Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail57.suw17.mcsv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s, apart from the reporter’s opinions ]

* Mapped: Terror threat around the world
* Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware
* Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks
* Cybercrime: Banks ‘Rewarding’ Bad Behaviour
* Banking malware slowed in 2015 – but don’t get too comfortable, Symantec warns
* Over 90 percent of CISOs expect to be hit by cyber attack in 2016
* INSIGHT: Are you liable for a cybersecurity attack?
* Global security threat told
* Emergency Java update fixes two-year-old flaw after researchers bypass old patch
* Australian industry lashes out at data breach notification scheme
* 5 key questions to determine your security posture
* Only 42% of cybersecurity professionals use shared threat intelligence
* Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks

Mapped: Terror threat around the world
The map explained: Those countries in dark red have a “high” threat from terror, those in red a “general” threat, those in orange an “underlying” threat and those in yellow a “low” threat.
The country had the highest terror threat level long before the deadly bomb attacks on a metro station and airport in Brussels, its capital.
The Foreign Office website states: “There is a high threat from terrorism.
Attacks could be indiscriminate, including on public transport and transport hubs and in other places visited by foreigners.
Brussels hosts a number of international institutions (EU and NATO) and government and foreign embassy buildings which are sensitive locations.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5a0ccbc4b9&e=20056c7556

Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware
Microsoft is finally addressing the elephant in the room in terms of security for Office users and has announced a new feature in the Office 2016 suite that will make it harder for attackers to exploit macro malware.
Now, Microsoft is announcing a new feature in its Office 2016 suite that will allow corporate network administrators to block the execution of macros that retrieve content from untrusted sources, which in most network configurations is “the Internet.”
“This feature can be controlled via Group Policy and configured per application,” Microsoft explains. “It enables enterprise administrators to block macros from running in Word, Excel and PowerPoint documents that come from the Internet.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=49fa2fae6c&e=20056c7556

Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks
The research was presented during today’s web seminar, entitled “Anti-virus software has had its day – how can you protect against advanced threats?”
It was also revealed that while 57 per cent have rolled out additional advanced threat detection and sandboxing solutions, as well as 32 per cent using application whitelisting techniques, only 15 per cent of respondents use truly advanced tactics, such as email filtering, network heuristics or read-only virtualisation.
Pannelist Bridget Kenyon (pictured), head of information security at University College London, expressed dismay at the results, stating:
While Kenyon acknowledged that “within a few hours the signature is in [antivirus] systems,” the fact that updating databases relies on systems being compromised in order to collect data makes standard antivirus software, in her mind, not fit for task.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=2df96de78a&e=20056c7556

Cybercrime: Banks ‘Rewarding’ Bad Behaviour
The Metropolitan Police commissioner says customers should be given incentives to tighten their passwords and update anti-virus software instead.
He said banks could make people more security conscious by refusing to reimburse people who had failed to protect themselves.
GCHQ says that 80% of cybercrime – which costs £1bn a year – could be prevented by more complex passwords and updated security software.
Police are set to include cybercrime estimates in their official crime statistics for the first time in July and Sir Bernard said this change could see crime figures double.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=4967553c2f&e=20056c7556

Banking malware slowed in 2015 – but don’t get too comfortable, Symantec warns
Australia is amongst the world’s top ten countries affected by banking malware, according to a Symantec analysis that found that one Australian bank was targeted by nearly 55 percent of all banking trojans analysed during 2015.
The company’s Financial Threats 2015 report analysed some 656 financially-targeted Trojans, which collectively sought to harvest access codes and other details from 547 banking institutions in 49 countries.
Malware authors’ increasing interest in Australian banks was correlated with a strong showing in the leaderboard for the countries with the most computers compromised by banking Trojans last year.
More than 20,000 Australian systems suffered attacks from such malware, ranking slightly behind France and just ahead of Russia in terms of absolute numbers of banking-related compromises.
Mobile attacks, in particular, had emerged as a favoured new attack vector by cybercriminals, with Kaspersky Labs recently noting that two mobile banking Trojans – Faketoken and Marcher – cracked the top-10 banking Trojans list.
In 2015, Kaspersky Labs noted, its tools blocked more than 1.9m attempts to launch malware capable of stealing money via online banking – up 2.8 percent on the previous year.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b3c5b68f2b&e=20056c7556

Over 90 percent of CISOs expect to be hit by cyber attack in 2016
This was a key, and rather worrying, finding from a survey by consultancy firm CEB of 160 FTSE-level organisations entitled IT Budget Benchmark 2016.
Furthermore, despite so many CISOs being aware of this threat almost three-quarters said they didn’t think they had adequate security in place to deal with the threat.
And many are throwing money at the problem in response, with CEB finding that security spend will account for 6.2 per cent of all IT budget spend this year.
Additionally many firms are looking to big data to help by being better able to spot threats before it’s too late.
However, CEB advised that ‘cyber hygiene’ is a better approach to tackling this threat, by educating staff to the types of cyber risks the organisation faces and making it clear good security is everyone’s responsibility.
Another area of increased spending is the cloud, where 92 per cent of firms expect to spend over five per cent of their IT budget on cloud services.
This is a notable increase on the 62 per cent that spent over five percent of their budget on cloud in 2011.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=edeaf2d032&e=20056c7556

INSIGHT: Are you liable for a cybersecurity attack?
By far the most misunderstood insurance coverage is cyberliability.
Just the name alone sounds futuristic and “techie.” Within the industry it’s also referred to as cybertheft, data security and data breach coverage.
In this article, I will give you a simple explanation of what it is, why your business might need it and how to start assessing your exposure.
What is it.
As a business you have a duty of care for how you use and store personally identifiable information and personal health information.
If this information is compromised in any way – whether accidentally released by your company or stolen from your computer, your business is responsible for the outcome to the information owners: your employees, customers, vendors, et cetera.
Some examples of this information would include name, Social Security number, date of birth, place of birth and maiden name.
Obviously, credit card numbers and financial data also are critical information.
Why is it important.
You use the information to conduct business and, as a result, misuse is legally your responsibility.
Think of its treatment as you would a physical piece of property.
If you take your car to get an oil change and it’s damaged in the process, the duty to correct the damage is on the business that allowed the damage to happen.
The same concept applies to an employee, customer or vendor’s information.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=dc2e3ed678&e=20056c7556

Global security threat told
Welcome to the White House.
Now read our take on global political landscape and trends for the next five years and beyond.
Bottom line: Get ready for a rocky road.
Their forecast calls for a slowing global economy dragged down by sluggish growth in China, and political volatility across the world, spurred by disillusionment with the status quo.
Insecurity will deepen rifts among social classes and religious groups.
Extremists will consolidate into large-scale networks across Africa, the Arab world and parts of Asia.
Competition among the U.S, China and Russia will heat up, raising the risk of confrontations.
Climate change is a problem now.
And technological advances will force governments and their citizens to wrestle with securing data, privacy, intellectual property and jobs lost to high-tech innovations.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ad44479f57&e=20056c7556

Emergency Java update fixes two-year-old flaw after researchers bypass old patch
Oracle has released an emergency Java security update to fix a critical vulnerability that could allow attackers to compromise computers when they visit specially crafted websites.
The company has assigned CVE-2016-0636 as the identifier for the vulnerability, which suggests that it is a new flaw discovered this year, but that’s not really the case.
Polish security firm Security Explorations confirmed via email that the new Java update actually fixes a broken patch for a vulnerability that the company originally reported to Oracle in 2013.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=df64ddfaf1&e=20056c7556

Australian industry lashes out at data breach notification scheme
Australian businesses say they are not sold on the government’s proposed mandatory data breach notification scheme, with some even going so far as to call for it to be abandoned.
However, Australia’s biggest industry groups are calling for changes to be made to avoid “notification fatigue” and to make their obligations clearer.
The Australian Industry Group – which represents 60,000 business across a range of sectors – said it couldn’t understand why such a scheme was required at all.
The Australian Retail Credit Association (ARCA) similarly argued the bill needed to be heavily edited if it was to progress any further.
According to PayPal, the legislation’s current scope of “harm” – which includes physical, psychological, economic and reputational – is “overly broad” and requires entities to assess characteristics of individuals without the requisite expertise to do so.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=f1cb6c3e15&e=20056c7556

5 key questions to determine your security posture
These topics serve as a great starting point for important discussions surrounding an organization’s security practice, with common security questions including:
1. What is your biggest security concern and is your security spend and expertise properly allocated to address that risk?
2. Do you have a clear picture of your overall security posture and of how it relates to industry best practices?
3. Do you currently conduct security assessments, such as penetration tests on a bi-annual basis?
4. How realistic is your plan to address the security gaps that you might have today?
5. Do you have an established process to address computer security breaches?
6. How confident are you of your ability to demonstrate compliance?
7. Given the skills gap that exists in security, do you view the ability to recruit and retain talent and expertise as a top priority?
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=668adc0720&e=20056c7556

Only 42% of cybersecurity professionals use shared threat intelligence
Intel Security released McAfee Labs Threats Report on cyber threat intelligence.
More than half, 59 percent, of survey respondents find such sharing to be “very valuable” to their organizations, while 38 percent find sharing to be “somewhat valuable.”
A near unanimous 91 percent of respondents voice interest in industry-specific cyber threat intelligence, with 54 percent responding “very interested” and 37 percent responding “somewhat interested.”
When asked why they have not implemented shared CTI in their enterprises, 54 percent of respondentssaid corporate policy as the reason.
It was followed by industry regulations with the percentage of respondents at 24.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d6333b65ff&e=20056c7556

Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks
The vulnerability was discovered by Stefan Metzmacher, a core developer of the Samba software, which is a popular open-source implementation of the SMB/CIFS (Server Message Block/Common Internet File System) networking protocol.
The company, which offers Samba consulting, support and development services, has even set up an website at badlock.org where more details will be released about the flaw on the disclosure date, which coincides with Microsoft’s Patch Tuesday — the day when Microsoft releases its monthly security updates.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=41cbf2f70a&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

Unsubscribe from this list (http://paulgdavis.us3.list-manage1.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=ebfc90070e)

Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme