Wednesday, August 31, 2016

London economy hit hard by security breaches

A new report by the Conservative members on the London Assembly, which help scrutinise the work of the Mayor of London, estimates that in 2015 in London 329,515 organizations experienced some form of security breach.

London economy

“In London specifically, it is possible to estimate conservatively that the cost to the economy from security breaches could be in the region of £35,997,500,000 per year,” the group said, and proposed a new “Mayoral Standard” for data security.

Like the Cyber Essentials scheme instituted by the UK Government, the standard would offer businesses a simple way to check their data security posture, and consumers can look for it as a sign that the company is thinking about the security of their data.

“The new GLA Conservative report is more like a worst-case scenario. It appears to take the estimates of the cost of the worst data breaches identified by the PWC report and multiply them by the total number of breaches,” Bernard Parsons, CEO of Becrypt, commented for Help Net Security.

“However, even a portion of the estimated £35bn in financial losses represents a serious blow to the economy. There is no doubt, whatever the number, that the cost of cybercrime to the UK economy continues to be significant and increasing,” he noted.

“The report’s recommendation of using the brand and influence of the Mayor of London’s office to create a Mayoral Standard for data security to raise the profile of cyber security can only be a good thing. Being able to prove their security capabilities with a highly visible standard could be a powerful competitive advantage for any business in the city.”

He noted that, currently, the vast majority of security breaches remain undisclosed, and therefore do not affect the companies’ bottom line or damage brand reputation, but this will change in 2018 with the introduction of the new EU General Data Protection Regulation (GDPR).

“This will influence the UK irrespective of Brexit and introduce mandatory disclosure of data breaches as well as significant fines,” he says.

“The GDPR is not prescriptive in terms of the detail of what good security looks like, however. There is certainly room for new standards such as the Mayoral Standard to define what good cyber security looks like, but they would need to be aligned with the existing work that Government is undertaking, such as the Cyber Essentials scheme, in order to be efficiently adopted by businesses.”

“The most important aspect of any ‘Mayoral Standard’ should be that it is both simple and cost effective – as this would encourage organisations to engage with it,” the group pointed out, but did not offer their opinion on what requirements the standard would bring with it.

That should definitely be left to security experts, but the wish for it to be simple and cost effective does not bode well. Perhaps because it makes me think of this well-known dilemma? But hats off to them if they manage not to sacrifice the value of the standard in the process, and make it a purely cosmetic sign that’s simply meant to inspire trust in users, and will fail in the long run.


from Help Net Security http://ift.tt/2bEUekt

It pays to be a penetration tester, the market is booming!

The penetration testing market is estimated to grow from $594.7 million in 2016 to $1,724.3 million by 2021, at a Compound Annual Growth Rate (CAGR) of 23.7%, according to MarketsandMarkets.

penetration testing market

This market is growing rapidly because of the growing security needs of IoT and BYOD trends and increased deployment of web and cloud-based business applications.

“Penetration testing still remains valuable in the private sector. New industries are constantly being targeted as criminals continue to monetize the data,” Charles Henderson, Global Head, IBM X-Force Red, told Help Net Security. “Take healthcare for example, in 2015 we saw more than 113 million medical records stolen. Healthcare organizations are loaded with medical devices that are often connected to the Internet and difficult to maintain, multiple different processing systems for billing, etc. These systems require regular penetration testing to stay ahead of the bad guys, often looking for a way to pivot into an organization.”

Wireless penetration testing to grow the most

Recent Pwnie Express research shows that 86 percent of infosec professionals are concerned with connected device threats. 55 percent have witnessed an attack via wireless device, and 38 percent have witnessed an attack via mobile device.

It’s no wonder that many organizations take advantage of penetration testing services to secure their wireless infrastructures, and the devices connected through it.

Wireless penetration testing expected to witness the highest CAGR in the global penetration testing market and North America will account for the largest market share in 2016, due to the presence of many security vendors in the region.

“The network becomes more valuable as more nodes are connected to it. With the explosion of IoT the new exponential network value will have significantly increasing demands to protect that value. The market for cyber security services and products should echo the device and value increase generated by IoT,” said Kenneth F. Belva, principle of IoTcrusher.com.

Government & Defense vertical to have the largest market size in 2016

The penetration testing market is also segmented by various industry verticals; out of which, the adoption of penetration testing services is expected to be the highest in the government and defense vertical as the critical data and applications used by the vertical are prone to advanced threats. Moreover, BFSI, retail, and IT & telecom verticals are expected to gain traction during the forecast period.

“As more and more organizations move to the cloud and adopt SaaS businesses models we see a move to agile development methods. Applications are today a moving target which require more agile security testing processes as well. We therefore see the cadence of penetration testing to go up from one time a year to quarterly and trending towards more continuous pen testing,” said Jacob Hansen, CEO at Cobalt.

North America is expected to dominate the market this year

North America is expected to hold the largest share of the penetration testing market in 2016 due to the technological advancements and early adoption of penetration testing in the region.

The market in APAC is expected to grow at the highest CAGR between 2016 and 2021. The major driving forces for this growth are increasing technological adoption and huge opportunities across industry verticals in APAC countries, especially India and China.


from Help Net Security http://ift.tt/2bDRUqE

Law enforcement equipment: Technology plays a complicated role

Law enforcement is challenged by the need for a balance between equipping officers with gear that will protect them while also trying to manage the appearance of acts of excessive use of force by officers. There are also major concerns about the excessive costs associated with many newer products.

law enforcement equipment

Sales of law enforcement and guarding equipment in the US are projected to increase 3.5 percent annually through 2020 to $1.2 billion, according to The Freedonia Group. Overall demand growth will be driven by the rising number of guards and law enforcement officers.

Adoption of high technology products

Demand will further benefit from the rising adoption of expensive, high technology products such as license plate readers, stationary cameras, body cameras, conducted electrical weapons, and drones. Sales of license plate readers and stationary cameras will particularly benefit from both the growing number of agencies that utilize these products and the decision of many agencies that already utilize these products to expand their existing stock.

“Law enforcement agencies have their hands full in attempting to keep qualified, competent, and skilled personnel, much less keep up with the explosion of solutions. As a former law enforcement officer, we were always asking for additional resources to keep up with the demand. What is needed are inexpensive solutions that are flexible, intuitive, affordable, and allow for the ever changing landscape of countering these threats,” Keith Lowry, Senior VP at Nuix, told Help Net Security.

“Solutions must be as agile as the threat. Security has always been an important concern to organizations, however, many are slow in recognizing that in addition to physical security, we live in a digital world that gates and guards don’t protect. As more and more organizations feel the public pressure and embarrassment of being the victims of cyber-crime, they are indeed increasing and expanding security resources beyond the physical and into the digital world,” Lowry added.

Newer technologies, especially body cameras and drones, are expected to see strong increases in the number of units sold, though value demand will be limited to a degree by declining prices.

“I think the general idea is that if there is new technology that can keep us safer, we want to adopt that technology,” said Ebba Blitz CEO of Alertsec. “Bad actors are primed to hijack the technologies of tomorrow, including robotics, virtual reality and artificial intelligence. As we are moving into an increasingly connected world, with new capabilities also on the dark side, the good guys need to be one step ahead. This requires investments in new technologies at an ever increasing speed.”

Products with high market penetration

In contrast to the more technologically advanced products, sales of duty gear, body armor and riot gear, and vehicle equipment tend to be driven by replacement demand as these products either wear out or expire.

Although product improvements contribute to rising prices and value demand, the high market penetration of these products often limits additional opportunities for growth. As a result, sales of these products are expected to see more limited gains through 2020.

Demand varies by region

Demand for law enforcement and guarding equipment varies by region due to demographic differences such as population size and urban-rural distribution.

Major urban areas represent a significant share of law enforcement officers employed in the US, as well as the majority of guards. As a result, the South and West – which have large populations and a larger number of urban areas — represent the largest and fastest growing regional markets. Differences in state and local legislation, which may either limit, ban, or require the use of certain products, also impact demand.


from Help Net Security http://ift.tt/2bEPc7B

Make  a Flavor-Packed, Ten-Minute Sauce with Cherry Tomatoes


At the height of tomato season, there’s nothing better than fresh tomato sauce. You have a lot of types of tomatoes to choose from, but try cherry tomatoes for the best flavor and the least effort. Here’s why.

Your go-to for fresh tomato sauce might be larger tomatoes, but cherry tomatoes will make a faster, tastier sauce for several reasons. Serious Eats says:

  • Cherry tomatoes are packed with flavor: Cherry tomatoes are small, so they’re allowed to ripen on the vine for longer since they’re less likely to be crushed under their own weight during shipping.
  • They contain more pectin: They’re sweeter and have more pectin, which makes them great for a sauce that you need to thicken quickly.
  • They take less time to cook: Since they’re small, cherry tomatoes need less time to cook and break down into a tasty sauce.
  • No prep needed: Toss the tomatoes straight into the pan. As they heat up, their water content will burst the skin, letting the juicy goodness seep out.

You can make a simple pasta sauce in ten minutes by using cherry tomatoes instead of a larger tomato. Check out the video above for a specific recipe, but you really only need olive oil, aromatics (garlic, onion), cherry tomatoes, and your choice of spices or herbs.

Use Cherry Tomatoes for the Fastest Fresh Pasta Sauce Ever | Serious Eats


from Lifehacker http://ift.tt/2bCZJgc

Make Natural Wood Stain Using Common Household Items


Maybe you’re working on a small hobby project and are looking for a unique way to stain your wood without those noxious chemical fumes. You want your birdhouse to attract animals of discriminating tastes, right? Here are a few wood-staining techniques you can try using items you might have in your kitchen.

In this video, woodworker and YouTuber Steve Ramsey experiments with five methods for staining wood with a few items that usually cause unwanted stains, like coffee, tea, and red wine. All of the techniques had some affect, and more than anything just require patience. Coffee and tea in particular need repeated applications to really leave an impressionable color; the end result, though, looks like store-bought walnut stain. He also tries beets and turmeric, both of which left a vibrant and pleasant color on the wood. (I’m recall that Adam Savage often uses espresso to add weathering to his projects.)

Is it really worth it when you can just go to the hardware store and pick up some stains for relatively little money? That’s up to you. All of these methods aside from the turmeric are indeed cheaper than actual stains. There’s the added advantage of not needing a respirator to avoid chemical fumes, making these staining much more kid-friendly for an art project. It’s worth experimenting if you just need a fun way to add some color to a picture frame or craft project.

5 Weird Wood Staining Techniques. Natural Wood Coloring Hacks That Really Work. | Steve Ramsey via YouTube


from Lifehacker http://ift.tt/2c0Q0Vr

Prevent Mealtime Mess with This DIY Suction Cup Bowl


Kids are messy, it’s just a fact of life. If your kid is prone to spills during meals, this DIY suction cup bowl lets them eat, keeps their dishes in place, and gives you one less thing to worry about.

First of all, this bowl is meant for young kids who don’t throw their food, but still young enough where some mess is expected—it’s no excuse not to teach your kids to not make a mess while they eat. You’ll need a plastic bowl or plate, two small suction cups, and some super-strong glue. If needed, cut off the nubs on the back of the suction cup to create a flat surface to glue the suction cups to the bottom of the bowl. Let them dry for 24 hours, then use as normal.

You might want to be careful about putting this in the dishwasher, although it is easy to repair or make again. Make a whole set of bowls and plates so that you don’t run out, or even apply this technique to snack containers to keep your car spill-free, too.

Suction Cup Bowls | Nifty (YouTube)


from Lifehacker http://ift.tt/2bBCrfv

60+ million Dropbox login credentials have been stolen

A breach disclosed by Dropbox in 2012 has resulted in the theft of usernames and hashed and salted passwords of over 60 million users.

Dropbox login credentials

At the time, the company did not give the impression that the breach was so extensive – either their investigation did not discover the whole extent of it, or the company chose not to disclose it.

In any case, last week Dropbox announced it will be forcing a password update on users who signed up for the service prior to mid-2012 and haven’t changed their password since then.

“Our security teams are always watching out for new threats to our users. As part of these ongoing efforts, we learned about an old set of Dropbox user credentials (email addresses plus hashed and salted passwords) that we believe was obtained in 2012,” Patrick Heim, Head of Trust & Security for Dropbox, explained in a blog post.

He added that they don’t believe that any accounts have been improperly accessed, but again did not share say just how many user credentials have been stolen.

The number has finally been revealed by Motherboard, and the legitimacy of the data confirmed by an unnamed senior Dropbox employee.

The publication obtained the full set of compromised credentials, and found that some 32 million passwords have been secured with bcrypt, and the rest with SHA-1 + salt. This means that attackers will be having a difficult time getting at the passwords underneath – if they are not predictable and short.

“The Dropbox dump does not appear to be listed on any of the major dark web marketplaces where such data is often sold: the value of data dumps typically diminishes when passwords have been adequately secured,” noted Motherboard’s Joseph Cox.

The legitimacy of the data has also been confirmed independently by security researcher Troy Hunt, who trawled the data for his wife’s record, checked whether the bcrypt-hashed password corresponds to her (complex) plaintext one from early 2012, and found that it does.

He commended Dropbox on how they handled the situation.

“They communicated to all impacted parties via email, my wife did indeed get forced to set a new password on logon and frankly even if she hadn’t, that password was never going to be cracked,” he noted.

“Not only was the password itself solid, but the bcrypt hashing algorithm protecting it is very resilient to cracking and frankly, all but the worst possible password choices are going to remain secure even with the breach now out in the public. Definitely still change your password if you’re in any doubt whatsoever and make sure you enable Dropbox’s two-step verification while you’re there if it’s not on already,” he concluded.


from Help Net Security http://ift.tt/2c88DUt

OneLogin breached, customers’ Secure Notes compromised

San Francisco-based OneLogin, which offers single sign-on and identity management for cloud-based applications and claims 1400+ enterprise customers in 44 countries, has suffered a data breach.

OneLogin breached

The attacker has managed to gain access to a company system that allowed him to view some customers’ unencrypted Secure Notes.

OneLogin advises users to use the feature to “securely store information such as license keys and firewall passwords.”

“These notes are stored in our system using multiple levels of AES-256 encryption,” OneLogin’s CISO Alvaro Hoyos explained, but added that a bug caused these notes to be visible in their logging system prior to being encrypted and stored in their database.

The attacker gained access by using a OneLogin employee’s password for that system. So far it seems that he accessed the system on July 2, 2016, but it’s possible he did so even earlier.

In any event, the potentially affected “small subset” of customers were notified of the intrusion, and have been advised to consider the information stored in their Secure Notes as compromised.

The company has called in outside cybersecurity experts to help with the investigation and remediation.

They have plugged the bug that was exploited in this attack, reset all passwords in external systems that don’t support SAML or allow alternate forms-based authentication, and have locked down access to the log management system by allowing only SAML-based authentication and only from a limited set of IP addresses.

The company will be sending out additional notifications if the investigation discovered that more customers have been affected by the breach.


from Help Net Security http://ift.tt/2bBwkpV

What differentiates a great CIO from simply a good one?

Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO).

great CIO

Young started his career as a software developer at HP, and stayed there for 11 years while occupying different IT and marketing roles. Before joining Sophos, he was the CIO at GoPro, and before that at Informatica, where he was also VP of Cloud and Subscription Sales.

“Prior to Sophos I helped two companies scale their IT capabilities to support $1B+ organizations. I have also helped evolve IT organizations to a level of maturity where they were business enabling. In all cases, security was a high priority. In these companies we matured the security and compliance functions to ensure they were core capabilities,” he told Help Net Security.

He expects his new job at Sophos to present a welcome challenge.

“In a sense, when you enter a new environment you are doing more than just one job,” he says. “One of those jobs is learning about the organization and the people you have within that organization. A second is ensuring that all existing commitments are being executed whilst ensuring that risk is managed. And a third is determining what needs to be done in order for the organization to progress forward in an elegant and effective manner.”

What makes a great CIO?

Young’s previous experiences in the CIO role have taught him that there are four things that differentiate a great CIO from simply a good one:

  • The ability to sell an idea and to influence an organization – a CIO must be able to eliminate barriers so that both the company and the team can be more successful.
  • A great CIO needs to be able to establish a compelling vision and ensure execution – people want to follow something they believe in, something greater than themselves.
  • A great CIO is an inspirational leader – people follow someone who cares about them and their success. “People are your number one asset and it is vital that you set a direction – a vision for success – and then provide them with the resources to ensure that they can be successful,” he notes. “Empower them and then get out of their way and allow them to flourish.”
  • A great CIO must be a business person first, then a technologist. It is vital to understand the business drivers and to ensure that your organization is investing proportionately in areas that will materially improve the business.

That last bullet point is often debated, and many fall on the “technical CIO” side of the debate.

“I agree you must understand technology and most CIOs have had deep technical expertise at some time in their career. What is most important, however is understanding how to leverage technology to create a sustainable competitive advantage,” Young opines.

“As for technical depth, as a CIO you need to surround yourself with people who know a lot more about technology than you. Most people also underestimate the amount of influencing and selling that is always required to be successful.”

His advice for those who want to, some day, occupy the CIO role, is to find a strong mentor.

“You do not need to be the smartest person in the room but you do need to know the smartest people and leverage their best practices. You also need to keep learning and one way you can do this is by networking with peers. Identify what world-class IT looks like and work for leaders who are world-class,” he concludes.


from Help Net Security http://ift.tt/2bFmoZM

Definitive EU net neutrality guidelines released

The Body of European Regulators for Electronic Communications (BEREC) has published the final guidelines aimed at helping EU member states’ National Regulatory Authorities (NRAs) implement EU net neutrality rules.

EU net neutrality

Net neutrality is the principle that ISPs and governments must apply an “equal and non-discriminatory treatment of (Internet) traffic.”

The road to the guidelines was long, and involved consultations with European-level stakeholders, academic, legal and technical experts, and the public.

The guidelines are published together with an accompanying consultation report summarising stakeholders’ views submitted and how they have been taken into account.

“BEREC’s Guidelines not about creating new rules; rather, about providing guidance on the regulatory implementation of existing rules,” the organization noted.

Here is a summary of the main changes that the guidelines effected, including more clarification on zero-rating, traffic management, and specialized services.

European Digital Rights (EDRi), an association of civil and human rights organizations from across Europe, is satisfied with the guidelines, and calls them a win for net neutrality in Europe.

Previously, they weren’t too content with the European Net Neutrality Rules themselves, deeming them too vague. They hoped that BEREC’s guidelines would fix that problem, and apparently they did.

“Based on a preliminary reading of the text, this is a triumph for the European digital rights movement,” net neutrality activist Thomas Lohninger from SaveTheInternet.eu commented. “After a very long battle, and with the support of half a million people, the principles that make the internet an open platform for change, freedom and prosperity are upheld in the EU.”

Joe McNamee, Executive Director of EDRi, congratulated BEREC on “its diligent work, its expertise and its refusal to bend to the unreasonable pressure placed on it by the big telecoms lobby,” and boasted that “Europe is now a global standard-setter in the defence of the open, competitive and neutral internet.”


from Help Net Security http://ift.tt/2c3Jtrm

Google Chrome impersonator Trojan doing rounds

If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with the Mutabaha Trojan.

According to Dr. Web researchers, the Trojan is downloaded on victims’ computers by a previously installed dropper. The dropper contacts a C&C server which instructs it to download and install Mutabaha, and then the dropper removes itself.

When running, the Trojan takes the form of Outfire, a special build of Google Chrome.

Mutabaha Trojan: Google Chrome impersonator

“During installation, it registers itself in the Windows system registry, launches several system services, and creates tasks in the Windows Task Manager in order to load and install its updates. In addition, Outfire modifies the installed Google Chrome browser by removing or creating new shortcuts and copying current Chrome user account information into the new browser,” the researchers explained.

This way, when you mean to open Chrome via the usual shortcut, you’re actually opening Outfire posing as Chrome.

“Once the installation is complete, the fake browser displays a home page which cannot be changed in the browser’s settings. In addition, it has a fixed extension designed to replace advertisements in browsed webpages and uses its own search engine, set by default—however, it can be changed in the application’s settings,” the researchers noted.

There are two interesting things about this Trojan: it searches for and removes other fake browsers that it finds on the target system, and it uses a recently documented technique to bypass Windows’ User Account Control (UAC).

More technical details about the threat can be found here.


from Help Net Security http://ift.tt/2bA4i11

Tuesday, August 30, 2016

SimpleRisk: Enterprise risk management simplified

SimpleRiskIn this podcast recorded at Black Hat USA 2016, Josh Sokol, creator of SimpleRisk, talks about his risk management tool, which he presented at the Black Hat Arsenal.

Written in PHP, with a MySQL database back-end, SimpleRisk was created in order to make risk management obtainable to all security practitioners, not just the ones with money to buy a GRC platform.

Due to it’s intuitive interface, this tool has actually been selected over the big name GRC tools in several instances.

The SimpleRisk Core product is free and downloadable. It should provide everything that you need in order to get started with risk management.

SimpleRisk

Black Hat USA 2016


from Help Net Security http://ift.tt/2bB2hPn

L0phtCrack 7 audits passwords up to 500 times faster

L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs.

L0phtCrack

A 4-core CPU running a brute force audit with L0phtCrack 7 is now 5 times faster than L0phtCrack 6. If you have a GPU such as the AMD Radeon Pro Duo the speedup is an astounding 500 times.

L0phtCrack was first released 19 years ago. Its password cracking capability forced Microsoft to make improvements to the way Windows stored password hashes. Microsoft eventually deprecated the weak LANMAN password hash and switched to only the stronger NTLM password hash it still uses today. Yet, hardware and password cracking algorithms have improved greatly in the intervening years.

The new release of L0phtCrack 7 demonstrates that current Windows passwords are easier to crack today than they were 18 years ago when Microsoft started making much needed password strength improvements.

On a circa-1998 computer with a Pentium II 400 MHz CPU, the original L0phtCrack could crack a Windows NT, 8 character long alphanumeric password in 24 hours. On a 2016 gaming machine, at less hardware cost, L0phtCrack 7 can crack the same passwords stored on the latest Windows 10 in 2 hours. Windows passwords have become much less secure over time and are now much more easily cracked than in the era of Windows NT. Other OSes, such as Linux, offer much more secure password hashing, including the NSA recommended SHA-512.

The ease of abusing weak Windows domain user passwords is not lost on attackers. In fact, a recent study by Praetorian of 100 penetration tests for 75 organizations found that the most prevalent insecure finding in the kill chain, at 66% of the time, is weak domain user passwords.

L0phtCrack 7 can easily audit your Windows domain to discover weak domain user passwords in a few hours. Then, with a few clicks, remediate the vulnerability with forced password resets or by disabling unused accounts completely.

In addition to auditing passwords much faster, L0phtCrack 7 includes improvements in its easy to use password auditing wizard, scheduling, and reporting. An updated password hash importer works seamlessly locally and remotely with all versions of Windows, up to and including Windows 10 “Anniversary Edition”. There is also support for many new types of UNIX password hashes. A new plugin interface will allow 3rd parties to build password importers and password hash crackers for new types of passwords in the future.


from Help Net Security http://ift.tt/2bUEGZK

Ubiquity and danger: The web scraping economy

Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing content into the web scraper’s own website and business operations. In most cases, bots, which make up 46 percent of web traffic, are implemented by individuals to perform web scraping at a much faster rate than humans alone.

web scraping

Diverse actors leverage web scraping bots, including nefarious competitors, internet upstarts, hedge funds, fraudsters, hackers, and spammers, to effortlessly steal whatever pieces of content they are programmed to find, and often mimic regular user behavior, making them hard to detect and even harder to block. Roughly two percent of online revenue is lost as a result of web scraping.

Through analysis of top web scraping platforms and services, Distil Networks outlined how the democratization of web scraping allows users to effortlessly steal sensitive information on the web.

“If your content can be viewed on the web, it can be scraped,” said Rami Essaid, CEO of Distil Networks. “Not only does web scraping pose a critical challenge to a website’s brand, it can threaten sales and conversions, lower SEO rankings, or undermine the integrity of content that took considerable time and resources to produce. Understanding the pervasive nature of today’s web scraping economy not only raises awareness about this growing challenge, it also allows website owners to take action in the protection of their proprietary information.”

38% of companies who engage in web scraping do so to obtain content – Web scraping is also used for research, contact scraping, price comparison, weather data monitoring, and website change detection.

Real estate sites are the number one victim of web scraping – Other industries plagued by web scraping include digital publishing, travel, online directories, e-commerce, and marketplace and classifieds.

Web scraping services cost as little as $3.33 per hour – The average web scraping project costs roughly $135.

The average web scraper makes $58,000 annually – When working for a large company specializing in web scraping, individuals can earn up to $128,000 per year for their work.


from Help Net Security http://ift.tt/2bF7ym6

Is Facebook’s People You May Know putting users at risk?


What is a friend, exactly? It’s a tricky question.

Too tricky even for the computing might of Facebook.

The Social Network is still some way short of total omniscience, so its Menlo Park boffins (apparently unconvinced by our ability to identify friends unaided) have to resort to rummaging through our virtual stuff looking for clues pointing to undeclared, undiscovered “People You May Know“.

Facebook describes how it does its rummaging in the following, vague terms:

People You May Know are people on Facebook that you might know. We show you people based on mutual friends, work and education information, networks you’re part of, contacts you’ve imported and many other factors.

Those “other factors” are a secret and how they interact has captured the attention of Fusion editor Kashmir Hill.

In June, Hill published an interview with a father who attended a gathering for suicidal teens. The father was shocked to discover that following the highly sensitive meeting one of the participants duly appeared in his People You May Know feed.

The only thing the two people seemed to have in common was that they’d been to the same meeting.

According to Hill:

The two parents hadn’t exchanged contact information (one way Facebook suggests friends is to look at your phone contacts). The only connection the two appeared to have was being in the same place at the same time, and thus their smartphones being in the same room.

Facebook’s response to the claim left Hill with “reportorial whiplash”, as she called it.

Facebook first suggested that location data was used by People You May Know if it wasn’t the only thing that two users have in common, then said that it wasn’t used at all, and then finally admitted that it had been used in a test late last year but was never rolled out to the general public.

So Hill was mistaken in her initial claim that “Facebook is using your phone’s location to suggest new friends”, but (if we assume his story is genuine) the outcome for the father was still the same.

Whatever confluence of events that lead to Facebook making recommendations that exposed sensitive information via People You May Know could presumably happen to others.

One of those others is a psychiatrist called Lisa (not her real name), another Hill interviewee who found out in the summer of 2015 that Facebook was suggesting her patients to each other in People You May Know:

“It’s a massive privacy fail,” said Lisa. “I have patients with HIV, people that have attempted suicide and women in coercive and violent relationships.”

Lisa lives in a relatively small town and was alarmed that Facebook was inadvertently outing people with health and psychiatric issues to her network.

Lisa was convinced that Facebook must have been using location data to suggest her patients to each other but Hill suspects that what they have in common is Lisa’s phone number:

[Lisa] was surprised to see that she had, at some point, given Facebook her cell phone number. It’s a number that her patients could also have in their phones. Many people don’t realize that if they give Facebook access to their phone contacts, it uses that information to make friend recommendations; so if your ex-boss or your one-time Tinder date or your psychiatrist is a contact in your phone, you might start seeing them pop up in the “People You May Know” list.

The need to maintain patient confidentiality has prevented both Hill and Facebook from investigating the underlying cause of the events reported by Lisa any further.

If Hill is right and Facebook’s use of phone numbers can produce issues like this one then brace yourself; it’s about to inject itself with a hit of up to one billion more of them from WhatsApp.

The stories published on Fusion are shocking, and whilst it remains a possibility that the people involved were mistaken, or even lying, these are not lone voices.

Stories about Facebook’s ability to dredge up unsuitable or even dangerous matches, whether they’re OkCupid dates we’d rather not see again or protected journalistic sources, have been around for as long as the People You May Know feature itself.

People You May Know isn’t designed to out people or put them at risk, but when your algorithms are secret, ever changing and handling 1.7 billion active users your edge cases can affect a lot of people.

The edge cases are also an insight into how much more than 98 things Facebook really knows about you.

The shock that Facebook may have leaked the names of a psychiatrist’s patients to each other masks the shock that Facebook knows enough to be able to do that in the first place, and that even tech-savvy users like Lisa aren’t aware of just how much they’re sharing.

With a bit of luck you might avoid the algorithms’ edge cases, but you can’t stop the algorithms churning altogether.

Not unless you leave.



from Naked Security http://ift.tt/2c2pNnG

Linux servers hit with FairWare ransomware – or is it just a scam?

Users posting on Bleeping Computer’s forums have alerted the world to a new threat targeting Linux server admins: the FairWare ransomware.

Whether the ransomware actually exists or not is still up for debate, as we only have the attackers’ claim that they are using it. It’s perfectly possible that they managed to compromise servers – apparently, through a brute-force SSH attack – and simply deleted the data they claim to have stolen.

Victims of the attack find their web folder deleted, and in its place a ransom note pointing them to an online paste.

There, they find the ransom note, saying that their server has been infected with “a ransomware variant called FAIRWARE,” that they have two weeks to send 2 Bitcoin to a specified address, and that they can contact the attackers via email, but should not expect to see proof that the attackers have the stolen files:

FairWare ransomware ransom note

This definitely adds to the suspicion that they might have simply deleted the files in question and, even if the victims pay, they might not get them back.

“Most ransomware developers dont just delete files as it would quickly be found out and noone would pay the ransom,” Bleeping Computer’s Lawrance Abrams noted.

“Its possible they gzipped the www folders, uploaded it, and then deleted it. Unfortunately, wont know unless you email them.”

So far, the attackers’ Bitcoin address has yet to show evidence of a ransom payment. This threat is very recent, and the two week payment deadline is still far off, so victims are likely still trying to discover whether paying the ransom will bring their files back and are looking for answers online.


from Help Net Security http://ift.tt/2cbmCw6

USBee makes USB devices transmit data from air-gapped computers


After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at cellular frequencies, hard drive noise and fan noise, researchers from the Ben-Gurion University of the Negev’s Cyber Security Research Center have now demonstrated that USB devices can be turned into a short-range RF transmitter via their USBee malware.

Unlike COTTONMOUTH, NSA’s USB hardware implant that allows attackers to infiltrate air-gapped systems, load exploit software on and exfiltrate data from them, USBee uses generic, otherwise unmodified USB devices, and equips them with software that intentionally generates controlled electromagnetic emissions from the data bus of a USB connector.

The team created a receiver (a $30 RTL-SDR software-defined radio connected to a laptop) and demodulator to see how effective this data exfiltration approach is, and they established that USBee can transmit data at a rate of 80 bytes per second. This is enough to quickly exfiltrate things like passwords or encryption keys.

The receiver can be positioned up to nine feet away from the transmitting USBee, and still successfully receive the sent data. The gap can be even wider if the USB transmitter is equipped with a cable that can function as an antenna.

Of course, for this attack to work, this specific malware has to already be present on the targeted computer, and that means that the computer has been already compromised, likely by an insider as the air-gapped computer is not connected to the Internet or to another network.

Average users does not have to worry about run-of-the-mill cyber crooks wielding USBee, but intelligence agencies and hacking teams backed by governments and involved in cyber espionage could definitely find this approach useful in some cases.

The researchers pointed out a few countermeasures that could work to defend air-gapped computers from this type of attack, including physical isolation (shielding or preventing EMR from USB components) and positioning the air-gapped computer into a restricted area, far away from other electronic equipment.

Apart from COTTONMOUTH, earlier examples of USB-based data spying solutions include BadUSB and TURNIPSCHOOL.


from Help Net Security http://ift.tt/2bOoLOS

How to choose a perfect data control solution for your enterprise

Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it.

In fact, the majority of the work and email is done on mobile devices, and this changed how people interact with data and how we keep it safe.

perfect data control solution

Prakash Linga at Vera HQ

This shift is why it’s important for businesses to maintain a certain level of visibility when it comes to data, and have the ability to use tools like Dynamic Data Protection (DDP) to ensure that if policies need to be adjusted for specific users, IT admins can do so in real-time.

“As information travels, this introduces new ways to access data and collaborate using tools like Dropbox and other productivity tools, so security must also evolve and change to keep pace,” says Prakash Linga, CTO of data security company Vera.

“On top of that, it’s not longer sufficient to rely on perimeter defenses when it comes to information security. You have to collapse the data control and policy enforcement down to the data. Any effective, and usable data security solution will encompass the best of both worlds: it will secure information with granular and flexible policies, and enable employees to continue their workflow seamlessly, while still giving companies optimal security.”

A perfect enterprise data security solution

Data control and visibility is a huge problem that large and small companies need to be mindful of.

A good data security solution is one that works as you want it to but it’s also equally important that it’s easy to use by your employees, management, and partners.

The best technical solution will not mean much if they don’t want to use it because it gets in the way of their work.

“In an ideal world, you want your users to maintain productivity, while still giving IT the confidence they’re doing so in a secure way,” Linga points out.

“Organizations spend too much time and money trying to focus on one aspect of the problem by adding more defenses, rather than focusing on the primary reason employees aren’t using the security tools already in place.”

The ideal data control solution should also offer robust data control tools with a user-friendly backend, to make life easier for IT and security teams. Managing policies and data at scale is a challenge and, according to Linga, this is one of the reasons why Data Loss Prevention (DLP) hasn’t taken off as expected.

A great data control system will be one that fits well within a specific and complex enterprise ecosystem – across different companies, meshing well with existing collaboration and productivity tools, and covering every data workflow.

Finally, the solution has to be always on, so that organizations can be confident that their most critical business information is secure whether it’s at rest, behind a firewall, or has been moved outside their network.

“For a lot of security savvy people, it’s all about having strong security controls. What we’ve learned from conversations with customers, prospects, and industry research is the biggest problem is keeping honest users honest,” says Linga.

“I’m referring to people who inadvertently share information they shouldn’t. For example, an executive accidentally fat-fingers a confidential financial document or earnings report to the wrong person.”

Data control and the Internet of Things

“The nature of data is changing rapidly. Today, it’s mostly collaboration and exchange between two people, but tomorrow it’s with IoT and other devices and approaches,” says Linga.

We know that makers of IoT devices and the software that makes them “smart” regularly disregard security, and that IoT is slowly infiltrating both homes and offices.

“Small quantities of data is often shared between devices and, if you look at the information as a snapshot in time, it might not be sensitive or something you care about at that moment. However, over an extended period of time, you may start to see patterns, and it becoming more relevant from an enterprise and consumer standpoint,” he adds.

Enterprises will have to find a way to keep on top of things, and be ready to pivot as fast as needed to tackle the known and yet unknown challenges of data security in the age of IoT.

“Both security and privacy needs to evolve for the new workflow around data and collaboration,” he concludes.


from Help Net Security http://ift.tt/2bO2Rvc

Monday, August 29, 2016

Risk and the Pareto Principle: Applying the 80/20 rule to your risk management strategy

risk management strategyEnterprises these days are putting more resources into monitoring and managing business risk. And with good reason – in light of a growing number of vulnerabilities and advanced threats, they’re dealing with a more complex risk environment that also impacts their technology partners and other third parties.

Of course, unknown and hidden vulnerabilities increase enterprise risk by leaving organizations susceptible to data theft, cyber espionage and other business disruptions. For regulated industries, vulnerability exploits can also result in hefty financial penalties and additional audits. What also may be less obvious, but eventually costlier, is that these vulnerabilities can often leave an organization susceptible to attack for years down the road.

Take the Yahoo breach as an example of the long and far reaching tail of business risk. While the breach itself likely dated back to 2012, it reared its head four years later in August 2016 when a hacker publicly announced that he had just placed 200 million Yahoo login credentials – including MD5-hashed passwords and date of births – for sale on the underground marketplace. And will this breach manifest in other ways down the road? More than likely.

While organizations are investing in Threat and Vulnerability Management (TVM) solutions to understand their exposure to risk, they’re also realizing that it’s nearly impossible to address the explosion of vulnerabilities that they’re suddenly detecting in their environment. A TVM solution might be a step in the right direction, but organizations also need to approach their risk posture more strategically.

Research indicates that the majority of risk (about 80 percent) is sourced to a fraction of their vulnerabilities (20 percent or less.) Looking ahead, that means organizations need to prioritize the vulnerabilities that present the most risk. By focusing on critical flaws with the potential for damage, enterprises can make a huge dent to business risk, while also streamlining threat management processes to be more efficient, cost effective and smarter.

Threat and vulnerability management and the Pareto Principle

In light of these threat trends, it’s not surprising that enterprise organizations are paying more attention to their risk posture and actively monitoring business risk – the growing number of cyberattacks and insider breaches that are often buried inside millions of events and vulnerabilities.

How can organizations hope to wrap their arms around all of those vulnerabilities hidden in their network? The short answer is that they probably can’t – and shouldn’t try. In order to truly understand their risk posture and address the threats that have the potential to cause the most damage, they need to be more strategic.

To start, organizations need to understand the Pareto Principle – otherwise known as the 80-20 rule – and how it applies to their threat environment. At a high level, the Pareto Principle, named for economist Vilfredo Pareto, stipulates that roughly 80 percent of the effects or results are attributed to 20 percent of the causes or invested input.

It’s a universal concept that also applies to users’ vulnerability environment. From a risk standpoint, that means that approximately 80 percent of the business risk that can cause the most harm comes from just 20 percent of the vulnerabilities.

So, in order to successfully gauge risk and develop an effective risk strategy, organizations will not only need to find vulnerabilities, they’ll need to identify and determine the right vulnerabilities – the ones that present the biggest risk both to their business and security posture.

In short, this is the equivalent of “finding a needle in a stack of needles.” The ability to locate, triage and then patch the most serious vulnerabilities is a lot more challenging than simply finding them. For that, organizations will need to invest in business risk and intelligence technologies which often includes some kind of Threat and Vulnerability Management (TVM) solution, designed to streamline the aggregation and correlation of asset vulnerability data with threat intelligence, while scoring risk and analytics prioritizing actions that tightly align with business objectives. In fact, solutions now provide risk intelligence coupled with TVM capabilities, which can also be offered from the cloud to accommodate an enterprise’s unique environment and scale as it grows.

But that’s just the beginning. Whatever solution that’s adopted needs to incorporate three salient macro-dimensions that will help enterprises to apply the Pareto Principle to their risk environment – rapidly identifying 20 percent of the most critical vulnerabilities while more effectively mitigating 80 percent of the impact.

The Data Model: Like the foundation of a building, the ability to locate, query and prioritize the data is where it all starts, essentially setting the stage for an effective Pareto Principle approach to risk.

It’s no secret that as organizations are now required to support thousands of practitioners and millions of asset objects, enterprise risk has become a big data challenge. To address this, organizations will need to create a strategy designed to effectively query, assess, analyze and prioritize the most important threat and risk data. Among other things, this includes smart connectivity with a large number of ecosystem partners, which enables organizations to quickly populate that model, and incorporates advanced correlation engine to ensure high performance functionality, regardless of the query.

Automation: These days, automation is not a luxury but a necessity for any organization attempting to get ahead of their business risk. Automation gives organizations the ability to streamline the process of operationalizing their security solutions – this includes content mapping, leveraging pre-built workflows, data ingestion with filtering, self-service business intelligence, and UI customization among other things that are now available “out of the box.” In addition to streamlining operations, automation is now an essential feature for data collection, providing organizations security threat information and asset discovery on an ongoing basis. And the biggest advancement in automation is the ability to configure, not program, changes.

Risk Scoring and Analytics: For organizations, one of the biggest priorities is board reporting – which means they need quick and easy access to dashboards and heat maps that can be generated in near real time. They also need the ability to easily slice and dice risk intelligence as needed for business leaders, security personnel and IT team members. They need the ability to assemble vulnerability and threat intelligence feeds into comprehensive analytics that reflect their own business-specific risk likelihoods and impacts.

Specifically, they require one data model, but multiple reporting options. The good news is that there are numerous innovations in risk scoring algorithms to quantify and prioritize risks based on multi-attribute weightings for business priorities, security data, and operational and compliance policies.

Modern analytics are mandatory for enterprises to quickly visualize business critical risk and make remediation immediately actionable. Among other things, this allows organizations to leverage scoring algorithms that quantify and prioritize vulnerabilities based on business requirements, threat exploits, and vulnerability impacts. They entail the ability to correlate assets with business context and threat intelligence, and conduct event analysis so organizations can see the entire picture of their risk posture. Prioritizing those vulnerabilities is conducted with configurable vulnerability risk scoring for security operations as well as business risk scoring across multiple lines of business as well as third parties.

When facing scrutiny from the board, analytics can provide key risk metrics – trending business risk prioritization and remediation effectiveness that includes factors such as aging, cost per vulnerability and incident reduction. Analytics also enable organizations to correlate vulnerabilities and patch information, including the ability to prioritize and group vulnerabilities based on criteria such as asset criticality, compliance regulations, vendors and SLA commitments. What’s more, for compliance and internal audits, analytics are vital for vulnerability exceptions – tracking critical flaws not remediated by policy.

Organizations can’t manage what they can’t see. A big picture of risk environment is a start. But ultimately, honing in on the most important 20 percent by understanding where to look and what to look at will offer a crucial leg up in managing the threats and vulnerabilities that have the potential to cause the most damage.


from Help Net Security http://ift.tt/2cnICFe

CodexGigas: Malware profiling search engine

CodexGigas is a free malware profiling search engine powered by Deloitte Argentina, which allows malware analysts to explore malware internals and perform searches over a large number of file characteristics.

malware profiling

Instead of relying of file-level hashes, users can compute hashes over features such as imported functions, strings, constants, file segments, code regions, or everything that is defined in the file type specification. This provides more than 142 possible searchable patterns that can be combined.

malware profiling

When it comes to development challenges, the authors tried to gather a massive amount of malware in order to test the software. “We currently have about 25 million samples, that’s 15 TB of malware. Turns out that amount of data is not as easy to manage as we thought. When processing data, for every extra millisecond it takes to process a sample on average, it takes seven hours to process the whole database,” Luciano Martins, CodexGigas developer, told Help Net Security.

If you’re interested in malware research, I suggest you take a look at Pestudio, a free tool that allows you to perform an initial assessment of a malware without even infecting a system or studying its code.


from Help Net Security http://ift.tt/2bwCFWE

55% of apps are already in the cloud, security a priority

Executives are increasingly adopting a digital business model, with the cloud as the key enabler. However, security concerns and tepid execution complicate the ability of the executives’ organizations to deliver on that commitment.

apps cloud security

IDG Research polled 175 IT and business executives in the United States and Europe on the initiatives their organizations are undertaking to capitalize on the convergence of social, cloud, mobility, data analytics, IoT and security to drive new business models and engage, enable and support an increasingly tech-savvy workforce and customer base.

72 percent of the respondents agree that it is critical or very important for an organization to modify IT processes and resources to support a digital business model.

The respondents clearly see the value of the cloud as the linchpin in an IT infrastructure that enables digital business: they report that more than half (55 percent) of their organizations’ applications are already deployed in a cloud environment.

Moreover, the respondents indicate that their organizations are seeing positive results from initial cloud and digital initiatives, with improvements over the last 12 months in multiple areas, including data security (56 percent), user experience with applications and services (44 percent), IT efficiency (42 percent) and infrastructure performance/availability (41 percent).

However, the executives show greater trepidation about their organizations’ ability to build quickly on that initial success. For example, fewer than 1 in 5 (15 percent) of respondents indicate that their organizations currently have the “extremely flexible/nimble” attributes required to implement a digital model that enables them to capitalize fully on future business opportunities.

Gap between aspiration and execution could impede progress

Those insufficiently robust capabilities could pose a challenge in areas the respondents see as priorities over the next 12 months. For example, 88 percent cite data security in the cloud as a top priority for competitiveness in the digital world while only 32 percent cite significant progress, creating a gap between aspiration and execution of 56 percentage points.

Similarly, less than a third of respondents report significant progress in other areas key to digital business, from creating scalable/predictable IT environments (24 percent) to gaining a high level of visibility into IT environments (32 percent). These shortfalls may slow progress at a time when it should be accelerating.

On the plus side, the study shows that the respondents who consider their organizations extremely flexible and nimble, and more aggressive in adopting the cloud, more frequently report benefits from use of cloud apps than the aggregate population of respondents.

59 percent of respondents who identify their organizations as extremely nimble say they have seen improved data security (vs. 56 percent of those who do not), while 56 percent of the same group say they are seeing improved speed of business decision-making.

By contrast, only 18 percent of those who identified their organizations as less nimble have seen improved speed of decision-making. There is also a significant disparity between those reporting improved user experience with applications and services. 52 percent of the extremely nimble group reports this benefit, while only 38 percent of the less nimble group can say the same.

Respondents in extremely nimble organizations are also more likely to report improved customer experience through integration of infrastructure and applications with IoT.


from Help Net Security http://ift.tt/2bwzBJV

Feds are using big data analytics for cybersecurity, but is it effective?

81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy and 28 percent are using it in a limited capacity. However, breaches continue to afflict agencies with 59 percent of Feds reporting their agency deals with a cybersecurity compromise at least once a month due to their inability to fully analyze data, according to MeriTalk and Cloudera.

big data analytics

It’s clear that Feds are struggling to stay afloat. Eighty-eight percent of Federal agencies face challenges drawing cybersecurity intelligence from data and the majority says the task has become more difficult in the past two years. Fewer than half of those using big data analytics for cybersecurity (45 percent) say they trust their efforts to be highly effective. Feds stated the following as top challenges:

  • Sheer volume of cybersecurity data is overwhelming (49 percent)
  • Agencies don’t have the right systems in place to gather the cybersecurity information they need (33 percent)
  • Information is no longer timely when it makes it to cybersecurity managers (30 percent).

As a result, more than 40 percent of their data goes unanalyzed. In addition to obvious budget issues, Feds’ efforts are hindered by: lack of skilled personnel (40 percent), potential privacy concerns (27 percent), and lack of management support/awareness (26 percent).

“Internal and external cybersecurity threats will continue to evolve daily and we need to unlock the power of the data in order to regain the advantage,” said Rocky DeStefano, Security SME at Cloudera. “Agencies need complete visibility into the data across their enterprise. These teams also need the ability to flexibly analyze that data in a meaningful timeframe so they can detect advanced threats quickly, identify the impact and reduce the associated risk. Accelerating investment in the platforms necessary to collect and analyze this data is critical to the success of these programs.”

big data analytics

Federal agencies that effectively use big data analytics see improvements in cybersecurity. In fact, 84 percent of big data users say their agency has successfully used big data analytics to thwart a cybersecurity attack and 90 percent have seen a decline in security breaches – malware (50 percent), insider threats (47 percent), and social engineering (46 percent) – as a result of using big data analytics.

Agencies see the value big data provides – 94 percent of Feds have plans to invest in big data analytics in the next two years with top planned investments in technology infrastructure (61 percent), hardware (52 percent), and business intelligence tools/analytics (52 percent).


from Help Net Security http://ift.tt/2c6AMvo

Five Tips for Avoiding the "Freshman 15"

During your freshman year of college, you’ll go through a lot of changes—including your weight if you’re not careful. These five tips will help keep you focused on your studies and not the

The “Freshman 15" is the name for the body weight many students pack on during their first year of college. It only takes about 144 extra calories each day for you to gain 15 pounds over the course of a year. That’s 144 calories that come from being able to eat whatever you like, stress snacking, and drinking alcohol. If you want to avoid those extra 15 pounds, this video from the PictureFit YouTube channel recommends you follow these tips:

  1. Avoid snacking during class: That three-hour humanities lecture may be boring, but munching on food is not a good way to keep yourself busy. This is especially true for chocolate and other candy. If you absolutely must have something, bring a water bottle and some high-fiber fruit or snack bars.
  2. Skip the sugary energy drinks: Caffeinated beverages might help you get through that math class, but one can of sugary energy drink every day will practically guarantee you gain the Freshman 15. If you need a boost, go for black coffee or green tea instead, or at least grab an energy drink that’s sugar-free.
  3. Use smaller plates in the cafeteria: Many college cafeterias offer an all-you-can-eat experience that is quite dangerous for any students who are watching their waistline. Do yourself a favor and use smaller plates to keep those portions under control. You’ll eat less and still feel satisfied.
  4. Make time for exercise: School will keep you busy, so don’t wait for free time to come around so you can go exercise. Make your workout part of your daily plan and stick to it. You don’t have to lift weights or run on treadmills either. There are lots of ways to get moving on college campuses.
  5. Limit alcohol consumption: Yes, it’s illegal, but many college freshman have access to alcohol one way or another. Alcohol adds a ton of calories to your diet, especially when it comes to the sugary cocktails many young drinkers enjoy. If you choose to drink, limit yourself as much as possible. Better yet, don’t drink at all and save yourself the calories as well as the trouble.

It’s not just about what you should avoid, however. It’s important to make healthy choices when it comes to food as well. Go for salads and vegetables at your cafeteria buffet, try to keep your diet high in protein, and when you can, make special requests to keep your meals from being something regret.

http://ift.tt/2aGfkM5

How To Avoid the FRESHMAN 15 - Keep the Weight Off During Your First Year of College! | YouTube


from Lifehacker http://ift.tt/2c9VTzT

Build a One-Click Morning Routine Starter with an Amazon Dash Button

We all have a morning routine, and depending on exactly how yours works, it might be possible to automate certain parts of it. Case in point, DIYer Tom Harrigan shows off his method of automating his morning routine to make his mornings a little easier.

When Harrigan presses the Amazon Dash button, the bedroom lights turn on, makes coffee using an If This Then That recipe, then sends a “good morning” message in Slack. It’s a simple system that’s easy enough to alter to fit your particular needs. Head over to Harrigan’s site for a full walkthrough.

Hacking a Morning Routine | Tom Harrigan


from Lifehacker http://ift.tt/2bMQG1G

This Video Shows How a Menstrual Cup Fits Inside You

If you’re used to tampons and pads, a menstrual cup might look bizarrely large and unwieldy: That’s supposed to fit where? This video offers a literal window into that problem. With a see-through anatomical model, everything becomes clear.

As the narrator explains how to insert the folded cup, you can see exactly what happens. Once it’s in far enough, it automatically pops open, and the handle of the cup doesn’t stick out at all, if you’ve chosen one that’s the right size for you. She also gives some helpful tips on removing it, and on how the cup interacts with other aspects of your anatomy—for example, a stiff cup can make it harder to empty your bladder. Check out the video for all those details, and if you’re still curious about menstrual cups, check out our guide on how to figure out if a cup is right for you.

http://ift.tt/29MmV0s

An “Inside” Look at Menstrual Cups | Put a Cup in It


from Lifehacker http://ift.tt/2bxasZH

iPhone Zero-Day Used by UAE Government

Last week, Apple issued a critical security patch for the iPhone: iOS 9.3.5. The incredible story is that this patch is the result of investigative work by Citizen Lab, which uncovered a zero-day exploit being used by the UAE government against a human rights defender. The UAE spyware was provided by the Israeli cyberweapons arms manufacturer NSO Group.

This is a big deal. iOS vulnerabilities are expensive, and can sell for over $1M. That we can find one used in the wild and patch it, rendering it valueless, is a major win and puts a huge dent in the vulnerabilities market. The more we can do this, the less valuable these zero-days will be to both criminals and governments -- and to criminal governments.

Citizen Lab blog post and report. New York Times article. More news articles.


from Schneier on Security http://ift.tt/2bx6wIt

Why Your Eyes Look Red in Photos and How to Prevent It


Nothing like a jarring pair of glowing red eyeballs to ruin the perfect shot. And while it’s a simple enough correction, SciShow explains why it happens in the first place and what you can do to prevent it.

As the video explains, the effect has to do with your eyes dilating. When the lighting around you is dark, the muscles in your iris make your pupils wider to let in more light. That way, you can see stuff. When your eyes glow red in photos, it’s often because you’re taking the photo in a dark room, and here’s what happens to your eyes:

...if there’s suddenly a bright camera flash, all that light floods into your eyes before your iris muscles have time to contract. Some of it might reflect off the blood vessels in the back of your eye, and shows up as a glowing red light to ruin that group photo you were trying to take.

Some cameras will actually flash a couple of times before taking the photo to give your eyes a chance to adjust to the light. SciShow suggests brightening the room before a photo, too, to make sure your pupils aren’t wide to begin with. Otherwise, avoid looking directly at the camera lens.

They offer some additional info in the video, along with some tips on how to tell if red-eye photos might actually signify eye problems. Check it out above and then head to their YouTube channel at the link below.

Why Do My Eyes Glow Red in Photos? | SciShow (YouTube)


from Lifehacker http://ift.tt/2bwyFzn

Five Last-Minute Tips Improve the Fit of a Baggy Shirt


If you have a shirt you like, but isn’t a perfect fit, there are a few ways to make it look and fit a little better before you can get it tailored or adjusted. Here are five (well, four and a gag) that work well in every situation.

The video above walks through all five of these pretty quickly, so it’s worth a watch. The first three tips are meant to be used when you don’t want to wear anything over the shirt, so you need it to look good from both the front and back. The last two are best used when you can layer something else over it.

  • Use a military tuck to tighten excess fabric and create a slimmer fit.
  • Roll up the sleeves to trim too long or loose fitting fabric.
  • Open the first two buttons for a more casual look (this makes a looser fitting shirt look less disheveled.)
  • Layer with a jacket or sweater to disguise a too-big shirt and hide excess fabric.
  • This is mostly a joke, but you can create a slim front silhouette by using binder clips to hold excess fabric at the back of your shirt.

Keep in mind what you’ll be doing while wearing the shirt. For example, the last “tip” will be uncomfortable if you plan to go to dinner or a meeting where you’ll want to rest your back against your chair. The look you’re going for will influence which of the above tips you decide to use, but remember that they’re only temporary fixes and you should get your shirt altered or tailored for a good fit that lasts.

5 Ill Fitting Shirt Hacks | Apparel Illustrated


from Lifehacker http://ift.tt/2bv7SGQ

Google Chrome users targeted by tech support scammers

Google Chrome users, beware: tech support scammers are misusing helpful browser features to impersonate Microsoft and to bombard users users with pop-ups.

In the first instance, the scammers are taking advantage of the browser’s full-screen mode.

tech support scammers

Users who are tricked into visiting a malicious site set up for the scheme can, at first glace, believe that they have landed on a legitimate tech support page by Microsoft: the address bar shows the right URL and the green lock that usually indicates that the site is what it says it is.

Unfortunately, the page has forced the browser to switch into full-screen mode, and the aforementioned address bar is an image loaded take the place of the real one.

“This is an interesting one because for years we have been telling people to double check the URL in the address bar to know if a website is really what it claims to be. When this scam page loads it runs in full-screen mode and prevents the user from easily closing it with an infinite loop of alerts,” noted Malwarebytes’ Jérôme Segura.

In the second instance, the scammers make the page show fake alerts saying the users’ computer has been blocked because it’s infected with spyware, but allow the users to press an OK button to dismiss the alert.

This alert has the “Prevent this page from displaying additional dialogues” (sic) option at the end of it checked, but it’s a lie.

Pressing the OK button will do the complete opposite: it will allow the page to show more similar fake Google Chrome alerts, with more tricks to exasperate the user (such as saying that pressing the ESC key will allow them to close the page, when only the Prevent message and the OK button will do that:

OPIS

Pressing the ESC key will trigger a new onslaught of fake pop-ups, making users more likely to decide to call the fake tech support number provided by the scammers.

“Sadly, most browsers are brought to their knees with simple bits of JavaScript and non savvy users will simply give up and call the toll free number for assistance (we forgot to mention that all this while a very annoying audio track plays in the background),” Segura pointed out.

It definitely pays to keep on top on all the new approaches online scammers come up with.


from Help Net Security http://ift.tt/2bujtbP

Some Anker USB-C Cables Are Getting Recalled For a Hardware-Frying Flaw


You’re probably going to have to start using USB-C cables for some gadgets in the near future, but you should probably be careful which ones you buy. Diligent engineers have found a flaw in some Anker USB cables that can destroy hardware.

As engineer Nathan K shows in the above video, Anker’s Powerline 3.1 Gen2 cable has a flaw that causes it to “remember” the charging voltage for a laptop that it’s plugged into, then accidentally provide that higher voltage to a phone unless it’s unplugged from the more powerful charging base. This can overload your phone and destroy it, if the phone isn’t equipped to handle more than 5 volts.

Anker has already replied with the following recall:

We are offering all of our PowerLine USB-C A8185011 users a full refund. In addition, we would like to offer a free Anker PowerLine USB-C cable to affected customers once we have improved Anker PowerLine USB-C A8185011.

This isn’t the first time that we’ve seen a problem with cables and quick chargers using the higher voltage capabilities of USB-C. Unfortunately, not all accessory manufacturers have tested everything as thoroughly as they should before they go out. USB-C cables are still relatively new compared to more established standards and hopefully manufacturers get their stuff in order before too long. Still, it’s worth reading reviews on USB-C cables before you buy, lest you lose some expensive hardware.

Anker issues recall and replacements after researcher demonstrates unsafe USB-C cables | Android Police


from Lifehacker http://ift.tt/2bLTU16

XSS flaw in D-Link NAS devices allows attackers to mess with your data

Security researcher Benjamin Daniel Mussler has unearthed an XSS flaw affecting seven D-Link NAS devices – a flaw which could allow attackers to access the devices and peruse and change the stored contents.

D-Link NAS flaw

He first found it in the firmware of D-Link DNS-320 rev A, a Network Storage Enclosure that allows users to access stored data via SMB and can be configured through a web interface.

“The device’s administrative web interface contains a Stored Cross-Site Scripting vulnerability, exploitable through an unauthenticated SMB login attempt (445/tcp). The injected code is executed when the victim logs into the administrative web interface,” he explained.

“Unlike reflected XSS vulnerabilities, it does not require the victim to open an attacker-supplied link or to visit a malicious web page. This is one of the relatively few XSS vulnerabilities where malicious code can be injected despite having neither direct nor indirect access to the vulnerable web application. As such, it can be exploited even when access to ports 80/tcp (HTTP) and 443/tcp (HTTPS) is denied.”

And, he pointed out, “due to the nature of the vulnerability, it would be trivial to automate the injection of malicious code into a number of vulnerable devices.”

After getting in touch with D-Link, the company confirmed that the same vulnerability exists in six other NAS models: DNS-320 rev B, DNS-320L, DNS-325, DNS-327L, DNS-340L, and DNS-345.

In mid July, D-Link pushed out patches for the firmware of DNS-320, DNS-320L and DNS-340L that solve the issue, but not for the rest of the affected products. They didn’t explain why.

When Mussler publicly released information about the flaw at the beginning of August, there were no indication that the flaw was being exploited in the wild. But, since he also published PoC code at the time, it is possible that someone has started exploiting in the meantime.

Ransomware authors might implement it to maximize the reach of the malware.

“NAS devices are often used to store backups of data the user considers important enough to keep a copy of. The vulnerability described in this advisory enables ransomware to have data deleted from a NAS device the next time the victim logs into the administrative web interface,” he noted.

That’s one reason why, even for devices for which a firmware update solving the problem has been made available, users should be careful when applying it.

“If D-Link addresses the vulnerability with a firmware update, its installation will require users to log into the vulnerable web interface. However, if an attacker has already managed to store malicious code inside the web interface, logging in to install the update may cause this code to be executed,” Mussler pointed out, and offered advice on the precautions to take to minimize the risk to the stored data.


from Help Net Security http://ift.tt/2bU9vPg

Why You Should Sleep Naked

We’ve mentioned before that sleeping in the nude has all sorts of benefits, including deeper, better sleep and helping you stay cool while you rest, but this video from DNews wraps up all of those benefits nicely, and adds some more we haven’t discussed.

http://ift.tt/2bwcmtl

Sleeping naked definitely keeps your body cooler than sleeping in clothes, obviously, but it’s that slight temperature difference that can lead to deeper, more restful, and uninterrupted sleep. It’s not the only benefit to sleeping naked though—as the video explains, sleeping naked can be especially good for reproductive health as well, and minimizing the chance of yeast infections for ladies, and helping men keep their testicles cool and avoid low sperm count. Of course, sleeping naked has other benefits, especially if you have a partner, as skin-to-skin contact is not only therapeutic, but a great form of medicine for both your mind and your body. Touching helps you build a stronger emotional bond with your partner, and kicks off the release of oxytocin in your brain, which helps regulate mood.

The video goes into a little more detail about each of these, so hit play above to check out the full thing, or hit the link below to read more about it—and some related articles—at YouTube.

Why Everyone Should Sleep Naked | DNews (YouTube)


from Lifehacker http://ift.tt/2bwady7

Cisco starts publishing fixes for EXTRABACON exploit

Starting last Wednesday, Cisco has begun publishing fixes for the SNMP RCE flaw in the software of its Adaptive Security Appliances (ASA), which can be triggered through the EXTRABACON exploit leaked by the Shadow Brokers.

EXTRABACON exploit

The exploit was initially thought to work only on versions 8.4.(4) and earlier of the ASA firewalls, but researchers have recently discovered that with small modifications, the exploit can be made to work on more recent versions of the appliance.

EXTRABACON exploits a zero-day buffer overflow vulnerability (CVE-2016-6366) in the SNMP code of the Cisco ASA, Cisco PIX, and Cisco Firewall Services Module. It allows attackers to execute arbitrary code and obtain full control of the system if certain requirements are met first (the affected device must be configured for SNMP with the snmp-server enable command, the attacker must know the SNMP community string).

Given that the exploit is now public, and modification trivial to hackers who know what to do, it’s just a matter of time until the exploit is widely used by different attackers. Many have already started.

So if you are a user of this particular Cisco product, now is the time to check for fixed software releases and implement them, if possible.

If it’s not possible, the company has also provided workarounds, a Snort rule and a Legacy Cisco IPS Signature that should help with detecting exploitation of the issue, so use those to minimize risk.

The SNMP RCE flaw also affects Cisco Firewall Service Modules and Cisco PIX Firewalls, but their software is no longer supported.

“Further investigations into these devices will not be performed, and fixed software will not be made available,” the company announced.


from Help Net Security http://ift.tt/2c2kvYk

Sunday, August 28, 2016

DNSSEC: Don’t throw the baby out with the bath water

DNSSECA recent report raiseed concerns about the abuse of DNSSEC to conduct DDoS attacks. The article reported that DNSSEC-signed domains can be used to conduct reflected DDoS attacks with large amplification factors (averaging 28.9x in their study) that could potentially cripple victim servers. The report went on to recommend that organizations deploying DNSSEC should configure their DNS servers to prevent this and other types of abuse.

While this report presents some useful information about the potential for misuse of DNSSEC, it has the side-effect of casting doubt on the overall value of the DNSSEC protocol itself. It would be a shame if someone reading this report concludes that DNSSEC creates more problems than it solves. In fact, DNSSEC is an essential protocol that continues to add critically needed trust to internet communications.

Most IT and security professionals know that DNS is the protocol that maps domain names to IP addresses that computer systems require to communicate. But the DNS is much more than this – it is a globally distributed ‘database’ that can be used to store a wide variety of information and retrieve it from any computing system anywhere in the world. Its architecture has been proven over decades of use to scale effectively to the size of the internet.

DNSSEC adds a missing ingredient to this globally distributed, highly scalable database – trust. Trust means two things – first, knowing that data received from a domain came from the owner of the domain; and second, knowing that the data has not been altered while in transit. It is important to note that DNSSEC does not provide confidentiality to the DNS – it makes the DNS a trustworthy place to publish and retrieve public information, but it does not make it a place to publish confidential or sensitive information.

Up to this point, most implementations of DNSSEC focused on ensuring the trustworthiness of only one piece of information – the IP addresses of servers associated with a domain name. While this is an important piece of information to protect, because it eliminates the risk that an attacker can hijack an organization’s web or email servers, it is only the first of many pieces of information that can be published in a trustworthy fashion in the DNS. In this article, I would like to focus on two pieces of information that have the potential to significantly increase the security of internet communications – email certificates, and web (TLS) certificates.

Theoretically, anyone can send an encrypted email to anyone else today. The only thing needed is to have the email certificate of the recipient. Once this information has been saved, most email clients will happily encrypt a message so that it can be read only by its intended recipient. In practice, this process has proven to be difficult – how does each recipient get a certificate? How do they send the certificates to anyone that might want to send them an encrypted email? These are the two critical challenges that have prevented widespread adoption of email encryption.

DANE (DNS-Based Authentication of Named Entities) SMIMEA records are a recent addition to the DNS that defines how email certificates can be published in in the DNS and secured with DNSSEC. Organizations that wish to enable encrypted email can publish an email certificate for some or all of their employees in their DNS, and these certificates can be retrieved by DANE-enabled email clients to automatically encrypt sensitive communications. The use of DNSSEC in conjunction with this new protocol is critical, as it prevents attackers from hijacking these certificates in order to snoop on sensitive emails. By making it easy to publish and retrieve email certificates, DANE removes one of the two barriers to widespread adoption of end-to-end email encryption. The second barrier – generation of email certificates and management of them throughout their lifecycle – can be addressed by commercial products, as this problem does not require any new internet standards in order to be tackled effectively.

Web servers also utilize certificates (in this case, TLS certificates) to encrypt web communications. These certificates are issued by Certificate Authorities (CA) that certify that the owner of a domain is the owner of the certificate. There are two main problems with this trust model, however. First, if you trust one CA, you must trust them all. Any CA can issue a certificate for any domain, and there are now dozens or even hundreds of CAs that are directly or indirectly trusted by today’s web browsers. Second, if you trust a CA to issue one type of certificate, you must trust them to issue any type of certificate. As a result of the CA trust model, a breach of a CA can result in the issuance of forged TLS certificates for ANY domain, and this, in turn, can allow web sites to be hijacked without detection. Such a breach actually occurred in 2011, when a Dutch CA was compromised and fraudulent certificates issued and again in 2013 as a result of the compromise of a Turkish CA.

DANE is also used to increase the trust in TLS certificates by allowing a domain owner to indicate to a web browser which CA is authorized to issue certificates on its behalf, which certificate the browser should expect, or whether the domain owner is self-publishing its own certificates. The net effect is a significant reduction in the risk of compromise of these critical certificates.

DNSSEC is a valuable security protocol, not just because it authenticates IP addresses to prevent domain hijacking, but also because it can be used to authenticate a wide variety of information that is controlled by a domain owner. We have seen how the recently published DANE standard enables increased trust in both email and web communications. Future standards may expand the set of information that can be published in the DNS and secured with DNSSEC. DNSSEC is simply too important to the future of internet communications to ignore or dismiss.


from Help Net Security http://ift.tt/2bZecFR