STE WILLIAMS

Speaking in Tech: The Snowden Effect… Why 2014 will be the year of PRIVATE cloud

5 ways to reduce advertising network latency

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

It’s the last SIT podcast of the year… and just in the nick of time, too. Your relatives are driving you up the wall, your brother’s doing his cringeworthy Charlton Heston impression, the talk has turned to politics and there’s no more wine… There has never been a better time to download our year-end spectacular tech chat, excuse yourself to take the dog for a walk or go to the bottlestore, plug in and enjoy.

This one should take you through Christmas lunch and beyond.


This week, Eddie has flown the coop while Greg and Sarah wrap up the year spectacularly with our very special guests, Brad O’Neill, CEO of TechValidate and Geoff Barrall, CEO and co-founder of Drobo.

This week we discuss…

  • Don Basile’s shock departure from Violin Memory
  • Geoff’s dramatic return to Drobo
  • Barrall: Days of enterprise NAS are numbered
  • Top tech stories of 2013
  • Edward Snowden / NSA scandal
  • Dell goes private
  • Microsoft restructuring
  • Recap of 2013 predictions
  • BIG 2014 Predictions

Listen with the Reg player below, or download here.

Speaking in Tech: Episode

Podcast Subscriber Links

Subscribe through iTunes

Subscribe through Google

Subscribe through Stitcher

Feed URL for other podcast tools – Juice, Zune, et cetera: http://nekkidtech.libsyn.com/rss

The business case for a multi-tenant, cloud-based Recovery-as-a-Service solution

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/25/speaking_in_tech_episode_90/

SSCC 127

Naked Security talks about Festive Season Security on BBC Radio 5 Live’s "Outriders" show…

Outriders is a BBC Radio 5 Live programme that describes itself as “exploring the frontiers of the web.”

It’s hosted by Jamillah Knowles, and it goes to air early on Tuesday mornings, so this week’s episode came out on Christmas Eve.

With the festive season in mind, Jamillah interviewed Naked Security’s Paul Ducklin about security and safety on line, including:

  • Should friends let friends run Windows XP?
  • Is gifting someone a computer enough on its own, or should you go the extra mile and help the recipient set it up properly?
  • What extra steps do you need to take if you’re giving your children tablets so they can go online unsupervised?
  • If you buy yourself a new computer this Christmas, what precautions should you keep in mind when you get rid of your old one?

You can download the programme as an MP3 from the BBC’s podcast repository, check out this and all previous Outriders shows on the BBC Podcasts website, or “tune in” and listen directly from the BBC’s site now:


(BBC Radio 5 Live: Outriders 24 Dec 2013)

Duck is on for the first ten minutes of the show.

Just remember: computer security is a smart choice for your whole digital lifestyle, not just for Christmas.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/YxtOErjwbMU/

On tech support duty for family at Christmas? Get our free Threatsaurus…

Are you on tech support duty for your nearest and dearest over Christmas and New Year?

Are you busily trying explain data leakage, drive-by downloads, exploits, keylogging, phishing, ransomware, rootkits, spyware and why that 5GB Mavericks download isn’t just for show…

…when really you’d rather be snowboarding (or at the beach, depending on your latitude)?

Let the Sophos Threatsaurus and our handy online Threat Index help you teach your friends and family how to stay secure.

→ Video won’t play or too small on this page? Watch directly from YouTube. Can’t hear the audio? Click on the Captions icon for closed captions.

From APTs to Zombies, from Anti-Virus to Web Firewalls, and with a fascinating history of viruses and malware from 1949 (really!) to the present day, the Threatsaurus tells you what you need to know.

There’s no jargon, no sales blurb, no hyperbole and no sense of impending doom like you get from some guides to online safety.

The Threatsaurus explains the facts about threats to your computers and to your data in simple, easy-to-follow language.

It’s a free download – no registration, no password, no email address.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/0V8p129A5Zg/

Snowden to warn Brits on Xmas telly: Your children will NEVER have privacy

Quick guide to disaster recovery in the cloud

Celebrity whistleblower Edward Snowden will hit Britain’s TV screens tomorrow to warn families: “A child born today will grow up with no conception of privacy at all.”

The ex-NSA sysadmin – temporarily exiled in Russia after leaking documents about America and the UK’s massive internet surveillance operations – will give this year’s Channel 4 Alternative Christmas Message. Snowden’s video address is already available to watch online for those who can’t wait until 4.15pm on December 25.


Channel 4’s Xmas Day message lampoons the Queen’s annual speech to the nation and Commonwealth, which is broadcast on the BBC the same day at 3pm. Past Channel 4 speakers have included Australian comedian Adam Hills, a team of midwives, the President of Iran, cartoon character Marge Simpson, and telly chef Jamie Oliver.

“Hi,” Snowden starts tomorrow’s address before thanking Brits for tuning in. The whistleblower then conjures Nineteen Eighty-Four author George Orwell in summarizing how the US’s NSA and the UK’s GCHQ intelligence agencies tap internet connections, phones and computers to collect vast amounts of information about innocent folks:

Great Britain’s George Orwell warned us of the danger of this kind of information. The types of collection in the book – microphones and video cameras, TVs that watch us – are nothing compared to what we have available today. We have sensors in our pockets that track us everywhere we go. Think about what this means for the privacy of the average person.

A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves; an unrecorded, unanalyzed thought.

And that’s a problem because privacy matters, privacy is what allows us to determine who we are and who we want to be.

Earlier this month, Snowden talked about smartphone snooping in a second plea to Brazil for asylum, an unsuccessful bid in which he offered to help uncover US surveillance of South America.

Tomorrow’s brief speech, presumably filmed in or near his apartment in Moscow, coincides nicely with an interview he gave the Washington Post, published yesterday. In that article, the former intelligence agency contractor turned leaker declared his mission “accomplished” – allowing him to now move on to the job of rebuilding his shattered life or shift his position from source to full-time activist – or both, we surmise.

Snowden told WaPo journalist Barton Gellman that he had lobbied within the NSA against the internet dragnets, adding: “All I wanted was for the public to be able to have a say in how they are governed. I am still working for the NSA right now. They are the only ones who don’t realize it.”

And he concludes in his Channel 4 message:

The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it.

Together we can find a better balance, end mass surveillance and remind the government that if it really wants to know how we feel, asking is always cheaper than spying.

On the subject of Snowden’s internal protests to bosses, NSA spokeswoman Vanee Vines told the Post: “We have not found any evidence to support Mr Snowden’s contention that he brought these matters to anyone’s attention.”

But if there’s one thing Snowden has right now, it’s attention – online, in print, on the television, and in the courts. ®

Bootnote

One thing to emerge from the Post interview is the reminder that high-tech spying is not just about cracking encryption, compromising chipsets, tapping internet backbone fibre, intercepting data-center communications, and so on. Even the most secure links in the world will be undone by poor OPSEC, which will be exploited by agents.

“People must communicate,” US Director of National Intelligence James Clapper reportedly said during a briefing, according to the WaPo. “They will make mistakes, and we will exploit them.”

2014 predictions: Top technology trends

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/24/snowden_channel_4_christmas_message/

SSCC 127 – Target, Microsoft, Apple, Gmail…and some amazing acoustics [PODCAST]

SSCC 127 – Target, Microsoft, Apple, Gmail…and some amazing acoustics [PODCAST]

F-Secure won’t speak at imperialist lackey RSA’s 2014 conference

Quick guide to disaster recovery in the cloud

Fallout from the allegation that RSA helped the NSA undermine crytpography standards is spreading, with Finnish security vendor F-Secure uninviting itself from the 2014 edition of RSA’s eponymous conference.

The reason, says F-Secure’s chief research officer Mikko Hypponen, is that RSA is an imperialist running dog. His strongly-worded missive addressed to EMC’s Joe Tucci and RSA’s Art Coviello says he won’t show at RSA and won’t deliver his planned speech titled “Governments as Malware Authors” at RSA 2014.


His reasoning for the cancellation is as follows:

“I don’t really expect your multibillion dollar company or your multimillion dollar conference to suffer as a result of your deals with the NSA. In fact, I’m not expecting other conference speakers to cancel. Most of your speakers are american anyway – why would they care about surveillance that’s not targeted at them but at non-americans. Surveillance operations from the US intelligence agencies are targeted at foreigners. However I’m a foreigner. And I’m withdrawing my support from your event.”

Hypponen’s being a little disingenuous, because while RSA appears to have done something at the NSA’s behest, the wider Snowden-derived scandal reveals that the USA has surveilled its own citizens as well as foreigners. If RSA has indeed fiddled crypto, as is alleged, that effort would hav helped domestic and global scrying.

But Hyponnen’s not alone in thinking a boycott of US technology concerns is apt: our own Trevor Pott made just such a call back in June. ®

2014 predictions: Top technology trends

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/24/fsecure_wont_speak_at_imperialist_lackey_rsas_conference/

F-Secure won’t speak at imperialist lackey RSA’s 2014 conference

Quick guide to disaster recovery in the cloud

Fallout from the allegation that RSA helped the NSA undermine crytpography standards is spreading, with Finnish security vendor F-Secure uninviting itself from the 2014 edition of RSA’s eponymous conference.

The reason, says F-Secure’s chief research officer Mikko Hypponen, is that RSA is an imperialist running dog. His strongly-worded missive addressed to EMC’s Joe Tucci and RSA’s Art Coviello says he won’t show at RSA and won’t deliver his planned speech titled “Governments as Malware Authors” at RSA 2014.


His reasoning for the cancellation is as follows:

“I don’t really expect your multibillion dollar company or your multimillion dollar conference to suffer as a result of your deals with the NSA. In fact, I’m not expecting other conference speakers to cancel. Most of your speakers are american anyway – why would they care about surveillance that’s not targeted at them but at non-americans. Surveillance operations from the US intelligence agencies are targeted at foreigners. However I’m a foreigner. And I’m withdrawing my support from your event.”

Hypponen’s being a little disingenuous, because while RSA appears to have done something at the NSA’s behest, the wider Snowden-derived scandal reveals that the USA has surveilled its own citizens as well as foreigners. If RSA has indeed fiddled crypto, as is alleged, that effort would hav helped domestic and global scrying.

But Hyponnen’s not alone in thinking a boycott of US technology concerns is apt: our own Trevor Pott made just such a call back in June. ®

2014 predictions: Top technology trends

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/24/fsecure_wont_speak_at_imperialist_lackey_rsas_conference/

Target Breach Should Spur POS Security, PCI 3.0 Awareness

The breach of cardholder data for 40 million Target customers that’s been speculated to have been triggered by attacks against Target’s point-of-sale (POS) systems has served as prime example for why security professionals have pushed for improved POS and payment application security in the last few years. And with increased scrutiny expected by the payment card brands on POS and payment application security as a result of more stringent standards written into PCI DSS 3.0 and PA DSS 3.0, Target’s breach serves as further reminder for why POS systems need to be on retailers’ immediate-term radar, experts say.

“There are some sophisticated attackers that understand payment processing and possess the high level of hacking skills needed to break into larger, more secure victims,” says Lucas Zaichkowsky, enterprise defense architect at AccessData.

According to Chris Strand, director of compliance for Bit9, the difference between the Target attack and most traditional forms of skimming attacks that attack individual POS devices is the sweeping nature of data collection across a whole network of devices. Rather than physically tampering with devices, attackers are going to be looking for a path of least resistance.

“This is a common type of attack that we’re going to see more and more prevalent because the attackers will take the path of least resistance and in this case, they’re realizing that these pos systems are not protected from a vulnerability perspective,” Strand says. “The fact is that the current security mechanisms they’re using to guard the internals of these POS systems is vastly inadequate to protect the inner systems and software running on these things.”

In addition to the scale of the attack and volume of cardholder data taken, also troubling was the depth of that data, which included track data.

“Loss of the track information from the credit cards is particularly nasty as it can allow for card cloning,” says James Lyne, global head of security research at Sophos. “That said, just the cardholder’s name, card and security code has the potential for widespread online ordering fraud which can be particularly nasty considering we’re in the midst of the holiday season.”

Lyne says he believes the Target breach points to poor architectural and business practices.

“It is critical that organizations handling such data take steps to protect it–such large volumes of data should never be accessible by one user or process—and should be encrypted to segment the data and should be detected if an export of such size occurs,” Lyne says.

[Are you using your human sensors? See Using The Human Perimeter To Detect Outside Attacks.]

According to experts with SecureState, a PCI Forensic Investigator, they believe that as further details emerge it will be shown that Target was not compliant PCI standards. Part of the issue, says BLANK, could be that Target’s custom developed payment application was not up to par with PA DSS requirements.

“For a hacker to be able to infiltrate Target’s network and access the POS application several PCI-DSS and PA-DSS controls must not have been implemented effectively. Thus, Target was not compliant during the time of the breach,” says. Ken Stasiak, CEO of SecureState. “How can I be so sure? We handle these investigations for the payment card brands and in all of the investigations we performed the merchant was not compliant to PCI-DSS controls during a breach.”

But many security insiders have noted that Target has a particularly secure information security practice—they point to its fast discovery and disclosure of the breach as testament to that—and some wonder what the other factors at play may have been.

“As Target is known to encrypt wireless transmission between the point-of-sale terminal and the wireless router, intercepting the personally identifiable information must have happened elsewhere in the processing chain,” says Girish Bhat, senior product manager at Wave Systems. “To carry an attack of this magnitude during the busiest holiday season is extremely difficult and may have involved multiple insiders.”

Regardless of the intricacies of the cause of the Target breach, the ultimate lesson is that organizations need to pay greater attention to the POS-related changes put forward by the PCI Security Standards Council.

“The security controls that merchants are using to meet the requirements on those POS systems are being highly scrutinized by the standard,” Strand says. “If you read through the standard, the overarching theme is to take a proactive stance when you implement your security controls for guard these systems. That is going to cause merchants to go out and say we need to re-address this. In the time being, I think we’re going to see more breaches like the recent Target breach.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/risk/target-breach-should-spur-pos-security-p/240164960