Wednesday, April 29, 2009

Around The Horn vol.1,91

Finovate: Privacy is dead, long live the PIN

By Josh Lowensohn

What's something we often use for security in the real world but not online? PIN codes. We use them at stores, banks, and ATMs, so why not use them online? For one, a QWERTY keyboard lets you create a much stronger, and often easier-to-remember password than you could with ...

Originally posted at Webware

Microsoft tightens Windows 7 security for USB drives

By Elinor Mills, Ina Fried

In the wake of the Conficker worm spreading via removable storage devices among other methods, Microsoft said on Tuesday it is making a change to the way Windows 7 handles USB drives.

As a result of the change, most USB drives will not be able to automatically launch a program ...

Phishing with Swine Flu as bait

By Elinor Mills

Phishers and spammers have caught Swine Flu fever and are exploiting fears around the outbreak to try to sell pharmaceutical products or steal information, security experts said Tuesday.

The e-mail scams have a subject line related to the Swine Flu and typically contain either a link to a phishing Web ...

Another Adobe Reader security hole emerges

By Elinor Mills

Updated 4:35 p.m. PDT with Adobe saying Windows, Mac and Unix versions of Reader are affected and more details.

Security experts are recommending that people disable JavaScript in Adobe Reader following reports of a vulnerability in the popular portable document format reader on Tuesday.

The vulnerability appears to ...

Industrial Control Systems Safe? I Think Not

By Darknet on power station security

It seems like there is some serious hacking going on, attacks on power stations and industrial control systems. You’d think most of these systems would be offline, or at least behind a solid DMZ. But as we’ve seen before they often get exposed by people plugging into the LAN then accessing the net through dial-up or [...]

Adobe Reader, Acrobat Hit With Another Zero-Day

PDF reader is now a favorite target for attackers, prompting security experts to recommend open-source alternatives

SANS Tells Congress: Feds' Checkbook Is Cyberdefense 'Weapon'

Senate hearing debates whether the White House or the Department of Homeland Security shoudl head up U.S. cybersecurity operations

Security Suffers Cuts In Recession, But Fares Better Than The Rest Of IT

IT security spending sees cutbacks, but situation isn't as dire as in the rest of IT, studies say

Security Vendors Offer More Freebies, Deals To Existing Customers

Customers are asking their vendors for -- and getting -- free enhanced features and better deals from their security vendors

The Cloud Security Alliance looks to standardize security for cloud computing

A wide ranging group has set down principles for cloud security and is seeking help advancing them.

Guide to enterprise password management drafted

I hate passwords. I think passwords are a dreadful way of authenticating identity: they cost a lot, they change too often (and so users write them down), the rules for preventing dictionary and brute-force attacks are generally easy for users to circumvent, there are too many of them (and so users write them… oh never mind), and nothing can stop users from writing them down (and sticking them in their wallets, under their keyboards, behind their screens, in their desk drawers….). And yet we constantly hear non-technical managers resisting smart-token-based authentication or proximity cards because they are supposedly too expensive.

McAfee launches 'online 911' for cybercrime victims

McAfee has launched a new Web site designed to help cybercrime victims recover from hacker attacks.

BitLocker, TPM won't defend all PCs against VBootkit 2.0

Trusted Platform Modules and BitLocker Drive Encryption can protect Windows 7 computers against a bootkit attack unveiled last week but these technologies won't be available on a large portion of computers, leaving millions of users unprotected when Microsoft releases its next version of Windows.

Microsoft retires AutoRun (kinda, sorta)
Security as second fiddle

Microsoft's security team plans to retire a much-abused feature in its Windows operating system that uses flash drives and other removable media to spread malware.…

Adobe users imperiled by critical Reader flaw
Move over, Microsoft

Updated Once again, Adobe is scouring its Reader application for bugs following reports that it's susceptible to two vulnerabilities that could allow attackers to remotely execute malicious code on end-users' machines.…

Loudmouth workers leaking data through social networking sites
Twitter ye not

Almost two-thirds (63 per cent) of sys administrators fear that workers share too much personal information through social networking websites, according to a poll by IT security firm Sophos.…

Hire your very own Fred the Shred
Old school, industrial-grade data destruction

Infosec: DiskShred Ltd and Secure IT Disposals have both introduced services guaranteeing storage device destruction involving lorry-borne industrial grade shredders turning up at your site, chewing up disk and tape drives and grinding them to bits.…

Infosec opens in new venue
Dolly birds and cybercrime

Infosec: Infosec, the annual IT security trade show, kicked off in a new venue on Tuesday with 310 firms competing for attention and security spending.…

Two Adobe 0-day vulnerabilities, (Wed, Apr 29th)

There are two 0-day vulnerabilities on Adobe Acrobat announced today, all current versions are vulne ...(more)...

Internet Explorer 8, now being pushed, (Tue, Apr 28th)

If you were to go to your Windows Update. ...(more)...

Updated List of Domains - Swineflu related, (Tue, Apr 28th)

F-Secure has just published a list of SwineFlu related domains. We have not had a chance to ch ...(more)...

RSA Conference Social Security Awards, (Tue, Apr 28th)

It is confirmed and published that we here at the SANS Institute Internet Storm Center have won the ...(more)...

Senators hear call for federal cybersecurity restructuring

By Robert Westervelt

Congress is mulling over whether to give more authority on cybersecurity issues to the Department of Homeland Security or create a new office within the White House.

Cyberwarfare, targeted attacks pose increasing infosec threat

By Eric Parizo

A malware expert at the Computer Forensics show says despite notable gains for the industry, the danger posed by cyberwarfare and organized crime pose a host of major challenges.

ICE Act would create White House cybersecurity post

By SearchCompliance.com

The Information and Communications Enhancement (ICE) Act would create a White House "cyber office" that would coordinate between government agencies and the private sector.

Former Federal Reserve Bank employee arrested

By SearchFinancialSecurity.com Staff

An IT analyst and his brother allegedly used stolen data, including sensitive bank employee information, to obtain loans.

RSA researcher Ari Juels: RFID tags may be easily hacked

By Neil Roiter

SearchSecurity.com caught up with Dr. Ari Juels and asked the well-known cryptographer about RFID security, cloud storage innovations and his new novel.

Operational risks could mire virtualization deployment, panel says

By Robert Westervelt

Future virtualization platforms and features could cause confusion when managing who owns virtual machines within an organization and how network traffic can be monitored.

Compliance drives opportunities for security integrators

By Kelley Damore

At the 2009 RSA Conference, new regulations and initiatives such as NERC, HITRUST and CNCI could signal some opportunities in healthcare and energy verticals.

White House cybersecurity advisor calls for public-private cooperation

By Michael S. Mimoso, Editor, Information Security magazine

Melissa Hathaway delivered precious few details about her 60-day review of the country's cybersecurity policies and structures during her RSA Conference keynote.

Cloud computing security group releases report outlining trouble areas

By Robert Westervelt, News Editor

The non-profit Cloud Security Alliance says its comprehensive report serves as the starting point for a broader discussion on cloud computing security issues.

SIEM: Not for small business, nor the faint of heart

By Neil Roiter, Senior Technology Editor

Technologists say security information and event management success depends not on the product, but on the risk and information management program implemented with it. Also, small businesses lack the resources to get much value from SIEM systems.

How to Secure Microsoft SharePoint

Enterprises are increasingly turning to affordable collaboration tools such as Microsoft SharePoint to meet the needs of rapid and secure collaboration among their employees, partners and customers. Knowledge Center contributor Shane Buckley explains how IT administrators can secure Microsoft SharePoint in their organization to keep up with security and compliance demands.
- Microsoft SharePoint. These are two words that conjure up both relief and fear. First, the relief: with over 85 million licenses sold and $1 billion in sales, it's clear that organizations are rapidly embracing Microsoft SharePoint as an affordable technology that can solve the not-so-insignificant ...

How to Secure Your Network from Kaminsky's DNS Cache Poisoning Flaw

Savvy network security administrators recognize that multiple defenses offer the best protection against insidious security threats. Knowledge Center contributor Sandy Wilbourn explains what the Kaminsky DNS cache poisoning flaw is and how to secure your enterprise's network from the Kaminsky DNS cache poisoning flaw.
- The seriousness of the recent DNS cache poisoning vulnerability, discovered by security researcher Dan Kaminsky, raises the bar for network security administrators and should provoke development of a comprehensive plan to address this insidious threat. Every enterprise has a caching DNS server and...

How to Unify Identities to Reduce Identity and Access Management Challenges

Organizations struggle with complex, heterogeneous environments that require users to have multiple identities for accessing the applications they need. As these identities grow, they require an increased level of control and visibility, presenting IT with identity and access management challenges in efficiency, security and compliance. Knowledge Center contributor Jackson Shaw explains how a get to one strategy that automates identity administration, consolidates directories and utilizes the organization's existing infrastructure and directory can minimize these identity and access management challenges.
- Today's complex, heterogeneous enterprises contain multifaceted and diverse information systems. The proliferation of the personal computer and the networking of those computers have caused the number and types of systems that are accessed, as well as the number of employees who must be granted acce...

Microsoft Changes Windows 7 Feature to Fight Malware

Microsoft announces it is altering the AutoPlay feature in Windows 7 to prevent it from enabling the AutoRun task for USB devices. According to Microsoft, this was done as a security move because malware, including the notorious Conficker worm, is increasingly abusing the AutoRun feature to propagate.
- Microsoft is building a small but important change into Windows 7 to help slow the spread of malware. According to Microsoft, the company is changing the way the AutoPlay feature operates to prevent it from enabling the AutoRun task for USB devices. The move, Microsoft officials said, was do...

McAfee Move Targets SMB Security

Security vendor McAfee is making a push into the SMB security space with a line of McAfee UTM Firewalls and a new SAAS offering it says could cut costs for businesses. The McAfee Web Protection Service includes anti-malware capabilities and reputation-based filtering.
- McAfee has its eyes on the small and midsize business market with a push based on software as a service and unified threat management. The focus on SMBs follows a similar move by Symantec, which recently announced plans for an SMB-focused version of Symantec Endpoint Protection. In McAfee's case...

Application Security Starts in the Development Lifecycle

Application security starts during the development process. Thwarting hackers means reducing the number of security vulnerabilities out there, something that starts with proper planning, those in the field said.
- IT is an interesting world, one where the Web is simultaneously a key driver for business and a popular gateway for attackers. With both these forces at work, it shouldnt be surprising enterprises are starting to take application security more seriously. Statistics from a recent survey by the Open...

Jeffrey Carr: Projecting Borders into Cyberspace

Projecting Borders into Cyberspace

Brief: JavaScript flaw reported in Adobe Reader

JavaScript flaw reported in Adobe Reader

McAfee Launches Cybercrime Self-help Site (PC World)

In technology

PC World - Antivirus software maker McAfee today launched a new Web site intended to provide advice and services to those who suspect they may be victims of cybercrime.

Conficker worm dabbling with mischief (AFP)

In technology

AFP - The Conficker worm's creators are evidently toying with ways to put the pervasive computer virus to work firing off spam or spreading rogue anti-virus applications called "scareware."

McAfee Launches 'online 911' for Cybercrime Victims (PC World)

In technology

PC World - McAfee has launched a new Web site designed to help cybercrime victims recover from hacker attacks.

How Anonymous Hackers Triumphed Over Time

By Ryan Singel

Anonymous, the troublemaking collective, rigs a Time magazine web poll to make it leader the most influential person in the world. Here's how they did it.

Senator Balks at White House Control of Cybersecurity

Susan Collins, (R-Maine), wants to make sure Congress has an oversight role.

Swine Flu Might Sicken the Net

Analysis: Is the Internet ready for a pandemic?

Experts Disagree on Cybersecurity Role for DHS

Some at the hearing question whether the new White House czar is needed

McAfee Launches Cybercrime Self-help Site

The antivirus company launched a new site today with decent, albeit basic, advice for possible victims of malware or ID theft.

'Hackers Wanted' Ad Fed Security Misconception

I should never be surprised at things related to government security efforts, but I did think the concept of hiring hackers was dead.

Cloud Computing Security: Who Knew?

Cloud computing is big even though there is less than perfect agreement on just what it is.

No comments:

Post a Comment

My Blog List