STE WILLIAMS

Keen to check for ‘abnormal’ user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA

RSA As IBM’s crew cancels their hotel rooms, Microsoft’s infosec staffers are still set to attend the decades-old RSA conference and pulled the covers off a raft of security releases and previews for the event today.

The clocks strike 13 as Insider Risk Management is released

We spoke to Microsoft 365 Senior Director, Alym Rayani, about compliance and insider risk at last year’s Ignite event.

Four months on, and the company has decided the product is ready for prime-time with the release to general availability of Microsoft Insider Risk Management and Communication Compliance. For Microsoft 365, naturally.

The gimlet glare of Insider Risk Management will use the likes of Graph to gaze over Office, Windows and Azure, as well as casting an eye over non-MS services such as SAP SuccessFactors and Workday via connectors. File activity, “communications sentiment” and “abnormal” user behaviours will be detected by the vaguely creepy service and passed onto HR (or whoever the workflow reckons is most appropriate.)

The data will include a timeline to show trends, context and history for the identified user. By default, the display names are anonymised.

As with all these things, the devil is in the detail and to get the most out of the new Orwellian Monitoring Insider Risk Management tools companies will have to ponder their processes – just slapping on some software and expecting it to do a bandaid on secret seepage isn’t going to fly. It is, however, relatively easy to get started on the platform; there are no pesky agents to install nor audit events to configure. There are also three new policy templates: “Departing employee data theft”, “Data leaks” and the exciting “Offensive language in email.”

The “machine learning” used to spot naughty words has found its way into the Communication Compliance functionality too, which was also made Generally Available. Monitoring corporate communications such as Teams Messages or Bloomberg chats, as well as email, the system will keep an ear out for offensive language and threats and trigger workflows accordingly.

We can think of at least one corporate that could probably have benefited from such a thing. Alas, that particular aircraft has long since left the runway before the departure gate could be closed.

Microsoft Loves Linux (Security)

As well as widening the preview of Microsoft Threat Protection, a system aimed at a more automated response to threats, the gang has also extended the cross-platform support for Microsoft Defender Advanced Threat Protection (ATP) to include a whole bunch of Linux distributions.

Teased at last year’s Ignite (skip to around the 14-minute mark for the full “sneak peek” experience), RHEL 7+, CentOS Linux 7+, Ubuntu 16 LTS, or higher LTS, SLES 12+, Debian 9+, and Oracle EL 7 all get some loving from Microsoft’s AV boffins. Users can expect a full command line experience as well as AV, while basic alerts and machine information will show up in the Defender Security Center.

The functionality remains in preview for the time being and will be joined by additional security capabilities for iOS and Android devices.

Azure Sentinel: Give us your tired, your poor, your AWS CloudTrail logs

Having nudged Azure Sentinel into the light at last year’s RSA event Microsoft is giving its security information event management (SIEM) platform a buffing with some new toys.

First up are connectors for the likes of Forcepoint and Squadra as well as one for Azure Security Center for IoT. The latter is particularly interesting since it means IoT data workloads from Azure IoT Hub-managed deployments can be shovelled into Azure Sentinel. The information will allow those who have bought into the Microsoft worldview to have a decent chance of spotting threats in a converged network.

As well as adding resources (via GitHub, of course) Microsoft is will also not be charging customers for importing AWS CloudTrail logs from 24 February 2020 to 30 June 2020. AWS CloudTrail allows users of Amazon’s cloud to track their AWS account. With customers using multiple clouds, Microsoft’s hope is that its SIEM platform will become a one-stop shop for security monitoring. And if Madam decides that Madam prefers her cloud to be Azure, well, we doubt the Redmond gnomes would demur.

Azure activity logs, Office 365 audit logs and Microsoft 365 security alerts can already be ingested for free. ®

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/02/20/microsoft_atp/

GRU won’t believe it: UK and US call out Russia for cyber-attacks on Georgia last year

The same Russian state hackers who unleashed NotPetya on the world’s computers were behind destructive cyberattacks on Georgia during 2019, the governments of Britain and the US have said – echoing a similar attribution a decade ago.

“The National Cyber Security Centre (NCSC) assesses with the highest level of probability that on 28 October 2019 the GRU carried out large-scale, disruptive cyber-attacks,” said the Foreign Office in a statement, referring to the main Russian overseas spy agency.

In a detailed statement the government department attributed the attack to a state-backed hacker crew “known as the Sandworm team, BlackEnergy Group, Telebots, and VoodooBear,” to give it some of its open-source names. The statement continued: “It is operated by the GRU’s Main Centre of Special Technologies, often referred to by the abbreviation ‘GTsST’ or its field post number 74455.”

That field post number is the same one as for the Fancy Bear hacking crew, also known as APT28, a well-known and prolific Russian government cyber attack unit. Russia has few qualms about letting APT28 loose against foreign countries, as its attacks against Italy a few years ago showed.

Today’s attribution comes after a number of cyberattacks in October last year saw a variety of Georgian web hosting firms and websites alike going dark and being defaced. Even Georgian TV stations were taken off air by the intensity and indiscriminate nature of the attacks.

Foreign secretary Dominic Raab, one of the few cabinet ministers not to be sacked in last week’s reshuffle, declared: “The Russian government has a clear choice: continue this aggressive pattern of behaviour against other countries, or become a responsible partner which respects international law. The UK will continue to expose those who conduct reckless cyber-attacks and work with our allies to counter the GRU’s menacing behaviour.”

Determined to make the Russians blush, the Foreign Office went on to list some of the hacker crew’s rap sheet:

Making it clear that Georgia is one of Britain’s buddies these days, the Foreign Office said: “Georgia is a strategic partner to the UK. The UK supports a range of projects in Georgia and our annual Ministerial-level UK-Georgia Strategic Dialogue provides an important framework for continuing to develop our strong relationship. The UK was particularly grateful for Georgia’s firm support following the attack on Salisbury in 2018, including in efforts to strengthen the [Organisation for the Prohibition of Chemical Weapons].”

An American statement in the name of foreign secretary Michael Pompeo said: “This action contradicts Russia’s attempts to claim it is a responsible actor in cyberspace and demonstrates a continuing pattern of reckless Russian GRU cyber operations against a number of countries. These operations aim to sow division, create insecurity, and undermine democratic institutions.”

The GRU’s tradecraft hasn’t been the hottest over the years. In 2018 researchers found a database of cars driven by GRU spies and hackers.

A decade ago Russia was also found to have been responsible for cyber attacks against Georgia, which appeared to have coincided with the former country’s invasion of the latter. ®

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/02/20/apt28_hacked_georgia_uk_us_declaration/

We know what you did last summer: MGM’s hotel spinoff lost 10.7m guest records and now they’re on hacker forums

Casino and hotel chain MGM Resorts lost almost 10.7 million guest records last summer, including the data of Jack Dorsey and Justin Bieber, which was duly posted to hacker forums.

According to soon-to-be-launched leak tracker Under the Breach, which spotted the post this week, the records included email addresses along with names, phone numbers, addresses and dates of birth.

MGM Resorts admitted the hack to ZDNet, which confirmed the accuracy of the records by contacting customers and confirming the dates of their visits to the relevant hotel.

The news site said the leak included details of celebrities, tech CEOs, reporters and government officials as well as “regular tourists and travellers”. Trips by Canadian pop-warbler Bieber, Twitter boss Dorsey and Department of Homeland Security and Transportation Security Administration staff were all slurped.

The hotel company said: “Last summer, we discovered unauthorized access to a cloud server that contained a limited amount of information for certain previous guests of MGM Resorts.”

The chain said no financial information was lost. It informed some customers in accordance with state laws and said it has reviewed security and “enhanced the security of our network to prevent this happening again”.

In news either reassuring or depressing depending on your point of view, Under the Breach informed email-checking service Haveibeenpwned, which found that 82 per cent of the emails had already been revealed thanks to previous breaches. ®

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/02/20/mgm_loses_ten_million_guest_details/

Firms Improve Threat Detection but Face Increasingly Disruptive Attacks

In addition, more third parties are discovering the attacks rather than the companies themselves.

Organizations are more quickly detecting attackers in their networks and systems, but the majority of attacks are still being found by third parties and not by internal security groups.

In 2019, companies needed 56 days, on average, to detect an attacker in their networks, down from 78 days in 2018, FireEye Mandiant stated in its “M-Trends 2020” report, out today. While the improvement is partially due to companies spending more effort and resources on detecting threats and responding to incidents, much of the impetus to improve is due to a second trend identified in the report: Attackers are more quickly taking action once inside a victim’s network, and often the action is destructive, says Charles Carmakal, vice president of consulting and chief technology officer at FireEye Mandiant.

“Unfortunately, we are seeing a lot more disruptive threats,” he says. “We are seeing a lot more ransomware out there, and ransomware operators are deploying in days to weeks, executing in a much shorter time frame than espionage-type threats.”

Overall, 43% of attacks have a destructive element, the company found.

The findings indicate that, while organizations are getting better at detecting threats, attackers have become more agile as well. 

The groups behind the attacks, for example, are expanding beyond just attacking Windows systems. In 2019, 274 of the 1,268 malware families tracked by FireEye — 22% of the total — targeted either the Linux operating system or the Mac OS. Seven in 10 malware samples encountered belonged to the top five malware families, which are based on open source tools and under active development, the company stated in the report. About 41% of the malware families encountered by FireEye were previously unknown.

“Attackers continue to grow more adept at working across a range of operating systems and device types, as well as in both on-premises and cloud architectures,” the report stated. “Traditional barriers to attacker success continue to lessen over time. Put simply, more attackers can do more things in more diverse environments.”

While the overall time between the compromise of a network and the detection of the attack showed improvement, the percentage of attacks discovered by company employees, as opposed to external third parties, declined to 47% in 2019, demonstrating that businesses need to focus more on their own security. In 2017, internal detection of threats peaked at 62%.

Organizations based in the Americas had the best success, with 52% detecting threats internally rather than relying on third parties, while the Asia-Pacific region relied far more on third parties, with almost three-quarters of attacks discovered by external sources.

Data on threat detection varies widely. Cybersecurity firm CrowdStrike, for example, sees companies detecting attacks more quickly; it found the average organization takes five days to detect an attack and a little less than seven days to contain a breach. Meanwhile, a Trustwave report found that companies detected attacks within 14 days in 2018, down from 26 days in the prior year.

The differences in estimates of the so-called “dwell time” could be due to the focus of the company collecting the data. FireEye Mandiant focuses on incident response, helping companies that have already been breached, while Trustwave and CrowdStrike aim to proactively prevent breaches and detect attacks. 

The company tracked 1,268 malware families in 2019, 41% of which were new. While the vast majority of malicious software targeted Windows systems, 208 targeted or could impact Linux systems and 66 targeted or could impact Mac systems. 

The attackers’ focus on ransomware and other disruptive attacks raises the stakes for organizations. While many companies are prepared to recover from such attacks — regularly backing up data being a priority — many still pay ransoms to expedite recovery, Carmakal says. 

“The assumption is that when victims pay, they are doing it because they have not made good backups, but that’s not the case,” he says. “There are plenty of organizations that have terrific backups. But if you have so many systems taken offline in a matter of minutes or hours, and you have to recover so many servers in your environment, the amount of downtime can be excessive.”

Carmakal declined to say how many, or what fraction, of ransomware incidents resulted in the victim paying a ransom.

Related Content

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “8 Things Users Do That Make Security Pros Miserable.”

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/firms-improve-threat-detection-but-face-increasingly-disruptive-attacks/d/d-id/1337097?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

10 Tough Questions CEOs Are Asking CISOs

CEOs today are prepared with better questions than ‘Are we secure,’ and chief information security officers had better be ready to answer.

CISOs are now getting plenty of face time with executive management: In fact, a study from ISC2 finds 43% of CISOs report to the CEO and 14% report to the board directly. And those dynamics are expected to shift even more. According to Gartner, 100% of CISOs at large enterprises are on pace to report to their boards on cybersecurity and technology risk at least annually.

With security in the spotlight more often, the ability to answer a common question like “Are we secure?” is no longer sufficient – and it really does little to convey the much larger picture of security efforts.

What questions should today’s CISOs be prepping to answer for their next executive meeting? The Edge asked a half-dozen security pros to weigh in on some of the most essential queries security managers should be ready to answer. Read on.

 

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full BioPreviousNext

Article source: https://www.darkreading.com/edge/theedge/10-tough-questions-ceos-are-asking-cisos-/b/d-id/1337083?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

5 Strategies to Secure Cloud Operations Against Today’s Cyber Threats

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud’s many benefits:

The cloud, once touted as an IT panacea, has a flip side that we see all too often in headlines when malicious actors take advantage of gaps in security. This cannot be repeated enough: Securing data and networks in a cloud environment is very different than doing so on-premises.

Infrastructure elements that were static on-premises are now abstracted to software. Firewalls must be designed to operate in an inherently fluid infrastructure. And in the cloud, you’ll need to focus more on applications, application programming interfaces, and user roles. 

Drawing from our experience with commercial and government cloud clients, here are five tips that re-emphasize and expand upon the fundamentals.

1. Control access to cloud management and configuration tools.
As cloud management and configuration tools — cloud service provider (CSP) consoles, command line interfaces, and APIs — provide end users great flexibility and autonomy, strong role-based access control is vital to protect the organization against external and insider threats.

  • Authenticate and authorize privileged users with two-factor authentication, digital signatures, and certificates.
  • Make training and skills evaluations mandatory before granting cloud roles.
  • Strictly separate user and admin credentials, and restrict user access to production systems.
  • Standardize processes for account life-cycle management.

2. Encrypt sensitive (and maybe all) data. 
In the cloud, data breach and data spillage are inevitable. Protecting data in transit via techniques like encryption becomes more critical as “the very notions of data-in-motion and data-at-rest become blurred.”

Encrypt all sensitive data, and segment it using multiple keys to minimize the impact of a compromised key. Keys should rotate regularly, with strong access control policies.

  • Implement encryption for data in transit and at rest.
  • Review CSP network encryption. (Not all network traffic between data centers may be natively encrypted.)
  • Evaluate both native cloud and third-party encryption solutions.

3. Use automation to minimize human errors due to misconfiguration.
Manual configuration eventually leads to human error and its consequences: inconsistent deployment configurations, inadvertent data spillages, and vulnerabilities to malicious activity. This is a big security risk. According to Gartner research, nearly all — 99% — of “cloud security failures will be the customer’s fault.”

Automation, with pretested and audited configurations, ensures that infrastructure is deployed and configured correctly. We recommend the following:

  • Automating infrastructure and platform builds, security testing, security guardrails, and baseline configurations.
  • Implementing high-availability configurations to mitigate the risks of unavailable regions or zones due to cloud provider errors.
  • Periodically performing configuration checks and routine compromise assessments.

4. Adapt visibility and vulnerability management to manage ephemeral and new types of cloud assets.
With a cloud solution — as data, systems, and responsibilities spread across environments — organizations may lack sufficient visibility for monitoring threats and ensuring compliance. Furthermore, legacy methods involving human vulnerability detection and remediation management may be too slow or cumbersome in the cloud, where incidents move at warp speed across interconnected systems and data.

A move to the cloud spurs many visibility questions:

  • Does your infrastructure allow for visibility across the cloud environment? For instance, is there an aggregated system of logs, dashboards, and reports for collecting data from network appliances, cloud infrastructure, operating systems, applications, and so forth?
  • Do you understand your cloud vendor’s incident response service-level agreements and how they integrate into your own processes?

Organizations will need to extend vulnerability management tools to container and serverless architectures and adapt these tools for rapid infrastructure deployment cycles and new cloud services. They will also benefit from in-line services such as proxies and network overlays to replicate traffic to “transparent” security services.

5. Implement enhancements throughout the operations life cycle.
Often, the initial cloud implementation is just the beginning. As apps are introduced, IT teams will need to make continual enhancements. And traditional “stovepiped” IT operations can impede the journey to cloud agility.

DevSecOps approach can help. As you take this approach, do the following:

  • Implement site reliability engineer functions so ops staff can continue to upgrade the environment.
  • Integrate DevSecOps with security staff in development and operations.
  • Track new products and services, with a road map for future integration.

With these five fundamentals in mind, organizations can reduce their security and compliance risk as they reap the cloud’s many benefits: cost savings, lower total cost of ownership, and faster time to value.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s featured story: “8 Things Users Do That Make Security Pros Miserable.

Chris Christou is a leader in Booz Allen’s secure cloud and IT infrastructure business. He applies expertise in cloud security, cloud infrastructure and platforms, network engineering, and IT infrastructure. Chris has more than 20 years of experience designing, testing, and … View Full Bio

Article source: https://www.darkreading.com/cloud/5-strategies-to-secure-cloud-operations-against-todays-cyber-threats/a/d-id/1337033?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Personal Info of 10.6M MGM Resort Guests Leaked Online

Data published on a hacking forum includes phone numbers and email addresses of travelers ranging from everyday tourists to celebrities and tech CEOs.

The personal information of 10.6 million MGM Resort guests has been published in a hacking forum, ZDNet reports. MGM Resorts has confirmed the data was stolen in a breach that occurred last summer.

When officials discovered unauthorized access to a cloud server holding certain information belonging to previous hotel guests, they sent out notifications, launched an investigation, and strengthened its network security to avoid the same problem in the future. Now some of this same data has resurfaced.

This trove of data contains details including full names, phone numbers, birthdates, and physical and email addresses for travelers who visited MGM Resorts through 2017. Those affected include tourists, DHS and TSA officials, tech CEOs, celebrities, reporters, and employees of major tech companies. Twitter founder Jack Dorsey and pop star Justin Bieber are among those whose data was exposed. Security experts warn this could put those affected at a higher risk of spear-phishing and SIM-swapping attacks.

MGM Resorts says the incident did not compromise financial, payment card, or password information.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s featured story: “10 Tough Questions CEOs Are Asking CISOs.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/personal-info-of-106m-mgm-resort-guests-leaked-online/d/d-id/1337102?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

It’s Time to Break the ‘Rule of Steve’

Today, in a room full of cybersecurity professionals, there are still more people called Steve than there are women.

Discussions about recruitment trends and how people can further their careers in cybersecurity are common topics at industry conferences these days. Recently, at Black Hat Europe, one of the most striking career discussions revolved around audience demographics, which reminded me of a point I’d heard earlier in the week: the “Rule of Steve,” a concept originally introduced by Dawn-Marie Hutchinson, chief information security officer for pharmaceuticals and RD at GSK.

This rule is easy enough to explain: In a room full of cybersecurity professionals, there are usually more people called Steve than there are females. Yes, this is a tongue-in-cheek observation, but it illustrates how far our industry has to go in encouraging not only women but other diverse groups into the workforce.

The security industry needs more people. Globally, (ISC)² estimates the workforce shortage to be over 4 million. That’s a lot of people, with the biggest shortage of around 2.6 million reported in Asia-Pacific. The shortfall in North America stands around 560,000, in Latin America around 600,000, and in Europe just shy of 300,000.

It is time to think beyond the usual confines of building a specialized workforce. Often, roles are advertised requiring a master’s degree in information security or a Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH) qualification. Without doubt, these qualifications are highly valued and sought after, but they probably can only cover a very small percentage of the 4 million workforce shortage — not to mention that individuals with these qualifications are likely already working in the industry anyway.

To build the workforce we need to encourage diversity. We need more women. We need more ethnic diversity. We need more neurodiversity. We need more men. We need more people from a whole range of “groups” who have the right aptitude and attitude to work in information and cybersecurity.

Does everyone who works in the industry need to be technical? No! Here’s an example. Business information security officers (BISO) need to be able to speak to the business and speak to the IT and information security functions. They do not need to be able to trace alerts through a SOC to identify potential security incidents and breaches. So instead of looking for a BISO with a Certified Information Security Manager (CISM) qualification, which arguably is the closest professional qualification for a BISO, the net should be spread wider.

For example, don’t limit potential candidates to the around 27,000 people with CISM (according to ISACA). Rather, look within the organization for individuals who are perhaps security ambassadors or champions, or others who have expressed an interest to join the group. Even if there are no direct expressions of interest then start with “lunch and learn” sessions to stimulate interest. Don’t be dry — make it exciting — and in this way organizations can start to build the next generation of security professionals.

Does everyone who works in the industry need to be in an office? No to this question, too. Remote working significantly expands the pool of candidates, which in turn brings access to better and diverse resource groups. A disparate and global workforce thinks more broadly, has different ideas, and can drive faster business outcomes than centrally located groups.

Some people in the industry do need to be technical, shown again at Black Hat Europe, and finding people with the right technical skills and expertise is also a challenge. However, at the event there was a cohort of technical people — DBAs, for example — who were desperate to make their way in the world of cybersecurity but couldn’t find an opening because they didn’t have the CISSP qualification. Is the industry limiting itself to that extent? According to (ISC)² there were fewer than 140,000 CISSP qualified individuals globally at the end of May 2019. Surely, we can see a way to bring in these individuals with an aptitude for technology and an enthusiasm for security, and train them into the roles so desperately needed?

There are initiatives around the globe, such as Vietnam’s Project DARE (Data Analytics Raising Employment) developing workplace-ready competencies for employers. The US National Institute of Standards and Technology (NIST) Cybersecurity Framework is fast becoming a globally recognized approach for cybersecurity and is being used to develop employee competencies. Look for these in your country or region and take advantage of them — they are there to help build the security workforce.

Many of the people I spoke with at Black Hat Europe were not called Steve and would make fantastic additions to the global information security workforce. It’s time to break the “Rule of Steve” and think outside the box.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s featured story: “Chaos Order: The Keys to Quantum-Proof Encryption

Maxine leads Omdia’s cybersecurity research, developing a comprehensive research program to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong … View Full Bio

Article source: https://www.darkreading.com/operations/its-time-to-break-the-rule-of-steve/a/d-id/1337040?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ring makes 2FA mandatory to keep hackers out of your doorbell account

Leery of losing microseconds of your life by using two-factor authentication (2FA) to keep your stuff safe from hackers?

Alas for you, but hurray for security. Bit by bit, the Internet of Things (IoT) is getting a wee bit more secure: last week, Google announced that it would soon begin forcing users of its Nest gadgets to use 2FA, and this week, security came knocking for Amazon’s Ring video doorbells.

On Tuesday, Ring president Leila Rouhi said in a blog post that starting immediately, the once-optional authentication is going to be mandatory for all users when they log in to their Ring accounts. That will prevent unauthorized users from getting into Ring accounts, even if they have your username and password.

This makes a ton of sense. Far too many people suffer from the debilitating condition of password-reuse-itis – debilitating to any account that lacks a unique, strong password, that is. As Mr. “I Hacked Disqus/Imgur/Kickstarter” Kyle Milliken advised when he got out of jail in September, he pulled off his crimes by using lists of login credentials, automatically stuffing sites to get control over as many accounts as he could.

By the end of his run, he had acquired 168 million login credentials and had earned around $1.4 million. He cooperated with the FBI, gave up a black hat colleague, and received a 17-month prison term in a federal work camp.

What helped him the most? Password reuse, he said.

We strongly recommend avoiding password reuse, but heaven knows it doesn’t seem to be going anywhere anytime soon. That’s what makes 2FA a good backup: even if your login gets stolen, and even if you’ve reused those credentials, a hacker still has to have access to your second factor – for example, your phone or your email, where you receive a one-time code to plug in as additional authentication – in order to log in to your account.

Every time you want to login to your Ring account, you’ll receive a one-time, six-digit code to verify your login attempt. That also goes for any Shared Users on your account. You’ll be able to choose whether you want to get that code sent to the email address you have listed on your Ring account or as a text message sent to your phone. After you’ve entered the code, you’ll be able to access the app and view footage from your outdoor and indoor cameras.

Besides your main Ring account, you’ll be required to use 2FA to access Ring’s web services and its app. That includes Ring’s Neighbors app, where users can share video footage.

Rouhi says that Ring is also changing how it shares data with third-party providers. The company has already temporarily paused the use of most third-party analytics services in Ring apps and on its site, she said. Plus, starting in early spring (for the Northern Hemisphere), users will be getting additional options to limit the data that’s shared with those third parties. Opting out will be enabled in Ring’s Control Center.

Beginning this week, Ring users will also be able to opt-out of personalized advertising. That doesn’t mean you won’t still see ads, but they won’t be targeted at you. That opt-out choice will also appear in Control Center.

Best practices

Rouhi also passed along this list of security best practices, all of which are good steps for any and all of your accounts, in addition to Ring:

  • Don’t reuse passwords between your various online accounts – instead, generate unique, strong passwords for each account using a password manager.
  • Turn on 2FA. If a website gives you the option to turn on two-factor authentication, do that. Here’s an informative podcast that tells you all about 2FA, if you’d like to learn more:

    LISTEN NOW

    (Audio player above not working? Download MP3 or listen on Soundcloud.)

  • Keep your phone numbers and email addresses up to date on your various online accounts.
  • Add a PIN or passcode to your smartphone account to help prevent unauthorized changes to your mobile account. You can do this by logging into your mobile phone account or calling your wireless carrier.
  • Upgrade to the latest version of your apps and operating systems, including the latest Ring apps.
  • View and manage your trusted devices in your “Authorized Client Devices” section of Control Center on your Ring app.
  • Add Shared Users to your Ring account instead of sharing your login credentials. You can also view and manage Shared Users in Control Center.

Latest Naked Security podcast

LISTEN NOW

Click-and-drag on the soundwaves below to skip to any point in the podcast. You can also listen directly on Soundcloud.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/ZP4hOfnjH24/

Firefox 73.0.1 fixes crashes, blank web pages and DRM niggles

Firefox version 73 has only been out for a week but already Mozilla has had to update it to version 73.0.1 to fix a range of browser problems and crashes, including when running on Linux machines.

The list of issues is surprisingly long for a point release but, in most cases, the issues only happen in specific contexts. Despite this, some of the issues are still said to have affected “numerous” users, prompting the rapid update.

Many reports noted Firefox would stop or hesitate when visiting websites or trying to open the internal about:config page, particularly when running in Windows 7 compatibility mode.

Customers of the Royal Bank of Canada (RBC) found they were ending up with a blank page when logging in while others found the browser would exit when leaving Print Preview mode.

In an issue known about for some weeks, users running third-party security programs with anti-exploit protection, including the 0patch ‘guerrilla’ patching agent, were being affected by crashes.

On Linux, users running the Widevine plugin for watching DRM-encrypted content were plagued with crashes.

All of these issues have been fixed in the latest update. To update to Firefox 73.0.1, it’s OptionsHelpAbout Firefox at which point the update should commence automatically.

One change to note is that Firefox’s current schedule of releasing a new version of Firefox every six weeks is due to move to a more rapid cycle of one every four weeks from the end of next month (except for enterprise Firefox ESR, which stays as it is).

For more detail on the security fixes included with last week’s Firefox 73, read our previous coverage. As trailed by Naked Security in December, Firefox 73 now supports DNS-over-HTTPS (DoH) provider NextDNS, adding to current default support for Cloudflare.


Latest Naked Security podcast

LISTEN NOW

Click-and-drag on the soundwaves below to skip to any point in the podcast. You can also listen directly on Soundcloud.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/caf79LMUoQo/