[ISN] Phishing emails fool most employees. But is this their problem or email’s?

http://news.techworld.com/security/3543504/phishing-emails-fool-most-employees-but-is-this-their-problem-or-emails/ By John E. Dunn Techworld 04 September 2014 More than a decade after phishing attacks became the standard way of getting around corporate defences, all but a tiny minority of employees still fall for this kind of email, a McAfee test of UK-based workers has found After crunching numbers on 1,755 people who took the firm’s online Phishing Test, eight out of ten failed to spot at least one bogus email in seven with finance and HR departments among the worst performers. Employees in more technical departments such as R&D were generally the best performers, with all types of workers particularly susceptible when spam emails included spoofed addresses. Six out of ten people fell for UPS scams if the return address looked genuine while half were fooled by a similar tactic using an eFax notification. “Phishing continues to pose significant security risks for businesses and consumers alike. More worryingly, perhaps, is the lack of education around how to spot a phishing email amidst the many emails we’re sent on a daily basis,” commented McAfee EMEA CTO, Raj Samani. […]




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] HealthCare.gov Server Compromised by Hackers

http://www.infosecnews.org/healthcare-gov-server-compromised-by-hackers/ By William Knowles @c4i Senior Editor InfoSec News September 5, 2014 Unknown hackers breached a test server with malware on a Health and Human Services (HHS) site that supports the Obamacare insurance website HealthCare.gov The commonplace malware was designed to launch “denial of service” attacks against other websites, HHS said, and there is no evidence any consumers’ personal information was sent to any external IP address. The attack did not appear to directly target HealthCare.gov, and the server that was targeted did not contain any consumers’ personal information. The Wall Street Journal reports that the server was connected to more sensitive parts of the website that had better security protections, the officials said. That means it would have been possible, if difficult, for the intruder to move through the network and try to view more protected information, an official at the Department of Health and Human Services said. There is no indication that happened, and investigators suspect the hacker didn’t intend to target a HealthCare.gov server. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Home Depot breach a near certainty, yet Backoff remains a question

http://arstechnica.com/security/2014/09/home-depot-breach-a-near-certainty-yet-backoff-remains-a-question/ By Robert Lemos Ars Technica Sept 4, 2014 Home Depot has not yet confirmed that a slew of fraudulent transactions came from a breach of its systems, yet an increasing body of evidence is mounting that points to a massive compromise linked to the home-supply retail chain. Financial institutions first detected the suspected breach when a wave of fraudulent transactions on cards had been used at Home Depot. On Wednesday, journalist and blogger Brian Krebs, who originally broke the story, analyzed the zip codes of a recent batch of stolen cards offered for sale on the underground and found a 99 percent match with the locations of Home Depot’s stores. Such a correlation is a “smoking gun,” Lucas Zaichkowsky, enterprise defense architect at AccessData, a digital forensics and security services firm, said in an e-mail interview. Whether Home Depot has been breached is no longer a question, he said. “The bigger question is why Home Depot didn’t detect the attackers as they maneuvered from their initial entry point past multiple layers of defense, performing internal reconnaissance and escalating privileges in the process,” Zaichkowsky said. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] The Russian-made tool that grabs nude selfies from iCloud accounts

http://www.csoonline.com/article/2602243/data-protection/the-russianmade-tool-that-grabs-nude-selfies-from-icloud-accounts.html By Jeremy Kirk IDG News Service Sep 4, 2014 There’s a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data. Some of the nude celebrity photos are believed to have first been circulated on Anon-IB, a definitely not safe-for-work forum. As reported by Wired, the forum is full of offers for iCloud “ripping,” or downloading the entire contents of an account. The software tool they’re using is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB, one of many forensic tools the company develops for law enforcement and other clients. Elcomsoft CEO Vladimir Katalov said via email on Wednesday that there are legitimate uses for his company’s software and that it doesn’t exploit flaws in Apple services. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] JPMorgan Had Exodus of Tech Talent Before Hacker Breach

http://www.bloomberg.com/news/2014-09-05/jpmorgan-had-exodus-of-tech-talent-before-hacker-breach.html By Hugh Son and Michael Riley Bloomberg.com Sep 5, 2014 As hackers pierced JPMorgan Chase & Co.’s (JPM) defenses in June, the bank’s cybersecurity chief was just getting acquainted with his employer and its sprawling technology infrastructure. Greg Rattray, a former U.S. Air Force commander for information warfare, became JPMorgan’s head of information security that month after upheaval at the highest levels of the bank’s tech division. His predecessor, Anthony Belfiore, had resigned early this year to join at least five JPMorgan leaders at First Data Corp. In between, Anish Bhimani was acting security officer while holding at least one other tech role. “It sucks that this happened at the beginning of Greg’s watch, but this is a legacy issue,” said Tom Kellermann, chief cybersecurity officer at anti-virus software firm Trend Micro Inc. “They had an acting person who was juggling way too much, with no one fully dedicated to the role for a bit of time.” JPMorgan, led by Chief Executive Officer Jamie Dimon, 58, has rushed to determine the scope of the assault and restore confidence in security at the biggest U.S. lender. While hackers targeted other banks’ systems, JPMorgan is the only bank said to have had gigabytes of data stolen, including information on customer accounts. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail