STE WILLIAMS

Setting the Table for Effective Cybersecurity: 20 Culinary Questions

Even the best chefs will produce an inferior product if they begin with the wrong ingredients.

I love to grill chicken. Aside from the fact that I enjoy the spicing, marinating, and grilling process, I also very much enjoy the results. Unfortunately, sometimes a little bit too much. But what does a chicken barbecue have in common with information security? Let me explain:

  1. Do you have the right ingredients? Even the best chefs will produce an inferior product if they begin with the wrong ingredients. In security, we need to make sure that we have the right data to meet our goals and mitigate the risk we’re most concerned about. With poor data, even the best security teams will struggle to produce results of any value.
  2. Are your ingredients fresh? Data must be right, but it also must be available when needed. A security team that can’t get to the data it needs when it needs it isn’t going to succeed in running security operations or investigating and responding to security incidents.
  3. Did you measure the ingredients properly? A security organization has access to an overwhelming amount of information. Unfortunately, some of that information adds no value to security operations and can have the opposite effect of reducing the effectiveness of the security team.
  4. Do the flavors complement each other and work together to improve taste? A security organization is made up of a number of different teams. Each team has a different function, and each team is important to the overall effectiveness of the security organization. If there are teams that aren’t adding value or that don’t work well with others, it brings everyone down.
  5. Do you have the right kitchen utensils? There are over 2,000 vendors in the security market. Some of them sell technology that will aid you in meeting your goals; others, less so. If a security organization doesn’t focus on acquiring the right technology to assist in meeting goals, it’s much harder for itself to achieve them.
  6. Are you spicing and marinating with the right technique? Even the best tools won’t do an organization any good if they aren’t leveraged properly. It isn’t enough just to install great technology. Technology needs to be configured in line with your operational needs and operated and maintained appropriately.
  7. Are you spicing and marinating for the right amount of time? All technology has a shelf life. As risk, threats, priorities, and business needs change, it would be naive to think that the same approaches and the same types of solutions will continue to fit the bill. Sometimes, an organization needs to take a step back and reassess.
  8. Is the grill at the right temperature? Even the best grill will ruin chicken if not set to the right temperature. Security operations needs to be set up to run efficiently and at the right pace. Otherwise, the organization runs the risk of getting bogged down in activities that don’t add value, or on the flip side, miss important events all together.
  9. Is the heat even? Setting the grill at the right temperature isn’t enough. The heat also needs to be distributed evenly. In security, there are many different activities that need to be given the appropriate attention. If attention shines disproportionately on one or a few activities, it takes away from other important activities.
  10. Are you grilling for the right amount of time? No matter how well you’ve prepared the chicken, if you grill it for too little or too much time, it will not come out well. Similarly, spending too little or too much time on analysis and investigation will lead an organization to jump to conclusions that can’t be substantiated or spend an inordinate amount of time poring over data that won’t lead to any tangible results.
  11. Did you dry out the chicken? There is such a thing as over-investigating an incident. If an incident can be analyzed, investigated, and resolved quickly, it should be.
  12. Did you choose side dishes that go well with the chicken? Security organizations exist first and foremost to mitigate and minimize the information security risk to the business. This involves working together with the business and cultivating cooperative relationships rather than operating in a vacuum or trying to force security on the organization against its will.
  13. Did you choose beverages that go well with the chicken? Business executives and the board need to make security a priority. Otherwise, without proper support, the security organization will be constantly be fighting an uphill battle it can’t win.
  14. Did you ruin your precious spicing and marinating work with sauces? A good security program should stand on its own. A weak one will need to be supplemented.
  15. Did you serve the chicken hot? A security team that provides timely and actionable information to the business serves the business well. The security team that arrives shaking its finger a day late and a dollar short doesn’t do anyone any good.
  16. Was the food ready when the guests arrived? Customers care first and foremost about protecting their data. When they ask how the organization protects their data, they want to feel confident that the organization takes custodianship seriously with the right processes.
  17. Did you invite the right mix of people? Security is a business function that requires the buy-in and collaboration of many different stakeholders: the board, executives, the business, customers, partners, and others. Make sure that the discussion around security is a constructive one that involves the right people at the table.
  18. Does the conversation suit the meal? The organizational conversation around security needs to be one that empowers the business to succeed securely. It can’t be one of security always being the team of “no.” And it also can’t be one of the business doing whatever it wants without any regard to security.
  19. Is there enough food for everyone? Resources are always constrained within a security organization. Projects, assets, and human resources need to be focused on value-added activities that can be sustained over time.
  20. Is there dessert? If the members of a security organization enjoy working together, work efficiently and effectively toward mitigating risk, and are innovative in their approach to security, that’s pretty much the icing on the cake.

Related Content:

Josh (Twitter: @ananalytical) is an experienced information security leader with broad experience building and running Security Operations Centers (SOCs). Josh is currently co-founder and chief product officer at IDRRA and also serves as security advisor to ExtraHop. Prior to … View Full Bio

Article source: https://www.darkreading.com/perimeter/setting-the-table-for-effective-cybersecurity-20-culinary-questions/a/d-id/1333471?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cybercrime Is World’s Biggest Criminal Growth Industry

The toll from cybercrime is expected to pass $6 trillion in the next three years, according to a new report.

According to a new report, no crime is growing faster in the US than cybercrime, and it is increasing in size, sophistication, and cost.

The “Official 2019 Annual Cybercrime Report,” is based on research conducted by Cybersecurity Ventures and sponsored by Herjavec Group. It predicts that cybercrime will cost companies across the world $6 trillion annually by 2021, increasing from $3 trillion in 2015.

The report notes this will make cybercrime more profitable than the combined global trade of all illegal drugs and represents “the greatest transfer of economic wealth in history.”

On the defensive side, the report predicts more than $1 trillion will be spent globally on cybersecurity between 2017 and 2021. It also will require 3.4 million workers by 2021, up from 1 million in 2014. That growth will keep the cybersecurity unemployment rate hovering near 0%, according to the report.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/cybercrime-is-worlds-biggest-criminal-growth-industry/d/d-id/1333485?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business

Enterprises are struggling with familiar old security challenges as a result, new survey shows.

Many organizations are still struggling to adopt a more risk-focused approach to cybersecurity, although the need for it has been recognized for years.

Some familiar issues have been holding them back, including infrastructure complexity, third-party risks, understaffing, resource shortages, and — most significantly — not measuring cyber-risks and their impact on business.

Security vendor Tenable recently commissioned the Ponemon Institute to evaluate how enterprises are measuring and managing cyber-risk.

The poll of 2,410 IT and security practitioners in the US and other countries showed that a depressingly large number of organizations are continuing to experience business-disrupting cyber incidents — some of them multiple times over a relatively short time. Ninety-one percent of the companies surveyed reported experiencing a damaging cyberattack over the past two years; 60% had two or more.

Thirty-one percent experienced a data breach involving 10,000 or more customer or employee records in the last two years. A substantially larger 52% — more than half of all organizations surveyed — expect they’ll experience a breach of this magnitude in 2019.

“At a time when business-disrupting cyber events are impacting almost all organizations, CISOs are unable to confidently quantify cyber-risk’s impact to business operations,” says Bob Huber, CISO of Tenable. “This is leaving the C-suite and boards of directors without actionable insight to make decisions” to alleviate business risk.

The Tenable survey showed that, with a couple of exceptions, the threats that organizations are most worried about are the same as they have been for the past several years. The top concerns this year were malware, with 48% saying they had experienced at least one malware attack in the past two years; third-party risks (41%); and leakage of emails and other business confidential information (34%).

Worries over some threats, however, appear to be spiking. Sixty-four percent — nearly two-thirds — ranked third-party risks as their top concern for 2019. The number is significantly larger than the 41% that actually reported a security incident involving a third party over the past two years.

Similar spikes were apparent in other areas as well. For example, 56% identified an attack on Internet of Things or operational technology (OT) assets as their biggest cybersecurity concern for 2019, though just 23% reported experiencing an actual attack of this type in the past 24 months. Economic espionage and attacks that disrupt OT infrastructure are also top-of-mind concerns for 2019.

Significantly, for all the hype around nation-state attacks, fewer organizations (13%) expect to experience one in 2019 than the 15% who said they already had become victims of one in the past two years.

The reasons for the overall pessimism appear tied to long-standing factors. Though organizations represented in the survey had 19 employees, on average, involved in vulnerability management, 58% still felt they did not have adequate staffing to scan for vulnerabilities — including publicly disclosed ones — in a timely fashion. Somewhat unsurprisingly, a nearly identical proportion (59%) said they had no set schedule for vulnerability scanning or did not scan at all.

The Tenable/Ponemon survey showed that a substantially high percentage of organizations are struggling to keep pace with the stealth and sophistication of attackers, reduce complexity in their IT security infrastructure, improve third-party controls, and control access to sensitive data.

While such factors have heightened the need for more risk-focused approaches to cybersecurity, Tenable’s survey showed that many organizations are still only just getting there.

Risk Measurement Management: Work in Progress
“While some organizations are making strides in improving their security maturity and mapping cybersecurity strategies to the business, there is still room for improvement,” Huber says.

For example, despite the enormous financial implications of data breaches and other security incidents, many organizations still have a poor understanding of the business costs of cyber-risks.

Less than half of the organizations represented in the survey — some 1,110 — claimed they measured and therefore understood the business impact of cyber-risks. Of that, only 41% were required to report that analysis to their board and business leaders. More than six in 10 did not believe their measures were very accurate.

In general, more respondents claimed to understand the importance of certain key performance indicators in understanding risk than are actually using them. For example, 70% and 64%, respectively, considered metrics about the time to remediate risk and the time to assess cyber-risk as important key performance indicators (KPIs). However, 46% and 49%, respectively, are using them.

The same gap was evident in the use of KPIs to measure the business impact of a cyber incident. Sixty-eight percent believed it was important to have a way to measure loss of revenue resulting from a cyber incident, but only 56% actually are using KPIs to do that. Seventy percent said KPIs for measuring loss of productivity were critical even though only 48% are actually using them.

Exacerbating the situation is the fact that the KPIs that organizations are using are designed for on-premises infrastructure and therefore are inadequate for current environments that include a mix of traditional IT, cloud, IoT, containers, and OT, Huber says.

Most KPIs are too technology focused and don’t fully take into account the financial and business implications, Huber says. Often, the metrics are tactical rather than strategic in nature and are not very effective at helping organizations mitigate risk, he says.

“Put another way, current cyber KPIs don’t consider business outcomes and fall far short of reflecting digital business and digital transformation,” Huber notes. “The most common KPIs for cyber-risk and business risk don’t correlate right now, and that’s a gap.”

While CISOs and other security leaders are typically responsible for deploying patches and managing vulnerabilities, they have relatively less influence in determining investments and strategies for vulnerability management. CISOs are most involved in evaluating cyber-risk at only 17% of the organizations represented in the survey — compared with CIOs at 36%.

“In the digital era, cyber-risk is now business risk, and that means CISOs must be able to measure their exposure and map it back to business outcomes,” Huber says.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/despite-breaches-many-organizations-struggle-to-quantify-cyber-risks-to-business-/d/d-id/1333486?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Universities Get Schooled by Hackers

Colleges and universities are prime targets for criminals due to huge sets of personal information and security that is weaker than in many businesses.

As university students leave campus for holiday breaks, they may carry more than new knowledge home to family and friends. Recent research points out that colleges and universities are coming under more aggressive security attacks while their defenses struggle to keep up with growing demand.

In “Defending Networks at Higher Learning Institutions — Heroes Needed,” a report issued earlier this fall, researchers at InfoBlox pointed out that the complexity of the university network environment makes effective defense difficult. “Years ago we planned ‘one jack per pillow,’ and that’s changed in such a short period of time,” says Victor Danevich, Infoblox CTO. He believes that each student on campus represents approximately seven IP addresses, making most state and many private universities the home of hundreds of thousands of connected devices.

And while the complexity and levels of attacks are growing, the issues in higher education cybersecurity aren’t new. A report released by EdGuards, “A Brief History of Higher Education Insecurity,” walks readers through attacks from 2002 through 2018 to show how hackers have evolved. One of the growing issues is the size of the databases sought and compromised by criminals, with tens to hundreds of thousands of records exfiltrated in attacks on scores of schools.

That evolution is aided by legitimate university network users. More than half of the administrators surveyed by InfoBlox say that 25% of students arrive on campus with their devices carrying malware. “The 25% infected rate shows the devices that students are bringing from home,” Danevich says. “It’s not laptops. It’s IoT devices [and] mobile devices.” For university security teams, the implication is simple. “You can’t take a look at the security once a year. You have to be much more current because it changes so fast,” he explains.

While students are a common infection vector, they are not the ultimate target. “Business applications, such as HR, Financial and Campus Solutions by PeopleSoft or other vendors, are the main target, as they store the most critical data and are vulnerable to both hackers and malicious insiders,” the EdGuards paper states. 

University security teams hamstring themselves when they see security as a traditional perimeter game because new devices and techniques simply bypass classic perimeter defenses, Danevich says. He recommends defense at the network perimeter, in-network control, and thorough, constant monitoring with automated assistance.

“You can put up a blacklist, but now it has to be taken a step farther with a collection of information that’s come from a variety of devices hooked to a SEIM and passed to a Splunk or ArcSight,” he says. Ultimately, he explains, “We need to use more machine learning and be smarter with what we do.”

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/network-and-perimeter-security/universities-get-schooled-by-hackers/d/d-id/1333487?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

US bitcoin bomb threat ransom scam looks like a hoax say FBI, cops

Police departments around the US say they’ve been apprised of emailed bomb threats seeking payment in cryptocurrency or else explosions will ensue.

On Thursday morning, the New York Police Department issued an advisory about an email message being circulated that threatens to detonate a bomb in the recipient’s workplace unless a bitcoin payment is made.

“While this email has been sent to numerous locations, searches have been conducted and NO DEVICES have been found,” the NYPD said via Twitter.

Two hours later, the NYPD said that, while it intends to respond to reports from individuals who have received this message, the threats do not appear to be credible.

Police in Chicago, Illinois, Montgomery County, Maryland, San Francisco, California, Los Angeles, California and Washington, DC, among others, have issued similar statements indicating the emailed threat has been distributed nationwide.

Though it looks to be highly unlikely that any explosives have been planted in conjunction with this bulk bomb mailing, the messages have nonetheless caused widespread disruption because some targeted organizations took precautionary actions such as evacuations or lockdowns.

On Thursday afternoon, the FBI issued a statement: “We are aware of recent bomb threats made in cities around the country, and we remain in touch with our law enforcement partners to provide assistance.”

The federal law enforcement agency urged the public to remain vigilant and report suspicious activities that could threaten public safety. Given the mass distribution of these bomb threats, that’s likely to mean a lot of incoming calls and messages.

George Duke-Cohan. Pic: National Crime Agency

Brit bomb hoax teen who fantasised about being a notorious hacker cops 3 years in jail

READ MORE

Screenshots of different threat message variants have been posted to Twitter and they include different bitcoin addresses where those targeted have been directed to send $20,000 in bitcoin.

The bomb threat notes we’ve reviewed begin with the sort of incorrect use of English common to online extortion and spam schemes: “There is an explosive device (Tetryl) in the building where your company is conducted.”

Other messages posted online are similar but not identical, suggesting an attempt at A/B testing to figure out the most lucrative way to phrase the apparently empty threat.

Ironically, the campaign itself appears to have bombed: No transactions have been recorded yet, at least at the bitcoin addresses we checked.

The notes conclude with a disclaimer: “If an explosion occurred and the authorities notice this message: We arent [sic] a terrorist organization and dont [sic] take any responsibility for explosions in other buildings.”

Investigators may not take the extortionists at their word, given that anti-terror laws are likely to make identifying and extraditing the culprits a bit easier. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/12/14/nationwide_bitcoin_bomb_threat_a_bust/

The fastest, most secure browser? Microsoft Edge apparently

Microsoft may have taken the decision to ditch the Edge’s browser engine for Google’s Chromium too soon.

According to the Security Council of Certificate Authorities (CASC), the current Edge browser is in fact the fastest and more secure browser on the market when it comes to identifying and blocking dodgy websites.

The CASC has put out a set of predictions for 2019 – including the claim that more than 90 per cent of the world’s http traffic will be secured over SSL/TLS in 12 months’ time – but also reviewed where we are in terms in security now.

And, remarkably, it is Edge, rather than Chrome or Firefox that has the, um, edge when it comes to phishing websites.

The industry group gave Edge a “protection score” of 93.6 per cent, compared with just 87.9 per cent for Chrome and 87.0 per cent for Firefox. The score was created by identifying what percentage of phishing sites each browser identified and blocked over time.

Edge succeeded in identifying 98 per cent of phishing sites and the other two just 96 per cent but the key metric was in how fast they did so – because phishers now understand that their sites will be blocked within days and so focus all their efforts into having a big impact as fast as possible.

Edge outperformed Chrome and Firefox when it came to quickly spotting and blocking: It immediately stops 89 per cent of phishing sites in their tracks; some 10 per cent higher Chrome and 12 per cent more than Firefox.

In two days, Edge had closed off 97 per cent of dodgy sites, with Chrome and Firefox trailing with 95 per cent. Even this improved performance isn’t good enough though, complains CASC.

“While browser filters such as Microsoft Smart Screen and Google Safe Browsing do a good job at detecting many phishing sites… most phishing sites are set up and taken down in a matter of hours, not days, this means many thousands of users are not meaningfully protected by browser filters,” it said.

Here phishy phishy

Why does this matter? Because, the CASC warns, while some aspects of browser security are getting better, it expects the number of phishing sites to rocket next year. “We predict the problem of encrypted phishing sites that imitate real websites will get significantly worse in 2019,” it states.

And it has produced an interesting graph showing the number of malware versus phishing sites from 2012 through to this year. The trends are stark: while malware sites peaked at around 600,000 in 2017, the introduction of new security measures has had a significant impact over 2018, pulling them down to around 100,000. By contrast, phishing has taken off: in one year they have doubled in size from 500,000 to over one million.

phishing

Certificates are killing malware but phishers have found a loophole.

“It’s not too dramatic to say there has been an explosion of phishing sites using encryption to trick users,” the CASC notes, flagging recent findings from another study that show phishing sites are using anonymous and free TLS certificates to circumvent security checks – at least for a time.

“This growth in encrypted phishing has primarily occurred via Domain Validated certificates,” the CASC notes. “These certificates can be acquired via automation [and] are anonymous [with] no identity information required.”

It’s not hard to see an incentive in the CASC pointed out the phishing problem: If browsers gave its members’ certificates a higher level of credibility and/or downgraded free alternatives, they would benefit immediately and companies offering free certificates would face a tougher market.

But the point is still valid: we are getting a more secure internet thanks to secure certificates and browsers put up warnings if websites don’t have one, but companies offering free certificates risk undermining that improvement because they have become the focus of online criminals.

Logging

One interesting point in the report: the CASC predicts that in 2019 there will be “a major state-sponsored attack on Certificate Transparency (CT) logs causing Internet outages.”

Image by ART production http://www.shutterstock.com/gallery-3278237p1.html

It’s official. Microsoft pushes Google over the Edge, shifts browser to Chromium engine

READ MORE

That’s referencing Chrome and Safari’s requirement that certificates be logged before they are trusted by the browsers. Firefox has said it will join the initiative soon. In order to smooth things, certificate authorities will “pre log” their certificates before they officially issue them so a website is trusted from day one. But the CASC warns, that makes the log a tempting target.

CT logging represents a “single point-of-failure for websites worldwide,” the CASC warns, “after all, if a website can’t obtain or renew a certificate recognized as logged and therefore ‘trusted’ by the browsers, that website will essentially be brought down and can no longer communicate with users.”

As such, a denial of service attack on the key CT logs are likely to attract “the kind of attack that a state-sponsor could launch for the purpose of shutting down major websites around the world.”

CASC points out that one suspected attack happened just last month, when Google’s CT logs were hit hard for over an hour. Google published its post-mortem on the incident this week and noted that the attack was actually the result of additional traffic generated by it migrating the logs from C++ to Trillian: something that its automated system interpreted as an attack.

Regardless, the point remains the same: CT logs could be a very effective way of disrupting the global internet. The CASC didn’t offer a solution in its post. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/12/13/secure_browser_microsoft_edge/

Fraudster convicted of online banking thefts using… whatever the hell this thing is

Police in London have put away a fraudster who was using a bizarre homemade device to con people out of the contents of their bank accounts.

London’s Metropolitan Police say that 53 year-old Tony Muldowney-Colston (who also goes by Tony Colston-Hayter) has admitted to nine counts of possession of an article for use in fraud and two counts of making or supplying an article for use in fraud. He has been sentenced to 20 months in prison.

One of those devices was this… thing. A home-built mixture of what looks to be AV equipment and a couple numerical input devices.

Fraud device seized by police

Police assure us this is a working device and not a stage prop

Click to enlarge

Police say Muldowney-Colston was using the device to impersonate banks in order to steal customer accounts, but doesn’t go as far as to explain how that worked.

The Telegraph has a bit more detail, explaining that the device altered Muldowney-Colston’s voice to allow him to impersonate people of various ages and genders. For example, he could change his voice to pretend to be a female bank official when trying to harvest account details from customers.

Aside from the odd voice machine, a raid of the man’s home yielded more than 100 pieces of evidence, including a hard drive containing deals on passports, ID cards, credit cards, and a spreadsheet with names and contact information for targets.

rice

Alleged crypto-crook CEO cuffed by FBI after $4m investment in his bank bafflingly vanishes

READ MORE

The scheme seemed to work well enough; cops estimate Muldowney–Colston made off with about £500,000 by the time he was caught.

This isn’t Muldowney-Colston’s first brush with the law, to say the least. A known con-man who was convicted for stealing £1.3m from Barclays in 2014, he also gained notoriety in the late 80s for organizing raves and was known as the ‘King of Acid House’ at one point.

“The scam carried out by Muldowney–Colston affected hundreds of people across the UK, and had the potential to affect many more. He is an audacious criminal who only recently was released from prison for carrying out very similar offences,” Met Police Detective Inspector Philip McInerney said.

“This should send a clear message to anyone considering committing crimes of this nature that we have the tools and methods to identify you and bring you to justice.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/12/13/banking_fraud_arrest/

US elections watchdog says it’s OK to spend surplus campaign cash on cybersecurity gear

The US Federal Election Commission has officially voted to allow members of Congress to use their campaign funds on cybersecurity protection.

The ruling means that senators and House reps will be able to purchase things like anti-malware subscriptions, two-factor authentication tokens and secure home routers with leftover campaign money after they take office.

The commission on Thursday voted to approve the draft document (PDF) putting the ruling on paper.

“Yes, you may use campaign funds to pay for cybersecurity protection for your personal devices and accounts,” the FEC said.

“Such expenses fall within the uses defined as permissible under the Act: ordinary and necessary expenses incurred in connection with the duties of the individual as a holder of federal office.”

This after Sen. Ron Wyden (D-OR) wrote in (PDF) to the commission earlier this year seeking clarification on whether it was legal for him to use his campaign’s surplus money to make sure he and his staff were secure from outside attackers.

Steam screenshot

Congressman called out for $1,300 video game binge

READ MORE

“Effectively defending against these threats imposes prohibitive costs and should not be the sole personal financial responsibility of members,” Wyden argued.

The ruling comes ahead of a huge turnover from the 2018 mid-term elections. When the new Congress is sworn in next month, 100 freshmen Reps and 10 Senators will be taking office for their first terms in DC.

While the ruling will create more money to spend on security, experts argue that much more should be done to protect staff from targeted attacks on their accounts and devices.

“The ruling by the FEC allowing leftover campaign funds to purchase additional cybersecurity detection and protection has kept the conversation about election protection going,” Obsidian Security CTO Ben Johnson said.

“We need to ask whether cybersecurity should have to rely on unpredictable leftover funds or if it should be a key component to candidates’ campaign machinery.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/12/13/us_elections_campaign_cybersecurity/

Update now! Microsoft and Adobe’s December 2018 Patch Tuesday is here

If you find patching security flaws strangely satisfying, you’re in luck – Microsoft’s and Adobe’s December Patch Tuesdays have arrived with plenty for the dedicated updater to get stuck into.

Don’t be fooled by the lighter-than-usual Windows patching load, featuring 39 CVE-level vulnerabilities, including nine rated critical.

Buried within these is a dangerous zero-day local privilege escalation flaw across all Windows versions, CVE-2018-8611, reportedly exploited by an APT group since at least October.

A second in the public domain but not yet known to be exploited is CVE-2018-8517, a .NET denial of service flaw.  Both are rated ‘important’, probably because exploiting them depends on other compromises being deployed first.

As for the criticals, watch out for two remote code execution browser vulnerabilities in IE and Edge (CVE-2018-8631) and CVE-2018-8624 respectively), which Microsoft rates as exploit candidates – the same goes for CVE-2018-8628 in PowerPoint.

Windows reboot

An extra complication with the Windows 10 updates this time relates to which version of the OS users are running.

Had all gone to plan with the Windows 10 October 2018 update, many home users could be sure they were using version 1809 – in which case they’d be looking for update KB4471332, bringing the build number to 17763.194.

However, because of unprecedented technical problems, Microsoft delayed its release and inched towards re-release with no fewer than four preview (i.e. test) builds.

And yet, the troubled version 1809 is already in use by two sets of users – those who downloaded it in October but who didn’t (or were unable) to roll back, and anyone signed up to receive preview builds.

It now appears that some users from the wider world are once again being offered 1809 as a regular update in the week they’re getting their Patch Tuesday updates.

If you’re one of the majority still running April’s version 1803, the update you’ll receive is KB4471324, taking the build number to 17134.471.

Life shouldn’t be this complicated, even for Windows users.

Microsoft needed this like a hole in the head in a year that has seen an unusual level of expert disquiet regarding the state of its Windows 10 updates.

Adobe repeats

Arguably, the biggest excitement this month is over at Adobe, which sees the arrival of a fixathon of 87 CVEs for Reader and Acrobat.

The user base has spent rather more time on Adobe fixes since November’s update than seems fashionable, including last week’s out-of-band Flash fix CVE-2018-15982 zero-day flaw on top of a publicly-known Flash critical from late November (CVE-2018-15981).

If you didn’t get these fixes, you’ll find them in this week’s update (corresponding to Adobe’s APSB18-42), which along with the other fixes takes Acrobat and Reader DC to version 2019.010.20064, Acrobat/Reader DC 2017 to 2017.011.30110, and Acrobat/Reader DC Classic to 2015.006.30461.

The ones to watch in this update bonanza are the criticals – 39 in total.

This is a lot of patching after a period when Flash appeared to be sinking under the volume of flaws being found by researchers. It might officially be on its last legs, but it’s looking more and more as if it will go down in a blaze of un-glory.

If this doesn’t motivate users to remove it, perhaps nothing will.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/PuP0R9w6Vfw/

WordPress worms, Android fraud and Flash fails [PODCAST]

In the Naked Security podcast this week:

  • Unpatched WordPress servers plagued by worm
  • Google Play plagued by ad-fraud malware
  • Adobe Flash plagued – can you believe it? – by a new zero-day

With Anna Brading, Paul Ducklin and Mark Stockley.

If you enjoy the podcast, please share it with other people interested in cybersecurity, and give us a vote on iTunes and other podcasting directories.

Listen and rate via iTunes...
Sophos podcasts on Soundcloud...
RSS feed of Sophos podcasts...


Thanks to Purple Planet Music for the opening and closing music.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/XGa-AEF_yqw/