STE WILLIAMS

Is your child a victim of identity theft?

The Equifax breach was well over half a year ago now, but I’ve had a nagging worry all the while since then: Was my child’s data affected in that breach, and how could I possibly find out for sure?

After the Equifax breach, a number of people who had never even heard of the credit monitoring bureau (including people living outside of the U.S.) found out their personal data had been compromised – an unpleasant discovery, to say the least. Something that was and still is quite unclear after the breach is if any data belonging to children had been leaked.

The official line from Equifax or any other credit bureau is that children should never be affected by a data breach like this, as children are not supposed to have any kind of credit until they become legal adults, which in the U.S. is at 18 years of age. However, some parents checked the Equifax breach website to see if their child’s data was leaked, and alarmingly many people got a notice that their child’s social security number “may” have been involved – with no easy way to investigate further.

That operative word, “may,” is unnerving – this is not an issue you want to let sit and fester with unknown status, as child identities are a very tempting blank slate for criminals to misuse. Most people won’t even think of their child’s credit until the child becomes an adult. However, finding out someone has already established your child’s credit for them is a nightmare to try and clean up after years of damage already done – you can’t just scrap the old credit profile and/or social security number and get a new one.

The reason for the ambiguity from Equifax’s point of view is that in most cases there should be no child credit report or any record of the child at all in the hands of a credit bureau in the first place (though some parents add their teenager as an authorized user to a credit card the parent owns, which does result in the teenager having a legitimate credit report). So if a credit bureau has a credit report for your child and that data has been breached, unfortunately, you now have two problems.

Finding out if someone has your child’s data takes a little investigation work, but it is absolutely doable. Someone who has unauthorized access to a social security number won’t just sit on it, they’ll use it – to rack up bills, take out loans – and that will leave a paper trail. For an adult, you want to scour your paper trail/credit report for signs of foul play; however, in the case of a child, the complete absence of a paper trail is a good sign.

How to check if your child has a credit report

As noted above, unless you have explicitly taken actions to give your child credit, they should not have any kind of credit report at all. If you’ve added your teen as an authorized user to a credit card, they will have a credit report, and you should take the same steps you would as an adult – keep an eye on it for activity and credit checks that you don’t recognize, and place a freeze if you suspect foul play.

In all other cases, to find out if a credit report exists for your child, you’ll need to contact each credit bureau one by one – Equifax, TransUnion, and Experian. Only the parent or legal guardian of a child can do this. Prepare yourself for a lot of paperwork and waiting time on the phone, this is unfortunately not a quick process. You’ll need plenty of documentation on your side to prove you are who you claim to be, and that you are the child’s parent or guardian.

If you get the news that a credit report does exist for your child, you can:

  • Demand that all activity relating to your child’s name and social security number be cleared, including credit inquiries, activity, and the like.
  • Tell the credit bureau to immediately place a fraud alert on your child’s credit report – usually you only need to do this once as one credit bureau will notify the other two, but you may want to confirm this yourself.
  • Place a complete credit freeze on the child’s credit (not possible in all states yet).

Some credit bureaus will do all of this for you for free, others may still charge you a nominal fee, others may only do it for you if you live in a state that requires it – it depends both on the credit bureau and where you live. (Infuriatingly, there’s no uniform federal law about this yet.)

Keep a record of all phone calls you make, and if possible send requests to the bureaus in writing. The FTC, which has plenty of helpful resources for anyone in the U.S. who may have been the victim of identity theft, also recommends filing a fraud report with them, and if necessary, filing a report with your local police station that fraud has occurred.

Prevention is the best cure

The reality is that stranger-danger identity theft with child data is exceedingly uncommon. Most of the time, the people stealing a child’s identity and sensitive information to commit crimes are already in the child’s life: family and close friends. Regardless of who perpetrates the crime, it’s good to trust your gut if something feels off, especially if you see signs that your child’s identity may have been misused. For example, if you start receiving mail or phone calls in your child’s name about services, unpaid bills or collections, something is amiss.

The best thing you can do to keep your child’s identity safe is to be discriminating about who has access to their sensitive data in the first place. Don’t be afraid to challenge anyone asking for your child’s data and demand to know how they plan on keeping it safe. Mitigating your child’s chances of being the victim of identity theft takes vigilance on the part of the parent, and while it’s not the easiest process, it is doable.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/sf1v6dLq25E/

World’s cyber attacks hit us much harder in past year – major infosec chief survey

Cyber security breaches were twice as severe in the past year, with total financial losses reaching $500,000 (£356,00) per business, according to an extensive survey of CISOs across the globe.

Some 32 per cent of breaches affected more than half of an organisation’s systems in 2017, up from 15 per cent the previous year, according to 3,600 security bods surveyed in Cisco’s annual cyber security report.

Financial damage included lost revenue, customers, opportunities, and out-of-pocket costs, said Switchzilla. Mark Weir, director of cybersecurity at Cisco UK Ireland told The Register the figure of $500,000 “could even be slightly conservative”.

The survey found one-fifth of UK respondents identified between 250,000 and 500,000 security alerts a day in 2017.

Increased threats could also be expensive for businesses in other ways. Last month the UK government warned that critical infrastructure firms could face fines of up to £17m if they do not have adequate cybersecurity measures in place.

Weir said the increase in severity of attacks is a “worrying trend” but added some of the measures that are being put in place could take a while to have an affect.

One such tactic is the use of multiple security products to try to tackle the threat. Some 25 per cent of security professionals said they used products from 11 to 20 vendors, compared with 18 per cent in the previous year.

Weir noted malware and ransomware attacks have become more significant over the last 12 to 18 months, with denial-of-service attacks also becoming increasingly sophisticated, and impacting the bottom line.

He said email encryption is also on the rise – which creates more challenges and confusion when trying to identify and monitor potential threats.

Cisco threat researchers observed a more than threefold increase in encrypted network communication used by inspected malware samples over a 12-month period. “Our analysis of more than 400,000 malicious binaries found that about 70 percent had used at least some encryption as of October 2017,” the report stated.

Another major challenge spotted was patching systems – as seen during the outbreak of the WannaCry ransomware cryptoworm last year. Weir said that is particularly difficult when organisations have complex estates with multiple legacy systems that can no longer be patched.

He said application level security was a key area. “I still think is a real weakness across our entire industry. Some companies do it well, but not anywhere enough in the numbers needed to protect against attack.”

As such companies could see an increase in their financial and reputational loss next year.

“We talk about the threats of ransomware, malware, application level security and IoT threat… but the reality is these people will attack wherever they see weakness. So organisations must have defences across the piece.

“I think the severity of some of those attacks will increase. Security strategy has to start with protecting data… the preservation and security of that data is critical.”

“Not surprisingly the people that propagate these attacks are very well funded, and well resourced. They work collaboratively, and I think as an industry we need to [do the same],” he added. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/21/severity_of_cyber_attacks_have_doubled_over_last_year_finds_major_ciso_survey/

Getting Started with IoT Security in Healthcare

What’s This?

There’s a hazard that comes with introducing any new element into patient care whether it’s a new drug or a connected device. These four steps will help keep patients safe.

It’s estimated that by 2025, more than 30 percent of all Internet of Things (IoT) devices will be dedicated to the realm of healthcare – more than in retail, transportation and the personal security sectors combined. Already today, practitioners are using IoT tech to conduct portable monitoring, enact electronic record keeping initiatives, and to apply drug safeguards – all efforts that are streamlining operations and delivering safer, more comprehensive care to patients.

Through 2018, the healthcare industry is expected to save more than $100 billion in operating costs thanks to connected devices. But operational expediency is only part of the larger story of how IoT tech is having such a huge impact on this industry.

There’s a hazard that comes with introducing any new element into patient care whether that’s a new drug or a connected device. Consequently, caregivers need to view new technologies through the same lens they do with the medicines or techniques they adopt by only changing methods and tools once they’ve been vetted and assured to actual deliver a benefit to patients.

But it’s a bit more complicated where healthcare IoT is involved since it’s not just the ability of these devices to operate effectively that’s a concern for patients and doctors. There are also serious questions around how secure these IoT tools are from outside threats, threats that could jeopardize patients’ wellbeing and personal security.

Here are four steps security teams can should follow before introducing IoT devices onto their healthcare networks.

Step 1: Decide whether you want devices to use the same connectivity of the larger healthcare network, or if it makes sense to architect and manage a dedicated IoT network to support these new technologies. Depending on the scope of the existing network, it may be preferable to task a separate IT team with managing the IoT network, leveraging dedicated secure web gateways and defenses to parse the “high-volume” traffic that characterize IoT communications.

Step 2: Before introducing a device onto the network, teams should ensure that they are installing a two-factor authentication system, which is a standard for meeting HIPAA compliance as well as a best practice in the realm of Health IT.

Step 3: Intensive encryption is a must for IoT, especially considering the spontaneous nature of IoT communications, in that a device could be at rest for long periods of time before suddenly “waking up” and sharing data with a beacon or sensor in transit. As we explained in a recent article on the topic, full disk encryption won’t cut because it doesn’t protect data in motion. This leaves important data vulnerable to bad actors.

Step 4: While an inventory of all the IoT devices on the network is a must, teams would be wise to take it a step further by flavoring this list with greater context. As IoT adoption ramps up, security teams should be able to easily reference where data resides in a “data bible,” or “data dictionary” showing where data originates, where it travels and the transmission capabilities of each device.

Healthcare IoT can be transformative in seemingly endless ways, from automating mundane tasks to simplifying the most complicated ones. But these tools are only as useful as they are secure, and implementing best practices on day one is the smoothest path to reaping IoT’s rewards. 

Chris Park brings more than 13 years of experience in corporate network security to his position as CIO at iboss, where he is responsible for creating and driving the company’s IT strategy. As resident expert in all aspects of iboss solutions and infrastructure, Chris is … View Full Bio

Article source: https://www.darkreading.com/partner-perspectives/iboss/getting-started-with-iot-security-in-healthcare/a/d-id/1331090?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

C-Suite Divided Over Security Concerns

Survey shows 60% of CEOs plan to invest the most resources in malware prevention, but CISOs, CIOs, and CTOs are on a different page.

More than 60% of CEOs believe malware is the biggest threat to their organization, but just one-third of CISOs, CIOs, and CTOs agree. 

It’s just one data point in a new study by identity management company Centrify that shows a major disconnect on this and many other security issues between CEOs and their technical officers (TOs), which include CIOs, CTOs and CISOs. 

CEOs and TOs also diverged on whether they knew if their organization had experienced a breach. Only 55% of CEOs say their organization experienced a breach, while 79% of TOs say so. On the technology front, 62% of CEOs say two-factor authentication technologies are difficult to manage, while only 41% of TOs concur with that statement. 

“Part of the problem is that the technical people tend to try to keep the breach quiet,” says Tom Kemp, CEO at Centrify. “I think overall, the TOs need to do a better job managing up, because with SEC regulations and various state breach notification regulations, organizations really do have to report if they have been breached today.”

Kemp points out that 42% of TOs point to identity breaches as one of the primary threats to their organizations. And 68% of executives whose companies experienced significant breaches indicate it would most likely have been prevented by either privileged user identity and access management or user identity assurance. Only 8% of all executives whose companies experienced a significant breach say that anti-malware technology would have prevented the more significant breaches with serious consequences.

Frank Dickson, an IDC analyst who focuses on identity and access management, points out that the 2017 Verizon Data Breach Investigations Report found that 81% of hacking-related breaches leveraged stolen and/or weak passwords.

“Our goal is not to eliminate malware, our goal is to eliminate breaches,” Dickson says. “By strengthening authentication, it lets us build security into the network,” and potentially eliminate the vast majority of breaches.

Lawrence Orans, a research vice president at Gartner who focuses on network security, says he doesn’t think it’s helpful to set security up as a choice between identity management versus malware detection.

“For example, malware could be used to steal credentials and execute an even broader attack,” he says. “And it actually makes sense that there would be a disconnect between the CEO’s understanding of new security technologies versus the TO’s: that’s what the CEO has the technical people for in the first place.”

Centrify’s Kemp maintains that TOs need to educate their CEOs on identity management issues, citing the three main tenets of so-called zero trust security:

  • Verify users. Companies can do this with single sign-on software that’s layered in with two-factor authentication.
  • Validate devices. Have a procedure for determining if the devices are enrolled with the IT department with the right OS versions, patch levels, and antivirus software. IT must also check past usage, including a user’s geography. (A user can’t be in New York one minute, then San Jose five minutes later).
  • Limit access and privileges. Companies should move to a least-privilege model in which users only gain access to a system if they need it for their jobs, and only for a defined time period.

The study was based on a survey of 800 senior executives conducted in November 2017 by Dow Jones Customer Intelligence, a unit of the Wall Street Journal/Dow Jones Advertising Department. More than 75% of the executives surveyed are CEOs, CTOs or technical officers such as CIOs, CTOs and CISOs; the rest are their direct reports.

Related Content:

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: https://www.darkreading.com/endpoint/c-suite-divided-over-security-concerns/d/d-id/1331098?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Bad news: 43% of login attempts ‘malicious’ Good news: Er, umm…

An extraordinary 43 per cent of all attempted online account logins are malicious, Akamai claims in its latest internet security report.

“Credential abuse” is an increasingly popular line of attack, thanks in large part to the readily availability of huge user/password databases that has been stolen and are sold online.

Akamai identifies two main types of such attacks: “bursty, high-speed login attempts” to break into people’s accounts, and “low and slow attempts to avoid apprehension by spreading login tries across longer time periods,” again to gain unauthorized access to profiles and systems.

The web hosting giant even reckons it may be underestimating the problem because it only gathered data from websites that use an email address as a username, which included no less than six billion login attempts over two months. Banks typically require you to select a username rather than an email and are often the most persistent focus of attackers attention, for obvious reasons, so are likely missing from this dataset.

In addition to detailing credential abuse, Akamai’s quarterly State of the Net report, out this week, identifies mobile devices, the internet of things, and APIs as the biggest, and somewhat bleeding obvious, new threats to online security.

API attacks more than doubled in the last quarter, we’re told. Akamai has also noticed a new trend in miscreants breaking into systems in order to use their computing power for activities including mining cryptocurrencies, rather than simply stealing information.

“We are seeing a new trend of enterprise systems being targeted, not only to steal their data, but to steal their computing resources, perhaps driven in part by the rise of cryptocurrencies and the potential value of mining resources,” the report notes.

And now for the… oh well

As for the good news – there is no good news. Denial-of-service and web app attacks continue to increase as the number of vulnerabilities identified grows over time. Criminals continue to make the most from “long-standing, tried-and-true attack vectors,” the report notes. That said, DDoS were down one per cent from the previous quarter so that’s… good?

As to how to protect yourself or your company, the main advice is – hold on to your hats – to patch existing, known flaws.

“Many of today’s attacks still leverage well-known vulnerabilities – flaws that have been documented and patched, and can be prevented,” the report stated, while banging its head on the table.

It goes on, slowly and clearly if the hope that people are actually listening, “efforts to cover the basics – secure coding practices, timely patching, proper device configuration, and prudent password management, would go a long way towards fortifying defenses.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/21/login_attempts_malicious_akamai/

Researcher to Release Free Attack Obfuscation Tool

Cybercrime gang FIN7, aka Carbanak, spotted hiding behind another Windows function, according to research to be presented at Black Hat Asia next month.

Advanced nation-state and cybercrime groups increasingly are hiding behind legitimate Microsoft Windows functions to mask their hacks – and their latest method ups the ante in abuses of the basic command prompt.

The FIN7, aka Carbanak, cybercrime gang known for attacking banks and most recently, the hospitality and restaurant industries, last year was spotted by FireEye  exploiting the cmd.exe Windows binary. The unique use of their technique inspired Daniel Bohannon, senior applied security researcher for Mandiant, a FireEye company, to create a tool that helps organizations better defend against attackers who hide their payloads behind the legitimate Windows commands.

Bohannon will release his new Invoke-DOSfuscation framework tool next month at Black Hat Asia in Singapore, where he will present his research on how attackers like FIN7 use the relatively basic cmd.exe to slip malware into their targets’ systems. 

“The way they used the [command process] blew my mind, so from that point forward, I started looking at command-execution obfuscation,” Bohannon says of FIN7’s activity.

The command prompt obfuscation method is another twist in what researchers refer to as “living off the land,” or fileless malware attacks, where attackers use native Windows tools on a victim’s machine to hide their activity and malware from detection-based security tools and whitelisting. “Attackers don’t need to drop custom malware on disk. They can use native tools and run everything in memory,” Bohannon explains.

PowerShell and Windows Management Instrumentation (WMI) tools were used in more than half of all attacks last year, according to a recent report from Carbon Black. Many organizations can only detect attacks when the file is written to the disk, so in-memory attacks using legitimate Windows tools mostly go unnoticed. Attackers also use the tools to move around and laterally to avoid getting caught in the act.

Living off the land attacks can span the initial intrusion to the full compromise of a system, Bohannon notes. An attacker can send a malicious Word file via email that spawns commands and PowerShell execution, he says.

In Command

In his Black Hat presentation next month, Bohannon will detail the entire process he pieced together on how attackers such as FIN7 are using the basic command-line function to hide their activity. FIN7 employs a string removal/replacement method as well as some unique encoding methods in system memory, using cmd.exe.

“I’m sharing the whole process because defenders need to be informed about why these [techniques] work. They [attackers] do a lot that’s never seen [being] used in the wild, and I expect them to change” their tactics once the Invoke-DOSfuscation gets released, he says.

The caret (^) and quote-mark (“”) symbols, for example, are placed in the command string to obfuscate their payloads. So if an attacker inserts quote marks around his malicious string, it evades detection because it “breaks rigid detection rules,” Bohannon explains.

FIN7 traditionally had been known for hiding LNK shortcut files in DOCX and RTF documents, which allowed their phishing attacks to slip by most traditional security measures. Bohannon and his team last June discovered the group also hiding behind JavaScript and cmd.exe. The attackers tweaked the string to “Wor” + “d.Application” in stead of “Word.Application,” for example, and other replacement characters in cmd.exe in order to fly under the radar.

Bohannon says his homegrown Invoke-DOSfuscation tool lets intrusion detection investigators and red teams perform the steps attackers are taking to hide their payloads behind cmd.exe. It allows them to input any cmd.ex or PowerShell command and then create different levels of obfuscated output commands. That in turn helps them improve their detection methods, he says. “A defender can take any command and obfuscate it. They are able to plug in detection rules, and [check] ‘did I detect all these commands?'”

If not, they can tune their detection rules, he says.

“[It] allows defenders to generate hundreds and even thousands of unique obfuscated commands to test their defenses against,” basically automating the detecting testing process, he says. The goal is to get organizations “in front of” the command obfuscation method before it hits them.

Bohannon also previously released other PowerShell obfuscation frameworks, including Invoke-Obfuscation and Invoke-CradleCrafter, and a detection tool, Revoke-Obfuscation. The new Invoke-DOSfuscation tool represents his first cmd.exe obfuscation tool. “Invoke-DOSfuscation automates the application of numerous kinds and levels of obfuscation to any arbitrary input cmd.exe command,” he notes.

Meanwhile, advanced hacking teams are using more open-source tools both to hide in plain sight, and to save on the labor and cost of writing custom malware. “It’s fascinating seeing nation-state actors using off-the-shelf open-source tooling because … they don’t have to spend RD and build custom stuff” when they go open-source, Mandiant’s Bohannon says.

 

 

See Mandiant’s Daniel Bohannon demonstrate these advanced obfuscation methods at Black Hat Asia next month. Go here for more information on the conference and to register.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/researcher-to-release-free-attack-obfuscation-tool/d/d-id/1331093?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Meltdown/Spectre: The First Large-Scale Example of a ‘Genetic’ Threat

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority.

In the security industry, we all tire of hearing how the latest malware or vulnerability is “the big one.” Previous widely publicized vulnerabilities — such as Heartbleed or Shellshock — could be patched and managed with relative ease, though that’s still a daunting task for some large enterprises because of the number of systems that must be evaluated.

While superficially just another large vulnerability, Meltdown and Spectre represent an entirely new class of threat that dramatically escalates the need for effective security programs and practices.

These vulnerabilities will likely take years for large organizations to fully remediate, if they ever are before being made obsolete by equipment turnover. Businesses are struggling to understand the true scope of the issue. They are trying to decipher conflicting guidance from vendors, as well as manage the impact the patches have on applications.

With Meltdown and Spectre, we are witnessing the next evolution in security vulnerabilities and threats, one with a scope and spread that is nearly impossible to estimate today.

From Bacterial to Genetic
Malware has been rapidly evolving for as long as microprocessors have existed. In the early days, we had what I call “bacterial” threats, because, similar to bacteria, they were self-contained and did damage through multiplication and spreading. These were relatively simple malware — such as Slammer or Blaster — which, while they caused widespread disruption, were not too difficult to fix. The growth of malware led to the parallel evolution in tools designed to detect and prevent its execution, such as antivirus and intrusion-detection systems.

As malware evolved, the emphasis shifted from the direct execution of malicious software to the use of malware to exploit vulnerabilities in operating systems and applications. I call this the “viral” age of threats. Viral threat malware is usually singular and works through the exploitation of vulnerabilities, similar to how viruses infect vulnerable cells and hijack them for their own purposes.

With these viral threats — such as Poodle, Heartbleed, and Shellshock — the emphasis on the protective side led to new tools to understand the IT environment, discover vulnerabilities, and patch them in a timely manner. As the continual stream of publicly announced breaches demonstrates, we still have a long way to go in meeting this basic bar for protecting information and IT-driven business processes.

With Meltdown/Spectre, I believe we have seen our first large-scale example of a “genetic” threat, or a vulnerability in the processing hardware that lies at the heart of our IT ecosystem. The unforeseen consequences of hardware designs have us facing a problem unlike anything we’ve ever seen, not only in scope (almost the entire computing universe), but also in scale (the effort required to remediate these issues).

Fight Back
Hardware and software vendors and researchers are working furiously to try and understand the impact of these vulnerabilities and how to fix them. Early announcements to replace the affected CPU chips have rightfully been supplemented with more practical advice to apply appropriate patches as they’re released. However, that directive hides a host of issues unlike anything seen in dealing with prior vulnerabilities, no matter how widespread.

Addressing the Meltdown/Spectre vulnerabilities will likely require an exponential increase in the level of effort required for remediation, largely due to the number of patches required, the complexity of putting the right patch on the right system, and the testing required to understand the performance and stability impacts of the patches.

We are still in the early stages of this triage. Exploits are actively being developed; in fact, researchers have already found over 130 malware samples designed to exploit Meltdown and Spectre. Companies must focus on building or enhancing the critical aspects of their security program that are needed to address this issue, in particular:

  • Asset management: Beyond knowing what systems are tied to what applications in what locations with what data, companies will likely need to understand what operating systems, CPUs, and possibly motherboards are in use in these systems to apply the right patches to the right systems. In addition, with the extensive use of cloud and SaaS solutions, companies must understand what their vendors are doing in terms of remediation, and the effects this can have on the performance and stability of the applications and business processes they have deployed in the cloud. 
  • Threat and vulnerability management: Companies must leverage threat information channels to keep up-to-date with new vulnerabilities, threats, and countermeasures, so they can apply patches quickly, correctly, and appropriately. Orchestrating the variety of patches across the variety of hardware, operating systems, and CPU models is a complex challenge that makes the simple patches of the past seem like a walk in the park. 
  • Risk management: Continual management of risk is the key to a successful information security program and is vital to the successful remediation of this issue. Beyond the simple calculation of ensuring that the most business-critical systems are patched first, additional consideration needs to be given to possible compensating controls that can be implemented if patches are not available, or have a detrimental impact on system or application performance and stability. These risk calculations need continual updating as the threat profile changes and as exploits for these vulnerabilities are announced.
  • Testing: Because patches addressing Meltdown/Spectre affect the CPU of the systems, organizations need to perform more comprehensive testing than in the past. The traditional approach of a virtualized test environment that is not the same as the production environment may lead to issues where it is impossible to know what effects patch application will have on performance and stability. Creative testing scenarios should be developed to possibly leverage segments of production systems or disaster-recovery systems to test patches properly.

If companies have not elevated the discussion around IT and information security risks and actions to boardroom levels, now is the time. IT health is critical to any modern organization’s success, and Meltdown/Spectre is the perfect example to use in discussing the risks and challenges in cyber-risk management. This function cannot be limited to a “black box” to be managed and cared for with little board- or executive-level oversight. This is a bedrock component to any company’s success, and leaders among technology and security disciplines should have a seat at the table.

Related Content:

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Michael Lines is Vice President, Strategy, Risk, and Compliance Services for Optiv, a security solutions integrator. He is responsible for leading Optiv’s security experts in helping companies develop and run the security programs that meet their business, risk, and … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/meltdown-spectre-the-first-large-scale-example-of-a-genetic-threat/a/d-id/1331071?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

SWIFT Network Used in $2 Million Heist at Indian Bank

The theft at India’s City Union Bank comes on the heels of news that attackers stole $6 million from a Russian bank via SWIFT network last year.

In an attack reminiscent of the one on Bangladesh Bank in 2016, attackers this weekend made $2 million in unauthorized transfers from India’s City Union Bank via the SWIFT financial network, Reuters reports. One of the transfers, for $500,000, was stopped.

The attack comes on the heels of a Friday report that an unnamed Russian bank had suffered a $6 million theft via the SWIFT network last year, and reports last week that insiders at India’s Punjab National Bank had conspired in a $1.8 billion fraud case. 

The unauthorized transfers from City Union Bank – which were being made to lenders in Dubai, Turkey, and China through City Union Bank’s correspondent financial institutions – were discovered by a private lender Saturday. 

City Union’s CEO N. Kamakodi told Reuters there is “so far no evidence of any internal staff involvement,” but said “we are very clear now the account holders are part of this conspiracy.”

The Committe on Payments and Market Infrastructure, in September, called for greater security of inter-bank messaging services like SWIFT.  

For more information, click here.

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/swift-network-used-in-$2-million-heist-at-indian-bank/d/d-id/1331092?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook Aims to Make Security More Social

Facebook’s massive user base creates an opportunity to educate billions on security.

Facebook’s user base of 2.13 billion poses for the social media giant both a challenge and an opportunity to secure a massive number of accounts while also educating users on best security practices. 

Other social media platforms, including LinkedIn, Twitter, and Instagram, also have the chance to enforce and foster strong security among users. But are they capitalizing on that opportunity?

“Getting people to care about their online privacy and security is always a challenge,” says Paul Bischoff, privacy advocate with Comparitech. “Users are responsible for meeting Facebook halfway, but adjusting security and privacy settings is usually an afterthought that most of us put off for far too long.”

It’s an area where most social media companies could stand to improve, says Nick Hayes, senior analyst serving security and risk professionals at Forrester.

“There’s a lot more social networks can be doing for security to help users improve their overall security posture,” he explains. “Looking at the main social networks, there are different aspects of security we should be breaking into.”

Facebook has a broad reach and its two billion users provide insight on how their ongoing security strategy is working. Hayes notes Facebook has done interesting and helpful things to boost user security, such as its early adoption of two-factor authentication.

“The one thing that we’ve definitely learned at the scale of two-billion-plus users is that there’s really no one-size-fits-all approach,” says Scott Dickens, product manager with the Facebook Account Integrity team, who led the redesign of Facebook’s Security Settings page last year.

Redesign with Security in Mind

“There’s a design focus on making sure users can easily identify and find the most important security tools,” Dickens explains. Its facelift included a top-level menu for security and login, and stronger focus on frequently used features.

“Change password,” the most common security function among users, is prioritized at the top so users can more easily access the option to set a cookie to remember their credentials. Most would prefer to access their accounts by tapping a photo of themselves, says Dickens, rather than entering their password every time they log in.

“We try to work on making security settings super easy to understand,” he continues. “We wanted to take away as much jargon as possible and make it accessible to all of our users, not just the security experts.”

For example, he says, Facebook used to use “login approvals” as the term to access multi-factor authentication settings. The team later learned people were searching for those settings by entering “two-factor authentication,” and adjusted its terminology to match user behavior.

“We actually didn’t get that right,” Dickens admits. “It was one of those cases where, in trying to make it accessible, we may not have make it accessible to the audience who wanted to find two-factor authentication.”

Login security continues to be a focus. Last year Facebook acquired Confirm.io, an identity verification startup specializing in tech that confirms user identities using photos of driver’s licenses or other forms of ID. Facebook has so far had little to say about its plans for Confirm and how the new company will fit into its strategy going forward.

“Confirm.io’s technology will most likely be used to improve and expand upon Facebook’s two-factor authentication function,” Bischoff predicts. It could improve security when logging in from unfamiliar devices and recovering accounts when someone loses credentials. “A biometric verification, such as a fingerprint or face scan, could serve as a more secure alternative.”

Facebook’s security initiatives include a new tool, also added in December, which helps verify phishing emails. You can view “recent emails about security and login” from the Security Settings page, where Facebook publishes security-related emails it sends to users. The idea is to prevent people from clicking fake login pages and entering credentials on malicious websites.

“It’s a way to better understand which emails Facebook sent you, versus which mails might look like they’re from Facebook but are not,” says Dickens. This was an area where Facebook noticed other online services taking action, and added the feature to match the rest of the industry.

Balancing Business with Security

Hayes says while these recent security features are key steps, there is more Facebook could do to protect its audience. For example, its emails about account notifications don’t contain much context, a move intended to get people to log into their accounts so they can view new messages. However, if emails had more context, it would be harder for attackers to replicate them.

The goal is to get people back on Facebook’s platform, Hayes continues, pointing to a tricky problem: while the company needs to protect users, it’s also a business that relies on consumer data to profit. The more people on Facebook, the more data and revenue it generates.

Identity and access management is an area where platforms could focus more on protecting users’ connections with followers, social media accounts for brands, and the users interacting with company social accounts, which could put them at risk if compromised, he adds.

“They could be doing a lot more to help people understand where users and followers, and the connections they have with others, are legitimate,” Hayes explains.

A recently added Facebook feature called “Protect,” located in the app’s navigation menu on iOS, redirects users to a download page for VPN service Onavo Protect, which Facebook acquired in 2013. According to the App Store page, Protect warns users when they visit potentially harmful sites. However, it also lets Facebook track users’ activity.

“Like most VPNs, Onavo encrypts all the Internet traffic traveling to or from a device and routes it through an intermediary server in a remote location,” says Bischoff. This does harden security, particularly on public WiFi, and can prevent Internet service providers (ISPs) from monitoring users’ activity.

However, most VPN providers don’t monitor or record users’ traffic. Onavo’s description says it’s used to “improve Facebook products and services, gain insights into the protects and service people value, and build better experiences,” he continues. Instead of ISPs tracking your activity, Facebook will do it instead.

Going forward, Hayes says there is an opportunity for Facebook to be more transparent in identifying security issues, and partner up with security companies to offer additional protection for users who want it. Not everyone has the same risk profile and the same risk tolerance, and people who want tighter security should be able to add it.

Related Content:

 

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: https://www.darkreading.com/endpoint/facebook-aims-to-make-security-more-social-/d/d-id/1331063?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook told to stop tracking users that aren’t logged in

In late 2015, a Belgian court ordered Facebook to stop tracking internet users in the country, even when they were not logged into – or even members – of its site.

Failure to comply within 48 hours would result in a €250,000 a day ($267,000) fine by the Belgian Privacy Commission (BPC), which brought the case.

Last week, in an eerie case of déjà vu all over again, a Belgian court ordered Facebook to stop tracking users not logged into its site or face a fine of €250,000 (now $315,000) per day up to a maximum of €100m. It must also delete data it had gathered from Belgians in this way.

Same issue, same result against Facebook more than two years on – what gives?

The legal answer is Facebook appealed against the 2015 judgement, winning in 2016 on the basis that because Facebook’s European HQ was in Ireland, the company should not be regulated by a court decision made in Belgium.

That appeal has, in turn, now been overturned, leaving the case more or less back at square one. Not surprisingly, Facebook said it will appeal yet again, which means the case trundles on.

The dispute is over the way Facebook is said to have carried out commercial surveillance on internet users who come into contact with the site with, but often without, their explicit consent.

It’s not the only company that does such things, of course, but it has become the European test case for where the acceptable lines should be drawn.

Most Facebook users might expect the company to track what they do on Facebook and other sites while logged into Facebook according to the company’s published ad policy.

What’s less appreciated is that Facebook uses technologies such as cookies, a piece of web code called Facebook Pixel, and even the ‘like’ or ‘share’ social buttons found on countless third-party websites to continue its surveillance across the web.

According to research commissioned by the BPC, this allegedly includes internet users who aren’t even members but merely encounter these features during browsing, or have opted out of tracking.

You can check out any time you like, it seems, but never really leave.

Facebook’s latest response to this accusation:

The cookies and pixels we use are industry standard technologies and enable hundreds of thousands of businesses to grow their businesses and reach customers across the EU.

Which includes consent:

We require any business that uses our technologies to provide clear notice to end-users, and we give people the right to opt-out of having data collected on sites and apps off Facebook being used for ads.

Facebook’s problem is that this isn’t simply a case of an internet superpower being pestered in one country by a small European privacy watchdog – others are on its case too.

A week earlier, Facebook lost a case brought by German consumer organisations alleging its privacy settings were illegal under consumer law.

The company has already committed to turning on new privacy settings to comply with the EU General Data Protection Regulation (GDPR), whose full force will be unleashed this year.

Meanwhile, it is under the cosh over fake news and accusations it allowed itself to be hijacked to influence US elections.

Facebook has faced down many opponents in its time, but an ongoing war with Belgium over its approach to privacy is one it could do without.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/rKN2hzgFYu8/