Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

IT Security News – 2017-07-11

Posted on July 11, 2016December 30, 2021 by admini

Table of Contents

  • How to handle security risks in Red Hat virtualization environments
  • Google is already fighting hackers from the future with post-quantum cryptography
  • If My Website Is Hacked and Customer Data Exposed, Am I Liable?
  • Business travellers putting organisations' cyber-security at risk
  • Protecting a BIT of Integrity BYTES
  • Global Cybergangs Take The ‘Cyber Arms Race’ Lead
  • Cybercrime Now Surpasses Traditional Crime In UK
  • Report: Firms see cyber threats, but not the means to deal with them
  • Business Intelligence and Data Security: A Double-Edged Sword
  • 8 Ways Ethically Compromised Employees Compromise Security

How to handle security risks in Red Hat virtualization environments

Here's a rundown of the types of threats to virtualization environments, and ways they can be mitigated:
– Denial of Service (DOS) attacks
– Memory corruption and leakage
– Guest-to-Host escape
Mitigation Techniques
-You can use control groups to protect the four core resources (memory, CPU, disk or network) that can be exploited.
-SELinux is Red Hat's Linux Security Module and it operates by implementing Mandatory Access Controls (MAC).
-sVirt (secure virtualization) combines SELinux and virtualization.
-SecComp is a kernel feature still early in development which also provides sandboxing like capabilities.
Link: http://www.techrepublic.com/article/how-to-handle-security-risks-in-red-hat-virtualization-environments/?ftag=TRE684d531&bhid=21487072891631060763005914609462

Google is already fighting hackers from the future with post-quantum cryptography

"We're announcing an experiment in Chrome where a small fraction of connections between desktop Chrome and Google's servers will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm that would typically be used," Google Software Engineer Matt Braithwaite wrote in a blog post Thursday, pointing out that Google plans to discontinue the experiment after two years, and hopefully move on to an even better algorithm.
What does all this mean for Chrome users.
Not much.
Regular users won't be part of the test.
Those who want to have a fraction of their online communication protected with a post-quantum key exchange algorithm should install the latest Chrome Canary build.
To check whether post-quantum crypto was on, go to a HTTPS-secured page, click on the lock next to the URL in the address bar, click on "details," and check if Key Exchange starts with “CECPQ1”.
Link: http://mashable.com/2016/07/08/google-chrome-quantum-cryptography/#zm1AzEuUGuqW

If My Website Is Hacked and Customer Data Exposed, Am I Liable?

That is a question most small business owners aren’t losing sleep over or are readily prepared to answer.
But in an era where data breaches routinely occur, it warrants serious consideration.
Unfortunately, there is no cut-and-dried answer to that question.
Some attest that the entity holding the information is liable while others suggest the customer bears responsibility.
Perez, weighing in on the liability issue, warns that small businesses running an ecommerce site must comply with the Payment Card Industry Data Security Standard (PCI DSS).
“The landscape of cyber security is shifting rapidly as data breaches are spiking,” Delaney said. “Congress, regulators and state attorneys general are taking a hard look at how companies … are protecting consumer information from unauthorized access.
Hearings have been held, and new laws pushed.”
Notification can quickly become very expensive, however, particularly if you have thousands of customers with which to communicate.
Unfortunately, standard commercial property and liability insurance does not cover the loss of personally identifiable information.
To address the issue, several companies now offer cyber liability policies intended to cover a data breach where customer information, such as Social Security or credit card numbers, is exposed or stolen.
While the question of liability is still not clear cut, businesses can protect themselves and their customers by following the guidelines included in this article.
Link: http://smallbiztrends.com/2016/07/website-hacked-customer-data-exposed-liable.html

Business travellers putting organisations' cyber-security at risk

A survey by Kaspersky Lab of 11,850 people from across Europe, Russia, Latin America, Asia Pacific and the US found that the pressure from work to get online is clouding the judgment of business travellers when connecting to the internet.
It said that three in five (59 percent) of people in senior roles say they try to log on as quickly as possible upon arrival abroad because there is an expectation at work that they will stay connected.
The research also found that 47 percent think that employers, if they send staff overseas, must accept any security risks that go with it.
Almost half (48 percent) of senior managers and more than two in five (43 percent) of mid-level managers use unsecure public access Wi-Fi networks to connect their work devices when abroad.
At least two in five (44 percent and 40 percent, respectively) use Wi-Fi to transmit work emails with sensitive or confidential attachments.
One in five (20 percent) senior executives admit to using work devices to access websites of a sensitive nature via Wi-Fi – compared to an average 12 percent.
One in four (27 percent) have done the same for online banking – compared to an average 16 percent.
Link: http://www.scmagazine.com/business-travellers-putting-organisations-cyber-security-at-risk/article/508027/

Protecting a BIT of Integrity BYTES

Leveraging the NIST Cybersecurity Framework to apply necessary albeit painful and often overlooked cyber changes to protect your most critical high-value assets (“Crown Jewels”) from advanced cyber threats
This post will focus primarily on Identify function’s Asset Management component and the Protect function of the NIST framework as it relates to often overlooked operational changes needed to isolate critical high-value assets.
What to Protect?
How to Protect?
Rise above the threats.
Leverage the NIST Cybersecurity Framework and follow best practices to isolate and protect your most critical “crown jewels” and tier-0 credentials using operational security practices and not just dependence on the latest “shiny object” security tools.
Bad guys have these same security tools before they attack, so we need to change the way we isolate and operate on our network.
These changes can be painful and often not intuitive, but defending against advanced attackers require advanced operational defenses to keep a breached PC from becoming a totally owned network.
Link: https://blogs.technet.microsoft.com/staysafe/2016/07/07/protecting-a-bit-of-integrity-bytes/

Global Cybergangs Take The ‘Cyber Arms Race’ Lead

In the release of its first Cyber Crime Assessment report on Thursday (July 7), the U.K.’s National Crime Agency (NCA) said that police and businesses are losing the “cyber arms race” to these sophisticated criminals.
According to the data, the most significant and advanced threat to the U.K. is actually from a small group of international crooks that use “highly profitable” malware to fuel cyberattacks.
These organized gangs of criminals are able to launch attacks directly at both businesses and individuals.
According to the report, advertisements — ranging from “DDOS attacks for as low as $5 USD an hour” to “Online tutorials from $20 USD that cover DDOS attacks, cracking Wi-Fi, Crypters and much more” — are just a sample of the offerings posted across the underground marketplace, which it describes as growing bigger, more sophisticated and competitive.
The intelligence analysts found that malware is becoming “much cheaper and continues to offer a low barrier to entry for cybercriminals looking to steal information,” posing an even greater threat to unsuspecting groups, consumers, private organizations and the government.
Link: http://www.pymnts.com/news/security-and-risk/2016/cybergangs-cyber-arms-race-malware/

Cybercrime Now Surpasses Traditional Crime In UK

Cybercrime is currently outpacing traditional crime in the United Kingdom in terms of impact spurred on by the rapid pace of technology and criminal cyber-capability, according to the UK’s National Crime Agency.
The trend suggests the need for a more collective response from government, law enforcement, and industry to reduce vulnerabilities and prevent crime, the NCA report says.
One security expert notes that the cybercrime situation here in the US is even more dire.
“I think it is more dramatic in the US and I do think cybercrime is a larger industry than narcotics trafficking because of intellectual property theft and secondary infection,” says Tom Kellermann, co-founder and CEO of Strategic Cyber Ventures, which invests in next-generation security technology.
Link: http://www.darkreading.com/threat-intelligence/cybercrime-now-surpasses-traditional-crime-in-uk/d/d-id/1326208

Report: Firms see cyber threats, but not the means to deal with them

The study, “Taking the Offensive: Working Together to Disrupt Cyber Crime,” was undertaken by international consulting firm KPMG and telecoms group BT.
While awareness of the threat has never been higher — 73 percent of respondents said digital security was on the agenda of board meetings — most organizations still don’t understand the scale of the threat and aren’t ready for it, according to the report.
Businesses are struggling to keep their data and systems secure against a backdrop of proliferating attack tools and growing cyber-criminal sophistication—what the report calls a “vast dark market” for cyber crime tools.
Less than a quarter (22 percent) said they were “fully prepared” to combat security breaches by ever-more-agile cyber criminals.
Nearly half of senior decision makers said they were constrained by regulation and lacked the right skills and people to thwart cyber crime.
Other constraints were organization-specific; 46 percent cited legacy IT systems as an issue and 38 percent identified bureaucratic processes.
Lack of investment and even cultural change within organizations were cited as barriers.
Link: http://fedscoop.com/organizations-fully-aware-of-growing-cyber-threat-but-few-ready-to-deal-with-it-study-finds

Business Intelligence and Data Security: A Double-Edged Sword

Business intelligence represents great opportunities for businesses that have the right people, processes and technology in place.
According to a recent ComputerWorld survey, 50 percent of respondents are increasing their IT security budget. 41 percent are increasing their analytics investment.
Another survey found that 35 percent of respondents considered security concerns to be the biggest obstacle surrounding data analysis.
The analytics software space is packed with vendors looking to cash in on this opportunity.
Proof positive is how hot the big data market has been over the past several years.
New data frontiers like social media, mobile ecommerce and web content performance represent new challenges and opportunities for insight for companies of all sizes.
Security Information and Event Management systems are powerful analytics solutions in their own right.
The latest security analytics systems are positioned as more advanced than SIEM could offer.
Threat Analytics/Intelligence solutions, delivered via the cloud by companies like FireEye, Palo Alto Networks and Fortinet are seen as the next generation of security intelligence.
Traditional BI vendors collect a lot of data from various repositories such as ERP, CRM and asset management systems, though they have typically left security and threat analytics to the leading vendors in that space.
Sharing business performance information across your company should be carried out on a “need to know” basis.
Providing permission-based access to data visualizations and executive dashboards should be provisioned with consideration of:
Standards-based API’s, certified by credible sources makes for safer analytics hub than coding your own connections.
Analytics engines are often at the center of multiple systems, which makes them a potentially lucrative target for opportunistic hackers.
Since many data breaches are as a result of employee activities, it emphasizes the need to govern access to reporting systems.
Link: http://www.business2community.com/business-intelligence/business-intelligence-data-security-double-edged-sword-01577755#KvjcbYs2JVLiiH8q.97

8 Ways Ethically Compromised Employees Compromise Security

The fact is that there are always a few bad apples in the barrel, and when it comes to employees–whether IT or your typical corporate user–the bad actors can introduce a lot of risk to the organization.
But some IT executives may not realize just how many potential bad apples there can be, depending on the circumstances.
Here are a few statistics that show how prevalent shaky ethics really are in the workplace.
Link: http://www.darkreading.com/threat-intelligence/8-ways-ethically-compromised-employees-compromise-security/d/d-id/1326196

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme