Cyber Security Institute

Thursday, July 25, 2013

Sophisticated Malware Is Stumping Security Pros

The ferocious nature of modern malware is wreaking havoc on some organizations, forcing security professionals to reassess current security policies and consider spending on modernizing defenses to detect attacks, according to a new survey. It found that 74 percent of respondents have increased their security budgets over the past two years in direct response to more sophisticated malware threats. Businesses need to assess their current defenses to avoid making impulsive spending decisions, said Jon Oltsik, senior principal analyst at Enterprise Strategy Group, in his “Malware and the State of Enterprise Security” report.

 

MORE... (0) Comments

Wednesday, July 24, 2013

New Trojan could create headaches for banks, customers

The developer’s new malware is called KINS, and he’s selling it for $5,000 a pop, although that price is likely to climb if the malware is a good as he brags it is. “[KINS is] a new professional-grade banking Trojan that is very likely taking its first steps in the cybercrime underground and could be poised to infect new victims as quickly and effectively as its Zeus, SpyEye and Citadel predecessors,” Limor Kessem, a cybercrime specialist with RSA, the security division of EMC, wrote in a blog post on Tuesday.

 

MORE... (0) Comments

Monday, July 22, 2013

Hackers’ StealRat botnet turns 85,000 unique IPs into malware-spreading tools

Hackers have developed a sophisticated StealRat botnet, capable of bypassing firms’ advanced anti-spam defences, according to security firm Trend Micro. Trend Micro threat response engineer, Jessa De La Torre reported uncovering the botnet, claiming that it uses advanced techniques to hide the malware used in the scam. “While exploiting vulnerable websites to send out spam has already been exhausted by other botnets, StealRat stood out because it used simple yet subtle methods to improve the botnet’s resiliency,” wrote De La Torre. De La Torre said by removing the interaction between the spam message and the campaign’s central server, the criminals are able to bypass most businesses’ cyber defences.

 

MORE... (0) Comments

Cyber threat well understood but organisations lack ‘intelligence’ to deal with it

Businesses across the UK may be more aware of cyber security threats, but they still have a long way to go to balance the cyber crime odds back in their favour. A report released by KPMG suggests that by learning from the intelligence approach adopted in the fight against terrorism, organisations can improve their safety-net and meet the ever-changing challenges of cyber attacks. KPMG’s Data Loss barometer, for example, shows that the hacking of information held by businesses has jumped globally from only 8% of total incidents in 2010 to a shocking 52% in 2012.


MORE... (0) Comments

Friday, July 19, 2013

HP Updates ArcSight Portfolio With Security Analytics

Technology giant Hewlett-Packard (HP) announced updates to its ArcSight portfolio, offering enterprises unified security analytics for big data with expanded identity monitoring to accelerate the detection of persistent threats. The series of updates includes ArcSight Threat Detector 2.0, which offers threat profiles and threat profile intelligence, and ArcSight Threat Response Manager 5.5, which provides cloud-ready, closed-loop capabilities for accelerated threat detection and response to mitigate advanced persistent threats (APTs).

 

MORE... (0) Comments

Thursday, July 18, 2013

Big banks staged mega-cyberattack drill last Thursday

About 50 institutions—including banks like JPMorgan Chase (JPM, Fortune 500) and Bank of America (BAC, Fortune 500)—participates in the exercise, called “Quantum Dawn 2.” To take part in the drills, each of the participating institutions will be running software developed by Cyber Strategies, a Northfield, Vt., firm that specializes in making cyber exercise software for financial institutions. Karl Schimmeck, SIFMA’s vice president of financial services operations, declined to share specifics of what exactly the simulated threats would look like, but similar drills in the past have looked like a giant, computerized version of roleplaying game Dungeons and Dragons.

 

MORE... (0) Comments

Wednesday, July 17, 2013

Security company to release testing tool for SAP mobile access

As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Boston-based Onapsis will release a new module for its X1 security suite, a product that performs automated security assessments, penetration testing and compliance audits for SAP’s ERP (enterprise resource planning) software, said Mariano Nunez, Onapsis’ CEO. The module will focus in part on the SAP Mobile Platform, formerly known as the Sybase Unwired Platform Developer Center, which helps developers build SAP mobile applications for different devices and platforms.


 

MORE... (0) Comments

As cyber attacks detonate, banks gird for battle

Banks large and small are girding for an elaborate drill this week that will test how they would fare if hackers unleashed a powerful and coordinated attack against them. Cyberattacks on the banking industry are growing more frequent and sophisticated and the list of assailants is ever-changing: crime bosses who want money, “hacktivists” who want to make political statements, foreign governments that want to spy on U.S. companies. Jamie Dimon, CEO of the country’s biggest bank, JPMorgan Chase, acknowledged that attacks are becoming more complex and dangerous, no longer carried out by “fairly simplistic” hackers commandeering people’s personal computers.

 

MORE... (0) Comments

Monday, July 15, 2013

Business users visit most malicious websites, security academics find

Business users account for 57 per cent of malicious attacks while one in eight Australian IP addresses is hit by one or more Web attacks on any typical day, according to a Deakin and Macquarie University analysis of more than 200 million Web requests from Australian Internet users. The report – entitled Analysis of the Australian Web Threat Landscape and conducted by Deakin and Macquarie academics with the support of security vendor Trend Micro – reflects research that began earlier this year and has since used data analysis on a wealth of data provided on an opt-in basis by users of Trend Micro’s cloud-based security filtering services. The Australian Research Council-funded research is based on data collected during the first two weeks of May, during which devices representing 600,000 distinct IP addresses visited HTTP/HTTPS sites every day. Of 200 million requests analysed during the time, just 400,000 – from around 80,000 distinct IPs – were issued for access to malicious Web pages.


MORE... (0) Comments

Thursday, July 11, 2013

Study: Network Reconnaissance On Rise Posing Computer Threat

In a study just released, Nuspire Networks contends network reconnaissance is on the rise, growing more pervasive and potentially damaging than the threat of computer viruses. The study finds that port scanning incidents at remote locations and branch office environments have risen nearly 40 percent from one month to the next. When a weakness is identified, it can be exploited and leads to sensitive information falling into the hands of those who intend on using it for criminal activity, the company said in a press release.


MORE... (0) Comments

Wednesday, July 10, 2013

Hunting for ‘Whales’ Using Targeted Malware

Until recently, most contemporary malware was designed so it could infect the greatest number of people, regardless of who they were. This is known as the shotgun approach to malware. The problem with that method is that IT security and end-user training is beginning to erode the effectiveness of this approach. This is forcing a change in tactics to the point where criminals are now beginning to put malware into very sophisticated and convincing packages to attract a whale or two. Cyber criminals now spend a great deal of time researching their whales and mine information like place of work, job title, names of individuals they interact with, and the names of business partners. It’s not so much that the malware itself is getting more sophisticated, but the spear phishing presentation used to trick the victim certainly is.

 

MORE... (0) Comments

Tuesday, July 09, 2013

Companeis lack the ‘intelligence’ to deal with cyber threats

Businesses across the UK may be more aware of cyber security threats, but they still have a long way to go to balance the cyber crime odds back in their favour. A report released today by KPMG suggests that by learning from the intelligence approach adopted in the fight against terrorism, organisations can improve their safety-net and meet the ever-changing challenges of cyber attacks. KPMG’s Data Loss barometer, for example, shows that the hacking of information held by businesses has jumped globally from only 8% of total incidents in 2010 to a shocking 52% in 2012.

 

MORE... (0) Comments

Friday, July 05, 2013

New EU laws approve tougher sentences for cyber criminals

Under new laws the 28 EU member states will be required to set terms of no less than two years in prison for individuals caught illegally accessing information systems, tampering with data, illegally intercepting communications, or creating tools that help commit such offences. This mandated minimum rises to five years if the individuals involved target national systems such as energy plants, public transportation or government servers. The changes also directly address the creation and operation of botnets – groups of hacked computers that are run in tandem to commit offences such as sending out spam and denial of service attacks.


MORE... (0) Comments

Thursday, July 04, 2013

DDoS attacks on sale for $2 an hour

Cybercriminals can now purchase DDoS attacks for $2 (£1.32) an hour from a rampant online marketplace of tools and services. That is according to a new white paper analysing the growth of the “as-a-service” nature of cybercrime penned by two senior technical bods at security vendor McAfee. As a result, the volume of cyberattacks is likely to increase” said report authors Raj Samani, vice president and chief technology officer EMEA and Francois Paget, senior threat research engineer at McAfee. The study highlighted a service offering to launch a DDoS attack on behalf of would-be attackers from as little as $2 per hour, for a one- to four-hour attack.

 

MORE... (0) Comments

Tuesday, July 02, 2013

AppRiver Releases Mid-Year Global Threatscape Report

AppRiver, LLC, a leading provider of email messaging and web security solutions, today released its mid-year Global Threatscape Report, a detailed analysis of web and email-borne threats and malware trends traced between January and June 2013. Once again, the United States was the leading country of origin for spam email messages, but to the surprise of many, servers in the former Soviet republic of Belarus logged the second-highest total from January through June.

 

MORE... (0) Comments

Monday, July 01, 2013

Combating attacks with collaborative threat intelligence

Even those attackers who are deploying more targeted, advanced attacks against a specific industry or organization will reuse the same techniques and exploit code in targeted attacks against similar organizations in the same industry. Another tool in the attacker’s arsenal is that they are highly adept at sharing information with each other. Why wouldn’t defenders likewise collaborate on the source, tools and techniques used for these attacks and reap the tremendous benefits of threat sharing? Not to mention that such collaboration among defenders can also increase the costs associated with executing these attacks.


MORE... (0) Comments