STE WILLIAMS

Leaked NSA Hacking Tools, Tactics, In Focus

The NSA’s catalog of custom hacking tools for popular networking and consumer products recently leaked by former contractor Edward Snowden provided a rare glimpse at the arsenal at the fingertips of the spy agency’s hackers.

But the tools were not unlike many techniques and weapons employed by criminal or other espionage cyber-attackers, experts say. Take DROPOUT JEEP, the NSA-built hacking tool included in its recently published catalog in 2008 that hacks iPhones. DROPOUT JEEP is technically a remote access Trojan or RAT, says Lucas Zaichkowsky, enterprise defense architect at incident response and forensics firm AccessData.

Zaichkowsky says based on the leaked information and the diagrams, there are NSA hackers operating the RAT backdoor for their intelligence-gathering operations. The RAT backdoor likely has a small footprint, and can be updated with plug-ins for various functions, he says.

“They’re just jailbreaking the iPhone,” Zaichkowsky says. “It’s a remote administrative tool … it can take pictures, do keystroke recording,” not unlike other RATs, he says.

The version leaked by Snowden is for attacks that require close proximity to the target, but the NSA’s description of the tool says a remote installation capability was on the horizon. The documents were published late last month by Der Spiegel, exposing the NSA’s elite hacking team called the Tailored NSA’s Tailored Access Operations (TAO) Group and the agency’s homegrown hacking tools.

Apple has reportedly denied providing the NSA with any backdoors to its products. “Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products,” the company said in statement. “We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.

“My initial thought was that Apple didn’t give them” access, Zaichkowsky says. “They [NSA] may have found some network-based exploits and sent specially crafted packets over the network,” he says. “If there isn’t proper input validation, then you end up jailbreaking the iPhone, exploiting it and getting kernel-mode or root access” on the targeted iPhone, he says.

[Treasure trove of tools created and used by NSA hackers for planting backdoors via Cisco, Juniper, Apple products unveiled in latest document leaks. See NSA Elite Hacking Team Operations Exposed .]

The actual damage these revelations of NSA operations have had and will have on security has been under debate within the security community since the Snowden leaks began this summer. While the scope of the NSA’s operations is under scrutiny, the agency is basically doing its own bug-hunting not unlike an advanced attacker would do, experts say.

“Any attacker could be finding zero-days. It’s less bad if we know our people know what those exploits are and are keeping an eye out, instead of having no clue those exploits exist,” Zaichkowsky says. NSA needs more external checks and balances surrounding its operations, however, he says.

But the fallout has already been felt not only within the U.S. as vendors have expressed concerns about the NSA’s operations, but also overseas.

Ron Gula, CEO and CTO of Tenable, says he’s seen European and Asian markets going sour on U.S.-based cloud firms in the wake of the NSA revelations. That’s actually boosted Tenable’s business, he says. “Since our stuff is inside the network, we have been able to switch out with some of our competitors who are cloud-based,” he says. But that’s only a temporary trend, he says.

The bigger worry of most enterprises in the wake of the leaked NSA documents outlining some controversial and widespread spying operations as well as backdoors in popular products, is copycat scenarios, Gula says. “More organizations are going to be interested in ‘becoming’ NSA,” he says. “There are technologies our there that take a movie of your desktop and play it later. That has dramatic ramifications for HR and IT security, with competitive intel” at risk, he says.

Most enterprises are just as worried about their top researchers being hired away, and being attacked by APTs, he says.

Not much is likely to change at NSA until any legal proceedings occur, says privacy expert Mark Weinstein, CEO of Sgrouples. “It’s business as usual right now,” Weinstein says. “This really has to work through our court systems. The courts are going to have to redefine what the Fourth Amendment means … and it’s going to take a couple of years” to hash out, he says.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/leaked-nsa-hacking-tools-tactics-in-focu/240165246

Spiceworks Rolls Out New Version Of Its Free IT Management Application

AUSTIN, Texas – January 8, 2014 -Spiceworks, the vertical network for IT, today announced a series of updates that simplify how more than 4 million IT professionals manage their technology environments. The new features are designed to give IT professionals access to the security and help desk tools they need to get their jobs done more efficiently, all from a single management interface.

“More than 4 million IT professionals rely on Spiceworks for the tools, information and connections they need to do their jobs,” said Jay Hallberg, co-founder and COO of Spiceworks. “As the platform expands, Spiceworks is reshaping how IT professionals research, purchase and use technologies from their favorite brands.”

New security integrations and help desk plugins fuel growth in the platform

Following the introduction of Spiceworks 7 in September 2013, the company today released version 7.1 of its free IT management application. The update includes performance enhancements to its IT inventory, help desk and mobile device management capabilities, as well as new ways for technology vendors to more seamlessly integrate their offerings with Spiceworks. The company also debuted four new help desk plugins that give IT professionals the ability to customize their Spiceworks help desk system to suit their needs.

To date, technology brands such as Microsoft, Rackspace, Dropbox and Google have integrated with Spiceworks to extend the functionality of the platform and provide IT professionals with the tools they need to manage their cloud services more efficiently. The platform continues to expand, and Spiceworks is introducing new security integrations that can help IT professionals address their data center and endpoint security needs, all from within Spiceworks. These integrations include:

AlienVault – AlienVault Threat Alerts in Spiceworks helps users identify and mitigate security threats on their network for free. Based on AlienVault’s Open Threat Exchange database, the integration allows IT professionals to scan network assets for connections with known malicious hosts, trigger alerts within Spiceworks for any issues that are found, and provide remediation advice.

NetClarity – Built exclusively for Spiceworks, NetClarity’s Network Access Control enables Spiceworks users to block and/or take action against unwanted devices attempting to access their networks, including rogue wireless access points, hackers, and employee-owned devices entering the corporate network.

Webroot – The integration of Webroot’s SecureAnywhere – Endpoint Protection with Spiceworks’ IT management platform enables IT professionals to receive real-time threat alerts, and view and manage endpoint security directly from Spiceworks.

Spiceworks is also adding four new help desk plugins to give IT professionals the ability to add new functionality to their ticketing system for free. Spiceworks’ plugin library consists of more than 300 plugins that have been downloaded over 600,000 times. New plugins include:

Help Desk Responses – The Help Desk Responses plugin allows IT professionals to add a series of auto-responses to their ticketing system so they can more quickly respond to support requests from end users.

Ticket Check Lists – This plugin gives Spiceworks users the ability to add to-do lists and checklists to individual help desk tickets. Doing so helps IT professionals manage complex support requests more efficiently.

Custom Time for Tickets – With the Custom Time for Tickets plugin, IT professionals and service providers can customize the “time spent” field within a help desk ticket to detail, at a more granular level, how long they spent addressing a support issue.

Remove Ticket Comment – The Remove Ticket Comment plugin gives IT professionals the ability to edit or remove comments from a help desk ticket.

About Spiceworks

Spiceworks is the vertical network for IT more than 4 million IT professionals use to connect with one another and over 2,700 technology brands. The company simplifies how IT professionals discover, buy and manage more than $500 billion in technology products and services each year. Headquartered in Austin, Texas, Spiceworks is backed by Adams Street Partners, Tenaya Capital, Institutional Venture Partners (IVP), Shasta Ventures and Austin Ventures. For more information visit http://www.spiceworks.com.

Follow Spiceworks on Twitter: http://twitter.com/spiceworks and connect with Spiceworks on Facebook: http://www.facebook.com/Spiceworks.

Article source: http://www.darkreading.com/management/spiceworks-rolls-out-new-version-of-its/240165247

New Year’s #sophoscrossword 2013/2014: And the winners are…

Well done to everyone who tried the New Year’s #sophoscrossword for 2013/2014!

And very well done to the 54 people who submitted correct solutions by the deadline.

You’ll find the full leaderboard below.

But first, here’s what the finished grid was supposed to look like:

To give you a bit more detail, here are the clues and their corresponding answers.

If you tried the puzzle this time and struggled with some of the clues, this will give you some insight that will be (OK, that may be) be of assistance next time:

Across

Sets aren't (7) = ORDERED
Switches have them (5) = CASES
Proof you mined a Bitcoin (3,5,5) = SHA BLOCK CHAIN
It's 160 at 7, 140 at 8 and 70 at 16 (3) = SMS
Data dropped for being naughty (3,6) = BAD PACKET
Sophos Anti-Virus has a blue one (6) = SHIELD
Where the punchcards go (6) = READER
Sets are (9) = UNORDERED
Definite hacker article (3) = TEH
Adi Shamir finds it acoustically (3,7,3) = RSA PRIVATE KEY
What Pirate Roberts is facing now (5) = DREAD
Synths from Osaka (7) = ROLANDS

Down

8-bit multiuser OS - on a Z80! (5) = OASIS
Analog computers have them (5) = DIALS
Tidied up your GOTOs (9) = RELABELED
Unbase64, for instance (6) = DECODE
Polynomial division to catch errors (3) = CRC 
PUSHed a bunch of data words (7) = STACKED
Al Gore, internet proselytiser, was one (7) = SENATOR
The evidence for many optimisations (9) = ANECDOTAL
Bubble sort time versus size (7) = SQUARED
Put on the other side of an air gap (7) = ISOLATE
It's in charge of your hardware (6) = DRIVER
You get one when you login (5) = TOKEN
Command set that demands attention (5) = HAYES
The colour of a Sophos VPN (3) = RED

We have two winners: the fastest to finish, and a randomly selected finisher from the rest.

Our fastest solver was: Ross Younger, of Christchurch, New Zealand.

Our random winner styled him or herself: k3p13 of California, USA.

Congratulations!

Here’s the list of all 54 solvers:

And, because a few of you emailed us to say you were looking forward to seeing where the solvers came from, here’s a leaderboard showing the number of solvers from each country:

By the way, a number of readers sent us messages to say that they loved the look of the prize shirts, and that they’d buy them if we put them for sale on the web.

We hear you!

No promises, but we’re hoping to make some cool Sophos and Naked Security merchandise available online sometime soon.

If we go for it, we’ll definitely do T-shirts; when we (half jokingly) suggested mugs as well, we got a couple of big “Yes pleases,” so there may yet be Naked Security crockery, too!

→ If you’re one of the people who’d like to see Naked Security merch, let us know in the comments, and tell us the sort of products you’d like to see. While you’re about it, please let us know what your favourite T-shirt colour scheme is. We’re a bit old school, so we think that techie shirts really ought to be white-on-black. No choices. But we made our recent AusCERT 2013 puzzle shirts in black-on-grey as an experiment, and they looked super-cool. What do you think?

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/EMmEOgtwB9s/

Cyber-bullying is on the rise, but so is cyber-counselling, says report

Cyber-bullying. Image courtesy of Shutterstock.In a sign of the times ChildLine, the UK’s helpline and online service for children and young adults, counselled more children online (59%) last year than via the telephone (41%) for the first time in its history.

This adoption and take up of new technology may explain why its latest report has highlighted a sharp increase in the number of youngsters contacting the group.

In a report released today, the service – which is provided by the charity NSPCC – tells of a big increase in the number of children requiring counselling across a wide range of issues that they are facing.

ChildLine reports that the two most common reasons for young people making contact are centred around family relationships and feelings of depression and unhappiness, with each accounting for 13% of the contact made with the charity.

The third most likely reason for children to contact ChildLine was bullying of various types. Year on year the amount of children telling Childline that they had been bullied in some way increased by 8% which is bad enough but, in 2012-13 the charity saw a total of 4507 cases of cyber-bullying, up a huge 87% from 2410 cases in 2011-12.

Worryingly, the children being bullied online told ChildLine that they felt they couldn’t escape the abusive behaviour due to the always-on nature of the internet.

Victims reported feeling isolated and experiencing low self-esteem. Some even told the charity that cyber-bullying made them feel suicidal.

Childline logoChildLine found that bullying was the number one reason for boys contacting them during last year with a total of 6724 needing counselling. For girls, depression and family issues required more counselling time but ChildLine still saw 14,653 girls asking for help with bullying related issues.

For children under the age of eleven offline bullying was the largest concern, requiring 24% of the total counselling given out to this age group.

84% of all cyber-bullying affected those in the 12-18 year-old group. In December 2012, ChildLine began to monitor when young people specifically mentioned bullying that related to social networking sites, chat rooms or gaming sites, and in the months that followed (December 2012 – March 2013) 1,098 young people referred to these platforms, a third of whom were aged 13 or 14.

Fortunately, the biggest social sites appear to be becoming more aware of the problem and their responsibilities, and are introducing new measures to deal with online abuse.

Facebook will allow users to anonymously report abuse across its site and Twitter has introduced a Report Tweet button, although it struggled to find an effective solution for blocking users.

Of course its not just down to individual web sites to protect your children from this sort of behaviour – if you, as a parent, have concerns that your own child may be being bullied then there is much that you can do to help them yourself.

Many kids may be unsure about confiding in their parents so it would be prudent to develop your own understanding of cyber-bullying, especially as technology and lifestyles continue to change at a rapid pace.

We interviewed Luke Roberts from the Anti-Bullying Alliance as part of Anti-Bullying Week back in November. He gave readers advice on how to spot the signs of online bullying, as well as thoughts on what to do if you suspect your child is the one carrying out the bullying.

And while we’re at it, if your child has access to a computer, Android or iDevice, why not set up parental controls on it today? It won’t necessarily stop cyber bullies, but it will help to give you more control over what your child gets up to online.


Image of cyber-bullying courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/3nMKzlHooUI/

Infosec experts boycott RSA conflab over alleged ‘secret’ NSA contract

2014 predictions: Top technology trends

More security researchers are boycotting next month’s US edition of the RSA Conference in protest against an alleged “secret deal” the company is said to have struck with the National Security Agency.

Last month Reuters reported that the NSA “secretly paid” RSA Security $10m in return for making the Dual_EC_DRBG random number generator algorithm the default option in its BSAFE cryptographic toolkit.


The news came from documents leaked by former NSA contractor Edward Snowden, the news agency reported.

In response, RSA issued a carefully worded denial that it had never knowingly put a backdoor in its BSAFE toolkit at the behest of the NSA or anyone else.

Reuters is standing by its story and many in the security community remain unconvinced by the EMC security division’s response.

Security researchers first expressed concerns that Dual_EC_DRBG was flawed on purpose, in effect creating a back door, as far back as 2006 – but RSA only advised customers against using the technology last September.

Mikko Hyppönen, the respected chief research officer at Finnish net security firm F-Secure, cancelled his planned presentation at the 2014 RSA Conference, saying that RSA Security had continued to back the use of its flawed random number generator for years “despite widespread speculation that NSA had backdoored it.”

Hyppönen had planned to deliver a talk on Governments as Malware Authors.

Hyppönen said he didn’t expect other conference speakers to follow his lead and cancel planned gigs at the RSA Conference and for the move to influence EMC’s policies. However the respected security researcher’s stance has struck a chord and several other security researchers are boycotting the San Francisco edition of the RSA Conference, traditionally the infosec business’s biggest single gathering, next month.

Seven other speakers have also cancelled their planned participation at RSA Conference USA, either in delivering talks or taking part in panels. The seven are: Jeffrey Carr, founder and chief exec of Taia Global; Josh Thomas of Atredis Partners; Chris Palmer, a software security engineer at Google; Adam Langley, a cryptographer who also works for Google; Chris Soghoian, principal technologist with the ACLU’s Speech, Privacy and Technology Project; Alex Fowler, Mozilla’s global privacy and public policy leader; and Marcia Hofmann, a digital rights lawyer at the ‪EFF‬.

Altogether 408 speakers are planned for the event.

RSA Conference organisers expressed disappointment over the planned withdrawal, telling the Washington Post that the protest was misplaced because the conference has “long been a neutral event”. It expects to fill vacated slots with alternate speakers.

RSA, the EMC security division, owns and runs the RSA Conference. This issue of the growing boycott has sparked a wider debate in the security community. Martin ‪McKeay‬, a security evangelist at Akamai, explains why he’ll still be going to the RSA Conference, and why it’s unrealistic to expect many security firms who are locked in to multi-year exhibition deals to boycott the show, in a blog post here.

Robert Graham of Errata Security argues (below) that a boycott against RSA Conference – and by extension RSA’s products – is necessary. He wrote:

The only thing stopping corporations from putting NSA backdoors into their products is the risk of getting caught. RSA got caught backdooring BSAFE. If nobody seems to care, if RSA doesn’t suffer consequences, then nothing will stop other corporations from following suit.

The reason isn’t that I’m upset at RSA, or think that they are evil. I think RSA was mostly tricked by the NSA instead of consciously making the choice to backdoor their products. Instead, what I care about is sending the message to other corporations, that they should fear this sort of thing happening to them. If you are a security company, and you get caught backdooring your security for the NSA, you should go out of business.

After confirming the cancellation of his appearance at the RSA Conference, Jeffrey Carr went further in also calling for an industry-wide boycott of RSA products.

“RSA cannot escape responsibility for offering a compromised BSAFE product for the last nine years by saying ‘we just followed NIST’ and ‘our customers had a choice’,” Carr writes. “This is a gross violation of its own mission statement not to mention its own illustrious history of defending the integrity of encryption against government attempts to weaken it.” ®

The master list of email delivery terminology

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/08/rsa_conference_boycott/

Nok Nok Labs/AGNITiO Voice Authentication Demonstration

Las Vegas, NV, Madrid, Spain and Palo Alto, CA – January 7, 2014 – Consumer Electronics Show – AGNITiO, a worldwide market leader in voice biometrics, and fellow FIDO Alliance founding member Nok Nok Labs, a company founded to transform online authentication for modern computing, announce the world’s first demonstration of a FIDO Readytrade Voice iD implementation, showcasing the market-transforming benefits of spoken voice authentication and identification for digital transactions.

“The hacking of personal information persists on a massive scale, costing businesses millions of dollars to mitigate fraud, while consumers remain frustrated with password-based authentication methods. The time is now for a change in the industry,” said Emilio Martinez, AGNITiO CEO. “With FIDO Readytrade Voice iD, the entire mobile ecosystem benefits – consumers simply authenticate by speaking, developers add personalization to their apps, commercial entities can provide expedient customer service and minimize security risks, all while saving time and money.”

The Agnitio and Nok Nok Labs FIDO Readytrade demonstration at CES 2014 shows how Voice iD and Nok Nok Labs’ Multifactor Authentication Client can be integrated into a mobile application to perform voiceprint-based strong authentication. The solution shown illustrates how FIDO-based authentication can replace the use of passwords to log in or confirm an e-commerce payment. This combination of the Nok Nok Labs and AGNITiO FIDO Readytrade products empowers users of online, mobile, and point-of-sale applications to conveniently access sites and services and perform transactions that are more secure, private and easy-to-use.

Nok Nok Labs’ client and server software leverages the existing security capabilities on a user’s device such as a built-in microphone, fingerprint sensor, camera or Trusted Platform Module (TPM) in order to provide user-friendly, strong authentication to any application. Unlike current siloed authentication solutions, Nok Nok Labs allows organizations to support a wide range of authentication technologies from a single, unified platform.

“The FIDO Alliance is gaining momentum with more than 70 members joining in the last year including Microsoft, Google, Discover Financial, MasterCard, Aetna, Goldman Sachs and more,” said Phillip Dunkelberger, President and CEO of Nok Nok Labs. “AGNITiO shares our leadership in the FIDO Alliance and together we take pride in the rapid steps we are taking to create universal strong authentication through open standards. AGNITiO Voice iD demonstrates a compelling user experience that epitomizes the FIDO Alliance goals of simplicity and security. Importantly, AGNITiO’s and Nok Nok’s solution can be adopted for use today on the large existing install base of mobile devices, as well as for future devices.”

The AGNITiO Voice iD Advantage

All voice biometrics technologies are not created equal. As the leader in government and law enforcement, and with a rapidly growing call center presence, AGNITiO Voice iD engine running KIVOX Mobile software allows for the use of simple, short voice phrases that are accurately detected 99.9% of the time. AGNITiO has a proprietary patented anti-spoofing technology that detects up to 97% of replay attacks, as well as many others risks. KIVOX software is completely language independent, minimizing costs for global deployments and enabling natural voice and user friendly authentication.

For more information about the Voice iD revolution, download the white paper “Identifying the Human Voice in a Mobile and Web-Enabled World: Voice Identification for Business Applications”.

About Nok Nok Labs

Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, Oracle, PayPal and Phoenix that have deep experience in building Internet scale security protocols and products. The company’s ambition is to enable end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. For more information, visit www.noknok.com.

About AGNITiO

AGNITiO (www.agnitio-corp.com) is a worldwide market leader for voice biometrics solutions in government and commercial sectors. AGNITiO has an extensive customer base including leading police, intelligence, military and other government organizations in over 35 countries, as well as a number of leading customers and partners in the commercial sector. AGNITiO Corp. is the US subsidiary, leading business development in USA and Canada. AGNITiO’s technology and products are protected by a family of patents that grows every year.

AGNITiO KIVOX is a voice biometrics product family targeted at the corporate sector. Financial services, telecommunications, utilities and other sectors are implementing new security solutions based on voice biometrics. KIVOX is ideally positioned in this market, with underlying Voice iD technology developed in most demanding environments such as forensics and intelligence.

AGNITiO has obtained numerous awards including the Red Herring 100 Global (2007), Speech Technology Market winner award (2007), Speech Technology Market leader award (2008), Regional finalists for the Global Security Challenge (2009), Speech Technology Market leader award (2010), Global Security Challenge (2011) and Speech Technology Market winner award (2012).

AGNITiO is a founding member of the FIDO Alliance (Fast IDentity Online) www.fidoalliance.org, which is dedicated to delivering open standards for strong multi-factor authentication. AGNITIO is already delivering a FIDO Alliance model solution with its voice biometrics Voice iD platform.

Article source: http://www.darkreading.com/mobile/nok-nok-labsagnitio-voice-authentication/240165233

HBGary Announces Next-Gen Responder Pro

SACRAMENTO, Calif., Jan. 8, 2014 /PRNewswire/ — In a move to significantly close the gap between discovery and mitigation of targeted attacks, HBGary, a part of ManTech International Corporation, today made available a new version of Responder Pro, the industry standard in Windows memory forensics.

By leveraging Digital DNAtrade 3.0, the latest generation of HBGary’s flagship behavioral analysis technology, Responder Pro 2.1 detects never-before-seen rootkits, Trojans, and other malware completely invisible to anti-virus and IOC (indicator of compromise) scanners.

New features and enhancements in Responder Pro 2.1 include:

Support for 32-bit and 64-bit versions of Windows 8, as well as Windows 7, Windows Vista, Windows XP, and Windows 2000.

Support for 32-bit and 64-bit versions of Windows Server 2012, as well as Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 R2, Windows Server 2003, and Windows Server 2000.

Full Digital DNA analysis of 32-bit and 64-bit processes, drivers, and modules.

Twice as many Digital DNA behavioral traits, making the world’s most accurate malware detection engine even better.

Unicode character support for extended and non-Latin alphabets.

Fortune 50 corporations, leading government agencies, and state and local law enforcement are just a few of the organizations using Responder Pro to counter today’s relentless cyberattacks.

“With the record increase in targeted attacks in 2013, it’s no longer a question of whether your organization will be hit; it’s a matter of when. Responder Pro gives investigators of all experience levels the ability to find the latest threats, collect and analyze critical memory artifacts, and generate actionable intelligence to determine whether an incident has occurred — and, if it has, to dedicate the necessary resources for response,” said Frank Blackmore, Product Manager.

Responder 2.1 also includes FDProtrade, the industry’s most complete memory acquisition tool.

About Digital DNA

Digital DNA proactively identifies and analyzes the most advanced malware threats, including those used against global organizations for theft of intellectual property, business intelligence, customer records, and classified information. All software modules residing in physical memory are identified and ranked by threat severity so incident responders, at a glance, can determine quickly how to allocate their resources to mitigate the risk to their business environment.

About Responder Pro

Responder Pro is the de facto industry standard Windows physical memory and automated malware analysis solution. Malware delivery and rootkit behavior not detected by anti-virus can be found easily using Responder Pro. The Responder Pro malware analysis module automatically generates a report that provides a high-level overview of each module’s capabilities broken out across six different areas. Responder Pro’s deep malware analysis includes automated code disassembly, behavioral profiling, pattern searching, code labeling, and control flow graphing.

About HBGary

HBGary provides Enterprise Incident Response solutions and services to enable organizations to conduct key phases of incident response including detecting zero-days and other unknown malware, validating whether an actual incident has occurred, and responding to the incident. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, CA. For information, please visit www.hbgary.com or HBGary’s Twitter or Facebook pages.

Article source: http://www.darkreading.com/applications/hbgary-announces-next-gen-responder-pro/240165234

Arbor Networks Appoints Matthew Moynahan President

BURLINGTON, Mass., January 8, 2014 – Arbor Networks, Inc. today announced the appointment of Matthew Moynahan to the position of President, replacing Colin Doherty. Mr. Moynahan had been senior vice president of product management and corporate development at Arbor since 2012.

Over the course of his 23-year career, Mr. Moynahan has held a variety of executive and leadership positions within both fast growing private and very large public companies. Prior to joining Arbor Networks, Matt was president and chief executive officer of Veracode, a leader in application security. Previously, he served as a vice president at Symantec in several roles, including the consumer products and client and host (server) security divisions.

“I’m excited by the opportunity to lead this great team. The solution portfolio is dynamic and exciting, but the company culture that Colin has fostered is what truly makes this a special place to work,” said Mr. Moynahan. “The company is well positioned, united around our strategy and committed to delivering for our customers, partners and each other.”

Mr. Doherty joined Arbor in 2007, first as VP of worldwide sales and then as president for the past four years. Arbor underwent a period of unprecedented growth and expansion under his leadership, highlighted by the 2010 acquisition by Danaher and culminating with the launch of Arbor CloudSM services for multi-layered DDoS protection and acquisition of Packetloop, expanding Arbor’s presence in the advanced threat market.

“2013 was a transformative year for the company. Arbor is now delivering a broad, integrated set of network visibility; threat detection and mitigation; incident response and forensics capabilities that help customers see, understand and solve their most critical security challenges,” said Mr. Doherty. “Matt has been instrumental in developing our strategy and has the right blend of business, technical and managerial experience to lead Arbor in its next stage of growth.”

“I am confident that Matt’s blend of experience, skills and entrepreneurial spirit will serve Arbor well as we establish a key leadership position in the growing advanced threat market,” said Robert Piconi, Danaher’s Group Executive for the Test Measurement Communications Platform. “I want to thank Colin not only for his exceptional leadership within Arbor, but the integrity and thoughtfulness he brought to the job every day.”

About Arbor Networks

Arbor Networks, Inc. helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier”, making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context – so customers can solve problems faster and help reduce the risk to their business.

Article source: http://www.darkreading.com/management/arbor-networks-appoints-matthew-moynahan/240165235

Man and woman admit to trolling journalist behind Jane Austen bank note

TwitterIn July, a vitriolic storm blew up in the UK, all over a campaign to replace Charles Darwin’s image with Jane Austen’s on a British banknote.

For nearly 48 hours following an announcement that the author’s likeness would grace the £10 note starting in 2017, death and rape threats hurled at the campaign’s backers poured in from Twitter, prompting a threatened boycott of Twitter and the company’s subsequent promise to put a “Report Abuse” button on all messages.

The Crown Prosecution Service (CPS) announced in December that a man and a woman had been charged with making the threats, and now the pair have confessed.

According to Sky News, Isabella Sorley, 23, and John Nimmo, 25, have both pleaded guilty at Westminster Magistrates’ Court to posting the messages to Caroline Criado-Perez.

Criado-Perez is the UK journalist and feminist leader who spearheaded the Jane Austen campaign.

At least one of her supporters, MP Stella Creasy, also received murder and rape threats.

According to Sky News, the court heard that the threats, flooding in from 86 Twitter accounts, included a message from Sorley in which she told Criado-Perez to kill herself and said

I would do a lot worse things than rape you.

Nimmo messaged Criado-Perez to

Come to Geordie land b****. What do you think the police will do?

Sorley told the court that she was drunk and bored when she sent the tweets, described the threats as “empty”, and said that she was just “winding Ms Criado-Perez up”, Sky News reports.

Both women reported that they found the tweets horrifying and frightening, Ms. Creasy feared for her own safety and that of her family, and Ms. Criado-Perez has subsequently suffered life-changing psychological effects because of the bullying.

Sorley, from Newcastle-upon-Tyne, and Nimmo, of South Shields, were both charged.

Sky News reports that the CPS said it would not be in the public interest to prosecute over the messages allegedly sent to Ms Creasy.

Nimmo, for his part, was described as a social recluse who claims benefits and who only leaves the home to empty the trash bins, Sky News reports.

This should not be read as any type of indictment on those who receive public benefits, of course.

What it should be read as, by anybody who’s suffered or now suffers from cyberbullying or who supports its victims, is a reminder that trolls’ actions can be the result of simple boredom.

As this story attests, reporting troll behavior can and does lead to arrests.

That’s what Twitter put that button there for.

Ever use it?

Feel free to tell us how it worked out – or any bully-reporting action, for that matter – in the comments section below.

Image of troll courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/WECYcAxNgfY/

Facebook is a bad way to rate potential employees, study finds

Drunk woman. Image courtesy of ShutterstockPotential employers Google us. They pore over our tweets. They scan our Facebook postings.

They want to see our truly embarrassing internet gaffes before they let us step through the door for an interview.

In a 2010 survey of 825 staffing professionals, 73% of respondents said they use social media platforms such as Facebook to recruit applicants.

What should be more worrisome to those of us with a certain joie de vivre style – call it joie de postings – is the number of managers who choose not to hire applicants based on what they discover in their social media research.

In a 2012 CareerBuilder survey of more than 2,000 hiring managers and human resources professionals, 34% reported that they had decided against hiring applicants based on what they uncovered in social media.

To be precise, this is what those employers found in the postings made by people they didn’t hire:

  • Candidate posted provocative/inappropriate photos/info – 49%
  • There was information about the candidate drinking or using drugs – 45%
  • Candidate had poor communication skills – 35%
  • Candidate bad mouthed previous employer – 33%
  • Candidate made discriminatory comments related to race, gender, religion, or other – 28%
  • Candidate lied about his or her qualifications – 22%

Those posting sins sound bad, don’t they? They sound like a pretty good indication that an employee will not work out well. Those postings would likely convince many of us not to hire the sinner in question.

But a new study published by Florida State University’s Journal of Management suggests that we might be making mistakes when we pass people over for Facebook postings or the like, given the lack of correlation between a) social media profiles that look pretty bad and b) the subject’s actual work performance and whether their managers keep them in the job long-term.

For the study, “Social Media for Selection? Validity and Adverse Impact Potential of a Facebook-Based Assessment,” researchers asked recruiters to evaluate the Facebook profiles of college students who were applying for full-time jobs.

They then followed up with supervisors to find out how the new hires fared, tracking supervisors’ ratings of their employees’ job performance, supervisors’ intentions with regards to retaining or letting those employees go, and actual employee turnover.

What they found was that recruiters’ evaluations of these people, based on their Facebook profiles, was no prediction of their performance or whether they’d keep their jobs – at least, the Facebook profiles were no better at prognostication than more traditional predictors, including the employees’ cognitive ability, self-efficacy and personality.

(In psychologists’ terms, self-efficacy is the extent or strength of a person’s belief in his or her own ability to complete tasks and reach goals.)

Furthermore, the researchers actually discovered a pernicious streak of bias, evidenced in Facebook ratings that tended to favor female and white job applicants.

The takeaway, from the research report:

The overall results suggest that organizations should be very cautious about using social media information such as Facebook to assess job applicants.

Researchers Chad H. Van Iddekinge, Stephen E. Lanivich, Philip L. Roth and Elliott Junco write that human resource professionals’ reliance on social media is easy to understand: it’s out there, free for the picking, unlike interviews and work sample tests, which are costly and time-consuming to set up and administer.

And Other recent research has pointed to social media content as providing a quick, easy peek at job applicants’ real selves.

But checking out job applicants’ intimate postings can potentially put employers into a questionable position when it comes to defending the legality of their selection processes, given that employers may discover, and find impossible to ignore, information about ethnicity, age, physical disabilities, religious beliefs, marital status, or sexual orientation, while blog or Twitter postings or other written material can reveal indications of mental health issues, substance abuse, arrests, or other “life challenges,” the researchers note.

Facebook post - magnifying glassOther problems with vetting job applicants based on social media content is that applicants have limited control over what others post to their profiles.

As far as gender bias goes, the researchers note that females have less tendency to post material about sexual exploits or substance abuse; tend to have higher verbal and writing ability that comes across in audio, video or written social media material; and tend to post more photos of themselves smiling and with others – signs pointing to what psychologists call “agreeableness.”

They found that Hispanic and Black subgroups, meanwhile, have a greater tendency to participate in social and political causes and to have that reflected in social media – something that may well set them apart as “other” in hiring managers’ minds and may influence recruiters to give their Facebook profiles lower ratings than profiles of those who are more like the recruiters themselves.

In other words, people often hire people who are like them – a recipe for disaster with regards to diversity in the workplace.

Given these and other limitations of basing hiring decisions on Facebook profiles and other social media content, the researchers are strongly recommending against the practice – at least until reliable, valid methods for collecting and evaluating the content get ironed out.

What do you think? Do you, or others you know of, suspect that you’ve been unfairly looked over for a job based on your social media selves?

It’s hard to imagine that employers will ever stop basing hiring decisions on information that we ourselves willingly post, that’s free and easy for them to access, and that seems, at least on the face of it, to provide a good look at our “real” selves.

But given this thoughtful study, there certainly seem to be compelling reasons to take a cold, hard look at what we really can learn about people on Facebook, Twitter and other online venues, as opposed to what we think we can learn.

Please share your views in the comments section below.

Images of drunk woman courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/HbB6pcsJJK0/