Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

‘Off-Network Data’ Is Major Security Threat For Companies

Posted on August 22, 2007December 30, 2021 by admini

“Protecting data that is stored on devices outside the confines and control of the corporate network is a problem for which many companies simply do not have a solution,” said Larry Ponemon, founder and chairman of the Ponemon Institute, in a statement.

“Our research shows that, while most companies recognize the risk off-network data poses, few seem to have a grasp on how to manage the many challenges off-network data present to maintaining a strong data security program, and many do not even have a policy to address the situation.”

http://www.informationweek.com/news/showArticle.jhtml?articleID=201801989

Read more

Hacking Germany’s New Computer Crime Law

Posted on August 22, 2007December 30, 2021 by admini

“In essence, the way the laws are phrased now, there is no way to ever comply… even as a non-security company,” says researcher Halvar Flake, a.k.a. Thomas Dullien, CEO and head of research at Sabre Security. “If I walked into a store now and told the clerk that I wish to buy Windows XP and I will use it to hack, then the clerk is aiding me in committing a crime by [selling me] Windows XP,” Dullien says.

“The law doesn’t actually distinguish between what the intended purpose of a program is. It just says if you put a piece of code in a disposition that is used to commit a crime, you’re complicit in that crime.”

Dullien says his company’s BinNavi tool for debugging and analyzing code or malware is fairly insulated from the law because it doesn’t include exploits. But his company still must ensure it doesn’t sell to “dodgy” customers. Thierry Zoller, security engineer for German security firm n.runs, says he has removed his homegrown Bluetooth hacking tool, and renowned PHP researcher Stefan Esser earlier this month took down all of the proof-of-concept exploits he had developed for the Month of PHP Bugs in March.

It’s unclear whether the long arm of the German law could reach them, so some aren’t taking any chances: The exploit-laden Metasploit hacking tool could fall under German law if someone possesses it, distributes it, or uses it, for instance.

“I’m staying out of Germany,” says HD Moore, Metasploit’s creator and director of security research for BreakingPoint Systems. The law basically leaves the door open to outlaw any software used in a crime, notes Sabre Security’s Dullien.

Interestingly, German lawmakers met plenty of expert resistance to the computer crime law reforms — but passed them anyway. Lindner says he told officials that the German implementation of the EU Cybercrime Convention — from which the law originated — is not in line with the EU version, which excludes security industry, academic, and private security research. Dullien says he thinks legislators were pressured to pass a new law because the old one was flawed. “And they had to implement the EU directive on cybercrime, making it illegal to provide software whose ‘principal purpose’ is committing a crime,” he says.

The law, which went into effect on August 10, mandates fines or prison sentences for any person who violates 202a or 202b “by providing access to, selling, acquiring, leaving at the disposition of someone, distributing or otherwise making accessible” passwords or access control information.

http://www.darkreading.com/document.asp?doc_id=132255

Read more

Security remains mobility’s weakest link

Posted on August 21, 2007December 30, 2021 by admini

“Organizations are thinking about the BlackBerry or smartphone as an extension of the computing network, and as a terminal that’s carrying a lot of sensitive enterprise data,” says Scott Totzke, vice president of the global security group at Research in Motion, maker of the BlackBerry handheld device. “They want tools to kill information or lock it down when a handheld is lost, they want to encrypt sensitive data in transit and at rest, and there are growing concerns around compliance.”

Although Totzke denies that security concerns are slowing down enterprise uptake of RIM’s BlackBerry devices, he admits the issue has made his company’s sales process “more complex,” as customers are going to greater lengths to ensure that data on handhelds is adequately protected before they buy. In working with the Pentagon’s IT leaders on mobile device adoption, including an ongoing project to replace 1,200 existing handhelds with new BlackBerries, executives at the consultancy say that security concerns have become a primary focus. In May 2006, the highly publicized theft of a Department of Veterans Affairs laptop containing millions of servicemen’s records led to a series of heated debates on Capitol Hill.

Since then the emphasis on making information security a central part of the hardware procurement process has shifted to the fore, including for handhelds, says Will Alberts, chief executive of FOWGroup. “No one wants to end up on the front page of the newspaper, and everyone recognizes that the additional capability of storing more data on the device opens new risks,” says Alberts, who is also a member of the National Security Administration’s Joint Wireless Working Group.

In addition to the security features that RIM offers, including remote data-wiping tools and integration with two-factor authentication systems, Alberts says that government organizations are interested in utilizing encryption capabilities offered by the device maker and other third-party vendors to defend mobile data more aggressively.

“Mobility is bringing more functionality into enterprises as the devices expand, and there are great productivity gains, but on the flip side the costs of downtime and impact of potential data loss have increased significantly,” says Kara Hayes, senior product marketing manager for the security and mobility connectivity group at Nokia. Hayes says security concerns most commonly voiced by enterprise customers include issues related to lost devices, use of unsanctioned handhelds or mobile applications, and the potential for hackers to hijack the machines’ wireless data transfer systems. “With encryption, companies are figuring out that they need to know who the users really are and what type of functions they are going to use; they understand that they need to have different types of policies and deploy different levels of encryption to the necessary users, and not necessarily everyone,” Hayes says. “If an individual is a hard-core user of e-mail, messaging, or mobile [CRM] tools, they are at higher risk and need this type of protection,” Hayes says.

“The mature IT organizations that bring network security people to the table during the decision-making process are the ones who are doing the best job,” Lobel says. “And people need to have these conversations about the risks and solutions in business terms so that everyone involved understands; it’s hard to tell the CEO no when he wants something, so it’s important to explain things in way that everyone grasps.”

One company, F-Secure, is sourcing its security applications through wireless carriers in an effort to stake a claim in the mobile device space. According to F-Secure officials, bundling security into wireless contracts and allowing operators to offer additional device defense services will prevent enterprises from having to deal directly with a wide array of vendors, thereby securing mobile initiatives in a more cost-effective manner.

Moreover, with security part of the package, end-users will also be more likely to use their smartphones in more interesting ways, says Curtis Cresta, general manager of F-Secure North America. “The critical mass of smart device users is changing perceptions of adoption; much as with laptops, there has been a natural evolution with security, and a growing number of enterprises are now coming to us for advice,” Cresta says. “For instance, there has previously been a bit of resistance to pushing business applications out to handhelds, and applications companies have even come to us looking for help selling their products, but the market appears to be coming around, and having better security available from the carriers is a significant part of that.”

Sprint Nextel, for example, offers Sprint Mobility Management. Available for roughly $8 per user, the portfolio includes compliance, data protection, and anti-virus services for handhelds, along with other nonsecurity capabilities.

In addition to researching device capabilities, carrier services, and aftermarket technologies to help protect mobile devices, analysts advise enterprises to look at advanced handhelds in the same way they have come to view laptops and other technologies from a security perspective.

http://www.infoworld.com/article/07/08/21/34FEmobilesecurity_1.html

Read more

Mobile Workers Think Security Is IT’s Job, Study Reveals

Posted on August 21, 2007December 30, 2021 by admini

The study also showed that one-third of mobile users access unauthorized wireless connections, whether they’re hijacking a neighbors’ wireless connection or using unsecured hotspots at a coffee shop or in a public park.

Although many said they are “sometimes” aware, another 28% admitted they “hardly ever” consider security risks and proper behavior.

Some even said they “never” consider safety best practices and didn’t know they needed to be aware of security risks.

http://www.informationweek.com/news/showArticle.jhtml?articleID=201801429

Read more

Survey: Zero-Day Bugs Biggest Concern

Posted on July 31, 2007December 30, 2021 by admini

“The prospect of zero-day attacks is extremely troubling for organizations of all sizes.”

“In 2003 and then again in 2004, we were hit with devastating worms that exploited vulnerabilities in different applications before we could release the patches from our home-grown deployment process,” said Jim Czyzewski, senior information systems specialist responsible for desktop patch management at MidMichigan Medical Center in Midland, Mich.

http://www.darkreading.com/document.asp?doc_id=130350&WT.svl=wire_1

Read more

Black Hat: How to Hack IPS Signatures

Posted on July 31, 2007December 30, 2021 by admini

Graham says it’s no surprise this could be accomplished, but it was a bit of a shock to him that attackers are already using it to their advantage.

TippingPoint late last month temporarily removed its Zero Day Initiative (ZDI) signature updates for its IPSs after getting the word from Errata on its research. The IPS vendor said it then added more secure storage and delivery to its software and recently released an update with those enhancements.

Graham says Errata decided to test the ZDI signatures after finding at least two different hacking groups that wrote zero-day attacks using the signature TippingPoint released to patch the hole found in the infamous $10,000 Apple hacking contest at CanSec West earlier this year. Errata used the well known IDA Pro reverse-engineering tool, and also wrote its own tools for decrypting TippingPoint’s signatures.

Graham says he won’t be releasing the tools: “We want to demonstrate that it can be done… ” He argues that the trouble with these zero-day signatures is they are often used more for marketing purposes so an IPS vendors can show that they “got there” first, but this process instead invites trouble. “We believe, and our customers agree, that providing zero-day filters in advance of vendor announcement of a vulnerability is serving a positive security purpose, in spite of the risk that some point out,” says Terri Forslof, manager of security response for TippingPoint.

Graham says Errata’s Black Hat briefing session will also include some strategies for this, but the bottom line is vendors cannot protect themselves with software alone. “An important first step would be to compile the signatures at the factory before sending them to the box, rather than shipping the source of their signatures.”

As for IPS customers, if you’re a high-value target, Graham says, you need to be aware that the bad guys already have these signatures, and they could use them to hit you. It’s simple for an attacker to bypass the IPS altogether: “All they have to do is change a few bytes in the patterns” of the exploit, and they can get right past the IPS.

http://www.darkreading.com/document.asp?doc_id=130313&WT.svl=news2_1

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme