STE WILLIAMS

WHOIS embarrassed about security? APNIC, after database leaks

Asia’s internet numbers registry APNIC has apologised to network owners after a slip in its WHOIS database config leaked credentials, including weakly-hashed passwords.

The breach affected those in the regional registry’s Maintainer and Incident Response Team (IRT) database objects. During a June 2017 upgrade, those details were included in downloadable WHOIS data.

“Maintainer” is the administrative object that restricts who is allowed to edit other objects in the APNIC database; the IRT object identifies who receives abuse reports.

Chris Barcellos of eBay’s Red Team noticed the data on a third-party Website on October 12 and notified APNIC. The registry’s deputy general director Sanjaya*writes that the database configuration was fixed on October 13, and subsequently the relevant passwords were reset.

Had an attacker been able to recover the passwords, they could have altered WHOIS information or hijacked IP address blocks.

As this configuration guide shows, one of the hash options available is crypt-pw, a weak and easily-reversed hash because it can only handle eight-character passwords.

APNIC says it hasn’t found evidence of malicious activity as the result of the breach. Had anybody altered the records, it would not have been permanent, since “authoritative registry data is held internally by APNIC”. ®

* Sanjaya uses just one name.

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/10/24/apnic_plugs_database_leak_resets_passwords/

Security pros’ advice to consumers: ‘We dunno, try 152 things’

A Google-conducted survey of 231 infosec pros worldwide has reaffirmed the industry’s faith in strong passwords, and achieved consensus about nothing else.

It’s almost unfair to make fun of the study’s title, “152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users”, because that’s clearly an editorial slip-up (the document [PDF] also includes the note, “ED: Please provide section title”).

What’s clear is that infosec types can’t agree, on an industry-wide basis, on the content of anything like the Australian Signals Directorate’s (ASD’s) enterprise-focussed “Essential Eight” safety strategies.

Hence: by asking 231 security pros for their top three pieces of advice, the suffering authors of the study (Robert Reeder, Iulia Ion, and Sunny Consolvo) ended up with a list 152 items long. As the paper dryly notes, “future work is needed to distill the 152 pieces of advice and communicate to users the most important ones”.

The better news, threading through that quagmire, is that at least the most-cited advice was reassuringly “don’t be stupid” stuff. Here, we pick out everything with more than 30 mentions:

However, to Vulture South’s eagle eye (sorry), it’s depressing how many things we’d consider obvious lacked traction even among experts.

Two of these least-mentioned strategies (backup, and privilege limitation), are on the ASD’s “Essential Eight”, so why experts didn’t agree on their importance is a mystery.

As our Googlers said, “it’s perhaps unsurprising that users don’t follow all the advice on offer—there’s a lot of it, it spans diverse areas, and it’s not clear where to start. Users are probably not receiving a consistent message on what’s most important and exactly what to do in each area”.

We couldn’t agree more. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/10/24/googles_security_advice_we_dunno/

Kaspersky Lab Offers Up its Source Code for Inspection

Beleaguered security vendor fights back against Russian-spying claims with new transparency program aimed at assuaging concerns.

Under intense political and market pressure in the wake of reports that its software was used by Russian nation-state cyberspies to steal US National Security Agency secrets, security firm Kaspersky Lab today announced it will allow independent third parties to review its source code as well as its internal processes and business operations.

The initiative follows a pledge made by Kaspersky Lab chairman and CEO Eugene Kaspersky in early July to share his firm’s source code with the US government as a show of good faith. The Trump administration last month ordered US federal agencies to uninstall Kaspersky Lab software and services from their systems due to US national security concerns due to possible ties between “certain Kaspersky officials and Russian intelligence and other government agencies” as well as Russian law that allows intelligence agencies there to “request or compel” help from the security firm to intercept communications across Russian networks.

Eugene Kaspersky and his firm have vehemently denied helping the Russian government with any cyber espionage efforts, and said it had no knowledge of a recently reported breach of an NSA employee’s home computer via the Kaspersky AV software running on it. The software was used to steal classified information and tools from the US spy agency, according to the reports, which allege the firm was complicit by either assisting in the heist or by selling software that was abused by Russian hackers.

The new transparency program indicates that the security firm has no plans to fade away under intense pressure by US officials and loss of commercial sales outlets such as Best Buy, which recently pulled the software from its shelves after the various reports of possible Russian government ties.

Kaspersky Lab did not name the third parties who will be performing its code reviews, but said it’s looking for experts with experience in software and assurance testing. The reviews will entail technical audits, code base reviews, vulnerability assessments, architectural risk analysis, and secure development lifecycle process reviews, according to the company. “Taking a multi-stakeholder approach, we welcome input and recommendations from interested parties at [email protected],” the company said in response to questions about the new program, which it calls the Global Transparency Initiative.

The first phase of the program includes the kickoff of an independent review of Kaspersky Lab’s source code by the first quarter of 2018, and subsequent reviews of updates and threat detection rules to then get similar vetting. The company also will launch an independent analysis of its secure development lifecycle processes and its software and supply chain risk mitigation practices during the first quarter.

Kaspersky Lab in Q1 also will work with an outside party to develop additional controls for its data processing practices, and also will set up the first of three Transparency Centers where “trusted partners” can inspect code, software updates, threat detection rules, and related operations by Kaspersky Lab. The centers will be based in Asia, Europe, and the US, and will be completed by 2020.

By the end of this year, Kaspersky Lab also will up its bug bounty awards to $100,000 for the most critical vulnerabilities.

Chris Wysopal, CTO of Veracode, which offers source code analysis, says the code and development process inspection announced by Kaspersky Lab is “good news” and should be adopted by all security vendors for their software. “Security software requires an enormous amount of trust from its users because of the privileged access that is granted security software for it to work,” he says. “Add in dynamic software updates and dynamic rule updates and you have allowed an external party complete access to your computer.”

Because software today gets updated on a continuous basis, a third-party review should occur for each update, he says, which Kaspersky has announced it will do. “A third-party review of the integrity of the SDLC and software supply chain is something all vendors should be providing to their customers, as almost all software is putting customers at varying levels of risk from vulnerabilities or backdoors.”

When asked if Veracode was one of the third parties that will inspect Kaspersky Lab’s code, Wysopal said he could neither confirm nor deny it was working with the security firm. Veracode typically has nondisclosure agreements with customers, for example, he says.

Fidelis Cybersecurity’s John Bambenek says Kaspersky Lab’s new program may help, but the allegations by Israeli intelligence reported that hackers searched for classified information in Kaspersky Lab’s telemetry were especially damaging. He says the new controls Kaspersky Lab has planned for how data gets processed “might” address those allegations, but it’s not yet clear.

“It certainly is a bold step Kaspersky is taking, and that they don’t plan to retreat from the North American market quietly,” says Bambenek, Fidelis’ threat systems manager. “What this actually shows is that there might need to be best practices and rules all cybersecurity companies adhere to worldwide because the accusations against Kaspersky by the US today could easily be the accusations against a US company by another country tomorrow.”

He says transparency and specific rules on how to handle user information by AV firms has been “long overdue.”

Veracode’s Wysopal concurs that the Kaspersky Lab program makes sense. But code-vetting still won’t stop nation-states from abusing software and networks via backdoors and covert channels, which can be more difficult to police. “Due to the nature of software and networks, I don’t think the risk can be entirely eliminated through transparency when it is nation-state risks we are dealing with,” Wysopal says.

When asked how the transparency program addresses recent concerns about Kaspersky Lab’s alleged relationship with the Russian government, Kaspersky Lab provided this statement: “Recent allegations aside, Kaspersky Lab company understands that as nations compete in cyberspace, IT security vendors must independently validate the assurance and integrity of their products in addition to their efficacy and effectiveness. As a cybersecurity company in operation for over 20 years, Kaspersky Lab has launched its Global Transparency Initiative to reiterate its industry leadership on not only providing great cybersecurity products and solutions, but also to demonstrate its continued willingness to go above and beyond to protect its customers.”

Eugene Kaspersky says the new initiative is all about showing the firm’s openness and transparency. “We’ve nothing to hide. And I believe that with these actions we’ll be able to overcome mistrust and support our commitment to protecting people in any country on our planet.”

He also called for curbing “attempts to introduce national boundaries in cyberspace” because cybersecurity requires multinational cooperation and “has no borders.”

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/kaspersky-lab-offers-up-its-source-code-for-inspection/d/d-id/1330195?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Windows 10 Update Aims to Block Attackers’ Behavior

Microsoft protects machines from common attacker behaviors with security updates in Windows 10.

Microsoft unlocked a host of new security and management features in the Windows 10 Fall Creators Update, which started rolling out last week. One of its new tools, Windows Defender Exploit Guard (WDEG), aims to protect businesses from ransomware by blocking common attacker behaviors.

Several studies point to the growth of ransomware hitting enterprise victims. Dark Reading found 35% of businesses were hit with ransomware in the past year, and only 27% believe current anti-malware tech is effective in preventing ransomware.

It’s not uncommon for victims to get tricked twice. An ESG Research Insight Report found many organizations have a recurrence of ransomware attacks, with 22% of 300 IT and security pros saying the same ransomware re-infected the same endpoints, and 38% claiming the same ransomware affected other endpoints within the business. Nearly half (46%) had been hit.

Microsoft is aiming to shrink the attack surface for next-gen malware with Windows Defender Exploit Guard, a suite of intrusion prevention tools shipping with the Creators Update. The set includes four parts created to block a range of attack vectors and actor techniques:

  • Attack Surface Reduction (ASR): Controls that block Office-, script-, and email-based threats to prevent malware from getting on the machine
  • Network Protection: Blocks outbound processes to untrusted hosts/IP via Windows Defender Smartscreen to defend against Web-based threats
  • Controlled Folder Access: Blocks untrusted processes from accessing protected folders with sensitive data
  • Exploit Protection: Exploit mitigations replacing EMET that can be configured to protect the systems and applications

Peter Firstbrook, Vice President at Gartner, says the idea is to get at the root cause of how attackers launch ransomware. Currently, AV systems mitigate ransomware by detecting and eliminating malicious files once they are on the endpoint. The problem is, attackers evade these technologies with new tactics to compromise endpoints and execute ransomware without writing anything to disk.

“Attackers are a pretty creative bunch,” he explains. “They may just move on to different types of applications and files, or find a way around it … we need to make it harder for attackers, and that’s really the key theme here with Windows.”

Instead of building security tools to react to new forms of malware, Firstbrook points out how companies like Microsoft, CrowdStrike, and Carbon Black are creating more proactive systems that anticipate hackers’ behavior and defend against it.

ASR, one component of WDEG, was built on the idea that email and Office apps are common attack vectors and let actors distribute fileless attacks. It can block behaviors that malicious documents use to execute; for example, it can block Office apps from injecting into process.

Controlled Folder Access, another, locks down critical folders so only authorized applications can access files. Unauthorized apps, like malicious and suspicious files, DLLs, and scripts, will be denied even when they are running with administrator’s privilege.

The Controlled folder protects common folders, which contain documents and important data, by default. It’s flexible, though, and admins can add other folders they want to be protected. This also allows trusted apps, such as a unique or custom app, to access protected folders. Users are alerted when unauthorized apps attempt to access or change files in protected folders.

“These are more durable changes than the traditional signature-based antivirus approach where we say, ‘Is the file good or bad?'” says Firstbrook. “Instead of issuing a new signature, [Microsoft] is saying ‘Why are they successful, and let’s deal with the root cause.'”

The decision to push automatic updates will also ultimately benefit companies in the fight against ransomware. “With continuous updates, and focus on security, they’re responding quickly to changing attack patterns on the OS they weren’t before,” he adds.

Microsoft isn’t the only company buckling down on endpoint security. The growth of ransomware has motivated businesses to think beyond traditional antivirus and host intrusion prevention systems, and build next-gen tools that don’t rely on signatures to detect malware.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: https://www.darkreading.com/endpoint/windows-10-update-aims-to-block-attackers-behavior/d/d-id/1330194?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

US Critical Infrastructure Target of Russia-Linked Cyberattacks

Attacks have been under way since May, targeting energy, nuclear, aviation, water, and manufacturing, FBI and DHS say.

Nation-state actors are trying to gain access to vital industrial control systems (ICS) at US energy companies and other critical infrastructure organizations via the networks of their suppliers and trusted third parties, the United States government has warned.

In an advisory issued late last week, the Department of Homeland Security (DHS) and the FBI said the threat activity has been ongoing since at least May 2017 and appears to be the handiwork of the Dragonfly advanced persistent threat (APT) group.

The group has been using a combination of tactics and techniques to break into victim networks including information harvesting using open-source reconnaissance, spear-phishing emails from compromised legitimate accounts, credential-gathering, and using watering-hole domains for hosting malware. Once on a victim’s network, the attackers have focused on finding and browsing information pertaining to Supervisory Control and Data Acquisition (SCADA) systems and control systems.

Dragonfly, also known as Energetic Bear, is a Russia-linked group that is suspected of numerous attacks on organizations in the manufacturing, pharmaceutical, industrial, and construction sectors globally since 2011. Symantec in September had warned about renewed attacks by the group against energy sector targets in the US and Europe. The DHS/FBI alert basically confirms the findings in the report, while noting that the campaign has included targets across multiple critical infrastructure sectors – not just the energy sector.

“This is the first time we are seeing such a widespread campaign that is specifically targeting industrial control systems which are responsible for managing and controlling the physical processes in nuclear, water, aviation, and critical manufacturing sectors,” says Dana Tamir VP of market strategy for Indegy.

The DHS and FBI advisory, which includes indicators of compromise and other pointers, described Dragonfly’s activity as an ongoing “multi-stage intrusion campaign.” The threat actors are targeting small and relatively low-security partner and peripheral networks to gain access to high-value asset owners in the energy and other sectors.  

The initial, or “staging,” victims are not opportunistic targets. Instead, they are carefully chosen for their pre-existing relationships with the intended victim. Their networks, once compromised, are being used as malware repositories and as pivot points for gaining access to the network of the final intended victims, the DHS and FBI said.

Nearly 50% of the known watering holes being used in the campaign to serve malware on target networks are trade publications and informational websites related to critical infrastructure, ICS and process control the advisory said.

There is little evidence that the attackers are using any zero-day vulnerabilities, or particularly sophisticated tools to gain access to their intended victim’s network. Rather, they have been using publicly available information to identify intended targets and craft customized spear-phishing campaigns for gathering credentials and information.

In instances where the threat actors managed to obtain a legitimate user’s credentials, they have used the credentials to gain access to the victim’s network and to download malware on it from remote servers. In some cases the malware created a user account and attempted to convert it to an administrator account with privileged access rights. The malware also disabled the host-based firewall on the compromised system and opened ports that would allow an attacker remote access to the system.

In addition to energy companies, others being targeted include organizations in the government, nuclear, aviation, water, and critical manufacturing sectors. The threat actors have succeeded in penetrating the networks of at least some of the intended targets, the advisory said.

“Threats to industrial control systems and critical infrastructure networks are definitely on the rise,” says Patrick McBride, chief marketing officer at Claroty. “We’ve arguably seen more threat activity in this space in the past four- to five months than the past three years.”

So far, the attacks have not caused actual physical disruption. But the theoretical is becoming reality, McBride says. “We need to recognize that nation-states are going to continue laying the groundwork for potential disruption in these networks. It is a logical action as a component of any potential conflict.”

Phil Neray, vice president of industrial cybersecurity at CyberX, says the FBI and DHS warning highlights the urgent need to address security weaknesses in US industrial control networks. Real-world network data that CyberX collected over the past 18 months from 375 industrial networks worldwide shows that operational technology (OT) networks are riddled with vulnerabilities.

CyberX’s data, contained in a soon-to-be published report, showed that industrial networks are not as air-gapped and isolated as many might imagine, with some one-third of them connected to the Internet. More than 75% of the sites had obsolete Windows technology such as XP and Windows 2000; 60% had plain-text passwords traversing their control networks; and 50% of the sites used no antivirus software at all.

“The data we’ve collected from real-world OT networks shows that once the adversaries get into the OT, it’s relatively easy for them to move around and compromise industrial devices that control physical processes such as assembly lines, mixing tanks, and blast furnaces,” he says.

Related Content:‘Dragonfly’ APT Now Able to Disrupt US Power Grid Operations, Symantec Warns

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/us-critical-infrastructure-target-of-russia-linked-cyberattacks/d/d-id/1330196?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Unpatched Bugs Rampant on Mobile Devices in Financial Services Firms

More than a quarter of mobile devices used by financial services employees carry known vulnerabilities, according to a recent report.

Many financial services employees are toting around unpatched mobile devices, putting their companies and customers at risk of a data breach, a recent report found.

More than 25% of mobile devices used by financial services employees had unpatched vulnerabilities, according to Symantec’s Q2 2017 Mobile Threat Intelligence Report: Mobility and Finance.

The data, gleaned from Symantec’s endpoint mobile security software and other sources, also found that 15% of employees’ mobile devices at financial services institutions had been exposed to a malicious network, while three in every thousand devices were infected with malware.

“If I read this report and I was Procter Gamble, I would be asking my bank, what you are doing to protect my data when your executives are connecting to suspicious WiFi networks, or how many of your employees have phones with malware?” says Varun Kohli, a senior director at Symantec. “I would be asking these questions because my data is at risk.”

And although corporate customers may find there is little they can do to protect themselves from the actions – or lack of actions – that their financial services company is taking, Kohli says that may change in the future.

“I hear enterprises are asking their software vendors to take certain steps to protect their information, but I have not heard this of the banks,” Kohli says. “But companies need to also ask this of their business partners, too.”

Patching Problem

Although Apple and Google may regularly patch vulnerabilities, employees at financial institutions may be unaware of the patch notifications. In part, Apple is able to push its patches out relatively easily since it controls both the hardware and software, whereas the task is more challenging for Android.

When Google issues a patch, it has to be delivered to the device manufacturer, which then performs its own version of the update if it decides to issue a patch for the flaw at all, Kohli says. 

Other findings in the report include a general lack of good mobile security hygiene. For example, more than 13% of mobile devices used by financial services employees lack the latest major OS version, while 99% do not have the latest minor update issued by Google or Apple, the report found.

Some 4.6% of iOS users in this sector have yet to install the latest mobile operating system, compared to 47.8% for Android, according to the report.

Despite those results, the financial services industry as well as the healthcare sector tend to institute more frequent updates than all industries overall, Kohli says. He notes both industries suffer the most attacks because of their valuable information and data and, as a result, more is spent to secure those industries and the devices they use.

“They are early adopters of security; but even then, we are seeing problems,” Kohli says. “I was very surprised at the results. I would have expected the number in the financial services industry to be lower.”

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET’s … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/unpatched-bugs-rampant-on-mobile-devices-in-financial-services-firms/d/d-id/1330197?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

What the KRACK was that? [Chet Chat Podcast 264]

This episode of the Chet Chat podcast was recorded live at the BSides Calgary conference in Alberta, Canada.

Sophos expert Chester Wisniewski (he’s the Chet in the Chat) caught up with fellow security researcher and former colleague Michael Argast for a whirlwind tour of the big security issues of the past week.

In this episode

If you enjoy the podcast, please share it with other people interested in security and privacy and give us a vote on iTunes and other podcasting directories.

Listen and rate via iTunes...
Sophos podcasts on Soundcloud...
RSS feed of Sophos podcasts...


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/bBfic7HB6do/

Facebook security chief stands by “college campus” comments

In late July, Facebook security chief Alex Stamos told employees in a conference call that the company isn’t doing enough to respond to growing cyber threats: in fact, with Facebook’s “move fast” mantra, the vault that stores the keys to a billion lives is (deliberately) run like a college campus but has the threat profile of a defense contractor, he said.

So that’s security worry No. 1.

Security worry No. 2 is that somebody on the call—a Facebook employee, one assumes—taped him and leaked the clip to ZDNet, which published it on Thursday.

Here are Stamos’ remarks from the call, which was concerned with the challenges of protecting Facebook’s networks from the growing threat of nation-sponsored hackers:

The threats that we are facing have increased significantly, and the quality of the adversaries that we are facing. Both technically and from a cultural perspective, I don’t feel like we have caught up with our responsibility.

The way that I explain to [management] is that we have the threat profile of a Northrop Grumman or a Raytheon or another defense contractor, but we run our corporate network, for example, like a college campus, almost.

We have made intentional decisions to give access to data and systems to engineers to make them ‘move fast,’ but that creates other issues for us.

As Ars Technica points out, nation states are suspected of being behind attacks against Google, Yahoo, defense contractors, security companies and more. In March, federal prosecutors indicted Russian intelligence agency officers for a 2014 hack on Yahoo that compromised 500 million user accounts, for example, while Google said in 2010 that it had lost intellectual property in a highly targeted attack coming from China.

That’s the kind of thing that Facebook, and everybody else online, is facing. And Facebook is being run like a campus. OK. We don’t know exactly what that means, but it doesn’t sound good. It sounds sloppy. It sounds like a high-risk environment.

But before we grab our torches and burn down the frat houses, let’s take a look at what Stamos had to say when he took to Twitter to clarify the remarks on Thursday:

I was asked for comment today wrt some leaked audio from when I was speaking to my security team at Facebook. 1/11

Here it is: I’ve said this before, internally, to describe one of the basic challenges security teams face at companies like ours 2/11

Tech companies are famous for providing freedom for engineers to customize their environments experiment with new tools 3/11

And also frameworks development processes. Allowing for this freedom helps creativity and productivity 4/11

We have to weigh that against the fact that we have become a potential target advanced threat actors. 5/11

As a result, we can’t architect our security the same way a defense contractor can, with limited computing options and no freedom. 6/11

Keeping the company secure while allowing the culture to blossom is a challenge, but a motivating one, I’m happy to accept. 7/11

The “college campus” wording is just a figure of speech to make the point; 8/11

My team runs network security for the company. Of course we secure it thoroughly. 9/11

It would not be correct to read my quote as a criticism of management not caring about security; they care a great deal. 10/11

It’s not a criticism of anybody, just a statement of why our team needs to be creative in how we protect our corporate network. 11/11

Some are sympathizing with Facebook. Software developer Molly McG: “…it’s actually an incredible analogy for the challenges you face and I love it … The college campus is a perfect metaphor for an environment where you can experiment while protected by institutional safeguards.”

“I don’t even see how this statement of reality is even remotely controversial” said April King, head of website security at Mozilla. “That freedom, despite its subsequent challenges, lets you attract the kind of tech talent that you simply couldn’t get at a large corporation.”

Fair enough. But we’re talking about personal information belonging to millions of people. Hiring whiz kids is great for churning out creative new ideas, but if that creativity comes at the expense of security, whose interests does it serve? Do we want surgeons to learn how to use a scalpel on a live patient?

Then again, as he explained, Stamos didn’t mean inexperienced, or foolhardy, when he referred to a “college campus.”

From the outside it looks like Facebook takes security very seriously: ever seen a Equifax- or Yahoo-level data breach from Facebook? No? Neither have we.

One of many examples of what Facebook does right can be found in the way it locks users in a closet if the company finds that they’ve reused their passwords on other sites that have been breached.

Another commendable practice: Facebook has been using secure browsing by default since July 2013. Plus, Facebook issues transparency reports to let us all know which governments are making plays for our data and how many times. On top of all that, it doesn’t balk at paying out decent bug bounties.

Plenty of other internet platforms are also doing those security-proactive things besides Facebook, but it’s still worth noting that clearly not every single Facebook security or development engineer is swinging from the ceiling fan.

Of course a company like Facebook only has to fail once for everything we’ve shared with it to be spilled.

Storing vast amounts of user data, moving fast and structuring themselves like a campus rather than a defence contractor are all deliberate decisions on Facebook’s part. Nobody obliged the company to do that, or shoulder the risks and responsibilities that go along with making it all work.

When it comes to Facebook securing its network, Naked Security’s Mark Stockley thinks that overall, it’s pretty impressive (though it’s certainly got a problem with at least one employee who felt that it’s OK to tape a confidential call and release it to a major tech publication).

On the other hand, regardless of Stamos trying to put his comments into the context of fostering creativity, the fact is that the top security guy at the company said “I don’t feel like we have caught up with our responsibility”. That’s why Mark said you could quote him on this one:

These are Facebook’s choices and the challenges it faces are real but self-imposed so I sympathize, but not enough to forgive it if they’re breached.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/oZLG4JnvdC4/

Just say “No!” – how to stop the DDE email attack [VIDEO]

You’ve probably heard of the DDE attack – a way of launching malware from a web download, an email attachment, or even directly from the body of an Outlook email message or calendar invite.

It sounds scary – no document macros, no tell-tale script files, no attachment to open…

…but once you know what to look for, stopping a DDE attack isn’t that hard.

Paul Ducklin tells you how the DDE attack works, what to look out for, and what to do.

(Can’t see the video directly above this line? Watch on Facebook instead.)

(You don’t need a Facebook account to watch the video, and if you do have an account you don’t need to be logged in. If you can’t hear the sound, try clicking on the speaker icon in the bottom right corner of the video player to unmute.)

PS. If you like the T-shirt in the video, you can buy one at https://shop.sophos.com/.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Q5hLxHp3g2E/

‘We’ve nothing to hide’: Kaspersky Lab offers to open up source code

Russian cybersecurity software flinger Kaspersky Lab has offered to open up its source code for third-party review.

The firm’s Global Transparency Initiative is in response to moves to ban the use of its technology on US government systems by the Department of Homeland Security over concerns of alleged ties with the Russian government.

The initiative comes days after reports that Russian government hackers used Kaspersky antivirus software to siphon off classified material from a PC belonging to a NSA contractor.

With this initiative, Kaspersky Lab will engage the broader information security community and other stakeholders in validating and verifying the trustworthiness of its products, internal processes, and business operations, as well as introducing additional accountability mechanisms by which the company can further demonstrate that it addresses any security issues promptly and thoroughly.

An independent review of the company’s source code by Q1 2018 will be followed by similar audits of its software updates and threat detection rules. A separate independent assessment of Kaspersky Lab’s secure development lifecycle processes and its software and supply chain risk mitigation strategies will take place in parallel.

Analysis of source code to rule out possible backdoors is all well and good but what really counts is how anti-malware software is configured to select what types of file are uploaded to the cloud for further scrutiny. The behaviour of the software can be and needs to be altered by updates.

Kaspersky Lab further plans to open up three Transparency Centres worldwide (in Asia, Europe and the US) by 2020. In the meantime, the company has increased the value of its bug bounty awards to up to £75,000 ($100,000) for the most severe vulnerabilities.

Eugene Kaspersky, chairman and chief exec, said the initiative was designed to re-establish trust and prevent the “balkanisation” of internet security.

“Cybersecurity has no borders, but attempts to introduce national boundaries in cyberspace is counterproductive and must be stopped,” Kaspersky said in a statement. “We need to re-establish trust in relationships between companies, governments and citizens. That’s why we’re launching this Global Transparency Initiative: we want to show how we’re completely open and transparent. We’ve nothing to hide.”

Industry reaction has been mixed.

Javvad Malik, security advocate at AlienVault, said: “Following the allegations against Kaspersky, the company needs to restore public trust and this is a good way to go about rebuilding that trust.

“With an increase in cyber warfare and hostile governments, it makes sense for more companies to bring more transparency to the market. So it could encourage other companies to follow suit and help technology companies remain politically agnostic.

“This is particularly relevant to security companies whose software often runs with high privileges.”

Lee Munson, security researcher for Comparitech.com, argued that the move had more to do with reputation management than transparency.

“However Kaspersky Lab packages this new initiative, it is clear to me that this is about reputation repair, especially in the US where claims of links to Russian intelligence agencies have been severely damaging.

“That it could build trust in the security community is true, though the trust being built for Kaspersky is obviously of paramount importance here.” ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/10/23/kaspersky_source_code_review/