{"id":1147,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl91-mcsv-net\/"},"modified":"2021-12-30T11:38:51","modified_gmt":"2021-12-30T11:38:51","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl91-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl91-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail55.atl91.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>IBM: CoreBot now ready for front line use as banking Trojan<br \/>\nCoreBot is now armed with 55 URL triggers that cause it to attack the online banking sites.<br \/>\nOnce in action, CoreBot&#8217;s first step is to grab the victim&#8217;s credentials; the malware then uses social engineering to con the victim into disclosing personally identifiable information and then commences to take over the session, the IBM report said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0d1363f91f&#038;e=20056c7556<\/p>\n<p>63% in favor of encryption backdoors to respond to national security threats<br \/>\nVormetric did a survey on how Americans view &#8220;backdoor&#8221; access by government entities to the encrypted data of private businesses.<br \/>\nNinety-one percent recognized that there were risks to encryption backdoors, but also felt that it is justified in some circumstances.<br \/>\nEnterprises recognize this; as shown by the results of another recent survey by IANS, 84% of businesses are considering encrypting all sensitive data.<br \/>\nBut adding backdoors to encryption compromises the technology, and this has not gone unnoticed by the American public.<br \/>\nIn certain circumstances Americans are in favor of backdoor access.<br \/>\nThis may be due to the strong &#8220;pro backdoor&#8221; language coming from the White House and senior federal law enforcement officials.<br \/>\nRespondents were in favor of backdoor access:<br \/>\n&#8211; In response to a national security threat (63%)<br \/>\n&#8211; As part of a federal investigation (39%)<br \/>\n&#8211; As part of a state or local investigation (29%).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=21bdd69f44&#038;e=20056c7556<\/p>\n<p>Millions of UK emails on global virus plotters&#8217; hitlist<br \/>\nBritish cyber-security experts have uncovered a trove of hundreds of millions of email addresses being used as a hitlist by criminals stealing financial data from banks, government bodies and other corporates.<br \/>\nSpecialists at GCHQ have been alerting companies named in the files, as an international investigation seeks to track down those using it.<br \/>\nThe vast database of 385\u2009million addresses was uncovered by the IT services giant Fujitsu, after following a trail from major clients who had fallen victim to hackers.<br \/>\nThe attack was global but particularly targeted the UK.<br \/>\nIn collaboration with anti-virus companies, Fujitsu\u2019s specialists traced Dridex to a series of servers in Russia that were being used to direct it.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f2a52c1244&#038;e=20056c7556<\/p>\n<p>Self-destructing computer chip can protect a top secret data<br \/>\n\u200bXerox Parc\u2019s new chip isn\u2019t quite on store shelves yet.<br \/>\nIt doesn\u2019t really even do much.<br \/>\nBut as a proof of DARPA-funded concept, it has one gigantic advantage that could help security-minded computer users and paranoid \u200bMr.<br \/>\nRobot \u200bfans: it can self destruct.<br \/>\nMade out of materials similar to smartphone display glass, modified to already have minute stress fractures.<br \/>\nA circuit was laid throughout the surface, and a laser activated transistor placed at the bottom.<br \/>\nOnce the laser was shined, it created a cascading effect, including pieces that continued to shatter into smaller pieces until all that was left was irrecoverable fragments.<br \/>\nIt could be used as a storage method for security fobs, encrypted passwords, and more.<br \/>\nIn the event of a data breach, storage fabricated on the chip could be destroyed within seconds, making the data physically irretrievable.<br \/>\nConversely, it could make for a great hackathon for people to figure out how to break into a system and shatter the chips (supposing a triggering element is installed internally) in order to either further strengthen the security, or just to be a butthead.<br \/>\nIn a demonstration on Thursday, the glass was stressed to breaking point by heat.<br \/>\nWhen a circuit was switched on, a small resistor heated up and the glass shattered into thousands of pieces.<br \/>\nEven after it broke up, stress remained in the fragments and they continued breaking into even smaller pieces for tens of seconds afterwards.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=93c144ba3e&#038;e=20056c7556<\/p>\n<p>The coming private cyber &#8216;war&#8217;<br \/>\nThe nature of cyber warfare \u2013 and whether the U.S. government would even be among the combatants \u2013 was one of the foremost discussion topics at the NextGov Prime conference Sept. 10.<br \/>\n\u201cMost companies have realized that the federal government is not coming to their rescue in the cyber sense,\u201d said journalist Shane Harris. \u201cThey are essentially on their own against organized criminals in Russia, against state-sponsored hackers in China, against groups like Anonymous, and sort of the various threats out there that might be trying to steal their data or take out their systems.\u201d<br \/>\n\u201cCompanies are not just going to keep taking this,\u201d the journalist warned. \u201cIf the government is saying to them, \u2018We can\u2019t really protect you, and we\u2019re not necessarily going to go on the offense for you,\u2019 I think it\u2019s only a matter of time before you see a company take matters into its own hands and essentially go on the offense and take the fight back to the hackers.\u201d<br \/>\nWill that fight take the form of U.S. companies hacking foreign firms, or even hacking foreign governments?<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9fcd5cd22b&#038;e=20056c7556<\/p>\n<p>Google shifts Flash advertisements to HTML5 to prevent malware<br \/>\nGoogle updates advertisement&#8217;s format in Chrome Browser beginning September 1.<br \/>\nThis update is about stopping advertisements to automatically play through Flash.<br \/>\nAdvertisements that are in Flash will be converted to HTML5 and others which are in HTML5 format will continue to work.<br \/>\nSpeaking with advertisers, Bulletin Leader stated that Google notified them about the shifting of format from Flash to HTML5 since the start of the year.<br \/>\nThe purpose of Google with the shift of video and animation model is to promote the advocacy of bug prevention with its users along with other online companies.<br \/>\nThe said transition was initiated on September 1, 2015.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b2bd4527da&#038;e=20056c7556<\/p>\n<p>Ten reasons threat intelligence is here to stay<br \/>\nOver the past couple of years, the volume and frequency of new malware and its variants has exploded.<br \/>\nBut it takes considerable time, effort and expertise to sift through data and transform it into pertinent information.<br \/>\nSo out with old and in with the new.<br \/>\nTo alter traditional approaches, threat intelligence emerged as a way to gather data about vulnerabilities and alter approaches based off that intel.<br \/>\nIn this article, I\u2019ve laid out 10 arguments being made against threat intelligence.<br \/>\n&#8211; Argument: Intelligence feeds will do very little to substantially improve cybersecurity.<br \/>\n&#8211; Argument: Threat intelligence plots dots on a blank sheet of paper, and may at best connect some of the dots, but it cannot paint the larger picture.<br \/>\n&#8211; Argument: Most organizations are unable to add the expertise required.<br \/>\n&#8211; Argument: No single vendor ever has a complete view of a campaign. A failure to note activity could give a client a flawed view of the picture and cause a low priority to be assigned to the threat, ultimately leaving the client no better off than before.<br \/>\n&#8211; Argument: Threat intelligence vendors operate in contrast to antivirus companies. When one antivirus company analyzes a new malware sample, those signatures are shared with peer organizations which reduce the burden for individual companies and ultimately protect the entire user community from known threats.<br \/>\n&#8211; Argument: Organizations do not need the details of the attack; they just want to know they are protected.<br \/>\n&#8211; Argument: Threat intelligence vendors guard their research to the detriment of the wider community<br \/>\n&#8211; Argument: Prices ensure that only those companies able to pay the hefty subscriptions get access, leaving many SMBs and critical parts of the supply chain in the dark.<br \/>\n&#8211; Argument: Networks, the solutions and resources defending them, and the data that resides on them vary greatly, and so do attacks.<br \/>\n&#8211; Argument: At its best, threat intelligence might provide occasional protection from attacks. At its worst it\u2019s an expensive source of information that bears no relevance to securing a network and could mislead decision-makers.<\/p>\n<p>The only way for companies to defend themselves is by adopting a more pragmatic and intelligent threat response: stopping a compromise at the host, proactively segmenting networks, and spending the time to develop in-depth situational awareness.<br \/>\nOtherwise, the next decade will end up much like the current.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=126c6d3070&#038;e=20056c7556<\/p>\n<p>The 10 things you need to know about cyberconflict<br \/>\nThe first step to understanding cyberconflict is to define the domain.<br \/>\nHere are 10 things to know about the cybersecurity debate, as taken from our recently released book from Oxford University Press, Cyber War versus Cyber Realities.<br \/>\n1. Terminology is important<br \/>\n2. We need data and theories about cyberconflict<br \/>\n3. Cybertactics are not used often<br \/>\n4. Cyber-actions to date have not been very severe<br \/>\n5. Most cyber-incidents are regional<br \/>\n6. Cyber-operations haven\u2019t gotten much reaction<br \/>\n7. Many cyber-incidents would be classified as espionage<br \/>\n8. Cyberterrorism is an inflated threat<br \/>\n9. Cyber-hygiene is important<br \/>\n10. A taboo is developing against cybertactics<br \/>\nOur research program in some ways clashes deeply with futurist proposals of those who would like to suggest war and conflict will be different with the rise of new weapons.<br \/>\nWe have seen little variation in the methods of warfare and diplomacy used through the history of human civilization.<br \/>\nThese processes have remained remarkably stable.<br \/>\nWe do not see that the use of cyber-technologies as a tactic will reshape the future.<br \/>\nOf course, cyberconflict will happen, and with greater frequency.<br \/>\nBut what we see is that the actions\u2019 severity will be minimal, and that clear norms are developing that will institutionalize the idea that there are only limited acceptable options for states in cyberspace if they wish go on the offense.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0bbc0f36e9&#038;e=20056c7556<\/p>\n<p>Lebanon library at center of internet privacy debate in shutting off its Tor server<br \/>\nA public library in Lebanon finds itself at the center of a complicated debate over internet privacy and safety, after questions from the Department of Homeland Security led the library to think twice about participating in the global anonymous web-surfing network known as Tor.<br \/>\nThe server, located at the Kilton Public Library in West Lebanon, was the first in the country to be operated by a public library under the Boston-based Library Freedom Project, which advocates for open software and privacy projects for public libraries.<br \/>\nFleming shut off the server after it had run for about a month, when Lebanon police raised the issue with city officials.<br \/>\nThe Lebanon Public Libraries Board of Trustees, which unanimously supported the project in June, is scheduled to discuss the issue at its meeting on Tuesday at 7 p.m. in the main library.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=39f91b0aed&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=84a5adaed5)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: IBM: CoreBot now ready for front line use as banking Trojan CoreBot is now armed with 55 URL triggers that cause it to attack the online banking sites&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1147","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1147"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1147\/revisions"}],"predecessor-version":[{"id":3634,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1147\/revisions\/3634"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}