{"id":1170,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail153-atl101-mcdlv-net-2\/"},"modified":"2021-12-30T11:38:53","modified_gmt":"2021-12-30T11:38:53","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail153-atl101-mcdlv-net-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail153-atl101-mcdlv-net-2\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail153.atl101.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>All Windows users should patch these two new &#8216;critical&#8217; flaws<br \/>\nMicrosoft has released patches for two critical security vulnerabilities that affect every supported version of Windows.<br \/>\nThe patch, MS15-112 addresses a memory corruption flaw in Internet Explorer.<br \/>\nIf exploited, an attacker could gain access to an affected machine, gaining the same access rights as the logged-in user, such as installing programs, and deleting data.<br \/>\nThe other patch affecting all versions of Windows, MS15-115, fixes a series of flaws that could allow an attacker to remotely execute code on an affected machine by exploiting how the operating system handles and displays fonts.<br \/>\nSome of the flaws can only be triggered if an attacker logs on to the affected machine, but some can be triggered by the user visiting a web page that contains exploit code.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6303020b2a&#038;e=20056c7556<\/p>\n<p>Emerging hacking trends worry seasoned security professionals<br \/>\n&#8220;Currently what&#8217;s worrying me the most &#8212; and I don&#8217;t know where everyone else is &#8212; is the speed at which [hackers] are able to attack us.<br \/>\nPreviously, if someone wanted to find and exploit every single website that had some vulnerability in it, that could take months. \u2026 As of about a year and a half ago, now we&#8217;re talking like 4 to 16 minutes, somewhere within that range.<br \/>\nAnd that&#8217;s the slow way to do it.&#8221;<br \/>\nThis is one of the more alarming hacking trends RSnake addressed in this interview with SearchSecurity at the 2015 RSA Conference.<br \/>\nHowever there is a small window to prepare for such speedy attacks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3b0e905a58&#038;e=20056c7556<\/p>\n<p>The top security threats of 2016<br \/>\nWe&#8217;re seeing a shift as threat actors turn towards digital methods to cause harm or get their point across &#8212; but what are we likely to see next year.<br \/>\nAccording to Intel&#8217;s McAfee security team, things are going to get interesting.<br \/>\n&#8211; Hardware<br \/>\n&#8211; Vulnerabilities<br \/>\n&#8211; Cloud services<br \/>\n&#8211; Wearables<br \/>\n&#8211; Connected cars<br \/>\n&#8211; Warehouses of stolen data<br \/>\n&#8211; Hacktivism<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=68a112c4c2&#038;e=20056c7556<\/p>\n<p>Friday Is Peak Malware Distribution Day, Study Shows<br \/>\nIf Mondays are usually when security administrators have their hands full cleaning up malware threats and data breaches, there\u2019s a perfectly good reason for it.<br \/>\nThe weekend is when employees typically tend to bring their office laptops home and browse the Internet via poorly secured Wi-Fi connections \u2014 sometimes downloading all sorts of malicious software in the process.<br \/>\nThey then introduce the threat on the corporate network when they log back in at work.<br \/>\nCloud security services vendor Cyren recently examined daily malware distribution trends during the third quarter of this year as part of its \u201cCybersecurity Awareness Report.\u201d It discovered that Friday is the peak distribution day for spam and malicious software.<br \/>\nAccording to the company, cybercriminals appear to be purposely spiking malware distribution on Fridays to take advantage of what they apparently consider to be less protected employees and corporate systems.<br \/>\nCyren\u2019s review showed that, on average, cybercriminals distributed about 2.25 billion attachments containing malware on Fridays during the third quarter of 2015, or roughly three times the number distributed on other week days.<br \/>\nAccording to Cyren, cybercriminals appear to be attempting to extract the name of the employer the victim works for in addition to their corporate network login names, email addresses, business phone numbers and passwords.<br \/>\nOften the scams involved the use of emails that purport to arrive from trusted organizations such as LinkedIn, Amazon and Apple, Cyren said.<br \/>\nThe fake domains that cybercriminals have set up to lure users into parting with their corporate credentials include fake sites linked to Apple, DHL, Bank of America, Amazon and PayPal.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fa54b80f07&#038;e=20056c7556<\/p>\n<p>Europe needs to tackle key security challenges, says TeleTrust<br \/>\nThere are three key challenges for which Europe needs to find answers appropriate to the region, according to Norbert Pohlmann, chairman of IT security association TeleTrust.<br \/>\n\u201cResearch has shown that, when asked whether private data belongs to companies, 76% of US respondents said \u2018yes\u2019 compared with just 22% of European respondents,\u201d he said.<br \/>\nAnother key area that needs to be resolved is the problematic business model where services are provided in exchange for personal data.<br \/>\nAt a state level, Pohlmann said there needed to be significant policy changes to ensure that it is clear what national security agencies are and are not allowed to do, regarding personal data.<br \/>\nIndustrial espionage is a key area that needs to be addressed in Europe, in the light of the theft of industrial secrets that cost around \u20ac51bn a year in Germany alone.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bbab98e9f1&#038;e=20056c7556<\/p>\n<p>Penta Security Systems Inc. Announces Critical Cyber Security Vulnerability Statistics for First Half of 2015<br \/>\nSEOUL, South Korea, Nov. 10, 2015 \/PRNewswire\/ Penta Security Systems Inc., a leading South Korean information security company, today announced the release of its annual Web Application Threat Report.<br \/>\nThe report is based on customer data logs of its enterprise-level web application firewall (WAF) WAPPLES, as well as its cloud-based WAF service Cloudbric.<br \/>\nFor the first half of 2015, Penta Security reported a total of 2.4 billion web application attacks based on the Open Web Application Security Project (OWASP) Top 10 web risks.<br \/>\nPenta Security determined that Sensitive Data Exposure was the most prevalent OWASP web risk with a 29.9% occurrence.<br \/>\nThis indicates that the majority of web attacks were focused on exposing website vulnerabilities.<br \/>\nOWASP considers the impact of Sensitive Data Exposure as &#8216;severe&#8217; due to prospective attackers&#8217; ability to access or modify confidential user information while businesses are still legally liable for damages.<br \/>\nPenta Security also discovered that 48.3% of attacks were motivated by web server vulnerability scanning, which also led to subsequent secondary and tertiary attacks.<br \/>\nWhen analyzing web attack trends for the first half of 2015, Penta Security reported a large shift in attack methods towards more discreet and difficult to trace attacks in order to exploit sensitive data.<br \/>\nFor instance, the most frequent attacks used in the second half of 2014 were injection attacks, which can noticeably compromise a victim&#8217;s web server and requires immediate resolution.<br \/>\nHowever, in the first half of 2015, injection attacks decreased by 74% and were replaced by two separate attacks centered on accessing web server settings files and sending abnormal HTTP requests.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5a284e10b6&#038;e=20056c7556<\/p>\n<p>How fully homomorphic encryption can prevent infiltration of secure networks<br \/>\nResearch and advancements within technology are showing that fully homomorphic encryption can substantially limit the infiltration of secure networks, combat the offensive techniques used by nation-states and usher in a new generation of cloud computing technologies.<br \/>\nUp to now, there have been few feasible methods to monitor and detect infiltration or exfiltration without releasing sensitive signatures, permitting the visibility of data, or preventing secure monitoring for sensitive signatures in host-based systems.<br \/>\nAn approach to address these challenges of monitoring encrypted sensitive network traffic, while still using sensitive signatures, is based on recent advances in practical fully homomorphic encryption (FHE) in a practical encrypted data guard.<br \/>\nFHE would allow computations to be run on encrypted data.<br \/>\nThe success of this technology would enable broader use of cloud computing technologies, and it would make existing host-based monitoring capabilities more effective by permitting the secure use of sensitive signatures.<br \/>\nOur approach uses homomorphic encryption to compare encrypted data flowing across a guard against encrypted signatures in text files and more complicated signals such as audio files.<br \/>\nInitial results show the feasibility of testing encrypted text data in under a minute.<br \/>\nThis run-time enables practical application for usable email and file transfer systems.<br \/>\nWe are proposing to research and design novel FHE signature evaluation algorithms, cloud data guard architectures and system integration issues to maximize quality of service.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e102b0c955&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage2.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=95792aebb8)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: All Windows users should patch these two new &#8216;critical&#8217; flaws Microsoft has released patches for two critical security vulnerabilities that affect every supported version of Windows. The patch,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1170","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1170"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1170\/revisions"}],"predecessor-version":[{"id":3657,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1170\/revisions\/3657"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}