Sponsor

2014/08/14

| 08.14.14 | Don't worry, as long as you don't use the Web, everything's fine

If you are unable to see the message below, click here to view.

What's New:
1. But as long as you don't read PDFs or surf the Web, don't worry, everything's fine
2. Tennessee firm sues bank over money lost in cyberheist
3. Yes, but what KIND of education do infosec pros really need?
4. Why the Blackphone hack at DEF CON was way overhyped

Spotlight:
Wired on the real Edward Snowden story

Also Noted:
Evading black helicopters; IoT security at tipping point; more Much more...

News From The Fierce Network:
1. Leading your IT team through a slump or setback
2. BYOx and the underpants strategy
3. Android Fake ID flaw increases BYOD risks

FierceITSecurity

August 14, 2014

Subscribe | Website
Refer FierceITSecurity to a Colleague

This week's sponsors:
PGi
Dell
GLOBO



 Follow @fierceitsec on Twitter


This week's sponsor is PGi.

Webinar: IT and Marketing: Extreme Collaboration
Tuesday, August 26th, 2pm ET / 11am PT | New Editorial Event!

Media outlets love to focus on the tension between IT and marketing. But if it's a war, both sides lose. Instead, CIOs have to partner with CMOs to help deliver on aggressive business goals in an ever-changing landscape. Register Today!


Sponsor: GLOBO

Webinars

> IT and Marketing: Extreme Collaboration - Tuesday, August 26th / 2pm ET / 11am PT
> Advancing the federal cybersecurity workforce - Wednesday, September 10th | 2pmET/11amPT

Marketplace

> Whitepaper: Supporting VDIs and Thin Clients
> eBook: eBrief | Making BYOD Work: 4 Critical Strategies for Midmarket and SMB Companies

This week's sponsor is Dell.
UnboundID
Webinar: Advancing the federal cybersecurity workforce
Wednesday, September 10th, 2pm ET/ 11am PT

Join NIST and NICE leaders as they explore The National Cybersecurity Workforce Framework, innovative spproaches to cybersecurity training and workforce improvement, the broader focus of NICE in advancing cybersecurity awareness nationawide, and more! Register Today!

What's New

1. But as long as you don't read PDFs or surf the Web, don't worry, everything's fine

By Derek C. Slater Comment | Forward | Twitter | Facebook | LinkedIn

Happy Tuesday, everyone. Please patch all systems having anything to do with the Web.

Microsoft's Patch Tuesday releases this week focused on Internet Explorer, addressing 26 'critical' vulnerabilities. Included on that list is one problem that had already been disclosed publicly, and one that Microsoft said is likely being exploited.

ThreatPost's Michael Mimoso points out several other recent announcements from Microsoft indicating that IE security needs tightening up. The company is shortening the window of time for support of older versions of the browser to 18 months. IE versions 6 through 8 lack certain memory protections that have been added since, so Microsoft wants to clamp down on usage of those more vulnerable versions.

Microsoft also announced last week that IE will start blocking the usage of older ActiveX controls, including those used in outdated versions of Java.

Just to keep you on your toes, Adobe also advised patching a total of eight critical flaws in its popular Flash, Acrobat and Reader products. Security vendor Kaspersky Labs reportedly identified one vulnerability that is being actively exploited in isolated cases.

" The vulnerability allows attackers to escape the sandbox protection of Reader and Acrobat X and XI in order to execute code with elevated privileges on the Windows platform," reports Lucas Constantine of IDG News Service.

For more:
- Read ThreatPost's Patch Tuesday writeup
- And Constantine's coverage of Adobe issues

More on patching and vulnerabilities:
Heartbleed scan shows most large companies still vulnerable
Android Fake IT flaw increases BYOD risks  (FierceMobileIT)
IoT stands for 'Increase of Threats' for many CIOs (FierceMobileIT)

 

Read more about: Patch Tuesday, Adobe
back to top


This week's sponsor is GLOBO.

eBrief | Making BYOD Work: 4 Critical Strategies for Midmarket and SMB Companies

Bring-your-own-device (BYOD) can be a blessing for mid-size and small businesses. But getting the real payoff requires some attention to details that may differ from those at large enterprises. This FierceMobileIT eBrief provides practical advice for making BYOD work. Download today.


2. Tennessee firm sues bank over money lost in cyberheist

By Derek C. Slater Comment | Forward | Twitter | Facebook | LinkedIn

Does your bank have to help you prevent fraud?

That's a question at the heart of a lawsuit filed by TEC Industrial against TriSummit Bank.

As first reported by Brian Krebs, a May 2012 account takeover by Russian cybercriminals drained more than $300,000 out of TEC's accounts at TriSummit. TEC (called Tennessee Electric Company at the time) was able to reverse numerous transfers but ultimately lost $192,656 to the attack.

Krebs alerted TEC to the problem on May 10, 2012 after speaking with a money mule who indicated receiving funds from the accounts.

Now TEC seeks to recover those damages from the bank. The complaint is filed with the Sullivan County circuit court in Tennessee.

This is not the first such lawsuit filed against banks for similar reasons. Krebs notes that decisions to date 'have been weighted heavily' in favor of the banks. Computerworld's Jaikumar Vijayan provides some details of two US Court of Appeals decisions in recent months, one (from the Eighth Circuit court) favoring the bank, and the other (from the First Circuit) decided for the plaintiff, a Maine-based construction company.

For more:
- Read Krebs' analysis of the lawsuit
- See the formal complaint
- Read Computerworld's coverage

More on cybercrime and the law:
Delaware firms must destroy consumer records, new law says
Most plaintiffs dismissed in SAIC's case of unencrypted backup tapes
33 lawsuits against Target over data breach will be heard by one Minnesota judge

 

Read more about: cybercrime
back to top


3. Yes, but what KIND of education do infosec pros really need?

By Derek C. Slater Comment | Forward | Twitter | Facebook | LinkedIn

In a recent column posted by Dark Reading, Hord Tipton--head of industry association (ISC)2--says infosec pros need four things to 'close the talent gap' in the battle between security and hackers. Thing One is education.

Fair enough. However, Tipton doesn't offer a lot of specifics other than to say "continuing education and training in order to stay ahead of ever-changing security threats."

So what specific educational background might make information security professionals most successful--do they need more specific engineering and technology coursework? Or would 18th-century English Lit be more helpful?

The answer doesn't have to be one or the other, of course. And that's a key point argued by Lysa Myers in another contributed Dark Reading piece.

Myers, Security Researcher at ESET who has worked in anti-malware since 1999, has a background in visual arts and finds it makes pattern-recognition 'a quick and intuitive process' for her.

Myers says that while STEM education is (of course) extremely valuable, it may be better when supplemented with more emphasis on writing and design. These capabilities and a general strength in creative thinking can work together with more traditional computer science forms of analytical thinking to equip infosec professionals for success.

"It is my fervent hope that creativity does not get lost in the rush to churn out STEM graduates and employees," Myers writes.

For more:
- Read Tipton's column
- And Myers' piece

More on security education and training:
Abysmal communication between IT and executive teams undermines corporate security
Many firms still in the dark and ill-prepared when it comes to APT attacks
Needed: People skills for IT security pros

 

Read more about: training
back to top


4. Why the Blackphone hack at DEF CON was way overhyped

By Derek C. Slater Comment | Forward | Twitter | Facebook | LinkedIn

The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.

"Blackphone rooted in 5 minutes" was a blogger's version of the story, which was then picked up by several other media outlets. This week the real story emerged.

The Blackphone is a first-generation device created by SGP Technologies, a joint venture of GeeksPhone and Silent Circle.

Sean Gallagher of Ars Technica explains that Blackphone's makers went to Black Hat to promote the product, as well as subject it to the inevitable testing that exposure to such an audience would provide.

And indeed, Jon Sawyer, CTO of Applied Cybersecurity (aka 'Justin Case') reportedly approached the Blackphone table and told them he had successfully rooted the phone. Gallagher notes that a BlackBerry blogger produced the erroneous 'in 5 minutes' headline (and also that an earlier Black Hat presentation had demonstrated vulnerability in BlackBerry and certain Android and iOS devices).

Rooting the device required a fairly stringent set of circumstances. Sawyer told Ars Technica that it required physical possession of the device, knowledge of the PIN code, and a non-standard configuration.

The headline on the original story at N4BB has been changed and the story was updated.

For more:
- Read the Ars Technica account
- See the updated N4BB post

More on mobile security:
Spotlight: Apple says iPhone backdoors are diagnostic services
Scams that take over smartphones for cryptocurrency mining are just not worth it
Is encryption the prescription for smartphone-based medical care? (FierceMobileIT)

Read more about: Mobile Security
back to top


Also Noted

TODAY'S SPOTLIGHT... Wired on the real Edward Snowden story

James Bamford is a former intelligence worker and was a self-described whistleblower in the 70s. For Wired's August magazine cover story, Bamford spent nine months working to set up face-to-face time with Snowden in Moscow; the result is a fairly detailed recounting of the operational aspects of his actions, as well as the politics behind them. Read more.

 

> DEF CON: Advice on evading black helicopters (eSecurityPlanet)
> Internet of Things security reaches tipping point  (Dark Reading)
> 7 futuristic authentication systems DARPA is funding (ITWorld)
> Why SIEM is different from your other security products  (Gartner blog)

And Finally... How to use your cat to hack your neighbor's wi-fi  (Wired)

 

Webinars

> IT and Marketing: Extreme Collaboration - Tuesday, August 26th / 2pm ET / 11am PT

Media outlets love to focus on the tension between IT and marketing. But if it's a war, both sides lose. Instead, CIOs have to partner with CMOs to help deliver on aggressive business goals in an ever-changing landscape. Register Today!

> Advancing the federal cybersecurity workforce - Wednesday, September 10th | 2pmET/11amPT

Join NIST and NICE leaders as they explore The National Cybersecurity Workforce Framework, innovative spproaches to cybersecurity training and workforce improvement, the broader focus of NICE in advancing cybersecurity awareness nationawide, and more! Register Today!

Marketplace

> Whitepaper: Supporting VDIs and Thin Clients

Companies have already begun deploying VDIs and thin clients (like Google's Chromebook) on a massive scale. The low-cost, easily deployed workstations present a significant cost savings for companies, but require unique tools to support them. This whitepaper, written by Proxy Networks, outlines the best way to do that. Download now.

> eBook: eBrief | Making BYOD Work: 4 Critical Strategies for Midmarket and SMB Companies

Bring-your-own-device (BYOD) can be a blessing for mid-size and small businesses. But getting the real payoff requires some attention to details that may differ from those at large enterprises. Download this eBrief to get more practical advice for making BYOD work.


©2014 FierceMarkets, a division of Questex Media Group LLC This email was sent to ignoble.experiment@arconati.us as part of the FierceITSecurity email list which is administered by FierceMarkets, 1900 L Street NW, Suite 400, Washington, DC 20036, (202) 628-8778.
Refer FierceITSecurity to a Colleague

Contact Us

Editor: Fred Donovan. VP sales and business development: Jack Fordi. Publisher: Ron Lichtinger.

Advertise

General advertising: Jack Fordi. Press releases: Fred Donovan. Request a media kit.

Email Management

Manage your subscription

Change your email address

Unsubscribe from FierceITSecurity

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts