infect, Part 2. LimorElbaz : Top 25 Female #InfoSec Leaders... Peer Review Service for Technology Products. Stealth Pentesting: When I.T. Doesn't Even Know We're Here. How to enable Family Safety features in Windows 8. The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content. Thankfully, Windows 8 offers some solid tools for doing just that. (Windows 7 does, too, but Microsoft made them easier and more robust in the new version of the OS.)

For example, you can limit your child's Web browsing to age-appropriate sites and block or allow specific sites as needed. To get started, you'll need to set up an account for your child. 1. 2. 3. 4. Now you're all set to configure any blocks or limits. If you're looking for a more robust solution, Mobicip (known for its popular content-filtering iOS Web browser) now offers a Windows 8-compatible version of its desktop tool. Have you found a parental-control solution you like better? Contributing Editor Rick Broida writes about business and consumer technology. Targeted attack against UAE activist utilizes CVE-2013-0422, drops malware. Think tank presses Blue Coat over censorship concerns. News By Jeremy Kirk January 16, 2013 01:09 AM ET IDG News Service - A Canadian think tank called on Tuesday for continued scrutiny of U.S. security vendor Blue Coat Systems after a new technical analysis showed wide use of its products in countries with human rights and censorship concerns.

The Citizen Lab, based at the Munk School of Global Affairs at the University of Toronto, published a report that showed Blue Coat technology widely deployed at key choke points in telecommunication systems. The report was the result of several weeks of technical analysis that ended earlier this month and focused on two Blue Coat products: ProxySG and PacketShaper. It found ProxySG in use by Egypt, Kuwait, Qatar, Saudi Arabia and the UAE. "We hope Blue Coat will take this report as an opportunity to explain their due diligence process to ensure that their devices are not used in ways that violate human rights," the Citizen Lab said in its report. Blue Coat officials could not immediately be reached. Securing Critical Information Infrastructure: Trusted Computing Base. Pandora’s Box It was the Stuxnet worm that became the first cyber-weapon whose deployment became well known to the general public. Intentional or not, the people behind Stuxnet opened a Pandora’s box - showing the world how effective an attack on an industrial facility can be.

It’s easy for just about anyone to comprehend the potentially devastating effects of a possible future attack on installations in the energy, industrial, financial or other spheres. After the discovery of Stuxnet, several other close “relatives” were detected: Duqu, Flame and Gauss. These programs have several traits in common, but their targets, functionality and creation timestamps all differ. Unfortunately, this is not the full list of known malware capable of spying and/or carrying out acts of sabotage - the grim reality is that the war arsenals of several countries now include cyber-weapons. The Anatomy of an Attack Industrial Control Systems The Problem of Vulnerability Trustworthy Information Conclusion. Security Leaders Give Up. Oracle to patch 79 DB server vulnerabilities.

216.104.33.150 | Mail Server | IP Address Inspector. Brucon 2011 streaming. For Infosec Geeks: Geographic Routing Controls. Get Cocoon Internet Services: Researcher Combats Hackers With Software Subterfuge, Academic Spotlight (Bowdoin) Researcher Slams Sophos: How Secure Is Your Security Company? Facebook Forensic Paper Release. Top 10 security experts to follow on Twitter. Top 10 security experts to follow on Twitter. Raw. B is for Botnet [ABCs of IT]‬‏ Links. Honda security breach exposes 283,000 customers. Gy5dwp Shared by teksquisite. Don't Try This At Home, That's What The Hackerspace is For! Schwartz On Security: First, Know You've Been Breached -- InformationWeek. The Top Five Most Dangerous Malware. 4 Famous Hackers Who Got Caught. 11068_Online_Fraud_report_0810.

11188_Online_Fraud_report_1110. ISPs sign up to voluntary anti-zombie code - Networking. Evolution of Zeus Botnet | Symantec Connect. U.S. Is Working to Ease Wiretaps on the Internet. How Cyber Jurisdiction Affects Cybercrime Prosecution : Internet Business Law. Chirashi Security | Ligatt’s Lawsuits.

Hacking

FAA Mike Monroney Cyber Security Awareness Day (FBC); Oklahoma C.