Global survey from the Center for International Governance Innovation reveals that almost half of all respondents say they don’t trust online shopping. This must be perceived positively from a cyber security standpoint. The general consumers starting to put more pressure on e-commerce organizations to implement superior security technologies to protect people’s privacy. Government regulators/agencies and IT companies must be transparent to explain what/how they will work together to do more for the common good of handling/protecting customers’ information.
“Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.” This script is available for download on Github, but a user who downloads it will need some programming skills to allow it to run. “Jennings said he developed his script by analyzing how the Doublepulsar implant communicated over the internet to its control server. However, his original intention was to help businesses identify the implant over their networks, not to scan the entire internet for the implant.”
The attacks that were demonstrated are most useful at guessing digits in four-digit PINs and have a 74-percent accuracy the first time it’s entered and a 94-percent chance of success by the third try.
The success of these attacks varied by browser. Mozilla and iOS have released update to mitigate these attacks. Google Chrome has not yet released a fix, but has acknowledged the issue publicly.
How Innovative Companies Lock Down Data
This is an interesting article that discusses companies that are going “back to the basics” on security measures of protecting data while trying to incorporate the newest methods as well. The author discusses the old measures such as enforcing complex passwords, encryption standards, and disaster recovery readiness as the old but still important measures. He also mentions the new direction that companies are going in such as preventing attacking within applications, real-time monitoring, and using deep learning with cybersecurity analytics. A mixture of old reliable methods with new techniques are definitely needed to face the ever-changing security threats.
The company, WordFence, reported that tens of thousands of routers, associated with the state-owned telecom company Telecom Algeria, have been hacked and used to launch attacks on wordpress sites. The researchers from the firm also identified up to 27 ISPs from various countries to have their routers involved in this hacking. The vulnerability was the result of ISPs listening on port 7547, used to manage customer’s devices, were running a vulnerable web server, AllegroSoft RomPager. WordFence has reported to have seen more than 90k unique IP address from a total of 28 ISPs to have become compromised.
How To Find Cybersecurity Vulnerabilities Across Your Environment
This article is written by a former CTO who talks about how he managed security at his data center. He talked about the “shotgun test” which is a test to see what you could destroy to do the most damage if you only had one bullet. He wanted to find something equivalent to test cybersecurity. He later suggests that’s Nessus vulnerability scanner might be the closest thing you can do to the shotgun test. He also emphasized the importance of having a balanced security portfolio and spend money wisely on diverse and appropriate security strategies.
This article is about the heavy distribution Cerber ransomeware and how it has taken over Locky in the last three months of the top ransomware threat. Cerber is “ransomeware as a service” which allows novice users to pay for it to be used against targets.
The article emphasized that controls inside the perimeter are key to defending against malware such as Cerber because it is able to sneak past endpoint- and malware-detection technologies. For example, least privilege access control is key to defending against this ransomeware because it crawls the network looking for accessible file systems and encrypting its contents.
This is an example of the importance of having a defense in depth approach to information security.