Cyber Security Vulnerability and Patch Report, September 10, 2017

Cyber Security Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Important Security Updates

Avira Antivirus: Avira has released version 15.0.30.29 of its free Antivirus. Updates are available from Avira’s website.

Dropbox: Dropbox has released version 34.4.20 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

Google Chrome: Google has released Google Chrome version 61.0.3163.79. Updates are available from within the browser or from Google Chrome’s website.

Microsoft: Microsoft has released updates for Office, Project and Visio. These are available from the Control Panel.

Opera: Opera has released version 47.0.2631.80. Updates are available from within the browser or from Opera’s website.

Viber: Viber has released version 6.9.1.77 for Windows. Updates are available on Viber’s website.

Current Software Versions

Adobe Flash 26.0.0.151

Adobe Reader DC 2017.012.20093

Dropbox 34.4.20 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 55.0.3 [Windows]

Google Chrome 61.0.3163.79

Internet Explorer 11.0.9600.18763

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.40.0.103

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in Apache Struts 2, IOS, IOS XE, IoT Field Network Director, Unified Communication Manager, Yes Set-Top Box, SocialMiner XML, Prime LAN Management Solution, Prime Collaboration Provisioning Tool, IR800 Integrated Services Router, Firepower Management Center, Email Security Appliance, Unified Intelligence, Unity Connection, Cisco Meeting Server, Emergency Responder, Catalyst 4000 Series Switches, ASR 920 Series Routers, ASR 5500 System Architecture Evolution Gateway and others. Apply updates. Additional details are available at Cisco’s website.

McAfee: McAfee has released updates for it’s Threat Intelligence Exchange Server. Updates are available from McAfee’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, September 10, 2017, appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cybersecurity News of the Week of, September 10, 2017

Cyber Security News 05.17.jpg

 

CYBER SECURITY NEWS

from our friends at Citadel Information Group

 

Individuals at Risk

Identity Theft

Equifax Hack Exposes Regulatory Gaps, Leaving Consumers Vulnerable: Despite the wealth of sensitive information in their databases, credit bureaus don’t face the same kind of scrutiny and oversight that banks do. The New York Times, September 8, 2017

Here are all the ways the Equifax data breach is worse than you can imagine: Another day, another massive data breach. Except this one involves Equifax, one of the credit-monitoring companies you might expect to be ultrasensitive to the importance of safeguarding your personal information from hackers. LA Times, September 8, 2017

Equifax Breach Response Turns Dumpster Fire: I cannot recall a previous data breach in which the breached company’s public outreach and response has been so haphazard and ill-conceived as the one coming right now from big-three credit bureau Equifax, which rather clumsily announced Thursday that an intrusion jeopardized Social security numbers and other information on 143 million Americans. KrebsOnSecurity, Septeber 8, 2017

Equifax Breach: 8 Takeaways: After Equifax on Thursday warned that 143 million consumers’ personal details may have been stolen by hackers, criticism of the consumer credit reporting agency – and data broker – has been swift. BankInfoSecurity, September 8, 2017

Outrage builds after Equifax executives banked $2 million in stock sales following data breach: The sale of nearly $2 million in corporate stock by high-level Equifax executives shortly after the company learned of a major data breach has sparked public outrage that could turn into another hurdle for the credit rating agency. The Washington Post, September 8, 2017

Equifax Says Cyberattack May Have Affected 143 Million in the U.S.: Criminals gained access to certain files in the company’s system from mid-May to July, according to an investigation by Equifax. The New York Times, September 7, 2017

Cyber Defense

Password Managers: One of the most important steps you can take to protect
yourself online is to use a unique, strong password for every one of your accounts and apps. Unfortunately, it is most likely impossible for you to remember all your different passwords for all your different accounts. This is why so many people reuse the same password. SANS, September 2016

Information Security Management in the Organization

Cyber Warning

New Dridex Phishing Campaign Delivers Fake Accounting Invoices: A new variant of the banking trojan Dridex is part of a sophisticated phishing attack targeting users of the cloud-based accounting firm Xero. ThreatPost, September 7, 2017

Cyber Defense

Are you an easy hacking target? Cybersecurity tips for small business: Small businesses and self-employed people are big targets for hackers, and the financial implications can be crippling. Gone are the days of thinking “It’ll never happen to us”. A total of 61% of all data breaches this year occurred in businesses with fewer than 1,000 employees, according to the Verizon Data Breach Investigations Report. Estimates vary on how much a breach truly costs, but it can often be millions of pounds. The Guardian, September 8, 2017

The 5 cyber attacks you’re most likely to face: As a consultant, one of the biggest security problems I see is perception: The threats companies think they face are often vastly different than the threats that pose the greatest risk. For example, they hire me to deploy state-of-the-art public key infrastructure (PKI) or an enterprise-wide intrusion detection system when really what they need is better patching. CSO, August 21, 2017

Cyber Talent

Meet the WISOs: 10 Women Information Security Officers to watch: As girls and young women become interested in cybersecurity, they can look to these Women Information Security Officers for inspiration. CSO, September 8, 2017

Cybersecurity in Society

Cyber Freedom

German hackers find security hole in software used for vote counts: Serious security flaws in the software used to register voting tallies in Germany and transmit them across the country have been found by a hackers’ collective, who have warned of the possibility of external attacks. The Guardian, September 8, 2017

Cash-strapped states brace for Russian hacking fight: The U.S. needs hundreds of millions of dollars to protect future elections from hackers — but neither the states nor Congress is rushing to fill the gap. Politico, September 3, 2017

Fake News

The Fake Americans Russia Created to Influence the Election: Posing as ordinary citizens on Facebook and building “warlists” of Twitter accounts, suspected Russian agents intervened last year in the American democratic process. The New York Times, September 7, 2017

The Fake-News Fallacy:Old fights about radio have lessons for new fights about the Internet: On the evening of October 30, 1938, a seventy-six-year-old millworker in Grover’s Mill, New Jersey, named Bill Dock heard something terrifying on the radio. Aliens had landed just down the road, a newscaster announced, and were rampaging through the countryside. Dock grabbed his double-barrelled shotgun and went out into the night, prepared to face down the invaders. But, after investigating, as a newspaper later reported, he “didn’t see anybody he thought needed shooting.” In fact, he’d been duped by Orson Welles’s radio adaptation of “The War of the Worlds.” Structured as a breaking-news report that detailed the invasion in real time, the broadcast adhered faithfully to the conventions of news radio, complete with elaborate sound effects and impersonations of government officials, with only a few brief warnings through the program that it was fiction. The New Yorker, September 4, 2017

National Cybersecurity

The Cyberlaw Podcast – Stewart Baker interviews Michael Mainelli: In Episode 177, fresh from hiatus, we try to summarize the most interesting cyber stories to break in August. Paul Rosenzweig kicks things off with the Shunning of Kaspersky. I argue that the most significant – though unsupported – claim about Kaspersky is Sen. Shaheen’s assertion that all of the company’s servers are in Russia. If true, that’s certainly an objective reason not to let Kaspersky install sensors in non-Russian computers. The question that remains is how much due process companies like Kaspersky should get. That’s a question unlikely to go away, as DOD is now comprehensively shunning DJI drones, issuing guidance that sounds a lot like Edward Snowden demanding that users uninstall all DJI apps and remove all batteries and storage media. Steptoe Cyberblog, September 5, 2017

The first quantum-cryptographic satellite network will be Chinese: IN THE never-ending arms race between encryptors and eavesdroppers, many of those on the side that is trying to keep messages secret are betting on quantum mechanics, a description of how subatomic particles behave, to come to their aid. In particular, they think a phenomenon called quantum entanglement may provide an unsubvertable way of determining whether or not a message has been intercepted by a third party. Such interception, quantum theory suggests, will necessarily alter the intercepted message in a recognisable way, meaning that the receiver will know it is insecure. This phenomenon depends on the fact, surprising but true, that particles with identical properties which are created simultaneously are entangled in a way that means one cannot have its properties altered without also altering the other, no matter how far apart they are. The Economist, August 31, 2017

Cyber Law

Could CareFirst Data Breach Case Be Headed to Supreme Court?: Could the class action lawsuit filed against CareFirst Blue Cross Blue Shield after a 2014 cyberattack impacting 1.1 million individuals be the first data breach case headed to the Supreme Court? A recent ruling by a federal court makes that a possibility. BankInfoSecurity, September 8, 2017

SEC Chief: Regulators must do more to help small investors better understand cyber crime and online fraud: NEW YORK (Reuters) – Regulators must do more to help mom-and-pop investors better understand the potential risks posed by cyber crime and new technologies used to commit fraud, U.S. Securities and Exchange Commission Chairman Jay Clayton said on Tuesday. Reuters, September 5, 2017

Cyber Medical

DHS Warns of 8 Cybersecurity Vulnerabilities in Smiths Medical Wireless Infusion Pumps: The Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (DHS ICS-CERT) on Thursday issued an advisory detailing eight cybersecurity vulnerabilities found in Smiths Medical’s Medfusion 4000 wireless infusion pumps. RAPS, September 8, 2017

Critical Infrastructure

Symantec Report: Hackers found to gain direct operational access to US power grid controls: In an era of hacker attacks on critical infrastructure, even a run-of-the-mill malware infection on an electric utility’s network is enough to raise alarm bells. But the latest collection of power grid penetrations went far deeper: Security firm Symantec is warning that a series of recent hacker attacks not only compromised energy companies in the US and Europe but also resulted in the intruders gaining hands-on access to power grid operations—enough control that they could have induced blackouts on American soil at will. Wired, September 6, 2017

Internet of Things

IoT Security: What’s Plan B?: In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn’t regulate the IoT market. It doesn’t single out any industries for particular attention, or force any companies to do anything. It doesn’t even modify the liability laws for embedded software. Companies can continue to sell IoT devices with whatever lousy security they want. SchneierOnSecurity, September 2017

Cyber Miscellany

If Blockchain Is the Answer, What Is the Security Question?: Like any technology, blockchain has its strengths and weaknesses. But debunking three common myths can help you cut through the hype. DarkReading, September 8, 2017

Boston Red Sox Used Apple Watches to Steal Signs Against Yankees: When confronted by Major League Baseball, the Red Sox admitted they were using Apple Watches in a scheme to gain an edge at the plate. The New York Times, September 5, 2017

Cyber Research

Security researchers in China send silent commands to speech recognition systems with ultrasound: Security researchers in China have invented a clever way of activating voice recognition systems without speaking a word. By using high frequencies inaudible to humans but which register on electronic microphones, they were able to issue commands to every major “intelligent assistant” that were silent to every listener but the target device. TechCrunch, September 6, 2017

SecureTheVillage Calendar

PIHRA: Information Security Awareness: The Cyber Tsunami!: Citadel’s Kimberly Pease will facilitate a discussion of (i) steps to take to protect a company’s information from hackers and cyber criminals; (ii)tips to protect yourselves as consumers; (iii) understanding who the criminals are and why you are a target; (iv) real stories and scary examples that could happen to you. September 20, 7:30 – 9:30, The City Club

SecureTheVillage: Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. September 22, 7:30 – 10:00, Grandpoint Bank

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. September 28, 7:30 -10AM. Datastream, Glendale.

Glendale Tech Week: SecureTheVillage and Citadel President Stan Stahl will join Louie Sadd, Datastream Managing Partner and SecureTheVillage Leadership Council member, and other cybersecurity panelists. October 12, 10:00 – 11:00, Glendale Central Library.

SecureTheVillage: Cybersecure Los Angeles 2017 — Get Cyber Prepared: SecureTheVillage joins UCLA Extension for its first cybersecurity conference. Learn from leading information security professionals and law enforcement, including: information security providers, cyber-insurance, financial services, law, the FBI, LA County District Attorney’s Office, and more. Leave with SecureTheVillage’s Information Security Management and Leadership ResourceKit: A practical guide for implementing an information security management and leadership program in your organization. October 19, 9:00 – 2:00, UCLA Extension, Figueroa Courtyard

The post Cybersecurity News of the Week, September 10, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security Vulnerability and Patch Report, September 3, 2017

Cyber Security Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Important Security Updates

Avast: Avast has released version 17.6.2310 for Free Antivirus. Updates are available on Avast’s website. Avast! has also released updates for Premier Antivirus, Pro Antivirus and Internet Security.

Comodo Free Firewall: Comodo has released version 10.0.1.6294 of its free firewall and antivirus. Updates are available from Comodo’s website.

Opera: Opera has released version 47.0.2631.71. Updates are available from within the browser or from Opera’s website.

Skype: Skype has released Skype 7.40.0.103. Updates are available from the program or Skype’s website.

Current Software Versions

Adobe Flash 26.0.0.151

Adobe Reader DC 2017.012.20093

Dropbox 33.4.23 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 55.0.3 [Windows]

Google Chrome 60.0.3112.113

Internet Explorer 11.0.9600.18763

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.40.0.103

For Your IT Department

None

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, September 3, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

 

Cyber Security News for the Week of, September 3, 2017

Cyber Security News

 

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Identity Theft

700 Million-Plus Email Addresses Leaked by Spam Operation: A sloppy spamming operation has exposed on a server in the Netherlands gigabytes of files that include 711 million email addressees and some associated account passwords. BankInfoSecurity, August 31, 2017

Cyber Privacy

Hackers are selling millions of Instagram celeb accounts on web. Selena Gomez among victims: A group of hackers used a bug earlier this week to scrape the phone numbers and email addresses of six million Instagram accounts and are now selling that information on the web. TechCrunch, September 1, 2017

Cyber Danger

Is Your Mobile Carrier Your Weakest Link?: More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security of your mobile account. Below are some tips to ensure your mobile device (or, more specifically, your mobile carrier) isn’t the weakest link in your security chain. KrebsOnSecurity, August 27, 2017

Victim of crypto-currency theft describes how cybercriminals hacked his cellphone: At about 9pm on Tuesday, August 22 a hacker swapped his or her own SIM card with mine, presumably by calling T-Mobile. This, in turn, shut off network services to my phone and, moments later, allowed the hacker to change most of my Gmail passwords, my Facebook password, and text on my behalf. All of the two-factor notifications went, by default, to my phone number so I received none of them and in about two minutes I was locked out of my digital life. TechCrunch, August 23, 2017

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency: Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal. The New York Times, August 23, 2017

Cyber Defense

On what basis are we to trust online file conversion services?: Let’s imagine that you just received an attachment on your phone, such as an image, a document or a spreadsheet. Naked Security, September 1, 2017

Cyber Warning

Beware of Hurricane Harvey Relief Scams: U.S. federal agencies are warning citizens anxious to donate money for those victimized by Hurricane Harvey to be especially wary of scam artists. In years past we’ve seen shameless fraudsters stand up fake charities and other bogus relief efforts in a bid to capitalize on public concern over an ongoing disaster. Here are some tips to help ensure sure your aid dollars go directly to those most in need. KrebsOnSecurity, August 29, 2017

Information Security Management in the Organization

Cyber Warning

Locky Ransomware Campaign Returns via Spam and Dropbox-Themed Phishing Attacks: In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We’re allowing access to a growing and dynamic user population that includes not only employees but partners, customers, channels and contractors. And, while the always-on mobile and BYOD landscape offers much-needed convenience for users, it further blurs personal and corporate access boundaries. Ultimately, we need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s completely seamless and easy for our users. BankInfoSecurity, Event on September 5, 2017

Cyber Talent

CISOs’ Salaries Expected to Edge Above $240,000 in 2018: Other IT security professionals may garner six-figure salaries as well, new report shows. DarkReading, September 1, 2017

The Haves And Have-Nots In Cybersecurity: How Your Company Can Level The Playing Field: We all know about the income-inequality debate in America, and the controversy about too much wealth being held by the “one percent”. But did you know there’s also an inequality issue when it comes to our country’s cybersecurity? Forbes, August 29, 2017

Cybersecurity in Society

Cyber Crime

Canadian university scammed out of $11.8 million: MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers. HelpNetSecurity, September 1, 2017

A server hosting dozens of popular file converter sites has been hacked: The server hosting the sites had been “tampered with for months on end, without the server owner noticing it.” ZDNet, August 31, 2017

Know Your Enemy

Hackers Host Ransomware on US Government Site to Infect Site-Visitors: As recently as Wednesday afternoon, a U.S. government website was hosting a malicious JavaScript downloader that led victims to installations of Cerber ransomware. ThreatPost, September 1, 2017

Cyber Law

Judge Nixes Bid to Quash Suit Filed by Yahoo Breach Victims: A federal judge in California has ruled that a consolidated class-action lawsuit filed by those affected by three Yahoo data breaches can proceed. BankInfoSecurity, September 1, 2017

Cyber Freedom

Open source or proprietary: how should we secure voting systems?: The stakes are always high when it comes to software security, which is why the ongoing debate over open-source vs. proprietary tends to be passionate. NakedSecurity, September 1, 2017

Software Glitch or Russian Hackers? Election Problems Draw Little Scrutiny or Analysis: The calls started flooding in from hundreds of irate North Carolina voters just after 7 a.m. on Election Day last November. The New York Times, September 1, 2017

National Cybersecurity

WikiLeaks alleges CIA created bogus software upgrade to steal data from FBI, NSA: The CIA didn’t trust its security service partners to share biometric information with it, so it created a bogus software upgrade to steal the data. ZDNet, August 25, 2017

Cyber Government

Trump’s Cabinet Leaves Key Cybersecurity Reports Unfinished: Major cybersecurity reports looking at the American government’s ability to defend itself from hacking are unfinished months after the deadline set by President Donald Trump. Newsweek, September 1, 2017

Cyber Medical

Pacemaker recall due to cybersecurity vulnerability affects at Least 456,000 US patients: Around 465,000 Americans with pacemakers fitted are being advised to visit their doctor to get an important software upgrade – otherwise their life-saving inner gadget could be vulnerable to a hacking attempt. Science Alert, September 1, 2017

Internet of Things

Leak of more than 1,700 valid passwords could make the IoT mess much worse: Security researchers have unearthed a sprawling list of login credentials that allows anyone on the Internet to take over home routers and more than 1,700 “Internet of things” devices and make them part of a destructive botnet. ars technica, August 25, 2017

Cyber Sunshine

Mirai Malware Attacker Extradited From Germany to UK: Admitted Mirai malware mastermind Daniel Kaye, 29, has been extradited from Germany to the United Kingdom, where he faces charges that he launched cyberattacks against two of Britain’s biggest banks. BankInfoSecurity, August 31, 2017

Tech Firms Team Up to Take Down ‘WireX’ Android DDoS Botnet: A half dozen technology and security companies — some of them competitors — issued the exact same press release today. This unusual level of cross-industry collaboration caps a successful effort to dismantle ‘WireX,’ an extraordinary new crime machine comprising tens of thousands of hacked Android mobile devices that was used this month to launch a series of massive cyber attacks. KrebsOnSecurity, August 28, 2017

Fake News

The Intimidators: Twitter bots unleashed in a social media disruption tactic: Overnight from August 28 to August 29, a major Twitter botnet opened a new front in its ongoing attempts to intimidate @DFRLab, creating fake accounts to impersonate and attack our team members. DFR Lab, August 30, 2017

Fake Twitter bots w Russian fingerprints used to intimidate and disrupt social media: I awoke this morning to find my account on Twitter (@briankrebs) had attracted almost 12,000 new followers overnight. Then I noticed I’d gained almost as many followers as the number of re-tweets (RTs) earned for a tweet I published on Tuesday. The tweet stated how every time I tweet something related to Russian President Vladimir Putin I get a predictable stream of replies that are in support of President Trump — even in cases when neither Trump nor the 2016 U.S. presidential campaign were mentioned. KrebsOnSecurity, August 30, 2017

SecureTheVillage Calendar

National Assn of Corporate Directors — Southern California Chapter: Join SecureTheVillage and Citadel President Stan Stahl, the National Cyber Forensics Training Alliance (NCFTA) CEO and former secret service agent Matt Lavigna, Apria Healthcare’s CISO Jerry Sto. Thomas and former SaaS CEO and PwC Partner, Bob Zukis. Learn about Southern California’s unique risks and local efforts to fight cybercrime. September 6, Noon Luncheon, California Club.

PIHRA: Information Security Awareness: The Cyber Tsunami!: Citadel’s Kimberly Pease will facilitate a discussion of (i) steps to take to protect a company’s information from hackers and cyber criminals; (ii)tips to protect yourselves as consumers; (iii) understanding who the criminals are and why you are a target; (iv) real stories and scary examples that could happen to you. September 20, 7:30 – 9:30, The City Club

SecureTheVillage: Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. September 22, 7:30 – 10:00, Grandpoint Bank

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. September 28, 7:30 -10AM. Datastream, Glendale.

Glendale Tech Week: SecureTheVillage and Citadel President Stan Stahl will join Louie Sadd, Datastream Managing Partner and SecureTheVillage Leadership Council member, and other cybersecurity panelists. October 12, 10:00 – 11:00, Glendale Central Library.

SecureTheVillage: Cybersecure Los Angeles 2017 — Get Cyber Prepared: SecureTheVillage joins UCLA Extension for its first cybersecurity conference. Learn from leading information security professionals and law enforcement, including: information security providers, cyber-insurance, financial services, law, the FBI, LA County District Attorney’s Office, and more. Leave with SecureTheVillage’s Information Security Management and Leadership ResourceKit: A practical guide for implementing an information security management and leadership program in your organization. October 19, 9:00 – 2:00, UCLA Extension, Figueroa Courtyard

 The post Cybersecurity News of the Week, September 3, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

Cyber Security Vulnerability and Patch Report, August 27, 2017

Cyber Security Vulnerability and Patch Report

  

From our friends at

 Citadel Information Group

Important Security Updates

AxCrypt: AxCrypt has released version 2.1.1534.0. Updates are available from AxCrypt’s website.

Dropbox: Dropbox has released version 33.4.23 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

Foxit Reader: Foxit has released Foxit Reader 8.3.2.25013 of its popular PDF-reader. Updates are available from within the program or from Foxit’s website.

Google Chrome: Google has released Google Chrome version 60.0.3112.113. Updates are available from within the browser or from Google Chrome’s website.

Google Earth Pro: Google has released version 7.3.0.3832 for Google Earth Pro. Updates are available from Google’s website.

LastPass: LastPass has released version 4.1.63 for its Free Password Manager. Updates are available from LastPass’ website.

Malwarebytes: Malwarebytes has released version 3.2.2.2018. Updates are available from Malwarebytes website.

Mozilla Firefox: Mozilla has released version 55.0.3. Updates are available within the browser or from Mozilla’s website. 

Current Software Versions

Adobe Flash 26.0.0.151

Adobe Reader DC 2017.012.20093

Dropbox 33.4.23 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 55.0.3 [Windows]

Google Chrome 60.0.3112.113

Internet Explorer 11.0.9600.18763

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.39.0.102

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in Smart Net Total Care, Meeting Server and others. Apply updates. Additional details are available at Cisco’s website.

TeamViewer: TeamViewer has released version 12.1.16680. Updates are available from TeamViewer’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security News for the week of August 27, 2017

Cyber Security News

 

Cyber Security News

from our friends at Citadel Information Group

Individuals at Risk

Identity Theft

Why It’s Still A Bad Idea to Post or Trash Your Airline Boarding Pass: One reason may be that the advice remains timely and relevant: A talk recently given at a Czech security conference advances that research and offers several reminders of how being careless with your boarding pass could jeopardize your privacy or even cause trip disruptions down the road. KrebsOnSecurity, August 24, 2017

Cyber Danger

Bank-fraud malware not detected by any AV found in Chrome Web Store. Twice in 17 days:A researcher has uncovered an elaborate bank-fraud scam that’s using a malicious extension in Google’s Chrome Web Store to steal targets’ passwords. Ars Technica, August 16, 2017

Cyber Defense

Backup & Recovery: If you use a computer or mobile device long enough, sooner or later something will go wrong, resulting in you losing your personal files, documents, or photos.SANS Securing the Human, August 2017

10 browser extensions to help keep you safe on the web: These 10 browser extensions can help add more than just peace of mind; they can step in where the average web browser fails and protect you from common threats. Tech Republic, August 25 2017

Cyber Warning

Adware Spreading Via Social Engineering, Facebook Messenger: Attackers have taken to Facebook Messenger with a combination of social engineering and malicious JavaScript to spread adware, something that’s likely earning them a small chunk of change in the process. ThreatPost, August 24, 2017

Secret chips in replacement parts can completely hijack your phone’s security: Booby-trapped touchscreens can log passwords, install malicious apps, and more. Ars Technica, August 18, 2017

Information Security Management in the Organization

Information Security Management and Governance

Board Directors Need to Get Involved With Cyber Risk Governance: They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight. SecurityIntelligence, August 24, 2017

Fallout From Cybersecurity Regulatory Crackdown Pushing Companies to Strengthen Security Management: The rise in cyberattacks has led to more regulations, which in turn has forced companies to look into cyberinsurance. Forbes, August 25, 2017

Security Culture

Charts Like This are Why Information Security is Failing: Out of the 57 controls listed, ONLY ONE is dedicated to the Human Operating System. SANS Securing the Human, August 22, 2017

New SANS survey identifies & addresses root cybersecurity cultural challenges: Working with hundreds of security awareness programs has taught me one thing, people are key.SANS Securing the Human, August 24, 2017

Cyber Warning

Ransomware Hiding in Word Files Seen Targeting Education, Healthcare Industry:Researchers observed a new, albeit small and selective ransomware campaign earlier this month targeting both education and healthcare verticals. ThreatPost, August 25, 2017

Cyber Law

Eighth Circuit Affirms Dismissal of Scottrade Data Breach Suit: The United States Court of Appeals for the Eighth Circuit recently affirmed the district court’s dismissal of a putative class action brought by customers of the brokerage firm Scottrade in the wake of an alleged data breach impacting Scottrade in 2013. Alston & Bird Privacy & DataBlog, August 25, 2017

Cyber Talent

7 Tips for Recruiting the Infosec Talent You Need Now: New ways to attract job candidates and keep them around. BankInfoSecurity, August 23, 2017

Cyber Security in Society

Cyber Crime

Cryptocurrency Ethereum Cyber Fraud Has Cost Victims $225 Million This Year, Says Report: Here’s another reason to be leery of the initial coin offerings being done at a staggering pace in the cryptocurrency world: there’s a one-in-10 chance you’ll end up a victim of theft. Bloomberg Technology, August 23, 2017

The HBO hackers just sent us the end of ‘Game of Thrones’ Season 7: The so-called Mr. Smith hacking group that’s responsible for stealing approximately 1.5 terabytes of data from HBO just released what they’re calling the sixth wave of leaks — and it just so happens this data dump contains what they claim is the end to Season 7 of Game of Thrones. Mashable Technology, August 25, 2017

Cyber Privacy

DoJ Subject to Strict Judicial Oversight in Anti-Trump Site Investigation: A US judge has ruled that the Department of Justice (DoJ) must operate under strict court oversight when searching data associated with an anti-Trump website to find a group of alleged rioters. InfoSecurityGroup, August 25, 2017

Know Your Enemy

Zero-Day Broker Zerodium Offers $500K for Encrypted Messaging Exploits: There’s another option for governments trying to overcome the end-to-end encryption barrier: buy a zero-day software exploit. BankInfoSecurity, August 24, 2017

How lower barriers and increased profits have lead to a surge in cybercrime .. And what you need to do: Nowadays, nearly all crimes have an element of cyber to them and we’re seeing more ‘traditional’ criminals get into the cybercrime industry. CSO, August 25, 2017

No coding skills required: Android app allows wannabe cybercriminals to build custom ransomware: A free tool available on hacking forums allows budding hackers to build their own Android ransomware simply by filling out a few forms. ZDNet, August 25, 2017

Cyber Gov

Government ranks near bottom in cybersecurity review of 18 critical industries: Data breaches and hacks of US government networks, once novel and shocking, have become a problematic fact of life over the past few years. Wired, August 24, 2017

Critical Infrastructure

Is the Power Grid Getting More Vulnerable to Cyber Attacks?: Rising computerization opens doors for increasingly aggressive adversaries, but defenses are better than many might think. Scientific American, August 23, 2017

Internet of Things

Industrial Collaboration Robots (Cobots) Highly Vulnerable to Hacking, Says New Report:Researchers at IOActive have found nearly 50 vulnerabilities in industrial collaborative robots, machines that work side-by-side with people in manufacturing and other settings, that can be abused to possibly cause physical harm to workers, or even configured to spy on their surroundings. ThreatPost, August 22, 2017

Cyber Enforcement

The Imperfect Crime: How Blockchain Might Lead to the WannaCry Hackers: Even if they can exchange their ransom, the criminals will have a hard time accessing their money anonymously. Scientific American, August 16, 2017

Cyber Sunshine

Chinese national arrested for allegedly using malware linked to OPM hack: A Chinese national was arrested in Los Angeles this week on charges he used a rare type of computer malware that was also deployed to access millions of sensitive U.S. records from the Office of Personnel Management. The Washington Post, August 24, 2017

Accused ‘Hacker for Hire’ for Russia Pleads Not Guilty: Canadian allegedly aided Russians who perpetrated massive yahoo data breach. BankInfoSecurity, August 24, 2017

Cyber Miscellany

Quantum Internet Is 13 Years Away. Wait, What’s Quantum Internet?: A year ago this week, Chinese physicists launched the world’s first quantum satellite. Wired, August 15, 2017

SecureTheVillage Calendar

National Assn of Corporate Directors — Southern California Chapter: Join SecureTheVillage and Citadel President Stan Stahl, the National Cyber Forensics Training Alliance (NCFTA) CEO and former secret service agent Matt Lavigna, Apria Healthcare’s CISO Jerry Sto. Thomasand former SaaS CEO and PwC Partner, Bob Zukis. Learn about Southern California’s unique risks and local efforts to fight cybercrime. September 6, Noon Luncheon, California Club.

PIHRA: Information Security Awareness: The Cyber Tsunami!: Citadel’s Kimberly Pease will facilitate a discussion of (i) steps to take to protect a company’s information from hackers and cyber criminals; (ii)tips to protect yourselves as consumers; (iii) understanding who the criminals are and why you are a target; (iv) real stories and scary examples that could happen to you. September 20, 7:30 – 9:30, The City Club

SecureTheVillage: Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. September 22, 7:30 – 10:00, Grandpoint Bank

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. September 28, 7:30 -10AM. Datastream, Glendale.

Glendale Tech Week: SecureTheVillage and Citadel President Stan Stahl will join Louie Sadd, Datastream Managing Partner and SecureTheVillage Leadership Council member, and other cybersecurity panelists. October 12, 10:00 – 11:00, Glendale Central Library.

SecureTheVillage: Cybersecure Los Angeles 2017 — Get Cyber Prepared: SecureTheVillage joins UCLA Extension for its first cybersecurity conference. Learn from leading information security professionals and law enforcement, including: information security providers, cyber-insurance, financial services, law, the FBI, LA County District Attorney’s Office, and more. Leave with SecureTheVillage’s Information Security Management and Leadership ResourceKit: A practical guide for implementing an information security management and leadership program in your organization. October 19, 9:00 – 2:00, UCLA Extension, Figueroa Courtyard

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security Vulnerability and Patch Report, August 20, 2017

Cybersecurity Vulnerability and Patch Report

From our friends at

 Citadel Information Group

 

Important Security Updates

1Password: 1Password has released version 4.6.9.90. Updates are available from 1Password’s website.

Google Chrome: Google has released Google Chrome version 60.0.3112.101. Updates are available from within the browser or from Google Chrome’s website.

Mozilla Firefox: Mozilla has released version 55.0.2. Updates are available within the browser or from Mozilla’s website.

Piriform CCleaner: Piriform has released version 5.33.6162 for CCleaner. Updates are available from Piriform’s website.

Current Software Versions

Adobe Flash 26.0.0.151

Adobe Reader DC 2017.012.20093

Dropbox 32.4.23 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 55.0.2 [Windows]

Google Chrome 60.0.3112.101

Internet Explorer 11.0.9600.18763

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.39.0.102

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in Virtual Network Function Element Manager, Application Policy Infrastructure, TelePresence Video Communication, Ultra Services Platform, Ultra Services Framework, Unified Communications Manager, Star OS for ASR 5000 Series Routers, Elastic Services Controller, Security Appliances, RV340, RV345 and RV345P Dual WAN, Policy Suite, Prime Infrastructure, AnyConnect WebLaunch and others. Apply updates. Additional details are available at Cisco’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, August 20, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cybersecurity News for the Week of August 20, 2017

Cyber Security News

 

Cyber Security News

from our friends at Citadel Information Group

Individuals at Risk

Cyber Privacy

Cars Suck Up Data About You. Where Does It All Go?: Automakers, local governments, retailers, insurers and tech companies are looking to leverage the data that cars generate. New York Times, July 27, 2017

Cyber Warning

New Android malware records calls, intercepts texts, and steals credit card info: A new version of Faketoken was identified by Kaspersky and poses a huge threat to anyone who stores bank card information for in-app purchases. TechRepublic, Aug 18, 2017

Repairing your smartphone? Replacement parts can hijack phone security, steal passwords: Booby-trapped touchscreens can log passwords, install malicious apps, and more. Ars Technica, Aug 18, 2017

Information Security Management in the Organization

Information Security Management and Governance

HBO Hack Illustrates That It’s Hard to Tell Exactly What’s Been Compromised: There may be much more missing than the headlines suggest. Robert Braun, SecureTheVillage Leadership Council, Cybersecurity Lawyer Forum, Jeffer Mangels Butler & Mitchell, Aug 17, 2017

Cyber Warning

New Survey Finds Failure to Remove Access from ex-Employees a Major Contributor to Breaches: Businesses drive the risk for data breaches when they fail to terminate employees’ access to corporate apps after they leave. DarkReading, Aug 18, 2017

Cyber breach at shipper illustrates dangers of business email compromise: Weak defences are leaving cargo vessels vulnerable to cyber-attacks, say experts. BBC, Aug 18, 2017

Cyber Defense

The importance of network segmentation as a key network security strategy: Cybercrime is getting worse. Keep your company safe by following the latest recommendations in network security. Inc, August 18, 2017

Caution advised with information security surveys: Cybersecurity reports based on answers from respondents often produce misleading or inaccurate statistics, and they can lead to industry confusion. CSO, August 15, 2017

Cyber Update

Cybercriminals found exploiting a vulnerability that Microsoft patched in April. Update now!!!: Attackers are targeting companies, and their goal is to get their hands on information that will allow them to steal money from the victims’ accounts. HelpNetSecurity, Aug 18, 2017

Cyber Law

Developments in New York and Colorado Cybersecurity Regulations: For the first time since New York’s Cybersecurity Regulation (23 NYCRR Part 500) became effective on March 1, 2017, the Department of Financial Services (DFS) has issued Frequently Asked Questions to assist Covered Entities in their compliance and provide guidance into the DFS’s interpretation and enforcement of its newly adopted regulation. National Law Review, Aug 18, 2017

Cyber Security in Society

Cyber Crime

Maersk says impact of NotPetya may be as much as $300 Million: Danish shipping giant A.P. Møller – Maersk faces a loss of up to $300 million as a result of the NotPetya global malware outbreak. BankInfoSecurity, Aug 17, 2017

Cyber Privacy

Justice Department wants data on anti-Trump protesters. An L.A. tech firm is resisting: Los Angeles tech company is resisting a federal demand for more than 1.3 million IP addresses to identify who visited a website set up to coordinate protests on President Trump’s Inauguration Day — a request whose breadth the company says violates the Constitution. LA Times, Aug 15, 2017

Cyber Attack

Inside the New York hospital hackers took down for six weeks (video): The medical industry is the new No. 1 target for hackers. CBS News, Aug 18, 2017

Cyber Defense

Amazon Macie automates cloud data protection with machine learning. Can it catch Microsoft and Google?: Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers? CSO, Aug 17, 2017

LA launches public-private CyberLab to share threat information with region’s businesses:The new tech platform and public-private partnership aims to protect critical IT infrastructure and aid businesses to fight cyberattacks in real time. StateScoop, Aug 16, 2017

Know Your Enemy

Microsoft cloud cybersecurity attacks up 300% in last year, report says: In volume 22 of Microsoft’s Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users. TechRepublic, Aug 18, 2017

Cyber Freedom

In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking: For the first time, an actual witness has emerged in the hack of the Democratic National Comittee, and he has been interviewed by the F.B.I. New York Times, Aug 16, 2017

Did New York Times get the story wrong about Ukraine malware expert: It’s a good read, as long as you can ignore that the premise of the piece is completely wrong. KrebsOnSecurity, Aug 18, 2017

Unprotected Backup of Chicago Voter Roll Found in Cloud. 1.8 Million Voter Records At-Risk: Voter registration data belonging to the entirety of Chicago’s electoral roll—1.8 million records—was found a week ago in an Amazon Web Services bucket configured for public access. ThreatPost, Aug 18, 2017

National Cybersecurity

Russian-Speaking APT Group Said to Be Engaged in G20 Themed Attack: Turla, a long operating advanced persistent threat group (APT) with presumed ties to the Russian government, appears to be actively targeting G20 participants and those interested in its activities including policymakers, member nations and journalists. DarkReading, Aug 18, 2017

Cyber Government

Annual cybersecurity review for state and local government approaches: Non-federal agencies still ride low on the maturity benchmark, but the increased political attention around cybersecurity could improve results in the coming survey period. StateScoop, Aug 18, 2017

Cyber Medical

Commentary: Why information security is a patient safety issue: Cybersecurity requires strategy to succeed and that means putting your priorities in the right place. CISOs and other infosec pros must up their game to make protecting patients the top concern. Healthcare IT News, Aug 15, 2017

SecureTheVillage Calendar

National Assn of Corporate Directors — Southern California Chapter: Join SecureTheVillage and Citadel President Stan Stahl, the National Cyber Forensics Training Alliance (NCFTA) CEO and former secret service agent Matt Lavigna, Apria Healthcare’s CISO Jerry Sto. Thomasand former SaaS CEO and PwC Partner, Bob Zukis. Learn about Southern California’s unique risks and local efforts to fight cybercrime. September 6, Noon Luncheon, California Club.

PIHRA: Information Security Awareness: The Cyber Tsunami!: Citadel’s Kimberly Pease will facilitate a discussion of (i) steps to take to protect a company’s information from hackers and cyber criminals; (ii)tips to protect yourselves as consumers; (iii) understanding who the criminals are and why you are a target; (iv) real stories and scary examples that could happen to you. September 20, 7:30 – 9:30, The City Club

SecureTheVillage: Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. September 22, 7:30 – 10:00, Grandpoint Bank

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. September 28, 7:30 -10AM. Datastream, Glendale.

Glendale Tech Week: SecureTheVillage and Citadel President Stan Stahl will join Louie Sadd, Datastream Managing Partner and SecureTheVillage Leadership Council member, and other cybersecurity panelists. October 12, 10:00 – 11:00, Glendale Central Library.

SecureTheVillage: Cybersecure Los Angeles 2017 — Get Cyber Prepared: SecureTheVillage joins UCLA Extension for its first cybersecurity conference. Learn from leading information security professionals and law enforcement, including: information security providers, cyber-insurance, financial services, law, the FBI, LA County District Attorney’s Office, and more. Leave with SecureTheVillage’s Information Security Management and Leadership ResourceKit: A practical guide for implementing an information security management and leadership program in your organization. October 19, 9:00 – 2:00, UCLA Extension, Figueroa Courtyard

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

6 Reasons Why Job Seekers Get Stuck

Stuck

Job seekers frequently get stuck because they don’t see the strategic paths leading from where they are to where they want to go.

Your resume is always about you, and it is always written for the benefit of another person. We’ll call these other people the audience for your resume.

  • If in your profession, you use language, acronyms and/or abbreviations that 100% of your audience does not use or clearly understand, you might get stuck.
  • Most people write resumes about themselves as if they’re writing their resume for themselves.  This approach will frequently get you stuck.
  • If your resume’s audience can’t figure out who you are, where you are, how to contact you, what you’re great at and how you can specifically solve their problems, you’ll likely find yourself getting stuck.
  • If you're ready for a leadership role and you're sending out resumes that carry laundry lists of technology rather than evidence of what you've done to lead, guide, mentor and grow other people, you'll likely get stuck in the hands-on individual contributor role you're in today. 
  • When employers are asking for job candidates who are visionary, strategic, collaborators who can influence, guide and execute and you aren't crystal clear as to which of those traits describe you, it will be very difficult to write a resume that addresses the traits and behaviors employers are seeking.
  • Your resume should give evidence of accomplishments, contributions and the value you've created for past employers in order to demonstrate that you can create similar value for the future employer.

By the way, research by The Ladders suggests that you now have 6 seconds to make a favorable first impression when you share your resume. In those first 6 seconds when a resume reviewer puts their eyes on your resume, you’re making a first impression.

The first impression your resume makes is either an impression that will open an interview door or it is an impression that will keep you stuck in your current situation.

Jeff Snyder’s, Security Recruiter Blog, 719.686.8810

Cyber Security Vulnerability and Patch Report, August 13, 2017

Cyber Security Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Important Security Updates

Adobe Flash Player: Adobe has released version 26.0.0.151. Updates are available from Adobe’s website. To see which version you have, go to Adobe’s web page.

Adobe Reader: Adobe has released version 2017.012.20093. Updates are available through the program’s Help menu/Check for Updates or from Adobe’s website. There is also an update for Acrobat.

Avira Antivirus: Avira has released version 15.0.29.32 of its free Antivirus and Pro. Updates are available from Avira’s website.

Dropbox: Dropbox has released version 32.4.23 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

LastPass: LastPass has released version 4.1.61 for its Free Password Manager. Updates are available from LastPass’ website.

Microsoft Patch Tuesday: Microsoft’s Patch Tuesday released updates to address dozens of vulnerabilities, some of which are highly critical within Windows operating systems, Microsoft Edge, Internet Explorer, Office, and other Microsoft products. Additional details are available at Microsoft’s website.

Mozilla Firefox: Mozilla has released version 55.0.1. Updates are available within the browser or from Mozilla’s website.

Panda Free Antivirus: Panda Free Antivirus has released version 18.03.0. Updates are available on Panda Security’s website.

Spotify: Spotify has released version 1.0.60.492. Updates are available on Spotify’s website.

Current Software Versions

Adobe Flash 26.0.0.151

Adobe Reader DC 2017.012.20093

Dropbox 32.4.23 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 55.0.1 [Windows]

Google Chrome 60.0.3112.90

Internet Explorer 11.0.9600.18763

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.39.0.102

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in WebEx, and others. Apply updates. Additional details are available at Cisco’s website.

VMware: Cisco has released updates to address vulnerabilities in VMware NSX-V Edge. Additional details are available at VMware’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, August 13, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

 

 

 

 

Cyber Security News for the Week of, August 13, 2017

Cyber Security News

 

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Cyber Update

Google Patches 10 Critical Bugs in August Android Security Bulletin: Google patched 10 critical remote code execution bugs in its August Android Security Bulletin issued Monday. ThreatPost, August 8, 2017

Mozilla Fixes 29 Vulnerabilities in Firefox, Makes Flash Click-To-Activate: Mozilla fixed three critical vulnerabilities when it released Firefox 55 on Tuesday, including bugs that could have triggered a crash of the browser and allowed for the execution of arbitrary code. ThreatPost, August 9, 2017

Critical Security Fixes from Adobe, Microsoft: Adobe has released updates to fix dozens of vulnerabilities in its Acrobat, Reader and Flash Player software. KrebsOnSecurity, August 8, 2017

Cyber Defense

Five Cybersecurity Tips for Your Summer Vacation: Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun. ITSP Magazine

Information Security Management in the Organization

Information Security Management and Governance

Culture Change Metaphor: Teach everyone to avoid a hot stove and you have no-cost burn care: It’s ironic: when global threats are in the news every day, their ubiquity makes them easy to ignore.” Robert Braun, co-chair of the Cybersecurity and Privacy Law Group, Jeffer Mangels Butler & Mitchell and SecureTheVillage Leadership Council. Cyber Security Lawyer Forum, August 3, 2017

New analysis shows cyber-breach has large impact on stock price: When it comes to thinking about cyber-attacks, many of the folks running businesses are relying on a heavy combination of faith (“it won’t happen to us”), reliance on cyber-insurance (“any losses will be covered”), and the unfounded belief that the long-term consequences won’t be that bad (“if it does happen, we’ll be back in business in no time”). ITSP Magazine, August 7, 2017

Data Breach Cost Calculator – IBM Security & Ponemon Institute: Companies face the constant, rising threat of data breaches each year. However, the cost of a data breach differs for every organization. How much would it cost yours? IBM Security, 2017

Cyber Awareness

Social cybersecurity: Influence people, make friends and keep them safe: Jason Hong talks about Carnegie Mellon’s work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Tech Target, August 2017

Cyber Warning

IRS Warns Tax Preparers of Fake Software Update Scheme that Steals Passwords: Just in time for the seasonal upgrading of tax software, the IRS is warning of phishing emails that try to trick tax professionals into downloading software updates, but in fact steer victims into divulging login credentials. BankInfoSecuirty, August 9, 2017

Cyber Defense

Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management: Companies need to do more than just scan for known problems and provide huge vulnerability reports to system and network administrators for remediation. Security Intelligence, August 9, 2017

Most of what we know about passwords is wrong, and how businesses should respond: Bill Burr, who wrote the guidelines for modern password standards, claims that he gave the wrong advice on how people should go about creating passwords. TechRepublic, August 9, 2017

10 bad habits cybersecurity professionals must break: Cybersecurity workers face many challenges on the job. Here are 10 bad habits they must avoid in order to be most effective. TechRepublic, August 10, 2017

Beware of Security by Press Release: The DirectDefense – Carbon Black Brouhaha: On Wednesday, the security industry once again witnessed an all-too-familiar cycle: I call it “security by press release.” KrebsOnSecurity, August 10, 2017

“White Hat” Hackers: Privileged Accounts Provide Fastest Access to Sensitive, Critical Data: Nearly 75 percent state traditional perimeter security firewalls and antivirus are now irrelevant or obsolete. DarkReading, August 9, 2017

Protecting Personal Information: A Practical Guide for Business – FTC: Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees. Federal Trade Commission

Cyber Law

Nationwide Insurance Breach Settlement Agreement: $5.5 million & stronger security management practices: Nationwide Mutual Insurance Co. will pay a $5.5 million settlement and update its security practices as a result of an agreement with attorneys general in 32 states and the District of Columbia in the wake of a 2012 data breach affecting more than 1.2 million individuals. BankInfoSecurity, August 9, 2017

Cyber Talent

Majority of MSPs struggle to find enough cybersecurity pros to hire: Two out of three managed service providers (MSPs) suffer from a shortage of qualified cybersecurity staff—leading to challenges keeping customers safe from ransomware attacks, according to a report from Kaspersky Lab, released Wednesday. TechRepublic, August 10, 2017

Five strategies to address the cybersecurity skills shortage: The ability to detect and respond to threats is greatly impeded by a lack of cybersecurity skills and staff. CSO, August 10, 2017

Cyber Security in Society

HBO Cyber Attack

Game of Thrones stars’ personal details leaked as HBO hackers demand ransom: Hackers of US television network HBO have released personal phone numbers of Game of Thrones actors, emails and scripts in the latest dump of data stolen from the company, and are demanding a multimillion-dollar ransom to prevent the release of whole TV shows and further emails. The Guardian, August 8, 2017

Watch the ransom video hackers sent to HBO (set to Game of Thrones music): HBO is at the center of a massive cyberattack putting 1.5 terabytes of valuable intellectual property and private information at risk. Mashable, August 9, 2017

HBO Hackers Leak Email From Network That Offers Them $250,000: The email dated July 27 indicates a negotiation between the network and the hackers. Hollywood Reporter, August 10, 2017

Know Your Enemy

Hackers & Pirate Websites Conspire In Malware Extortion Schemes: Hackers have become an inescapable part of the Hollywood narrative, on and off the screen. Deadline, August 8, 2017

Russia’s ‘Fancy Bear’ Hackers Used Leaked NSA Tool to Target Hotel Guests: Since as early as last fall, the Russian hacker group known as APT28, or Fancy Bear, has targeted victims via their connections to hacked hotel Wi-Fi networks, according to a new report from security firm FireEye, which has closely tracked the group’s intrusions, including its breach of the Democratic National Committee ahead of last year’s election. Wired, August 11, 2017

Cyber Freedom

Voting Machine “White-Hat” Hackers Have 5 Tips to Save the Next Election: American Democracy depends on the sanctity of the vote. Wired, August 6, 2017

National Cyber Security

A Vulnerable Castle in Cyberspace … Embracing the ‘information warfare’ mindset: The topic of cybersecurity seems to affect just about everything these days. US News, August 11, 2017

Financial Cyber Security

Uptick in Malware Targets the Banking Community: A number of recent attacks, using tactics old and new, have made off with an astonishing amount of money. DarkReading, August 9, 2017

Cyber Medical

DHS Warning: Vulnerabilities Found in Some Siemens Medical Imaging Devices Open Door to Hackers: The Department of Homeland Security has issued an alert warning about cyber vulnerabilities in certain Siemens medical imaging products running Windows 7 that could enable hackers to “remotely execute arbitrary code.” BankInfoSecurity, August 8, 2017

Cyber Sunshine

Alleged sextortionist caught after FBI plants malware on video of victim: A Bakersfield, Calif. man who allegedly tried to extort pornographic video footage from underage victims was tracked down and apprehended after investigators secretly hid malware on a digital video file sent from the intended victim’s computer, according to a criminal complaint filed in Indiana. SC Media, August 10, 2017

Alleged vDOS Operators Arrested, Charged — Krebs on Security: Two young Israeli men alleged by this author to have co-founded vDOS — until recently the largest and most profitable cyber attack-for-hire service online — were arrested and formally indicted this week in Israel on conspiracy and hacking charges. KrebsOnSecurity, August 09, 2017

 SecureTheVillage Calendar

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: SecureTheVillage and Citadel President Stan Stahl will speak on High-Performance Information Security Management & Leadership Teams. August 17, 2017, 7:30 -10AM. Datastream, Glendale.

National Assn of Corporate Directors — Southern California Chapter: Join SecureTheVillage and Citadel President Stan Stahl, the National Cyber Forensics Training Alliance (NCFTA) CEO and former secret service agent Matt Lavigna, Apria Healthcare’s CISO Jerry Sto. Thomas and former SaaS CEO and PwC Partner, Bob Zukis. Learn about Southern California’s unique risks and local efforts to fight cybercrime. September 6, Noon Luncheon, California Club.

PIHRA: Information Security Awareness: The Cyber Tsunami!: Citadel’s Kimberly Pease will facilitate a discussion of (i) steps to take to protect a company’s information from hackers and cyber criminals; (ii)tips to protect yourselves as consumers; (iii) understanding who the criminals are and why you are a target; (iv) real stories and scary examples that could happen to you. September 20, 7:30 – 9:30, The City Club

SecureTheVillage: Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. September 22, 7:30 – 10:00, Grandpoint Bank

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. September 28, 7:30 -10AM. Datastream, Glendale.

Glendale Tech Week: SecureTheVillage and Citadel President Stan Stahl will join Louie Sadd, Datastream Managing Partner and SecureTheVillage Leadership Council member, and other cybersecurity panelists. October 12, 10:00 – 11:00, Glendale Central Library.

SecureTheVillage: Cybersecure Los Angeles 2017 — Get Cyber Prepared: SecureTheVillage joins UCLA Extension for its first cybersecurity conference. Learn from leading information security professionals and law enforcement, including: information security providers, cyber-insurance, financial services, law, the FBI, LA County District Attorney’s Office, and more. Leave with SecureTheVillage’s Information Security Management and Leadership ResourceKit: A practical guide for implementing an information security management and leadership program in your organization. October 19, 9:00 – 2:00, UCLA Extension, Figueroa Courtyard

The post Cyber Security News of the Week, August 13, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

 

Can You be a Courageous Leader?

Courageous Leadership

Dictionary.com defines Courage like this: the quality of mind or spirit that enables a person to face difficulty, danger, pain, etc., without fear; bravery.

Many authors have suggested that leadership requires courage.  The Clifton StrengthsFinder™ specifically isolates and measures a person’s courage in a trait called Self-Assurance®.

The Clifton StrengthsFinder™ defines Self-Assurance® like this: People exceptionally talented in the Self-Assurance® theme feel confident in their ability to manage their own lives. They possess an inner compass that gives them confidence that their decisions are right.

More than 16.7 million people globally have now taken a Clifton StrengthsFinder™ assessment. When 15,000,000 had taken a Clifton StrengthsFinder™, I crunched some interesting numbers.

Out of 34 traits, Self-Assurance® comes in at number 33 in terms of how often it shows up in a person’s Top 5 traits or themes.  Out of 15,001,435 StrengthsFinder™ assessments, Self-Assurance came up 710,060 times in assessment taker’s Top 5 Traits.  This number equates to .047% of the time.

When I dug further, I found that for men, Self-Assurance® came up .061% of the time in their Top 5 themes. For women, Self-Assurance came up .025% of the time in their Top 5 themes.

Self-Assurance®, as measured by the Clifton StrengthsFinder, ™ is a powerful influencing theme.  What this means is that people who have this trait and people to turn this trait into a strength are specially equipped with a talent that fits well in leadership roles.

If you lead or you want to lead, find out where the Self-Assurance® falls among your 34 traits on the Clifton StrengthsFinder™. Don’t stop once you find out. The power behind the Clifton StrengthsFinder™ occurs when a person learns their potential strengths, when:

  • they take ownership of their potential strengths
  • when they turn their traits into strengths and
  • when they properly aim their strengths towards work or activities where they can produce the best version of themselves.

This is what an experienced Strengths Coach can do when you engage with them in their Strengths Coaching methodology.

Jeff Snyder’s, SecurityRecuriter.com, Security Recruiter Blog 719.686.8810

  

Cyber Security Vulnerability and Patch Report, August 6, 2017

Cyber Security Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Important Security Updates

AxCrypt: AxCrypt has released version 2.1.1526.0. Updates are available from AxCrypt’s website.

Dropbox: Dropbox has released version 31.4.24 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

Evernote: Evernote has released version 6.6.4.5512. Updates are available on Evernote’s website.

Google Chrome: Google has released Google Chrome version 60.0.3112.90. Updates are available from within the browser or from Google Chrome’s website.

Skype: Skype has released Skype 7.39.0.102. Updates are available from the program or Skype’s website.

Current Software Versions

Adobe Flash 26.0.0.137

Adobe Reader DC 17.009.20044

Dropbox 30.4.24 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 54.0.1 [Windows]

Google Chrome 60.0.3112.90

Internet Explorer 11.0.9600.18739

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.39.0.102

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in Adaptive Security Appliance, Videoscape Distribution Suite, Identity Services Engine, Unified Communications Manager, Smart Net Total Care Software, Prime Collaboration, Meeting Server H.264, Firepower, Jabber Guest Server, Finesse, and others. Apply updates. Additional details are available at Cisco’s website.

 

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, August 6, 2017 appeared first on Citadel Information Group.

 

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

Cyber Security News for the Week, August 6, 2017

Cyber Security News

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Cyber Privacy

Google wants to track you in real life – privacy group says, ‘No way!’: There’s a long-term marketing bugaboo that Google has plans to fix: how to convince its clients that their ad dollars are turning into sweet payola. NakedSecurity, August 4, 2017

Cyber Defense

Mozilla sets up private, encrypted file sharing service for large files: Mozilla has launched an online service for private sharing of encrypted files between two users. It’s called Send, and it’s meant to ensure users’ shared files do not remain online forever. HelpNetSecurity, August 4, 2017

Flash Player is Dead, Long Live Flash Player!: Adobe last week detailed plans to retire its Flash Player software, a cross-platform browser plugin so powerful and so packed with security holes that it has become the favorite target of malware developers. To help eradicate this ubiquitous liability, Adobe is enlisting the help of Apple, Facebook, Google, Microsoft and Mozilla. But don’t break out the bubbly just yet: Adobe says Flash won’t be put down officially until 2020. KrebsOnSecurity, August 2, 2017

Backup and Recovery – Securing the Human: If you use a computer or mobile device long enough, sooner or later something will go wrong, resulting in you losing your personal files, documents, or photos. For example, you may accidently delete the wrong files, have a hardware failure, lose a device, or become infected with malware, such as ransomware. At times like these, backups are often the only way you can rebuild your digital life. In this newsletter, we explain what backups are, how to back up your data, and how to develop a simple strategy that’s right for you. SANS, August 2017

Cyber Warning

iOS users beware: You’re the biggest target for mobile phishing attacks: Phishing continues to be a problem, and attacks are moving away from the email inbox. A new report found that iOS is the biggest target, with most attacks coming from game apps. TechRepublic, August 4, 2017

How Cyber Criminals Are Targeting You Through Text Messages: Cyber criminals are increasingly targeting victims through a text message scam called “smishing” that can infect your smartphone and let thieves steal your personal information. NBC, July 20, 2017

Information Security Management in the Organization

Information Security Management and Governance

How to Budget Cybersecurity Spending At Your Firm: Businesses understand today that poor cybersecurity protocols are not just a security risk, but a financial and reputational risk which can cost firms greatly whether through a data breach or ransomware. As a result, global cybersecurity spending is set to reach new highs in 2017, with global spending on informational security to reach $90 billion in 2017 and $113 billion by 2020. AccountingWeb, August 4, 2017

Separation of duties and IT security: Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team. CSO, August 3, 2017

Cyber Warning

Business Email Compromise: The Cybercrime Scheme That Attacks Email Accounts And Your Bank Accounts: Cybercrime is ever present, and there is one particular fraud we all should be aware of—particularly anyone who sends or receives bank wiring instructions or the funds themselves. The fraud involves the hacking or impersonating of email accounts, it might be called business email compromise (BEC) fraud, CEO fraud, or CFO fraud, and it demonstrates that criminal participants are infinitely adaptable in pursuit of profitable schemes. Cybercrime is not always a technical attack, but often about social engineering—tricking a person into performing an action—which means we need to stay informed, be alert, and exercise sound judgment. Huffington Post, August 3, 2017

Cyber Defense

Amazon reaches out to AWS customers with bad security before the crooks do: We’ve read plenty of stories recently about the accidental exposure of data stored in the cloud because of users’ poor configuration choices. NakedSecurity, August 4, 2017

New Survey. Same Old Story. Poor Network Security Hygiene & Inadequate User Awareness Makes it Easy for Hackers: The level of security of Wi-Fi networks and user awareness regarding information security has fallen significantly; a Positive Technologies security audit says mostly due to common vulnerabilities not needing much skill to implement. SC Magazine, August 4, 2017

Cyber Talent

What Women in Cybersecurity Really Think About Their Careers: New survey conducted by a female security pro of other female security pros dispels a few myths. DarkReading, August 4, 2017

Cyber Security in Society

Cyber Crime

Someone has emptied the ransom accounts from the WannaCry attack: For months, the ransom money from the massive WannaCry cyberattack sat untouched in online accounts. Now, someone has moved it. CNN, August 3, 2017

Cyber Attack

Spoiler Alert: Hackers Are Gunning for Hollywood (Guest Column): The 2014 hack at Sony Pictures Entertainment was a watershed moment for the entertainment industry. This week, yet another targeted attack — this one against HBO — reminds us that cybercriminals continue to target Hollywood. Variety, August 4, 2017

HBO Hack: New Threat Promises Emails to Be Released Sunday: An email purported to be from the hacker or hackers behind the HBO breach is making a fresh wave of threats against the network. While the sender of the email, received by The Hollywood Reporter, appeared to use a pseudonym, the sender offered evidence of hacked materials to buttress the claim. Hollywood Reporter, August 3, 2017

HBO says full email system likely not compromised in data breach: HBO is the latest victim of a large-scale security breach, and the company is still investigating just how big it is. CNN, August 3, 2017

HBO Hack: Insiders Fear Leaked Emails as FBI Joins Investigation: The company is reeling from a sophisticated cyberattack that potentially compromised seven times the amount of data stolen in the Sony hack as the FBI investigates potential culprits. Hollywood Reporter, August 2, 2017

HBO hacked: Upcoming episodes, Game of Thrones data leaked online: HBO has joined the ranks of Hollywood entertainment companies to suffer a major cyber attack. Entertainment Weekly, July 31, 2017

Cyber Freedom

DEF CON Hackers Got Into Many Voting Machines and an E-Poll Book: How long will defenders of America’s electronic voting systems ignore the present danger hacking presents to U.S. elections? Alternet, August 2, 2017

“White Hat” Hackers easily break into voting machines at security conference: When the password for a voting machine is “abcde” and can’t be changed, the integrity of our democracy might be in trouble. CNet, July 30, 2017

National Cyber Security

States Take a Comprehensive Approach to Improving Cybersecurity: The National Governors Association has been focused on engaging states when it comes to cybersecurity, and now a multistate compact stands as another positive sign of progress. Governemnt Technology, August 3, 2017

White House officials tricked by email prankster: (CNN)A self-described “email prankster” in the UK fooled a number of White House officials into thinking he was other officials, including an episode where he convinced the White House official tasked with cyber security that he was Jared Kushner and received that official’s private email address unsolicited. CNN, August 1, 2017

Internet of Things

New Bill Seeks Basic IoT Security Standards: Lawmakers in the U.S. Senate today introduced a bill that would set baseline security standards for the government’s purchase and use of a broad range of Internet-connected devices, including computers, routers and security cameras. The legislation, which also seeks to remedy some widely-perceived shortcomings in existing cybercrime law, was developed in direct response to a series of massive cyber attacks in 2016 that were fueled for the most part by poorly-secured “Internet of Things” (IoT) devices. KrebsOnSecurity, August 1, 2017

Cyber Research

Arrest of WannaCry researcher sends chill through security community: The Wednesday arrest of cybersecurity researcher Marcus Hutchins is sending chills through the cyber community. The Hill, August 4, 2017

SecureTheVillage Calendar

Cyber Security Awareness Presented by Marcum LLP, DiamondIT, LBW Insurance & Citadel Information Group: Speakers Include: David Rice, COO of DiamondIT; Stan Stahl, President of Citadel Information Group / President of SecureTheVillage; Howard Miller, Senior Vice President of LBW Insurance. Event Date: August 10, 2017, 4 – 7 PM.

SecureTheVillage Financial Services Cybersecurity Roundtable: The Financial Services Cybersecurity Roundtable is a cross-organizational, cross-functional “learning community” committed to working together to better protect our community from bank fraud, credit card theft, identity theft and other forms of cyber crime. Event Date: August 11, 2017, 7;30 – 10AM

SecureTheVillage: San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable: The San Fernando Valley-East (Pasadena / Glendale) Cybersecurity Roundtable is designed to support communication and collaboration between C-Suite executives, IT managers, and cybersecurity experts. The San Fernando Valley-East Roundtable is intended for both for-profit and nonprofit organizations. The Roundtable functions as a cross-organizational “learning community” committed to working together to better protect our community from cybercrime. Event Date: August 17, 2017, 7:30 -10AM

The post Cyber Security News of the Week, August 6, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

Cyber Security Vulnerability and Patch Report, July 30, 2017

Cybersecurity Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Important Security Updates

Google Chrome: Google has released Google Chrome version 60.0.3112.78. Updates are available from within the browser or from Google Chrome’s website.

Google Earth Pro: Google has released version 7.3.0.3830 for Google Earth Pro. Updates are available from Google’s website.

Oracle Java: Oracle has released versions Java SE 8 Update 144. The update is available through Windows Control Panel or Java’s website. [See Citadel’s recommendation below]

RoboForm: Siber Systems has released Version 8.3.9. Updates are available from within the program or from RoboForm’s website.

Viber for Windows: Viber has released version 6.8.6.5 for Windows. Updates are available on Viber’s website.

Current Software Versions

Adobe Flash 26.0.0.137

Adobe Reader DC 17.009.20044

Dropbox 30.4.22 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 54.0.1 [Windows]

Google Chrome 60.0.3112.78

Internet Explorer 11.0.9600.18739

Java SE 8 Update 144 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.38.0.101

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in IOS and IOS XE, Access Control System, Multiple Cisco Products OSPF and others. Apply updates. Additional details are available at Cisco’s website.

McAfee: McAfee has released a security bulletin to address multiple vulnerabilities in Web Gateway. Updates are available from McAfee’s website.

TeamViewer: TeamViewer has released version 12.1.15448.0. Updates are available from TeamViewer’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, July 30, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security News for the Week, July 30, 2017

Cyber Security News

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Cyber Privacy

Crossing the U.S. Border? Here’s How to Securely Wipe Your Computer: Many people crossing the U.S. border are concerned about the amount of power that the government has asserted to search and examine travelers’ possessions, including searching through or copying contents of digital devices, like photos, emails, and browsing history. The frequency of these intrusive practices has been increasing over time. Electronic Frontier Foundation, July 26, 2017

“Perverse” malware infecting hundreds of Macs remained undetected for years: A mysterious piece of malware that gives attackers surreptitious control over webcams, keyboards, and other sensitive resources has been infecting Macs for at least five years. The infections—known to number nearly 400 and possibly much higher—remained undetected until recently and may have been active for almost a decade. ars technica, July 24, 2017

Cyber Update

Bug in top smartphones could lead to unstoppable malware, researcher says: A recently patched bug found in the chips used to provide wifi in iPhones, Samsung Galaxies and Google Nexus devices could be used to build malware which jumps unstoppably from device to device, according to Nitay Artenstein, the researcher who discovered the flaw. The Guardian, July 27, 2017

Cyber Defense

Going on holiday? Here are our tips for a security-minded trip: With August looming, we at Naked Security won’t be the only ones getting ready to head off on holiday, so with the beach in mind, we’ve come up with some tips to help you plan a safer summer holiday (and with apologies to our readers in the southern hemisphere winter!) Naked Security, July 28, 2017

How to guard against identity theft and bank fraud: Reports of data breaches involving credit card networks at stores and hotels seem to be increasing. So maybe it’s not surprising that consumers are worrying more about it happening to them, and what it might mean. Consumer Affairs, July 27, 2017

NIST Has Spoken – Death to Entropy, Love Live the Passphrase!: PMNIST has spoken, and I could not be more excited. For years the security community has inflicted one of the most painful behaviors to date, the dreaded, complex password. I’ve watched many times in horror as security researchers made fun of ordinary computer users for using simple passwords, often calling out hacked databases of passwords and bemoaning what is wrong with the world. In reality, these very same people should have taken the time to look in the mirror and see what they were inflicting on others. SANS, July 27, 2017

Information Security Management in the Organization

Information Security Management and Governance

CSO survey: 61% of boards still see security as IT issue rather than corporate governance issue: The past year has been tough for enterprise security teams. Attacks like Petya and NotPetya suggest that the impact scale is increasing dramatically. The recent leak of government-developed malware and hoarded vulnerabilities has given cybercriminals greater capabilities. IT is struggling to keep pace with the flow of important security software patches and updates, and the continued adoption of new technologies like the internet of things (IoT) creates new vulnerabilities to contend with. CSO, July 28. 2017

Cyber Defense

How the DHS responds to cyberthreats, and what businesses can learn: Any organization can fall victim to cybercrime. Learn how the DHS deals with threats and how to apply their response plan to your business. TechRepublic, July 27, 2017

Facebook’s Stamos preaches defensive security research in Black Hat keynote: LAS VEGAS — Black Hat 2017 marks the 20th anniversary of the conference and during the show’s opening keynote, Facebook CSO Alex Stamos urged the community to take advantage of the voice it had and focus on bigger problems than just those that make good presentations and to expand that focus beyond traditional defensive security efforts. SearchSecurity, July 26, 2017

Cyber Career

How to Build a Path Toward Diversity in Information Security: Hiring women and minorities only addresses half the issue for the IT security industry — the next step is retaining these workers. DarkReading, July 27, 2017

Cyber Security in Society

Cyber Crime

Google Study Quantifies Ransomware Profits: LAS VEGAS—Over the past two years, 35 unique ransomware strains earned cybercriminals $25 million, with Locky and its many variants being the most profitable. ThreatPost, July 27, 2017

Cyber Defense

State Attorneys General Appear in Anti-Piracy PSA Campaign: WASHINGTON, D.C. — A group of 15 state attorneys general have launched a public service campaign to warn consumers about the risk of malware from visiting piracy sites. Variety, July 25, 2017

Cyber Espionage

Iranian hackers used female ‘honey pot’ on social media to lure targets, finds new research: Hackers believed to be working for the Iranian government have impersonated a young female photographer on social media for more than a year, luring men working in industries strategically important to Tehran’s regional adversaries, according to new research. The Independent, July 28, 2017

Know Your Enemy

North Korea hackers ‘want cash not secrets’: North Korean hackers are increasingly trying to steal cash rather than secrets, a South Korean government-backed report suggests. BBC, July 28, 2017

The rise and rise of Cybercrime as a Service: When cybercriminals wanted to launch cyberattacks, they once had to know how to code. No longer. Bad actors can now search among any number of underground online sites to buy or lease potent cyberweapons. CSO, July 27, 2017

The Lazy Habits of Phishing Attackers: Most hackers who phish accounts do little to hide their tracks or even mine all of the data they can from phished accounts, mostly because they can afford to be lazy. DarkReading, July 27, 2017

It’s a myth that most cyber-criminals are ‘sophisticated’: News reports and pop culture continually paint cyber-criminals as cunning and devious hackers, with almost magical computer skills. Is that actually true? BBC, July 26, 2017

Cyber Freedom

“White Hat” Hackers Scour Voting Machines for Election Bugs: LAS VEGAS — Hackers attending this weekend’s Def Con hacking convention in Las Vegas were invited to break into voting machines and voter databases in a bid to uncover vulnerabilities that could be exploited to sway election results. The New York Times, July 28, 2017

U.S. elections are an easier target for Russian hackers than once thought: When Chris Grayson pointed his Web browser in the direction of Georgia’s elections system earlier this year, what he found there shocked him. The LA Times, July 28, 2017

Over 100 cybersecurity and voting experts advise Congress on securing U.S. elections : More than 100 cybersecurity and voting experts are urging the government to make the U.S. voting system more secure. CNN, June 21, 2017

Cyber Government

IRS fails to resolve dozens of information security deficiencies, GAO says: The IRS’s ability to protect sensitive financial and taxpayer data is limited by its failure to resolve numerous information security deficiencies identified by the Government Accountability Office (GAO). The Hill, July 27, 2017

Financial Cyber Security

Hackers are making their online bank-fraud malware more powerful by copying WannaCry and Petya ransomware tricks: Hackers responsible for one of the most common forms of banking Trojans have learned lessons from the global WannaCry ransomware outbreak and the Petya cyberattack, and have equipped their malware with a worm propagation module to help it spread more efficiently. ZDNet, July 28, 2017

HIPAA

HIPAA “Wall of Shame” Gets Update from OCR: Yesterday, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) announced the launch of a newly revised HIPAA Breach Reporting Tool. The tool, commonly referred to as the “Wall of Shame,” is a publically available listing of reported breaches of unsecured protected health information (“PHI”) affecting 500 or more individuals. National Law Review, July 27, 2017

Critical Infrastructure

Should you stay awake at night worrying about hackers on the grid?: Analysis The energy sector across multiple Western countries is under intensified assault by hackers. Security experts warn that industrial systems are wide open to potential exploit once hackers secure a foothold, the most difficult part of the hacking process, using targeted phishing or similar tactics. The Register, July 28, 2017

Researchers Release Free Tool to Analyze ICS Malware: CrashOverride/Industroyer malware used against Ukraine’s power grid the inspiration for the reverse-engineering tool. DarkReading, July 27, 2017

Internet of Things

Will Blockchain Improve Internet of Things (IoT) Security?: Because the Internet of Things (IoT) is creating its own ecosystem, the biggest challenge for the industry is how companies secure and manage the exponential growth of decentralized endpoint devices. Unfortunately, most security experts only know how to defend against attacks from a centralized perspective. Most Chief Information Security Officers (CISO) only understand centralized networks and depend on choke points or linear cyber kill chains that focus on traditional perimeter and inbound security protocols to defend against malware, viruses and other attacks that inevitably overwhelm networks and damage servers, devices and workstations. One of the potential solutions available to improve the distributed nature of IoT security is blockchain. Forbes, July 28, 2017

Cyber Warning

Researchers at Black Hat show how hackers ‘could make car wash attack’: Researchers say they have found a way to hack an internet-enabled carwash and make it “attack” users. BBC, July 28, 2017

Cyber Enforcement

Feds Indict Russian Over BTC-e Bitcoin Exchange: Police in Greece on Tuesday arrested Alexander Vinnik, 38, for allegedly running a massive money laundering operation that processed $4 billion in bitcoins, many of which may be tied to the largest bitcoin exchange heist in history. BankInfoSecurity, July 27, 2017

 The post Cyber Security News of the Week, July 30, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

 

Cyber Security Vulnerability and Patch Report, July 23, 2017

 

From our friends at

 Citadel Information Group

Important Security Updates

Apple iTunes: Apple has released version 12.6.2 (64-bit and 32-bit) of iTunes. Updates are available from Apple’s website.

Apple Multiple Products: Apple has released updates in tvOS 10.2.2, iCloud for Windows 6.2.2, Safari 10.1.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6, OS X Yosemite 10.10.5, IOS 10.3.3, watchOS 3.2.3 and others. Additional details are available on Apple’s website.

Avast: Avast! Free Antivirus has released version 17.5.2303. Updates are available on Avast’s website. Avast! has also released updates for Premier Antivirus, Pro Antivirus and Internet Security.

Opera: Opera has released version 46.0.2597.57. Updates are available from within the browser or from Opera’s website.

Oracle Java: Oracle has released versions Java SE 8 Update 141. The update is available through Windows Control Panel or Java’s website. [See Citadel’s recommendation below]

Current Software Versions

Adobe Flash 26.0.0.137

Adobe Reader DC 17.009.20044

Dropbox 30.4.22 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 54.0.1 [Windows]

Google Chrome 59.0.3071.115

Internet Explorer 11.0.9600.18739

Java SE 8 Update 141 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.2 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.38.0.101

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in SNMP, WebEx, Web Security Appliance, Prime, ASR 5000 Series and others. Apply updates. Additional details are available at Cisco’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security News for the Week, July 23, 2017

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Cyber Warning

How A Billion-Dollar Internet Scam Is Breaking Hearts And Bank Accounts. Criminal networks defraud lonely people around the world with false promises of love and romance. … Modern online romance scams are premeditated, organized crimes that steal millions ― potentially billions ― of dollars from vulnerable, lonely people over the internet. HuffPost, July 20, 2017
 

Cyber criminals are targeting you a new way: through ‘smishing.’ Cyber criminals are increasingly targeting victims through a text message scam called “smishing” that can infect your smartphone and let thieves steal your personal information. … That means social security numbers, addresses, and even your credit card information can all be vulnerable through a simple, unassuming text message you receive. NBC News, July 20, 2017

Cyber Update

Apple Patches BroadPwn Bug in iOS 10.3.3. Apple released iOS 10.3.3 Wednesday, which serves as a cumulative update that includes patches for multiple vulnerabilities including the high-profile BroadPwn bug that allowed an attacker to seize control of a targeted iOS device. threatpost, july 19, 2017

Information Security Management in the Organization

Cyber Awareness

Who’s responsible for cybersecurity: the employee or the firm? Question: All we keep hearing about at my firm is “cybersecurity.” I get what I’m supposed to do: Don’t click on strange links in e-mails. Watch out for phishing attempts. Verify distribution requests with my clients verbally. Beyond that, isn’t it the firm’s responsibility to make sure its systems are buttoned up? Financial Planning, July 21, 2017
 

Your Organization’s Greatest Threat? It’s Bob. You know Bob who works for your organization? That’s right, Bob, the CFO. Nice guy. Organized, always on time, gets the job done. Good guy (except when he got tanked at the Christmas party but let’s not talk about that). Well, there’s something you might not know about Bob: He’s incredibly dangerous to your business. He’s potentially a one man wrecking crew who could put you out of business and you know why? It’s your fault; you haven’t trained him. ITSP, July, 2017
 

Cyber Defense

Companies unprepared to measure incident response. Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their organizations are not prepared to measure incident response, and only 14.5 percent of respondents are measuring MTTR (Mean Time to Respond). Help Net Security, July 21, 2017

35 cyber security statistics every CIO should know in 2017. Cybercrime is now part of every business and IT decision. Discover the latest trends, and the implications behind them, in our essential round-up of the key stats you need to know. HP, February 17, 2017

HIPAA

Five Steps to Ensuring Your Risk Assessment Complies with OCR Guidelines. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and healthcare technology have changed significantly over the past 20 years. Covered entities and their business associates face an ever-evolving risk environment in which they must protect electronic protected health information (ePHI). Although healthcare security budgets may increase this year, the cost of implementing and maintaining adequate security controls to protect an entity’s ePHI far exceeds what is often budgeted. As a result, some ePHI may be under-protected and vulnerable to data breach. A long-term, consistent and cost-conscious approach to HIPAA compliance is needed. Healthcare Informatics Magazine, July 14, 2017

Cyber Security in Society

Cyber Crime

In each “Evil Internet Minute,” $858,153 is Lost to Cybercrime: RiskIQ Report. With cybercriminals costing the global economy $454 billion last year alone, RiskIQ took a closer look at the growing volume of malicious activity on the internet during a single “internet minute.” … Every minute, close to $858,153 is lost to cybercrime, and 1,080 people fall victim. Despite businesses’ best efforts to guard against external cyberthreats, which spend up to $143,936 in 60 seconds, bad actors continue to proliferate online. RiskIQ, July 2017

$32 million worth of digital currency ether stolen by hackers. Around 153,000 ether tokens , a digital currency similar to bitcoin, worth $32.6 million were taken by hackers on Wednesday. A vulnerability in Parity’s multisignature wallet was exploited by the hackers. This latest theft follows an incident on Monday where $7 million worth of ether tokens were stolen.

Miscreants pillaged credit cards from Trump Hotels’ booking system. If you stayed at one of 14 Trump hotel properties between July 2016 and March 2017, there’s a chance your credit card data and other personal information may have been pilfered. ars technica, july 12, 2017

Cyber Freedom

Read the Undisclosed Plan to Counter Russian Hacking on Election Day. Time Exclusive. resident Obama’s White House quietly produced a plan in October to counter a possible Election Day cyber attack that included extraordinary measures like sending armed federal law enforcement agents to polling places, mobilizing components of the military and launching counter-propaganda efforts.Time Magazine, July 20, 2017
 

Security experts from Google, Facebook, Crowdstrike join with Harvard group to save US elections. A new group at Harvard University staffed by the former campaign managers of the Hillary Clinton and Mitt Romney campaigns, along with other top security experts, have banded together to help mitigate various types of online attacks that threaten American democracy. … The initiative, dubbed “Defending Digital Democracy,” will be run by former chief of staff for the secretary of defense, Eric Rosenbachars technica, july 18, 2017

Microsoft using lawsuits to attack Russian hacking group Fancy Bear. Microsoft is going after Fancy Bear, the Russian hacking group that targeted the DNC, by wresting control of domain names controlled by the foreign spies. … A new offensive by Microsoft has been making inroads against the Russian government hackers behind last year’s election meddling, identifying over 120 new targets of the Kremlin’s cyber spying, and control-alt-deleting segments of Putin’s hacking apparatus. … How are they doing it? It turns out Microsoft has something even more formidable than Moscow’s malware: Lawyers. Daily Beast, July 20, 2017

Please Prove You’re Not a Robot. When science fiction writers first imagined robot invasions, the idea was that bots would become smart and powerful enough to take over the world by force, whether on their own or as directed by some evildoer. In reality, something only slightly less scary is happening. Robots are getting better, every day, at impersonating humans. When directed by opportunists, malefactors and sometimes even nation-states, they pose a particular threat to democratic societies, which are premised on being open to the people. The New York Times, July 15, 2017

National Cyber Security

UAE orchestrated hacking of Qatari govt sites, planted fake news, say U.S. intelligence officials. The United Arab Emirates orchestrated the hacking of Qatari government news and social media sites in order to post incendiary false quotes attributed to Qatar’s emir, Sheikh Tamim Bin Hamad al-Thani, in late May that sparked the ongoing upheaval between Qatar and its neighbors, according to U.S. intelligence officials. Washington Post, July 16, 2017
 

Cyber Government

FCC has no documentation of DDoS attack that hit net neutrality comments. The US Federal Communications Commission says it has no written analysis of DDoS attacks that hit the commission’s net neutrality comment system in May. … In its response to a Freedom of Information Act (FoIA) request filed by Gizmodo, the FCC said its analysis of DDoS attacks “stemmed from real time observation and feedback by Commission IT staff and did not result in written documentation.” Gizmodo had asked for a copy of any records related to the FCC analysis that concluded DDoS attacks had taken place. Because there was no “written documentation,” the FCC provided no documents in response to this portion of the Gizmodo FoIA request. ars technica, july 20, 2017

Financial Cyber Security

US Banks Targeted with Trickbot Trojan. The Necurs botnet has begun delivering the Trickbot banking Trojan to financial institutions in the United States, a sign of increasingly larger and more complex attacks on the industry. … Trickbot, which specifically threatens businesses in the financial sector, has been behind man-in-the-browser (MitB) attacks since 2016. Until now, its webinject configuration was only used to hit organizations outside the US. DARKReading, July 20, 2017

Cyber Medical

Healthcare Industry Lacks Awareness of IoT Threat, Survey Says. Healthcare networks are teeming with IoT devices from glucometers to infusion pumps, but a study found that the majority of IT decision makers may be operating with a false sense of security regarding their ability to protect these devices from cyber attacks. … According to a survey of more than 200 healthcare IT decision makers, more than 90% of healthcare IT networks have IoT devices connected to the systems, according to a report released Wednesday by ZingBox. DARKReading, July 20, 2017 

Internet of Things

IoT in the Enterprise: The Next Big Thing. Millions of connected devices already have been potentially compromised – inside and outside of the enterprise. Phil Marshall discusses when and how attackers will take advantage of these in the next big IoT strike. Phil Marshall, Tolaga Research. BankInfo Security, July 20, 2017

Experts in Lather Over ‘gSOAP’ Security Flaw. Axis Communications — a maker of high-end security cameras whose devices can be found in many high-security areas — recently patched a dangerous coding flaw in virtually all of its products that an attacker could use to remotely seize control over or crash the devices. … The problem wasn’t specific to Axis, which seems to have reacted far more quickly than competitors to quash the bug. Rather, the vulnerability resides in open-source, third-party computer code that has been used in countless products and technologies (including a great many security cameras), meaning it may be some time before most vulnerable vendors ship out a fix — and even longer before users install it. Krebs on Security, July 18, 2017

A smart fish tank left a casino vulnerable to hackers. Most people know about phishing — but one casino recently learned about the dangers of actual fish tanks. … Hackers attempted to steal data from a North American casino through a fish tank connected to the internet, according to a report from security firm Darktrace. … Despite extra security precautions set up on the fish tank, hackers still managed to compromise the tank to send data to a device in Finland before the threat was discovered and stopped. CNN Tech, July 19, 2017

Know Your Enemy

Surprisingly stealthy botnet has been targeting users for years. ESET researchers have unearthed a botnet of some 500,000 infected machines engaged mostly in ad-related fraud by using malicious Chrome extensions, but also Facebook fraud and brute-forcing Joomla and WordPress websites. The compromised machines are also equipped with a fully featured backdoor, which allows the operators to spy on all the victims, and to download additional malware on the computers. Help Net Security, July 21, 2017

Cyber Enforcement

Police Seize World’s Two Largest Darknet Marketplaces. At a Thursday news conference, the FBI and Europol announced that they’ve jointly seized the world’s two biggest darknet – or dark web – marketplaces, AlphaBay and Hansa, which were collectively responsible for more than 10 times the volume of sales as the notorius Silk Road marketplaceBankInfo Security, July 20, 2017

After AlphaBay’s Demise, Customers Flocked to Dark Market Run by Dutch Police. Earlier this month, news broke that authorities had seized the Dark Web marketplace AlphaBay, an online black market that peddled everything from heroin to stolen identity and credit card data. But it wasn’t until today, when the U.S. Justice Department held a press conference to detail the AlphaBay takedown that the other shoe dropped: Police in The Netherlands for the past month have been operating Hansa Market, a competing Dark Web bazaar that enjoyed a massive influx of new customers immediately after the AlphaBay takedown. Krebs on Security, July 20, 2017

Krebs Exclusive: Dutch Cops on AlphaBay ‘Refugees.’  Following today’s breaking newsabout U.S. and international authorities taking down the competing Dark Web drug bazaars AlphaBay and Hansa Market, KrebsOnSecurity caught up with the Dutch investigators who took over Hansa on June 20, 2017. When U.S. authorities shuttered AlphaBay on July 5, police in The Netherlands saw a massive influx of AlphaBay refugees who were unwittingly fleeing directly into the arms of investigators. What follows are snippets from an exclusive interview with Petra Haandrikman, team leader of the Dutch police unit that infiltrated Hansa. Krebs on Security, July 20, 2017

Cyber Law

Anthem Settles Data Breach Litigation for Record-Setting $115M. Health insurance giant Anthem, Inc. agreed to the largest data breach settlement to-date last week, ending multi-district consumer litigation over a 2015 data breach for $115 million.  The data breach, which resulted from a hacker-orchestrated cyberattack following the theft of an employee password, exposed personally identifiable information (“PII”) and protected health information (“PHI”) of nearly 80 million people.  The stolen information included the names of current and former clients, dates of birth, addresses, social security numbers, and other medical information. Alston & Bird Privacy & Data SecurityBlog, July 2017

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security Vulnerability and Patch Report, July 16, 2017

Cybersecurity Vulnerability and Patch Report

 

From our friends at

 Citadel Information Group

 

Weekend Vulnerability and Patch Report, July 16, 2017

 

Important Security Updates

Adobe Flash Player: Adobe has released version 26.0.0.137. Updates are available from Adobe’s website. To see which version you have, go to Adobe’s web page.

Avira Antivirus: Avira has released version 15.0.28.28 of its free Antivirus and Pro. Updates are available from Avira’s website.

Dropbox: Dropbox has released version 30.4.22 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

Google Drive: Google has released version 3.35.5978.2967 of its Google Drive. Updates are available from Google’s website.

LastPass: LastPass has released version 4.1.60 for its Free Password Manager. Updates are available from LastPass’ website.

Microsoft Patch Tuesday: Microsoft’s Patch Tuesday released updates to address almost a hundred vulnerabilities, some of which are highly critical within Windows operating systems, Microsoft Edge, Internet Explorer, Office, and other Microsoft products. Additional details are available at Microsoft’s website.

Opera: Opera has released version 46.0.2597.46. Updates are available from within the browser or from Opera’s website.

Piriform CCleaner: Piriform has released version 5.32.6129 for CCleaner. Updates are available from Piriform’s website.

Current Software Versions

Adobe Flash 26.0.0.137

Adobe Reader DC 17.009.20044

Dropbox 30.4.22 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 54.0.1 [Windows]

Google Chrome 59.0.3071.115

Internet Explorer 11.0.9600.18739

Java SE 8 Update 131 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

Microsoft Edge 40.15063.0.0

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, 2016 US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 10.1.1 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.38.0.101

For Your IT Department

Cisco Multiple Products: Cisco has released updates to address vulnerabilities in SNMP, Samba Affecting Cisco Products and others. Apply updates. Additional details are available at Cisco’s website.

*******************

If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.

If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.

Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.

Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.

Copyright © 2017 Citadel Information Group. All rights reserved.

The post Weekend Vulnerability and Patch Report, July 16, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810

Cyber Security News for the Week, July 16, 2017

Cyber Security News

Cyber Security News

from our friends at Citadel Information Group

 

Individuals at Risk

Cyber Privacy

White House releases sensitive personal information of voters worried about their sensitive personal information: The White House on Thursday made public a trove of emails it received from voters offering comment on its Election Integrity Commission. The commission drew widespread criticism when it emerged into public view by asking for personal information, including addresses, partial social security numbers and party affiliation, on every voter in the country. The Washington Post, July 14, 2017

Cyber Update

Adobe, Microsoft Push Critical Security Fixes: It’s Patch Tuesday, again. That is, if you run Microsoft Windows or Adobe products. Microsoft issued a dozen patch bundles to fix at least 54 security flaws in Windows and associated software. Separately, Adobe’s got a new version of its Flash Player available that addresses at least three vulnerabilities. KrebsOnSecurity, July 11, 2017

Cyber Defense

Keep security in mind on your summer vacation: When you travel, there probably are a few must-haves in your suitcase: your toothbrush, deodorant, socks, shoes – you get the idea. But one travel must-have we don’t always think about is security. While you’re away from home, you might be using public Wi-Fi, tagging your locations (whether or not you realize it), carrying around your passport, and using your credit card more often. Those things could put you at a higher risk of identity theft. Federal Trade Commission, Consumer Information, July 13, 2017

Cyber Warning

macOS users beware: A new and nearly undetectable malware is on the rise: Often thought of as impenetrable, macOS is falling prey to a sneaky malware that’s stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here. TechRepublic, July 14, 2017

Watch out for this money stealing macOS malware which mimics your online bank: OSX Dok now attempts to steal money from Apple Mac users — and could be being prepared for use in further attacks. ZDNet, July 14, 2017

Information Security Management in the Organization

Information Security Management and Governance

Beyond Breach Notification: Ever since California adopted the nation’s first breach notification law in 2002, companies that have suffered a data breach have focused on whether and how to notify their customers, employees and others of the nature and extent of the breach. California’s law has been amended multiple times, and has been followed by breach notification laws in almost every state, as well as the notification requirements under the Health Insurance Portability and Accountability Act (“HIPPA”). As these laws developed, a tandem requirement has emerged: the obligation to take reasonable steps to protect data, and companies are, increasingly focused on taking steps to ensure the security of their data. Robert Braun, SecureTheVillage Leadership Council, Jeffer Mangels Butler & Mitchell Cybersecurity Lawyer Forum, July 7, 2017

Cyber Awareness

How to Avoid Being the Weakest Link in Your Company’s Information Security: When you think of hackers, you probably think of some spy movie where they come down from the ceiling to steal a computer off of a desk and then whisk it away to their laboratory where they input lines of code to crack the encryption. In reality, hacking is often as simple as learning about a user and then guessing their password or even asking them for it: a process called social engineering. INC, July 13, 2017

Why your company needs clear security policies: A cautionary tale: An IT employee was recently almost fired for storing documents on Dropbox. Here’s how the employee and the company could have prevented that situation. TechRepublic, July 13, 2017

Using Feedback Loops to Enhance End User Security: The security world abounds with case studies demonstrating that end users are a weak point within the organization. End users are constantly bombarded by phishing attacks, are notorious for using weak account credentials and are preyed on by malware relying on the user to introduce malicious software into an environment. All of these examples may lead to significant damage to the organization and negative headlines. SecurityIntellegicen, August 9, 2017

Cyber Warning

Darkweb Hackers Begin Offering Functional Mac Malware and Ransomware as a Service: With the popularity of both ransomware and the creation of macOS malware on the rise with hackers, Apple users face a growing number of threats. It now appears that others have turned their attention to the creation of new malware to spy on Mac users — but these programmers have gone a step further. Rather than developing a tool and deploying it personally, they have taken to the dark web to offer their products for sale. Known respectively as MacSpy and MacRansom, the hackers provide the malware to users while operating a centralized web portal. The authors’ continued involvement is why this threat is often called malware- or “ransomware-as-a-service.” SecureMac, June 29, 2017

Cyber Defense

To update or not to update: There is no question: Updating software has become one of the many keys to data security. Jack Wallen explains why the excuses for failing to update must become a thing of the past. TechRepublic, July 13, 2017

IT is NOT Cybersecurity: Having IT isn’t enough anymore, businesses need a separate security team also. Policemen and firefighters are a good examples of this, both of them will help you in your time of need, but each of them has very specific training for specific functions. CSO, July 11, 2017

Cyber Security in Society

Cyber Crime

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far: Data breaches aren’t slowing down. If anything, they’re set to break last year’s record pace. As noted by 24/7 Wall Street, the 758 breaches reported this year mark nearly a 30 percent increase from 2016. If cybercriminals keep it up, the total number of attacks could break 1,500 by the end of 2017. SecurityIntelligence, July 13, 2017

Self-Service Food Kiosk Vendor Avanti Hacked: Avanti Markets, a company whose self-service payment kiosks sit beside shelves of snacks and drinks in thousands of corporate breakrooms across America, has suffered of breach of its internal networks in which hackers were able to push malicious software out to those payment devices, the company has acknowledged. The breach may have jeopardized customer credit card accounts as well as biometric data, Avanti warned. KrebsOnSecurity, July 8, 2017

Cyber Espionage

Vault 7 reports new WikiLeaks dump details CIA’s Android SMS snooping malware: Since launching its Vault 7 project in March, WikiLeaks has dumped documents outlining the CIA’s efforts to exploit Microsoft and Apple technology. In this week’s latest release, it focuses on malware called HighRise, which the agency used to target Android devices. Naked Security, July 14, 2017

Know Your Enemy

With this $7 malware, anyone can be a hacker for cheap: Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions. TechRepublic, July 14, 2017

National Cyber Security

Private Email of Top U.S. Russia Intelligence Official Hacked: On Tuesday morning, a hacker going by the name Johnnie Walker sent a group email to an unknown number of recipients claiming to have a trove of emails from the private account of a U.S. intelligence official. Foriegn Policy, July 14, 2017

Governors ask Congress to create cybersecurity committee: The leadership of the National Governors Association, including incoming chairman Gov. Brian Sandoval, repeated a plea to Congress on Friday to create a national committee to address cybersecurity threats. Las Vegas Review Journal, July 14, 2017

States Pledge to Meet Cyber Threats; Publish Resource Guide: National Governors Association (NGA) Chair Virginia Gov. Terry McAuliffe kicked off the 2017 NGA Summer Meeting with a discussion on how states continue to develop strategies to thwart cyber threats. Dark Reading, July 14, 2017

Stewart Baker interviews DSB’s Jim Miller re cyber conflict & deterrence: In this episode, we interview Jim Miller, co-chair of a Defense Science Board panel that reported on how the US is postured for cyberconflict and the importance of deterrence. The short answer: deterring cyberconflict is important because our strategic cyberconflict posture sucks. The DSB report is thoughtful, detailed, and troubling. Jim Miller manages to convey its message with grace, good humor, and clarity. Steptoe Cyberblog, July 10, 2017

Stewart Baker interviews ex-NSA Deputy Director Richard Ledgett: Today we deliver the second half of our bifurcated holiday podcast with an interview of Richard Ledgett, recently retired from his tour as NSA’s deputy director. We cover much recent history, from Putin’s election adventurism to questions about whether NSA can keep control of the cyberweapons it develops. Along the way, Rick talks about the difference between CIA and NSA approaches to hacking, the rise of NSA as an intelligence analysis force, the growing effort to keep Kaspersky products out of sensitive systems, and the divergence among intel agencies about whether Putin’s attack on the American election was intended mainly to hurt Hillary Clinton or to help Donald Trump. Steptoe Cyberblog, July 5, 2017

Financial Cyber Security

Thieves Used Infrared to Pull Data from ATM ‘Insert Skimmers’: A greater number of ATM skimming incidents now involve so-called “insert skimmers,” wafer-thin fraud devices made to fit snugly and invisibly inside a cash machine’s card acceptance slot. New evidence suggests that at least some of these insert skimmers — which record card data and store it on a tiny embedded flash drive — are equipped with technology allowing them to transmit stolen card data wirelessly via infrared, the same communications technology that powers a TV remote control. KrebsOnSecurity, July 13, 2017

HIPAA

HIPAA: Five Steps to Ensuring Your Risk Assessment Complies with OCR Guidelines: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and healthcare technology have changed significantly over the past 20 years. Covered entities and their business associates face an ever-evolving risk environment in which they must protect electronic protected health information (ePHI). Although healthcare security budgets may increase this year, the cost of implementing and maintaining adequate security controls to protect an entity’s ePHI far exceeds what is often budgeted. As a result, some ePHI may be under-protected and vulnerable to data breach. A long-term, consistent and cost-conscious approach to HIPAA compliance is needed. healthcare informatics, July 14, 2017

Critical Infrastructure

Your Guide to Russia’s Infrastructure Hacking Teams: Since reports first surfaced that hackers targeted more than a dozen American energy utilities, including a Kansas nuclear power plant, the cybersecurity community has dug into the surrounding evidence to determine the culprits. Without knowing the perpetrators, the campaign lends itself to a broad range of possibilities: a profit-seeking cybercriminal scheme, espionage, or the first steps of hacker-induced blackouts like the ones that have twice afflicted Ukraine in the last two years. WIRED, July 12, 2017

U.S. officials say Russian government hackers have penetrated energy and nuclear company business networks: Russian government hackers were behind recent cyber-intrusions into the business systems of U.S. nuclear power and other energy companies in what appears to be an effort to assess their networks, according to U.S. government officials. The Washington Post, July 8, 2017

Combating a Real Threat to Election Integrity: Russia’s meddling in the 2016 election may not have altered the outcome of any races, but it showed that America’s voting system is far more vulnerable to attack than most people realized. Whether the attackers are hostile nations like Russia (which could well try it again even though President Trump has raised the issue with President Vladimir Putin of Russia) or hostile groups like ISIS, the threat is very real. The New York Times, July 8, 2017

Internet of Things

The Threat From Weaponized IoT Devices: It’s Bigger Than You Think!: IoT devices, such as smart meters, smart watches and building automation systems, are prolific. You may think that compromised IoT devices pose a danger only to the devices’ owners — for example, it’s easy to understand the privacy violation of an attacker viewing a web camera feed without the owner’s permission. SecurityIntelligence, July 20, 2016

Cyber Sunshine

Darknet Marketplace AlphaBay Offline Following Raids: A joint law enforcement investigation involving the United States, Canada and Thailand appears to have resulted in the takedown of the world’s largest darknet marketplace, called AlphaBay. Meanwhile, one of its alleged operators has been found dead in a Bangkok jail cell. BankInfoSecurity, July 14, 2017

Cyber Miscellany

Pew Report: Whose job is it to keep us safe from online harassment?: A new report has found that 41% of Americans have personally experienced online harassment, 66% have seen it directed to others, and 62% consider it a major problem. Naked Security, July 14, 2017

The post Cyber Security News of the Week, July 16, 2017 appeared first on Citadel Information Group.

Jeff Snyder's, SecuirtyRecruiter.comSecurity Recruiter Blog, 719.686.8810