[ISN] Army Reserve soldiers train in cyber defense operations

http://www.dvidshub.net/news/123583/army-reserve-soldiers-train-cyber-defense-operations By Capt. Addie Randolph DVIDSHUB.net FORT DIX, NJ, US 04.01.2014 FORT DIX, N.J.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] UMC Health System Security Officer discusses user awareness

http://healthitsecurity.com/2014/04/01/umc-health-system-security-officer-discusses-user-awareness/ By Patrick Ouellette Health IT Security April 1, 2014 With 14 years under his belt working with government entities in IT security, Phil Alexander, Information Security Officer at University Medical Center (UMC) Health System, certainly has a unique outlook on IT security in the healthcare sector. Based on those experiences at the federal level and his one year at UMC, Alexander talked with HealthITSecurity.com about his current focuses and where he thinks healthcare IT security is headed. UMC Health System, which includes our all its clinics in the local area, is the major regional provider in the West Texas area, so Alexander has a lot to keep track of. What are you concentrating on security-wise at UMC at the moment? When I got here, we were doing the typical basic cybersecurity and information assurance, nothing out of the ordinary. So I split my team into two: one dedicated to beefing up information assurance and the other being our computer security incident response team (CSIRT). The CSIRT team does a lot of traffic monitoring, packet analysis and forensics. And then on the other side of the house we’re increasing user awareness training this year. I have a different philosophy on security awareness


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Hacked passwords can enable remote unlocking, tracking of Tesla cars

http://www.networkworld.com/news/2014/040114-hacked-passwords-can-enable-remote-280268.html [There was a good tweet about solving this problem now with a simple fix https://twitter.com/justinlundy_/status/449759008253964288 – WK] By Lucian Constantin IDG News Service April 01, 2014 Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher. Tesla Model S owners need to create an account on teslamotors.com when they order their cars and the same account allows them to use an iOS app to remotely unlock the car’s doors, locate it, close and open its roof, flash its lights or honk its horn. Despite providing access to important car features, these accounts are only protected by a password with low-complexity requirements


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Middle Eastern hackers use remote access Trojan to infect 24, 000 machines worldwide

http://www.v3.co.uk/v3-uk/news/2337382/middle-eastern-hackers-use-remote-access-trojan-to-infect-24-000-machines-worldwide By Alastair Stevenson V3.co.uk 01 Apr 2014 Security firm Symantec has uncovered 487 groups actively using njRAT malware, claiming the malicious users have managed to infect 24,000 machines worldwide. Symantec threat lab researchers reported the campaigns in a blog post, confirming the hackers are using the njRAT malware for a variety of purposes. “Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have different motivations, which can be broadly classed as hacktivism, information theft and botnet building,” the researchers said. “The malware can be used to control networks of computers, known as botnets. While most attackers using njRAT appear to be engaged in ordinary cyber-criminal activity, there is also evidence that several groups have used the malware to target governments in the region.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] China’s unsupported XP machines hold the potential to become a massive botnet army

http://www.networkworld.com/news/2014/033114-xp-china-280233.html By Tim Greene Network World March 31, 2014 Unsupported Windows XP machines in China could pose a threat to the Internet in general if bot-herders round up significant numbers of them to use as launch pads for malicious exploits, according to a top white-hat hacker. James Forshaw, a vulnerability researcher for Context Information Security, says the vast number of XP computers in China represents the potential staging ground for attacks if they become compromised. “If we’re talking tens of millions of machines that’s a significant pool to do DoS or other malicious attacks,” says Forshaw, who is a $100,000 winner of Microsoft’s BlueHat bounty prize for finding and reporting vulnerabilities in its Internet Explorer browser. “It might be in everyone’s best interest to get China or other countries to help them to migrate.” StatCounter, which tracks operating system use by country, says that in January Windows XP represented 50.46% of the operating systems in use in China. That’s down from 63% the year before, but still very significant. With China’s population upward of 1.3 billion, that represents a lot of machines, Forshaw says. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] What are Advanced Evasion Techniques? Don’t expect CIOs to know, says McAfee

http://news.techworld.com/security/3509357/what-are-advanced-evasion-techniques-dont-expect-cios-know-finds-mcafee/ By John E Dunn Techworld 31 March 2014 What is an Advanced Evasion Technique (AET)? According to a McAfee survey, an awful lot of CIOs have absolutely no idea, confusing them with the more famous Advanced Persistent Threats (APTs) that have become an established term on many large organisations’ worry list. The survey of 800 professionals across the US, UK, Germany, France, Australia, Brazil, and South Africa found that only 70 percent were even sure they understood AETs, with 37 percent of those getting the definition wrong. This means that less than half of CIOs can define the term at all. In fairness to CIOs, nobody has heard of AETs because they are, whisper it, pretty dull. They can be explained as subtle techniques designed to get around security boxes such as firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Think of them as packet-level probes that aim to spot weakness in these products such as traffic flows they don’t understand, get confused about or just don’t notice. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Bank abandons place in class-action suit against Target, Trustwave

http://www.computerworld.com/s/article/9247309/Bank_abandons_place_in_class_action_suit_against_Target_Trustwave By Jeremy Kirk IDG News Service March 31, 2014 One of the two banks suing Target and security vendor Trustwave over responsibility for one the largest data breaches in history has pulled out of the lawsuit. Trustmark National Bank, of New York, filed a notice of dismissal of its claims on Friday in U.S. District Court for the Northern District of Illinois. It had joined Green Bank of Houston in the class-action suit, which claims Target and Trustwave failed to stop the theft of 40 million payment card details and 70 million other personal records. The suit may have wrongly named Trustwave as one of Target’s IT security contractors. After the suit was filed on March 24, Trustwave said it would not comment on pending litigation and customarily does not identify its customers. Many agreements with IT vendors and customers are confidential. But on Saturday, Trustwave’s Chairman and CEO Robert J. McCullen added more clarity by writing a letter on its website saying Target did not outsource its data security or IT obligations to the company. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail