Tuesday, October 11, 2016

#G7 FUNDAMENTAL ELEMENTS OF #CYBERSECURITY FOR THE FINANCIAL SECTOR

Bookmark and Share

Tuesday, October 4, 2016

Think changing your #Yahoo password is enough? Think again…

Like many others, Simon received a notification that his account was included in the breach. Like many others, Simon logged in to his account and changed his password. He then opened his iPhone Mail application since he had configured the app to use his Yahoo account. He expected to be prompted for his new password and was more than a little surprised when he found it was not necessary. Even though he had changed the password associated with his Yahoo account, the phone was still connected.
Upon investigating, it became clear that Yahoo had issued a permanent credential to the device. This credential does not expire and is not revoked when the password changes. In other words, if someone already obtained access to your account and configured the iOS Mail app to use it, they would still have access to the account even after the password changes. What’s worse is that you would likely not even realize someone still has access to your email.
This presents a couple of different problems. First, steps beyond changing your password are not being clearly communicated from Yahoo. This could lead to a situation where millions believe they are protected even though they aren’t. Additionally, even if you are security conscious like Simon and want to review your activity and devices, it’s not easy to find. Associated devices aren’t listed under the “Account Security” tab at all. As shown in Figure 1 (below), the “Account Security” tab has no mention of associated devices.

blog


Figure 1 – Yahoo Security Tab

 The setting actually exists under the “Recent Activity” tab (Figure 2). Here you are able to see which applications are connected to your account with an option to remove them. It’s also interesting to see the apps and devices are just listed by product name – in this case “iOS” – and the date authorized. It’s up to the user to figure out what is legitimate and what’s not.



blgo2








Figure 2 – Yahoo Recent Activity Tab

Looking at the phone settings (Figure 3) is of little help. Looking at the setting shows there is no option via the app to change the password. This is likely by design. When you set up your mail account on the device, it gets permanently credentialed until the credential is revoked through the server.





blgo3



Figure 3 – iPhone Mail Settings
While it’s unfortunate Yahoo’s official advice for securing a hacked Yahoo account makes no mention of checking for or removing associated apps and devices, it definitely should be on your list. In fact, your list should look something like this:
The steps users take after a breach notification often determine whether further account damage occurs. It’s unknown if the attackers will be able to decrypt stolen passwords or how they intend to use other leaked data. Regardless, if you change your password and review the associated devices, you’re less likely to be impacted. By understanding all the actions needed, you can exert some control over your account’s security.











blog.trendmicro.com

Bookmark and Share

Genesis mining promo code: CZL5k6

#FBI Official Explains What To Do In A #Ransomware Attack

Bookmark and Share

Genesis mining promo code: get your 3% with: CZL5k6 

Thursday, August 18, 2016

'Auction' of NSA Tools Sends #Security Companies Scrambling


 The leak of what purports to be a National Security Agency hacking tool kit has set the information security world atwitter — and sent major companies rushing to update their defenses.


 Experts across the world are still examining what amount to electronic lock picks. Here's what they've found so far.


WHAT'S IN THE RELEASE?


 The tool kit consists of a suite of malicious software intended to tamper with firewalls, the electronic defenses protecting computer networks. The rogue programs appear to date back to 2013 and have whimsical names like EXTRABACON or POLARSNEEZE. Three of them — JETPLOW, FEEDTROUGH and BANANAGLEE — have previously appeared in an NSA compendium of top secret cyber surveillance tools .


 The auctioneers claim the tools were stolen from the Equation Group, the name given to a powerful collective of hackers exposed by antivirus firm Kaspersky Lab in 2015. Others have linked the Equation Group to the NSA's hacking arm, although such claims are extraordinarily hard to settle with any certainty.
 The leaked tools "share a strong connection" with the Equation Group, Kaspersky said in a blog post late Tuesday. The Moscow-based company said the two used "functionally identical" encryption techniques.
 The leaked tools also appear to be powerful, according to a running analysis maintained by Richmond, Virginia-headquartered Risk Based Security. The group said several of the vulnerabilities targeted by the malware — including one affecting Cisco firewalls — were previously unknown, a sign of a sophisticated actor.
Security and networking companies scrambled to investigate the flaws exposed by the auction. Cisco Systems, Inc. issued an urgent update to its software late Wednesday. Fortinet, Inc., a Sunnyvale, California-based security company, also said it was investigating.
 Nicholas Weaver, a researcher at the International Computer Science Institute in Berkeley, California, said that the news was terrible for the NSA no matter the circumstances behind the leak because companies like Cisco guard critical U.S. infrastructure.
"If the NSA discovered breach in 2013 and never told Cisco/Fortinet, this is VERY BAD," he said in a message posted to Twitter . "If they didn't know, this is VERY BAD."
The NSA has not returned repeated messages seeking comment.


WHO IS BEHIND THE LEAK?


 The documents have been leaked as part of a surreal online auction by a group calling itself "Shadow Brokers." Their madcap, Borat-like manifesto rails against the "Wealthy Elite" and the group's name appears to be a nod to the "Mass Effect" series of video games, where an elusive Shadow Broker traffics in sensitive information.
Few take the name or the manifesto at face value. Many have floated the possibility of Russian involvement, a theory that received unexpected support when NSA leaker Edward Snowden endorsed it on Twitter.


 In a series of messages , Snowden wondered aloud whether the server the data was stolen from might be linked to a U.S. attempt to influence a foreign election. That would be a politically charged development in the context of recent allegations that Russia is trying to tamper with America's presidential campaign.
The leak looks like a warning that any attempt to point the finger at Moscow over alleged electoral interference "could get messy fast," Snowden tweeted. He did not return messages seeking further comment.
Comae Technologies founder Matt Suiche said the theory of a disgruntled insider couldn't be ruled out.
In a blog post , Suiche said he'd been contacted by a former NSA hacker who pointed out that the tools leaked online normally resided on a segregated network and that the way they were named suggests the data was copied direct from the source. Suiche cautioned it was just a theory.
"We'll never know," he said in a message to AP.
Repeated emails and online messages seeking comment from the Shadow Brokers went unreturned.


HOW DOES THE AUCTION WORK?


 Shadow Brokers have already published much of the data they claim to have. The rest — "the best files" — will be released, they claim, to whoever wins the auction.
The content of the files is secret, the group said in its announcement. So too is the length of the auction, which it said would end, in its signature broken English, "when we feel is time to end."
Many dismiss the auction as a stunt.
Hopeful bidders have been invited to send bitcoins — the borderless electronic currency — but as of late Wednesday the address specified by the group had only gathered 1.72 bitcoins, or $981.
It's more than pocket change. But the group's stated goal is 1,000,000 bitcoins, or $570 million.

Nytimes.com



Genesis mining promo code CZL5k6

Tuesday, August 2, 2016

Why you should hurry up and preorder the Galaxy #Note7 as soon as possible

Bookmark and Share

Genesis mining promo code 
CZL5k6

Tuesday, July 26, 2016

#Audi Plans Three Electric Vehicles by Decade’s End

Bookmark and Share

Genesis mining promo code 
CZL5k6

Monday, July 11, 2016

Lessons From the #Tesla Crash




 A recent fatal crash in Florida involving aTesla Model S is an example of how a new technology designed to make cars safer could, in some cases, make them more dangerous. These risks, however, could be minimized with better testing and regulations.

 Tesla says that the wrecked car’s assisted-driving system, called Autopilot, did not detect a white tractor-trailer when — against a bright sky — it turned in front of the car. The driver, Joshua Brown, who died in the crash, also did not hit the brakes, possibly because he was distracted.



 More than 35,200 people were killed in car crashes in this country last year, up 7.7 percent from 2014. People caused most of those accidents. Driverless cars could help reduce that toll substantially, but those vehicles are still years away. In the meantime, many car companies are trying to improve safety in other ways. For example, some systems, primarily found in luxury cars like Teslas, can slow or stop cars when drivers are not paying attention.

 Tesla’s electric cars are not self-driving, but when the Autopilot system is engaged it can keep the car in a lane, adjust its speed to keep up with traffic and brake to avoid collisions. Tesla says audio and visual alerts warn drivers to keep their hands on the steering wheel and watch the road. If a driver is unresponsive to the alerts, the car is programmed to slow itself to a stop.

 Such warnings aren’t sufficient, though; some Tesla drivers, as shown invideos on YouTube, have even gotten into the back seat while the car was moving. Such reckless behavior threatens not just the drivers but everyone else on the road, too.

 It’s not surprising that technology that helps drivers can lull them into thinking they need not pay attention at all. Chris Urmson, who heads Google’s driverless car project, said in a TED talk last year that when his company tested a driver assistance system some drivers became so dangerously distracted that Google pulled back on that concept. It has decided to focus its efforts on fully self-driving cars instead.

 The National Highway Traffic Safety Administration should study how automakers can minimize driver distraction. This will become more urgent as advanced systems become available in cars made for the mass market.

 A recent fatal crash in Florida involving aTesla Model S is an example of how a new technology designed to make cars safer could, in some cases, make them more dangerous. These risks, however, could be minimized with better testing and regulations.

 Tesla says that the wrecked car’s assisted-driving system, called Autopilot, did not detect a white tractor-trailer when — against a bright sky — it turned in front of the car. The driver, Joshua Brown, who died in the crash, also did not hit the brakes, possibly because he was distracted.

 More than 35,200 people were killed in car crashes in this country last year, up 7.7 percent from 2014. People caused most of those accidents. Driverless cars could help reduce that toll substantially, but those vehicles are still years away. In the meantime, many car companies are trying to improve safety in other ways. For example, some systems, primarily found in luxury cars like Teslas, can slow or stop cars when drivers are not paying attention.

 Tesla’s electric cars are not self-driving, but when the Autopilot system is engaged it can keep the car in a lane, adjust its speed to keep up with traffic and brake to avoid collisions. Tesla says audio and visual alerts warn drivers to keep their hands on the steering wheel and watch the road. If a driver is unresponsive to the alerts, the car is programmed to slow itself to a stop.

 Such warnings aren’t sufficient, though; some Tesla drivers, as shown invideos on YouTube, have even gotten into the back seat while the car was moving. Such reckless behavior threatens not just the drivers but everyone else on the road, too.

 It’s not surprising that technology that helps drivers can lull them into thinking they need not pay attention at all. Chris Urmson, who heads Google’s driverless car project, said in a TED talk last year that when his company tested a driver assistance system some drivers became so dangerously distracted that Google pulled back on that concept. It has decided to focus its efforts on fully self-driving cars instead.

 The National Highway Traffic Safety Administration should study how automakers can minimize driver distraction. This will become more urgent as advanced systems become available in cars made for the mass market.

Nytimes.com

Genesis mining promo code 
CZL5k6