{"id":1224,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail199-atl101-mcdlv-net\/"},"modified":"2021-12-30T11:38:59","modified_gmt":"2021-12-30T11:38:59","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail199-atl101-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail199-atl101-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail199.atl101.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* NIST looks to reengineer thinking about cyber<br \/>\n* Cyber security &#8216;health checks&#8217; for big business [Australia]<br \/>\n* Tech Industry Lines up Behind IT Modernization Fund Proposal<br \/>\n* Tangerine relaunches mobile app with new biometrics and security features<br \/>\n* This one chart explains why cybersecurity is so important [InfoGraphic]<br \/>\n* Lost in the threat maze: Uncertainty looms over global security landscape<br \/>\n* SME cyber security awareness jumps &#8211; national survey [New Zealand]<br \/>\n* AppRiver Reports Q1 2016 Spam, Malware Traffic Eclipses 2015 Highs<br \/>\n* Rethinking Cybersecurity In View Of The Relentless Nature Of Cybercrime<br \/>\n* Ransomware was the biggest cyber threat in the UK last week<br \/>\n* Malware menace with &#8216;scary&#8217; backdoor strikes 12 million machines<br \/>\n* Breach Response Portal Added by Massachusetts Regulator<br \/>\n* A security professional&#8217;s guide to cyber insurance<br \/>\n* House unanimously passes Email Privacy Act, requiring warrants for obtaining emails<\/p>\n<p>NIST looks to reengineer thinking about cyber<br \/>\nAn updated draft of NIST&#8217;s 800-160 document will be released for public comment on May 4.<br \/>\nAccording to its lead author, Dr.<br \/>\nRon Ross, the new 800-160 will kick off a difficult discussion over not only how federal agencies approach cybersecurity, but also how U.S. business and general population should think about it &#8212; not just as an add-on, but as an foundational component of any technology that touches the Internet.<\/p>\n<p>The document, officially titled NIST Special Publication 800-160: Systems Security Engineering, has been overhauled from its two-year-old original draft.<br \/>\nThe new iteration takes a more holistic approach to cyber defense.<br \/>\nIt incorporates International Organization for Standardization systems engineering standards, including 30 different processes aimed at building security capabilities into products, services and systems.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9a150155fe&#038;e=20056c7556<\/p>\n<p>Cyber security &#8216;health checks&#8217; for big business [Australia]<br \/>\nThe federal government will offer cyber security &#8216;health checks&#8217; at some of Australia&#8217;s biggest companies.<br \/>\nThe top 100 ASX-listed companies will be given the opportunity to get their voluntary check, which will be co-ordinated by the Australian Securities Exchange.<br \/>\nThe plan was announced under the government&#8217;s new $230 million cyber security package, however involves no new government funding.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5592494d5d&#038;e=20056c7556<\/p>\n<p>Tech Industry Lines up Behind IT Modernization Fund Proposal<br \/>\nRepresentatives of the tech industry are showing public support for legislation that would establish a $3.1 billion revolving fund to help federal agencies upgrade aging and obsolete IT systems.<br \/>\nSigning on to statements of approval are executives from Northrop Grumman, Cisco, Dell, Intel, CSRA and the pro-business U.S.<br \/>\nChamber of Commerce, whose stance on the matter could be useful in thawing Republican opposition to the measure\u2019s price tag.<br \/>\nThe statements were collected in an April 26 release by Rep.<br \/>\nSteny Hoyer, D-Md., who introduced the IT Modernization Fund earlier this month.<br \/>\nThe Obama administration first proposed the fund as part of its fiscal 2017 budget package, but it requires congressional approval.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d8f2f12984&#038;e=20056c7556<\/p>\n<p>Tangerine relaunches mobile app with new biometrics and security features<br \/>\nTangerine Bank has relaunched its mobile app for iOS, adding secure instant messaging support and new biometric security features, the Toronto-based direct banking firm announced today.<br \/>\nThe biometric features, provided by Kansas City, Missouri-based EyeVerify Inc. and Burlington, Massachusetts-based Nuance Communications, allow users to protect their accounts with an eye-scan or vocal password, while the \u201cSecure Chat\u201d feature, developed in collaboration with IBM Corp. using Genesys technology, allows them to message a customer service representative under the in-app \u201cContact Us\u201d section.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=59e20a0559&#038;e=20056c7556<\/p>\n<p>This one chart explains why cybersecurity is so important [InfoGraphic]<br \/>\nNew hacking threats have emerged in the past two years, and with it has come an large increase in worldwide concern about cybersecurity.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5ca8a399f5&#038;e=20056c7556<\/p>\n<p>Lost in the threat maze: Uncertainty looms over global security landscape<br \/>\nThe Information Security Forum (ISF) recently released Threat Horizon 2018, the latest in our annual series of reports which provide organisations of all sizes with a forward-looking view of the increasing threats in our always-on, interconnected world.<br \/>\nIn this report, we discussed the top three emerging threat themes, as determined by ISF research, to information security over the next two years.<br \/>\nHere are a few of the highlights:<br \/>\nAs technology and connectivity spread, threats intensify and multiply<br \/>\nToday\u2019s protective measures will not stand up to tomorrow\u2019s threats<br \/>\nGovernment intervention and regulation will complicate security on a global scale<br \/>\nPlan now to be ready for rapidly emerging threats<br \/>\nMany organisations will struggle to cope as the pace of change intensifies.<br \/>\nAdopting new security measures while in the midst of radical change is like trying to build a house in a hurricane.<br \/>\nSet about laying a strong and resilient foundation now: do the groundwork of comprehensive risk management, weave business and IT leadership into a collaborative defensive strategy, and build an organisation capable of rapidly and proactively addressing changes in regulations, threats, and technologies.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b800452f2d&#038;e=20056c7556<\/p>\n<p>SME cyber security awareness jumps &#8211; national survey [New Zealand]<br \/>\nHeightened interest in cyber security issues has driven a large increase in the number of small and medium businesses who are becoming more cyber aware according to leading online accountancy software provider MYOB.<br \/>\nThe latest MYOB Business Monitor survey highlights that 70 percent of New Zealand SMEs now register concerns with one or more cyber security risk areas, an increase of 10 percent in just six months, with awareness up across all categories.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5c1eb2cbca&#038;e=20056c7556<\/p>\n<p>AppRiver Reports Q1 2016 Spam, Malware Traffic Eclipses 2015 Highs<br \/>\nGULF BREEZE, Fla., April 27, 2016 (GLOBE NEWSWIRE) &#8212; via PRWEB &#8211; AppRiver, LLC, a leading provider of email messaging and Web security solutions, today confirmed that the levels of spam and malware email traffic it recorded during Q1 has already surpassed total levels documented during the whole of 2015, totaling at 2.3 billion malicious email messages, with 1.7 billion occurring in March alone.<br \/>\nGULF BREEZE, Fla., April 27, 2016 (GLOBE NEWSWIRE) &#8212; via PRWEB &#8211; AppRiver, LLC, a leading provider of email messaging and Web security solutions, today confirmed that the levels of spam and malware email traffic it recorded during Q1 has already surpassed total levels documented during the whole of 2015, totaling at 2.3 billion malicious email messages, with 1.7 billion occurring in March alone.<br \/>\nAppRiver has also seen an uptick in wire transfer attacks, typically targeting finance departments.<br \/>\nCustom communications are spoofed by the attackers to appear as if they come from within an organization, most often impersonating a company&#8217;s CEO.<br \/>\nA final trend AppRiver has been monitoring is the Distributed Spam Distraction (DSD) technique.<br \/>\nFred Touchette, manager of security research at AppRiver, explains, &#8220;DSDs flood an individual&#8217;s inbox with spam emails in an attempt to hide critical confirmation emails for purchases or wire transfers made in the victim&#8217;s name.<br \/>\nWith all of the spam in the victim&#8217;s inbox, the deed is done before the confirmation email is located, allowing the cybercriminal to make away with fraudulent purchases or wire transfers.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5c7f496757&#038;e=20056c7556<\/p>\n<p>Rethinking Cybersecurity In View Of The Relentless Nature Of Cybercrime<br \/>\nOne dirty secret of corporate hacking episodes is that the adversary\u2019s code can be nearly impossible to remove\u2014even after it\u2019s discovered.<br \/>\nThe hack may have made headlines a month ago, but without next-generation cybersecurity, there\u2019s a good chance the hackers are still in there and capable of wreaking havoc.<br \/>\nClearly, new approaches and solutions are necessary.<br \/>\nOrganisations are beginning to discover two little-known but very effective security defences.<br \/>\nThe first is network visibility\u2014a way to see who is on your network every minute, map their locations and know everything they are accessing.<br \/>\nThe second secret weapon is speed, and speedy remediation is a function of visibility.<br \/>\nThe best-practice solution to harden networks is the installation of a centralised response centre.<br \/>\nThis makes sense because many enterprises have plenty of security solutions for each individual problem.<br \/>\nBut too many security solutions running parallel at the same time, without exchanging information, will not be able to reach a sustainable level of protection.<br \/>\nA recent survey by SC Magazine asked 350 corporate executives and consultants in the information security industry about their current set-up regarding security tools.<br \/>\nRespondents indicated that 52 percent of their companies use more than 13 security solutions.<br \/>\nFully 78 percent of respondents would like to see these tools linked in order to increase their effectiveness.<br \/>\nThe findings of the Frost &#038; Sullivan survey showed that companies are looking for security architectures that operate on the network level and can exchange information with other solutions.<br \/>\nIT also needs an automated incident response centre that allows full insight.<br \/>\nThe interaction with other tools, for instance, through the use of application programming interfaces (APIs), allows bi-directional integration so that information from existing security investments can be shared.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28c8cc4360&#038;e=20056c7556<\/p>\n<p>Ransomware was the biggest cyber threat in the UK last week<br \/>\nAccording to data gathered by the security firm ESET\u2019s LiveGrid telemetry, ransomware accounted for a third of the threats that targeted computer users in the UK during the past week.<br \/>\nA recent spike in the sheer volume of ransomware attacks in the UK has been attributed to new malicious code called JS\/Danger.ScriptAttachment.<br \/>\nOnce on a users\u2019 computer, this code attempts to download and install various pieces of malware.<br \/>\nIt then executes the ransomware Telsacrypt which encrypts user data and demands payment.<br \/>\nUsers who pay the demanded fee will regain access to their data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b513ac76f7&#038;e=20056c7556<\/p>\n<p>Malware menace with &#8216;scary&#8217; backdoor strikes 12 million machines<br \/>\nCisco Talos has warned of a malware infection that has backdoor capabilities and 12 million machines in its grasp.<br \/>\nThe malware can steal personal information and gain administration rights.<br \/>\nTalos calls it a &#8216;generic trojan&#8217; made worse owing to its scale and payload.<br \/>\nA common theme in the malware is a lot of incidents of the word &#8216;Wizz&#8217; in the code.<br \/>\n&#8220;The word \u2018Wizz&#8217; was in the name of every sample analysed, roughly 7,000 unique samples,&#8221; Talos said in a blog post.<br \/>\nTalos explained that the malware also includes a &#8220;scary&#8221; backdoor. &#8220;Inside our custom sandbox, the launcher executed and our WeAreWizzlabs registry key allows our analysis tools to avoid detection.<br \/>\nThe module executed and installed on the victim machine,&#8221; the firm said.<br \/>\n&#8220;Aside from monetisation, when a malicious piece of software is able to gain a foothold in the victim machine and gain the ability to deliver any other possible binaries, the game is up.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6d1df5800f&#038;e=20056c7556<\/p>\n<p>Breach Response Portal Added by Massachusetts Regulator<br \/>\nPursuant to the Massachusetts data breach notification statute, M.G.L. 93H, notices must be provided to the affected resident, the Attorney General\u2019s office and to the Office of Consumer Affairs and Business Regulation (OCABR).<br \/>\nIt is not enough that Massachusetts has a sui generis breach notice content statutory requirement (you must tell affected residents of the breach, but you can\u2019t tell them about the breach), now the OCABR has created its own notice submission portal that is a separate form and not just a place to upload a copy of the AG notice.<br \/>\nA letter sent out earlier this month also says \u201cIt is important to note that this electronic submission form only satisfies the notification requirement for OCABR.<br \/>\nThe submission does not relieve businesses of their legal obligation to separately notify the AGO and the affected Massachusetts residents.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=912820a307&#038;e=20056c7556<\/p>\n<p>A security professional&#8217;s guide to cyber insurance<br \/>\nAs the saying goes, the best offense is a good defense.<br \/>\nHaving a strong and well-documented security program in place can help to potentially reduce the cost of insurance or put a company in a stronger position to negotiate more favorable terms.<br \/>\nCompanies that can demonstrate that they are following security best practices to prevent attacks and that they have a plan in place to manage a potential incident are often more attractive to insurers.<br \/>\nThere are several steps that cybersecurity professionals can take to help in this process.<br \/>\nFor starters, having a well-documented data breach response plan in place and practicing it on an ongoing basis better prepares and equips companies to respond to an attack in a timely and sensitive manner.<br \/>\nFurther, regularly conducting internal and third-party audits of corporate networks, as well as third-party cloud providers or other organizations that have access to sensitive information, can help prove to insurers that the company is effectively managing security risks and is compliant with applicable laws.<br \/>\nSpecifically, when working with brokers to evaluate policies and determine the coverage best suited for a company, there are several key pieces to look for:<br \/>\n&#8211; Existing exemptions<br \/>\n&#8211; Coverage for external vendors<br \/>\n&#8211; Coverage for response services<br \/>\n&#8211; Risk management services<br \/>\nCybersecurity leaders play a major role in setting their companies up for success when buying insurance.<br \/>\nBy establishing a strong security posture ahead of time, identifying their company\u2019s needs, and sharing this information with risk managers and brokers they can greatly influence and benefit the purchasing process.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b0bccb1c21&#038;e=20056c7556<\/p>\n<p>House unanimously passes Email Privacy Act, requiring warrants for obtaining emails<br \/>\nThe U.S. House of Representatives has passed H.R. 699, the Email Privacy Act, sending it on to the Senate and from there, hopefully anyhow, to the President. The yeas were swift and unanimous. .<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7d8c217326&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=ba695e16a5)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * NIST looks to reengineer thinking about cyber * Cyber security &#8216;health checks&#8217; for big business [Australia] * Tech Industry Lines up Behind IT Modernization Fund Proposal * Tangerine relaunches mobile app&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1224","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1224"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1224\/revisions"}],"predecessor-version":[{"id":3711,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1224\/revisions\/3711"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}