{"id":1160,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl121-mcsv-net\/"},"modified":"2021-12-30T11:38:52","modified_gmt":"2021-12-30T11:38:52","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl121-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl121-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail152.atl121.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Facebook Now Warns Targets of State-Sponsored Hackers<br \/>\nWhen their accounts are compromised by state-sponsored actors, Facebook users will now be prompted to turn on &#8220;Login Approvals.&#8221; The feature requires the user to enter a special code whenever they are trying to log onto Facebook from an unrecognized device or browser.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b9303874a7&#038;e=20056c7556<\/p>\n<p>Mac OS X Malware hits record high<br \/>\nInfosec specialist Swift on Security has raised awareness on Friday over new adware software named &#8220;eFast Browser&#8221;.<br \/>\nMalwarebytes detailed in a report the modus operandi of the nefarious software.<br \/>\nWhat happens is that eFast attempts to erase Chrome and sets itself in its place, which allows it to hijack file associations and links with ease.<br \/>\nFor the unsuspecting user, eFast shows a striking design resemblance with icons and window from Chrome.<br \/>\nWhat is more, eFast is built on the open source Chromium project to begin with, so it functions in a very similar fashion to the Google-created browser.<br \/>\nWhat the analysis showed them was that the figure for the first 9 months of 2015 was 5 times greater than the sum of the years 2010-2014.<br \/>\nLet\u2019s be clear, this is not five times greater than any one year but 5 times greater than all the malware seen over the previous five years and this only takes us through the first 9 months of 2015.<br \/>\nBit9 + Carbon Black is not the only company to warn of an increase in Mac OS X malware.<br \/>\nEarlier this year Kaspersky revealed details of the Darwin Nuke attack which affected both iOS and Mac OS X.<br \/>\nIt said then that the number of attacks against Apple and its operating systems were on the rise and this was expected to continue.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=91b684b99a&#038;e=20056c7556<\/p>\n<p>Banks Should Use Darknet For Better Security According To Ex MI5 Chief Lord Evans<br \/>\nIn response to the IBTimes UK\u2019s question, Lord Evans made a statement at the Good Exchange Cybersecurity Summit on 14 October:<br \/>\n\u201cCertainly giving yourself that forward awareness so that you\u2019re not waiting to see what arrives, you are out there trying to find out what might arrive, I think is quite a game changer.<br \/>\nBut it does require quite a lot of maturity in your systems in order to do that and it can be quite difficult for some companies to do that.\u201d<br \/>\nSeveral cybersecurity managers have shown their support to the former MI5 Chief\u2019s statements.<br \/>\nIn an emailed comment to IBTimes UK, Richard Beck, head of cybersecurity at QA, made this statement: \u201cThe dark web is increasingly at the forefront of criminal innovation.<br \/>\nTapping into this hidden part of the Internet is the next chapter in the cat and mouse game of cybercrime being played out by the hackers and the IT security teams who continually try to catch them.<br \/>\nHaving an understanding of how the dark web works is the first step in being able to combat the illegal activities that go on there.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bcd0bab494&#038;e=20056c7556<\/p>\n<p>Drowning in security data? Here\u2019s how to make threat intel work for you<br \/>\nHow does a company operationalize its risk and security programs.<br \/>\nMore specifically, with all of the talk about big data, how does a company operationalize its threat intelligence process?<br \/>\nThe reality is, security teams looking to analyze logs are at the mercy of the developers who decide what to log and from which systems.<br \/>\nThese details are often built into (or more accurately, excluded from) systems when they are developed.<br \/>\nAs Smith at Tripwire recommends, absolutely capture your log data but also look to move beyond logs and \u201corganize some of your own internal network feeds.<br \/>\nYou should also tie sessions together to capture packet strings and ultimately perform a full packet capture.\u201d<br \/>\nWhen taking on this challenge, you will most likely need to identify and collaborate with a security expert trained in big data and security analytics.<br \/>\nSimilarly, be sure to identify solution providers and security vendors that can provide expertise in both internal and third-party vendor risk management as well as security incident response.<br \/>\nIt\u2019s critical to thwart as many attacks as you possibly can up and down the supply chain, but when attacks succeed, it\u2019s just as important to limit the damage and immediately return your network infrastructure to normal operations and to a fully secure state.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a90afdffd0&#038;e=20056c7556<\/p>\n<p>&#8216;Whale&#8217; finance fraud hits businesses<br \/>\nExperts have dubbed this &#8220;whaling&#8221; fraud because it targets &#8220;one big fish&#8221; as opposed to phishing, which tends to be aimed at lots of smaller fry.<br \/>\nThis week, the UK&#8217;s NCC Group said it too was targeted by &#8220;whaling&#8221; fraud.<br \/>\nIn a blogpost the company said emails had been sent from a gang that had registered the nccgrrouptrust.com domain that is close to the firm&#8217;s actual domain.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=89bf4960e2&#038;e=20056c7556<\/p>\n<p>Failing To Protect &#8216;Internet Of Things&#8217; Data Is Biggest Threat To Tech, Says Symantec, Cisco, RSA Security<br \/>\nThat&#8217;s according to top information officers from companies like Symantec, Cisco, RSA Security and others who gathered at the NASDAQ Monday for an event hosted by the National Cybersecurity Alliance.<br \/>\n\u201cIf you don\u2019t have confidence in the company you\u2019re doing business with, you probably won\u2019t do business with them,&#8221; said Tim Fitzgerald, chief security officer at Symantec. &#8220;That\u2019s going to help raise the bar when it comes to customers\u2019 expectations about what companies need to do.\u201d<br \/>\n\u201cWe have an opportunity now to get ahead of this,\u201d said Sven Schrecker, chief architect of IoT security solutions at Intel. \u201cThere\u2019s no reason to wait until it\u2019s too late this time.<br \/>\nWe have the lessons of history.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=724b83e903&#038;e=20056c7556<\/p>\n<p>Two-thirds of enterprises fail to meet best practice standards for data control<br \/>\nIn IDC\u2019s survey of senior executives at 429 mid-to-large scale enterprises, two-thirds of respondents were failing to meet best practice standards for data control, and few were likely to be consistent across the full spectrum of data security policies.<br \/>\nMore than three quarters (77%) of those surveyed also failed to mask sensitive data during the test-development phase, which significantly increases the threat of a data breach.<br \/>\nGovernment was the best-performing sector at implementing data control policies, while education was the weakest.<br \/>\nMeanwhile, it was found that a typical organisation holds 375 data copies, with each copy carrying sensitive information and therefore an increased risk of attack.<br \/>\nAnd the CIO was cited as central to the implementation of data control and security policies, which were only found to be applied on an ad-hoc basis 34% of the time.<br \/>\nBy 2018, IDC estimates copy data will be cost IT organisations $50.63 billion and currently consumes up to 60% of the IT storage hardware and infrastructure budget.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0f5f1d96c5&#038;e=20056c7556<\/p>\n<p>Merchant Advisory Group Launches CyberRisk Mitigation Tool During Cybersecurity Awareness Month<br \/>\nThe MAG CyberRisk Hub\u00ae is a private, mobile-friendly website that provides tools and resources to help MAG members understand their exposures, establish a response plan and minimize the effects of a breach on their organizations.<br \/>\nTools include access to a Breach Coach, incident roadmap, risk management tools and up to date news.<br \/>\nThe CyberRisk Hub\u00ae also serves as a Crisis Center, providing members with the information and technical resources they need to respond quickly and effectively to a potential data breach, alleged privacy violation or other cyber incident.<br \/>\nThe portal is powered and maintained by NetDiligence\u00ae, a leading cyber risk assessment and data breach services company.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0266452036&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=bfaa88243b)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Facebook Now Warns Targets of State-Sponsored Hackers When their accounts are compromised by state-sponsored actors, Facebook users will now be prompted to turn on &#8220;Login Approvals.&#8221; The feature&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1160","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1160"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1160\/revisions"}],"predecessor-version":[{"id":3647,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1160\/revisions\/3647"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}