Friday, June 26, 2015


How to Build an Adaptive Security Culture



By Bruce Cowper, SecTor
If you do not ADAPT, you do not Survive. It's A Principle That Runs throughout Nature and Business - and IT's Just as True in cybersecurity. Security teams Need to BE as adaptable in Their Technological environments as animals are in Their Natural Ones. Often, though, security practitioners are rigid, slow moving and unresponsive.
Things Have to change. It's Time for an Adaptive Approach to Security. This Is True especially now. Since The early 2000s, cybersecurity Threats Have been accelerating.
In 2000, US-CERT logged twenty-One Thousand Seven Hundred Fifty-Six cyberattacks. The Biggest Causes of such incidents AT The Time; Denial of Service attacks, BIND Domain name System software vulnerabilities and The LoveLetter worm. The First botnet HAD only surfaced A year Before, and Windows XP Would not Ship Until A year Later. Social Media did not EXIST.   

Today's Threats Have Expanded in Number. In 2009, PwC Recognized 3.4 Million Cyber ​​incidents. Last year, That Number hit 42.8 Million, Representing A 66 percent CAGR over five years.  
They Also Have deepened in complexity and Type. Cybercrime Is A Commercial Operation. Zeus malware Is Being repurposed to Attack Specific Vertical Markets. Exploit Kits are available off The shelf, and Even mainstream websites Can BE Made Malicious  
Cyberattackers always Look for Advantage The next, Which typically involves exploiting new Technologies. BECAUSE Systematic Innovation Is in The Technology Sector, They Have Plenty of feedstock.
You do not Fight A multi-headed, Fast-Moving Enemy by freezing. You Adopt A Culture of adaptability, Able to bend and Flow, and counter new Kinds of Attack as They emerge. As Bruce Lee famously put SO: "Become like water."
This culture of adaptive security breaks down into three parts, which map broadly to the three phases of a cyber-incident: before, during and post-attack.

Not so Rigid Risk Management

The First and preventative Part of this Strategy focuses on risk Management. Many risk Management teams take A Rigid and overly structured Approach.
One common mistake Is to Focus on Security Features product. Relying on A Security Appliance to cover All of your Bases May SEEM like an Easy win, But May you find That The Security Capabilities of those Solutions do not Match The Needs of your Organization.
These Needs are Changing as The Technology Changes. Ten years ago, departmental managers Would not Have HAD recourse to Cloud-based Applications such as analytics and CRM. Now They May well Spend Their Own Budget on those Services.
These dissolve Technologies The Traditional perimeter-based Security Model, Creating new Threat vectors. Risk Management and Security Infrastructure Design must BE Fluid Enough to Absorb Them, Which MEANS That cybersecurity teams must BE Willing to Their Perceptions Mold Around Them.

Make No Assumptions

The Second Part of an Adaptive Security Strategy Looks AT How The Organization ACTS When an Attack Is Underway. The First rule Is to Admit your Own vulnerability? Assume you Will BE AT breached Some Point. Acknowledge That Even The Best risk Management Will not make you invincible.
Avoid Making assumptions That Will blind you to Potential Threats During, Agents this Phase. Your cybersecurity Team May Have A tailored Response to Specific Threats, assuming That They are The Most Likely. If you ignore those Threats That you Never Thought Would occur, you May BE Caught unawares and end up taking longer to resolve an attack.
Blindness Can MANIFEST Itself in Other Ways, TOO, particularly When looking AT How you Respond to an Attack Across Different Components of your Technology architecture. Many Systems Directly Affect MANY others. If your Active Directory System Is Compromised, for Example, That May Touch Other Systems such as Human Resource Applications, Access Control Layer Or Collaboration software. Your Response Team must BE Able to Explore These Systems as Quickly as an ATTACKER does.
That Can Challenging BE, BECAUSE companies Tend to Create Organizational Silos Around These Systems That Can STOP Response teams Thinking laterally about Them. Sometimes, Different teams Can Even BE Dedicated to Specific parts of The Technology Infrastructure, Which Can Restrict Cross-System visibility.

Update Your Response and Test

FINALLY, There's The Post-Attack Phase. This Is Where your Team Gets to plug The hole That an ATTACKER exploited. This Is Where an Adaptive Security Strategy Comes Into ITS Own. Running A Post-Incident Review Is One Part of this Process. Security teams can then secure the hole that was exploited and also look for similar vulnerabilities elsewhere in the infrastructure.
The other part of the process is updating the risk management process and the response "playbook" with information gleaned from the attack, so that your company's security is hardened and the response team better equipped to cope next time.
IT's Also Important for Organizations to Test themselves once Fixes Have been Applied, to prove That They Have Adapted. A "War Games" Approach Can BE Useful here, with hired attackers specifically Setting out to Gain Access Via The SAMe Attack vector.
Doing All of These Things Will help companies Close The Circle by Positive Feeding information back Into The Security Process. This Is Where an Adaptive Security architecture Comes Into ITS Own.

Building Security into Organizational Culture

These pointers Will help you Build more Operational and Tactical adaptability Into your cybersecurity Operation. These are Great for Short-to-Mid term Challenges, But There are Longer-term, more Strategic lessons Learned here to BE, TOO. Security Threats Will Just morph as dramatically as Technology does. How Can you ADAPT to These Changes;
Explore The EXTENT Security to Which Is Built Into your Organizational Culture, Rather Than Being merely bolted on. Includes appointing this Security Staff AT A Strategic, Managerial Level and secure driving processes (such as secure software Development and Procurement secure) throughout The Company. Engaging Employees Properly and systematically with user Security awareness Training That Actually Works Is Also A Crucial Part of The Equation. After All, companies are not Just Collections of processes? They're Also Built from People.    
All The Technologies That underpin those processes, and Which are Used by those People, are Going to change Even more dramatically in The next FEW years Than They did The last FEW. Mobility, Cloud computing, The Internet of Things and The Digital Supply Chain are Going to Evolve and Work Together, in Unison. It's All Speeding up, Which MEANS That your cybersecurity Practice Will Need Bruce Lee-like skills. Are you Ready to Become like Water;
Bruce Cowper   Is A Founding Member of The Security Education Conference Toronto (SECTOR), Which Runs Oct. twenty to twenty-one, 2015.


Source




Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.




A few hundred expert hackers offering "crime as a service" are behind a large percentage of all the cybercrime acts committed. That's the conclusion of a group of international law enforcement experts from organizations including the FBI and the UK's National Crime Agency.
Talking at the recent InfoSec Europe security conference in London, FBI agent Michael Driscoll said that there is evidence that just 100 to 200 people around the world are enabling organized crime gangs to mount technical attacks by selling them malware, botnets, distributed denial of service ( DDoS) capabilities and other hacking services.
Despite the small number of people behind many of the attacks, the effects of their actions are devastating, Driscoll said.
"The average loss on the Internet is $ 3,000, and bank losses average $ 1,800. That may not seem like a lot, but we get about 22,000 complains a month and we think that is about 10 percent of the total," he said. "There is constant hacking and online fraud; the volume is huge."
Catching organized crime gang members, and the cybercriminal masterminds who offer services to them, is hard - or in many cases impossible, said Alan Woodward, a professor at the Surrey Centre of Cyber ​​Security. That's because they operate in concert from all over the world.
"Some people think that the financial threats stem from Russia, IP threats come from China and so on, but it is not as simple as that," he explained. "These organized criminal gangs in particular are international and distributed. There might be one member in the Ukraine, one in the UK and so on."

Reach out to Law Enforcement

The good news for anyone whose company faces the threat of attack by cybercriminals - and that means just about any company - is that law enforcement agencies can help you. But before they can be of help, it's essential that you make contact with them.
"One thing that's sure is that you can not be secure on the Internet, so my advice is to make sure you are talking to law enforcement now. Do not wait until you get hit and it is too late," said the FBI's Michael Driscoll.
"You need to engage with the FBI, or with CERT, or with the National Crime Agency," he said. "They push information about criminal activity to companies, so you need to make sure that you are getting that. And you need to be sending information about odd activity that you spot back to law enforcement."
Woodward said that doing so can be crucial to the fight against cybercriminals. "Threat intelligence is very important; do not underestimate it. You need to share intelligence, use what you learn from others, and have a plan for when you get hit."

Hack Attribution

What makes "solving" cybercrimes particularly difficult is that attribution is hard. You may know that your organization has been hacked, but law enforcement agencies may have no idea where the attack came from - let alone who is responsible.
"We are getting better at fingerprinting attacks but it is very easy to put in false flag trails so attribution is difficult," said Woodward.
(The widely publicized Sony Attack in November 2014 HAS been attributed to The North Korean Government, But this only Possible Attribution WAS BECAUSE of information Provided by Local Rather Than Intelligence Agents by A Forensic Analysis of The hack.)  
This is in sharp contrast to traditional criminal landscapes, pointed out Andy Archibald, deputy director of the National Crime Agency's National Cybercrime Unit. He said most cities play host to people involved in illegal activity such as drug dealing, firearms sales, immigration scams and even the provision of hitman services. Law enforcement officers monitor and limit these activities using covert policing to build up a picture of who is involved in each crime field.

How to Fight Cybercrime, at a High Level

Because it is so hard to pin down those involved in cybercrime, the unanimous opinion of the law enforcement experts was that the best way to fight it is to disrupt their activities as much as possible.
How can this be done? Archibald suggested going after so-called bullet proof hosting services - many of which are based in China, other parts of Asia and Russia and its surrounding countries.
Bullet proof hosting services can be used by organized crime gangs to:
  • offer downloads of exploit kits and other malware
  • serve as botnet command and control centers
  • provide drop storage for stolen financial details captured by banking Trojans and other malware
  • host forums where stolen credit card information and exploit ideas are exchanged
He also suggested cracking down on money launderers who help organized crime gangs clean the proceeds of their crimes, and even going after anti-virus testing services. These can be used to help malware authors test if their software is susceptible to detection by common anti-virus software used in the enterprise, he said.
Disrupting cybercriminals may well be the most practical way to tackle their illegal activities, but at best it can only limit the number of their attacks, and resulting data breaches, rather than solving the problem completely.
That means that having clear plans in place to mitigate the damage of a data breach when - not if - your company gets hit is vital, Woodward stressed. "The number of businesses that go bust after an attack is growing every day, so knowing how to respond is absolutely key."


Wednesday, June 17, 2015

How to use two-step verification with your Microsoft account



Microsoft has offered two-step verification (2FA) process since early 2013. Also known as two-factor authentication or two-step authentication, the process strengthens your account security by requiring you to enter your password (step 1), then a security code (Step 2). The Security code Can BE Sent to you by E-mail, SMS, phone Call Or you Can Use an authenticator app on your Mobile device.
Enabling Two-Step verification on your Microsoft account Will Enable IT Across All Microsoft Services Currently That Support Two-Step verification, like Windows, Outlook.com , Office, and SkyDrive . Here's How to get Started:  

Enable two-step verification

microsoft-account-setup-two-step.jpg
On The 1st Step:  Go to this Account Settings page , and Look for an email Both Address and phone Number under The section titled "Security info Helps Keep your account secure." If either piece of information Is Missing, click on The Add Security info Link and Follow The prompts.   
The SMS functionality of 2FA relies on your phone Number Being Connected to your account, do not Skip SO IT. Otherwise you'll Need Access to your email account to Receive your Secondary log-in code.
On The 2nd Step:  Click on The "Set up Two-Step verification" Link.
On The 3rd Step:  Follow The Setup Process Until you REACH The end, Then click "Done." You May Asked to Provide BE A verification code, Sent to either your phone Via SMS Or to your email Alternate Address, Before you complete The Can Two-Step Setup. Once IT's complete, you shouldnt Receive an email Confirmation from Microsoft Sent to your email Alternate Address.

Pair an authenticator app with your Microsoft account

verification-app.jpg
You Can get Security Codes by email, phone Call Or SMS, But an Even EASIER passing Is to Use an authenticator app on your Mobile device. Authenticator Apps, like Google Authenticator, Run Locally on your device and Work Even IF your device does not Have an Internet Connection. The Use an authenticator app, you First Have to pair IT with your Microsoft account.
On The 1st Step:  Download The authenticator app of your Choice to your device. Android , iOS , and BlackBerry users Can Use Google Authenticator, While Windows Phone users Can Use Microsoft Authenticator   
On The 2nd Step:  Go back to your Microsoft account Security info page , and you shouldnt See A prompt to Setup an Mobile app. If not, click on "Set up Identity verification app" Link under The Identity verification Apps section.  
Step on The 3rd:  Launch your Preferred authenticator app, Then Scan The bar code on The Screen.
Step on The 4th:  The When Security code appears in The authenticator app, ENTER IT in The Box, Then click on The Pair Button.

Using two-step verification

Once you've enabled Two-Step verification on your Microsoft account, logging in to your Microsoft Services Will Require your account password and A Security code. Fill out The Required information (usually we The Four last digits of your phone Number, Or A Portion of your email Address) to Trigger The Security code Being Sent to your device. Otherwise, Launch Whatever app you Used to set up verification Codes (Google Authenticator, for Example) and Then ENTER The code in The Field text.
Lastly, Some Apps and Devices do not Support Security Codes. In those instances, you Can Go to The Security info page and Create an app password  to log in.


How to change your LastPass password in wake of site hack




LastPass users are advised to change their master password in the wake of a recent hack attack, especially if that master password is weaker than it should be.
On Monday, LastPass disclosed That IT WAS The Victim of A hack That Compromised email addresses, password Reminders and Other information . However, The hackers Were not Able to Access Accounts The actual users Store Where Their Website passwords, The Company Said. LastPass Uses Encryption to secure passwords so they can only be read on your indivdual Web browser. 
As a manager password, LastPass can generate passwords for each of the protected websites you use. Plugged in your browser, the software can then automatically fill in the proper password for each site, saving you the effort of having to remember and manually enter the password for the scores of sites you potentially use.
To protect and access all your passwords, LastPass requires you to set up a single master password. But what if someone obtains that master password? Though the master passwords themselves are secured with a high level of encryption and were untouched in the data breach, the hackers gained access to the clues, or reminders, used to remember those passwords. As such, the right clue could help a hacker potentially guess your master password, especially if you've used one that's particularly easy to guess.
"If you've used a weak, dictionary-based master password (eg: robert1, mustang, 123456799, password1!), Or if you used your master password as the password for other websites you need to update it," LastPass CEO Joe Siegrist Said in A blog Post Monday. 
Okay, so how do you change your master password, and are there further steps you can take to lock down your account? Let's tackle that first question.
Changing your master password
  • First, log in to The LastPass Website with your username and password.  
  • After logging in, you'll see a LastPass page with a left sidebar menu of various options. Select the option for Account Settings.
  • In the Account Settings page, look at the section for Login Credentials and click the button to Change Master Password.
  • At the Password Reset form, type your current (old) password. Type your new master password, then type it again for confirmation. Finally, type a password reminder that can help you remember your master password should you ever forget it.
Your master password should be as strong as possible to make it difficult to crack. For example, you can use a combination of alphanumeric characters with both uppercase and lowercase text. You may also want to throw in non-alphanumeric characters, including underscores or dashes. You can also use a single lengthy phrase that may be easier to remember, such as MyCatLikesToSnuggleOnMyLap. As you type your master password, LastPass visually shows you its relative strength or weakness.
  • Click the button to Save Master Password.
  • Assuming all went well, LastPass congratulates your for changing your password and offers a link for you to log back in with your new password.
  • Log in with the new password to confirm that it's working.
  • You should receive an email from LastPass confirming that your password was changed.
As Siegrist said in his blog, if you used your LastPass password on any other websites, you may want to change those as well.
Setting up multifactor authentication
Using beyond A strong password Master, are There Other Measures Can you take to secure your LastPass Better Data; Yes, you Can set up multifactor Authentication . Such Authentication Requires an Additional mode of verification in order to Access your account information. Here's how that works: 
  • Return to the LastPass Account Settings page and click the link at the top for Multifactor Options.
  • Here you can choose from a number of multifactor options both for free and premium accounts.
  • For Example, you Could Use The Google Authenticator to send A One-Time verification code to your smartphone, Which Would you Then Type AT The LastPass Website Access to your account.  
  • Click the method of authentication you wish to use and follow the instructions to set it up.
"We ALWAYS suggest using multifactor authentication for added security," a LastPass spokeswoman said in an email. "And we go without saying that we encourage folks to create strong, unique master passwords."
At this point, LastPass is also requiring users to verify their account by email when logging in from an unknown IP address or device

LastPass users with weak master passwords should change them following the recent data breach.


Monday, June 15, 2015

Encrypted connections coming soon for all Wikipedia readers


As of right now, the data that moves between Wikipedia.com and most users is unencrypted, which increases the chances that someone else may be eavesdropping on you. That, however, is about to change: On Friday, the Wikimedia Foundation announced that it’s moving its sites toward HTTPS by default, so that all data transferred between you and its servers will be encrypted.

Wikimedia says it has been working on the move toward HTTPS for all users since 2011, but that it stepped up its efforts in 2013 in the wake of government surveillance revelations. It did take the organization some time to complete its HTTPS project, however, is it needed to update its back-end systems to support encrypted connections for everyone.
Encrypted connections aren’t a guarantee against data theft—after all, they won’t necessarily keep a determined cybercriminal from trying to break into a server. But at the very least, they do help ensure that your data will at least get to the site you’re visiting without causal snoops eavesdropping on your browsing.


Tuesday, June 2, 2015



Google unifies your privacy and security settings in one spot

privacysecuritygooglehub

More than three years ago, Google unified its privacy policy. Now it's unifying your privacy (and security) information. The company recently announced an overhaul to the Google account dashboard that puts nearly every privacy and security feature in one place. The new My Account section includes Google's privacy and security checkups, the ability to mange ad settings, your search and browsing history, location history via Google Maps, and password changes. Google Wallet is still separate from the My Account dashboard.
To get to the new privacy and security hub, open Gmail or a Google search page while signed in. Then click on your account picture and select Account from the drop down menu. You can also access the new dashboard at myaccount.google.com.
The new dashboard has three major sections: sign-in & security, personal info & privacy, and account preferences. Each section has all the services you're familiar with if you've ever delved into the deep settings of your account before.
Under sign-in & security, you can do things like change your password, manage app-specific passwords and connected apps, set a recovery email address and phone number, and check how many devices are connected to your Google account.
The privacy section controls your account history, lists the Google services you use, and lets you download your personal data via Google Takeout. You can even set an account trustee to manage your account in the case of death, long-term imprisonment, or any other situation where you can't get online for an extended period of time.
Finally, you've got your account preferences to set your preferred language, manage Google Drive storage, delete your account, and so on.
This is the second major privacy announcement from Google recently. During Google I/O the company also announced that Android M, the next major version of Google's mobile operating system, would provide granular permissions for third-party apps. In addition to the new privacy hub, Google also rolled out a new FAQ site on Monday to answer privacy- and security-related questions.
The impact on you at home: With so much anxiety about the amount of data Google has on you, it's good the company is making it easier to get at that information. This will become even more important for Android M users with upcoming features like Now on Tap—Google Now context for mobile apps—that will require Google to store even more information about how you use your device, your personal information, and the content you consume.

Contributor, PCWorld





 Meet Batteriser

A $2.50 gadget that extends disposable battery life by 800 percent


   

Microsoft has set a release date for Windows 10 to arrive in the summer


Microsoft has announced that it will begin offering its newest software to power PCs and tablets as a free upgrade on July 29. Windows 10 Mobile, the company's companion software designed to power smartphones, is expected to arrive later this year. Windows 10 will be free for users who have bought a computer in the past six years or so, powered by Windows 7 or later, or tablets running Windows 8.1.
Users running Windows 7 or 8.1 with the latest updates can reserve the upgrade, which is available until July 29, 2016
Windows 10 marks the next iteration of the one of the world's most ubiquitous pieces of software. Microsoft's operating system powers a majority of personal computers and acts as the backbone of many of the world's businesses. Despite its dominance, Microsoft critics see the company and its products as a tech titan in decline, as mobile phones and competing, cheaper software have chipped away at Windows. The company's goal with Windows 10 is both to repair the damage done by the ill-received Windows 8 and to convince consumers that upgrading is worth the time and effort.