{"id":1173,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail137-suw12-mcsv-net\/"},"modified":"2021-12-30T11:38:53","modified_gmt":"2021-12-30T11:38:53","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail137-suw12-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail137-suw12-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail137.suw12.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Apple, Google and Microsoft: weakening encryption lets the bad guys in<br \/>\nApple, Microsoft, Google, Samsung, Twitter, Facebook and 56 other technology companies have joined together to reject calls for weakening encryption saying it would be \u201cexploited by the bad guys\u201d.<br \/>\nAfter Apple\u2019s chief executive Tim Cook\u2019s claims that \u201cany backdoor is a backdoor for everyone\u201d, the Information Technology Industry Council, which represents 62 of the largest technology companies worldwide, said: \u201cEncryption is a security tool we rely on everyday to stop criminals from draining our bank accounts, to shield our cars and airplanes from being taken over by malicious hacks, and to otherwise preserve our security and safety.\u201d<br \/>\nGovernments, including the UK\u2019s, have said that backdoors \u2013 holes in the security software powering various forms of encryption \u2013 should be created through which security services could view communications.<br \/>\nShould technology companies refuse to include means through which governments and security agencies can break encryption, banning would only impact the lawful as it will be very hard to stop terrorists or other groups from using software that uses encryption.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=634fa13ef9&#038;e=20056c7556<\/p>\n<p>Reboots Keep Security Officers Busy<br \/>\nIn Microsoft\u2019s November Patch Tuesday, there are 12 security bulletins that resolve more than 80 individual vulnerabilities.<br \/>\nFour of these updates are \u201cCritical&#8221; with the remaining eight marked as \u201cImportant.&#8221;<br \/>\nSecurity officers beware.<br \/>\nThis baseline contains numerous updates that have a vulnerability impact of Remote Code Execution or Elevation of Privilege, which are often exposed by users rather than seen as a failure in technology.<br \/>\nIt is critical to pay close attention to the number of reboots required in this release.<br \/>\nJames Rowney, service manager, Verismic Software, adds, \u201cThe number of reboots is significantly high in this public release.<br \/>\nIf you deploy these patches to the systems in your network, you must reboot.<br \/>\nOtherwise, the vulnerability remains a problem.<br \/>\nIn this process, remember, communication is vital to minimize user impact.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e3f40a35a0&#038;e=20056c7556<\/p>\n<p>8 issues that will derail IT in 2016<br \/>\nTo find out IT\u2019s major pain points, a recent survey polled 2,685 IT professionals around the globe, asking what their biggest challenge would be in the year ahead.<br \/>\nThe research, conducted by Ipswitch, uncovered that there are eight key issues holding IT teams back that should be prioritised in 2016.<br \/>\n1) Security &#8211; IT teams indicated that security was the top challenge, receiving 25 per cent of the overall responses. General security issues like breaches, malware, vulnerabilities and zero-day attacks were the biggest concern in this category, as stated by 55 per cent of respondents. File transfer was the second-leading response, with 39 per cent of respondents noting that moving data safely and efficiently inside and outside the organisation was setting them back.<br \/>\n2) Infrastructure and network monitoring &#8211; Nineteen per cent of those surveyed cited IT infrastructure and application performance monitoring as their top concern heading into 2016.<br \/>\n3) New technology, updates and deployment &#8211; Keeping up with new technology was the third-largest category, securing 14 per cent of the overall responses.<br \/>\nTwo-thirds (67 per cent) of the respondents in this category said that making necessary updates and deploying new technology was the biggest issue facing their IT department.<br \/>\n4) Time, budget and resource constraints &#8211; 4 per cent of responses indicated that time, budget and resource constraints were the biggest hurdle facing IT.<br \/>\nNearly half (46 per cent) of the respondents in this category said that a lack of time and internal resources hindered their ability to do their jobs.<br \/>\n5) Business issues &#8211; Seven per cent of survey respondents said general business issues were a barrier to achieving IT goals.<br \/>\n6) Data management and storage.<br \/>\nHow to manage, protect and store big data was on the mind of six per cent of respondents who named it their largest IT challenge to overcome in 2016.<br \/>\n7) Device management and end user issues &#8211; Five per cent of survey responses fell into the device management and end user issues category.<br \/>\n8) Automation and reporting &#8211; Four percent of survey responses fell under automation and reporting.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8df84bff26&#038;e=20056c7556<\/p>\n<p>The new Nmap 7 version just released<br \/>\nAfter 3.5 years, Fyodor has released the new version of the popular network-exploration tool Nmap 7.<br \/>\nNmap is one of the most popular open-source network mapper, the principal changes announced for this release are:<br \/>\n\u2013 3,200 code commits since Nmap 6<br \/>\n\u2013 expanded capabilities for its scripting engine including 171 new NSE scripts<br \/>\n\u2013 Mature IPv6 support from host discovery, port scanning and OS detection<br \/>\nSerious vulnerabilities like Heartbleed, POODLE, and FREAK could be easily detected by using the automated scanners implemented by Nmap 7.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b0d79aa846&#038;e=20056c7556<\/p>\n<p>A Look at What Security Vulnerabilities Are Worth<br \/>\nThis week, vulnerability acquisition firm Zerodium published its list for what it will pay for security vulnerabilities.<br \/>\nZerodium has achieved a degree of notoriety this month for claiming to pay out a $1 million bug bounty for an Apple IOS 9 exploit chain.<br \/>\nChaouki Bekrar, founder of Zerodium, told me in September that his firm was acquiring various zero-day exploits and was spending &#8220;$400,000 to $600,000 per month for vulnerability acquisitions.&#8221;<br \/>\nHewlett-Packard&#8217;s Zero Day Initiative (ZDI) similarly paid $30,000 to researchers for each Firefox exploit publicly demonstrated at the 2015 Pwn2own hacking challenge.<br \/>\nZDI however awarded those that could exploit Microsoft&#8217;s Internet Explorer $65,000, while a Google Chrome exploit was valued at $75,000.<br \/>\nA remote jailbreak of Android or Windows Phone is valued at up to $100,000, while a remote jailbreak on Apple iOS is now valued at $500,000.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a05945e40c&#038;e=20056c7556<\/p>\n<p>XL Catlin Launches CyberRiskIQ.com, an Online Portal To Help Clients Address Data Breaches<br \/>\nNEW YORK, Nov. 23, 2015 \/PRNewswire\/ &#8212; XL Catlin&#8217;s Cyber &#038; Technology insurance business just launched a new online resource \u2013 CyberRiskIQ.com, providing clients with easily accessible support for cybersecurity readiness and incident response services.<br \/>\n&#8220;CyberRiskIQ.com is an online portal of information, tools and insights designed to help our clients learn more about cyber threats and network security perils.<br \/>\nIt provides resources dedicated to helping our clients understand their risks and learning materials to lessen the severity of a cyber-security incident, if encountered,&#8221; said Elissa Doroff, Underwriting and Product Manager for Cyber &#038; Technology insurance. &#8220;Our intention is to keep our clients well-informed about the latest developments and trends and well-equipped to respond, should they experience their own cyber incident.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28bbbc9969&#038;e=20056c7556<\/p>\n<p>NERC\u2019s security exercise GridEx III involves 350 organisations<br \/>\nIn North America, more than 350 organisations and 3,000 participants from across the electric utility industry and federal and state governments participated in the North American Reliability Corporation&#8217;s (NERC&#8217;s) industry-wide grid security and incident response exercise GridEx III.<br \/>\nThe two-day exercise that took place on 18-19 November was designed to enhance the coordination of cyber and physical security resources, as well as communication with government partners and other stakeholders, including those in Canada and Mexico.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7a002bafa1&#038;e=20056c7556<\/p>\n<p>Mostly harmless: Berlin boffins bleat post epic TrueCrypt audit feat<br \/>\nTen auditors from the lauded Fraunhofer Institute for Secure Information Technology have given TrueCrypt a security tick after completing a comprehensive six-month audit under contract from the German Government.<br \/>\nThe 77-page report dug up extra vulnerabilities in the once-popular encryption platform but say none are sufficient to undermine the jettisoned software.<br \/>\n&#8220;Overall, the analysis did not identify any evidence that the guaranteed encryption characteristics are not fulfilled in the implementation of TrueCrypt.<br \/>\nIn particular, a comparison of the cryptographic functions with reference implementations or test vectors did not identify any deviations.<br \/>\nThe application of cryptography in TrueCrypt is not optimal.<br \/>\nThe AES implementation is not timing-resistant, key files are not used in a cryptographically secure way and the integrity of volume headers is not properly protected.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7bec7e8f60&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=d83cc87059)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Apple, Google and Microsoft: weakening encryption lets the bad guys in Apple, Microsoft, Google, Samsung, Twitter, Facebook and 56 other technology companies have joined together to reject calls&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1173","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1173"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1173\/revisions"}],"predecessor-version":[{"id":3660,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1173\/revisions\/3660"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}