{"id":1210,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail57-suw17-mcsv-net\/"},"modified":"2021-12-30T11:38:58","modified_gmt":"2021-12-30T11:38:58","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail57-suw17-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail57-suw17-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail57.suw17.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Mapped: Terror threat around the world<br \/>\n* Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware<br \/>\n* Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks<br \/>\n* Cybercrime: Banks &#8216;Rewarding&#8217; Bad Behaviour<br \/>\n* Banking malware slowed in 2015 \u2013 but don&#8217;t get too comfortable, Symantec warns<br \/>\n* Over 90 percent of CISOs expect to be hit by cyber attack in 2016<br \/>\n* INSIGHT: Are you liable for a cybersecurity attack?<br \/>\n* Global security threat told<br \/>\n* Emergency Java update fixes two-year-old flaw after researchers bypass old patch<br \/>\n* Australian industry lashes out at data breach notification scheme<br \/>\n* 5 key questions to determine your security posture<br \/>\n* Only 42% of cybersecurity professionals use shared threat intelligence<br \/>\n* Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks<\/p>\n<p>Mapped: Terror threat around the world<br \/>\nThe map explained: Those countries in dark red have a &#8220;high&#8221; threat from terror, those in red a &#8220;general&#8221; threat, those in orange an &#8220;underlying&#8221; threat and those in yellow a &#8220;low&#8221; threat.<br \/>\nThe country had the highest terror threat level long before the deadly bomb attacks on a metro station and airport in Brussels, its capital.<br \/>\nThe Foreign Office website states: &#8220;There is a high threat from terrorism.<br \/>\nAttacks could be indiscriminate, including on public transport and transport hubs and in other places visited by foreigners.<br \/>\nBrussels hosts a number of international institutions (EU and NATO) and government and foreign embassy buildings which are sensitive locations.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5a0ccbc4b9&#038;e=20056c7556<\/p>\n<p>Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware<br \/>\nMicrosoft is finally addressing the elephant in the room in terms of security for Office users and has announced a new feature in the Office 2016 suite that will make it harder for attackers to exploit macro malware.<br \/>\nNow, Microsoft is announcing a new feature in its Office 2016 suite that will allow corporate network administrators to block the execution of macros that retrieve content from untrusted sources, which in most network configurations is &#8220;the Internet.&#8221;<br \/>\n&#8220;This feature can be controlled via Group Policy and configured per application,&#8221; Microsoft explains. &#8220;It enables enterprise administrators to block macros from running in Word, Excel and PowerPoint documents that come from the Internet.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=49fa2fae6c&#038;e=20056c7556<\/p>\n<p>Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks<br \/>\nThe research was presented during today&#8217;s web seminar, entitled &#8220;Anti-virus software has had its day &#8211; how can you protect against advanced threats?&#8221;<br \/>\nIt was also revealed that while 57 per cent have rolled out additional advanced threat detection and sandboxing solutions, as well as 32 per cent using application whitelisting techniques, only 15 per cent of respondents use truly advanced tactics, such as email filtering, network heuristics or read-only virtualisation.<br \/>\nPannelist Bridget Kenyon (pictured), head of information security at University College London, expressed dismay at the results, stating:<br \/>\nWhile Kenyon acknowledged that &#8220;within a few hours the signature is in [antivirus] systems,&#8221; the fact that updating databases relies on systems being compromised in order to collect data makes standard antivirus software, in her mind, not fit for task.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2df96de78a&#038;e=20056c7556<\/p>\n<p>Cybercrime: Banks &#8216;Rewarding&#8217; Bad Behaviour<br \/>\nThe Metropolitan Police commissioner says customers should be given incentives to tighten their passwords and update anti-virus software instead.<br \/>\nHe said banks could make people more security conscious by refusing to reimburse people who had failed to protect themselves.<br \/>\nGCHQ says that 80% of cybercrime &#8211; which costs \u00a31bn a year &#8211; could be prevented by more complex passwords and updated security software.<br \/>\nPolice are set to include cybercrime estimates in their official crime statistics for the first time in July and Sir Bernard said this change could see crime figures double.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4967553c2f&#038;e=20056c7556<\/p>\n<p>Banking malware slowed in 2015 \u2013 but don&#8217;t get too comfortable, Symantec warns<br \/>\nAustralia is amongst the world&#8217;s top ten countries affected by banking malware, according to a Symantec analysis that found that one Australian bank was targeted by nearly 55 percent of all banking trojans analysed during 2015.<br \/>\nThe company&#8217;s Financial Threats 2015 report analysed some 656 financially-targeted Trojans, which collectively sought to harvest access codes and other details from 547 banking institutions in 49 countries.<br \/>\nMalware authors&#8217; increasing interest in Australian banks was correlated with a strong showing in the leaderboard for the countries with the most computers compromised by banking Trojans last year.<br \/>\nMore than 20,000 Australian systems suffered attacks from such malware, ranking slightly behind France and just ahead of Russia in terms of absolute numbers of banking-related compromises.<br \/>\nMobile attacks, in particular, had emerged as a favoured new attack vector by cybercriminals, with Kaspersky Labs recently noting that two mobile banking Trojans \u2013 Faketoken and Marcher \u2013 cracked the top-10 banking Trojans list.<br \/>\nIn 2015, Kaspersky Labs noted, its tools blocked more than 1.9m attempts to launch malware capable of stealing money via online banking \u2013 up 2.8 percent on the previous year.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b3c5b68f2b&#038;e=20056c7556<\/p>\n<p>Over 90 percent of CISOs expect to be hit by cyber attack in 2016<br \/>\nThis was a key, and rather worrying, finding from a survey by consultancy firm CEB of 160 FTSE-level organisations entitled IT Budget Benchmark 2016.<br \/>\nFurthermore, despite so many CISOs being aware of this threat almost three-quarters said they didn&#8217;t think they had adequate security in place to deal with the threat.<br \/>\nAnd many are throwing money at the problem in response, with CEB finding that security spend will account for 6.2 per cent of all IT budget spend this year.<br \/>\nAdditionally many firms are looking to big data to help by being better able to spot threats before it&#8217;s too late.<br \/>\nHowever, CEB advised that \u2018cyber hygiene\u2019 is a better approach to tackling this threat, by educating staff to the types of cyber risks the organisation faces and making it clear good security is everyone\u2019s responsibility.<br \/>\nAnother area of increased spending is the cloud, where 92 per cent of firms expect to spend over five per cent of their IT budget on cloud services.<br \/>\nThis is a notable increase on the 62 per cent that spent over five percent of their budget on cloud in 2011.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=edeaf2d032&#038;e=20056c7556<\/p>\n<p>INSIGHT: Are you liable for a cybersecurity attack?<br \/>\nBy far the most misunderstood insurance coverage is cyberliability.<br \/>\nJust the name alone sounds futuristic and \u201ctechie.\u201d Within the industry it\u2019s also referred to as cybertheft, data security and data breach coverage.<br \/>\nIn this article, I will give you a simple explanation of what it is, why your business might need it and how to start assessing your exposure.<br \/>\nWhat is it.<br \/>\nAs a business you have a duty of care for how you use and store personally identifiable information and personal health information.<br \/>\nIf this information is compromised in any way \u2013 whether accidentally released by your company or stolen from your computer, your business is responsible for the outcome to the information owners: your employees, customers, vendors, et cetera.<br \/>\nSome examples of this information would include name, Social Security number, date of birth, place of birth and maiden name.<br \/>\nObviously, credit card numbers and financial data also are critical information.<br \/>\nWhy is it important.<br \/>\nYou use the information to conduct business and, as a result, misuse is legally your responsibility.<br \/>\nThink of its treatment as you would a physical piece of property.<br \/>\nIf you take your car to get an oil change and it\u2019s damaged in the process, the duty to correct the damage is on the business that allowed the damage to happen.<br \/>\nThe same concept applies to an employee, customer or vendor\u2019s information.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dc2e3ed678&#038;e=20056c7556<\/p>\n<p>Global security threat told<br \/>\nWelcome to the White House.<br \/>\nNow read our take on global political landscape and trends for the next five years and beyond.<br \/>\nBottom line: Get ready for a rocky road.<br \/>\nTheir forecast calls for a slowing global economy dragged down by sluggish growth in China, and political volatility across the world, spurred by disillusionment with the status quo.<br \/>\nInsecurity will deepen rifts among social classes and religious groups.<br \/>\nExtremists will consolidate into large-scale networks across Africa, the Arab world and parts of Asia.<br \/>\nCompetition among the U.S, China and Russia will heat up, raising the risk of confrontations.<br \/>\nClimate change is a problem now.<br \/>\nAnd technological advances will force governments and their citizens to wrestle with securing data, privacy, intellectual property and jobs lost to high-tech innovations.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ad44479f57&#038;e=20056c7556<\/p>\n<p>Emergency Java update fixes two-year-old flaw after researchers bypass old patch<br \/>\nOracle has released an emergency Java security update to fix a critical vulnerability that could allow attackers to compromise computers when they visit specially crafted websites.<br \/>\nThe company has assigned CVE-2016-0636 as the identifier for the vulnerability, which suggests that it is a new flaw discovered this year, but that&#8217;s not really the case.<br \/>\nPolish security firm Security Explorations confirmed via email that the new Java update actually fixes a broken patch for a vulnerability that the company originally reported to Oracle in 2013.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=df64ddfaf1&#038;e=20056c7556<\/p>\n<p>Australian industry lashes out at data breach notification scheme<br \/>\nAustralian businesses say they are not sold on the government&#8217;s proposed mandatory data breach notification scheme, with some even going so far as to call for it to be abandoned.<br \/>\nHowever, Australia&#8217;s biggest industry groups are calling for changes to be made to avoid &#8220;notification fatigue&#8221; and to make their obligations clearer.<br \/>\nThe Australian Industry Group &#8211; which represents 60,000 business across a range of sectors &#8211; said it couldn&#8217;t understand why such a scheme was required at all.<br \/>\nThe Australian Retail Credit Association (ARCA) similarly argued the bill needed to be heavily edited if it was to progress any further.<br \/>\nAccording to PayPal, the legislation&#8217;s current scope of &#8220;harm&#8221; &#8211; which includes physical, psychological, economic and reputational &#8211; is &#8220;overly broad&#8221; and requires entities to assess characteristics of individuals without the requisite expertise to do so.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f1cb6c3e15&#038;e=20056c7556<\/p>\n<p>5 key questions to determine your security posture<br \/>\nThese topics serve as a great starting point for important discussions surrounding an organization\u2019s security practice, with common security questions including:<br \/>\n1. What is your biggest security concern and is your security spend and expertise properly allocated to address that risk?<br \/>\n2. Do you have a clear picture of your overall security posture and of how it relates to industry best practices?<br \/>\n3. Do you currently conduct security assessments, such as penetration tests on a bi-annual basis?<br \/>\n4. How realistic is your plan to address the security gaps that you might have today?<br \/>\n5. Do you have an established process to address computer security breaches?<br \/>\n6. How confident are you of your ability to demonstrate compliance?<br \/>\n7. Given the skills gap that exists in security, do you view the ability to recruit and retain talent and expertise as a top priority?<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=668adc0720&#038;e=20056c7556<\/p>\n<p>Only 42% of cybersecurity professionals use shared threat intelligence<br \/>\nIntel Security released McAfee Labs Threats Report on cyber threat intelligence.<br \/>\nMore than half, 59 percent, of survey respondents find such sharing to be \u201cvery valuable\u201d to their organizations, while 38 percent find sharing to be \u201csomewhat valuable.\u201d<br \/>\nA near unanimous 91 percent of respondents voice interest in industry-specific cyber threat intelligence, with 54 percent responding \u201cvery interested\u201d and 37 percent responding \u201csomewhat interested.\u201d<br \/>\nWhen asked why they have not implemented shared CTI in their enterprises, 54 percent of respondentssaid corporate policy as the reason.<br \/>\nIt was followed by industry regulations with the percentage of respondents at 24.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d6333b65ff&#038;e=20056c7556<\/p>\n<p>Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks<br \/>\nThe vulnerability was discovered by Stefan Metzmacher, a core developer of the Samba software, which is a popular open-source implementation of the SMB\/CIFS (Server Message Block\/Common Internet File System) networking protocol.<br \/>\nThe company, which offers Samba consulting, support and development services, has even set up an website at badlock.org where more details will be released about the flaw on the disclosure date, which coincides with Microsoft&#8217;s Patch Tuesday &#8212; the day when Microsoft releases its monthly security updates.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=41cbf2f70a&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage1.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=ebfc90070e)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Mapped: Terror threat around the world * Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware * Ninety-seven per cent of IT professionals think standard antivirus software will&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1210","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1210\/revisions"}],"predecessor-version":[{"id":3697,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1210\/revisions\/3697"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}