http://fortune.com/2015/07/29/crowdstrike-cybersecurity-george-kurtz/ By Robert Hackett @rhhackett Fortune.com July 29, 2015 It’s not every day that a company can compel hackers to give up. Yet that’s exactly what CrowdStrike managed to do earlier this year. CEO and co-founder George Kurtz tells it like this: A besieged customer needed backup. So Kurtz’s team sent in reinforcements, placed its cloud-based software sensors across the breached business’s computing environment, and started gathering intel. Aha! Investigators spotted Hurricane Panda, an old Chinese nemesis that Kurtz’s crew had been battling since 2013. What happened next surprised them: When the attackers scanned an infected machine only to find traces of CrowdStrike, they fled. CrowdStrike’s reputation precedes it. The company, founded in 2011 and based in Irvine, Calif., has gone toe-to-toe with some of the world’s most sophisticated state-sponsored hacking groups. The firm analyzed the data behind the breaches of millions of sensitive records at the Office of Personnel Management, the federal agency responsible for human resources, in what may have been the biggest act of cyberespionage the U.S. has ever seen. It has published threat reports on many of the more than 50 adversaries it tracks, which include the likes of Ghost Jackal (the Syrian Electronic Army), Viceroy Tiger (an Indian intruder), and Andromeda Spider (a criminal coterie). Between 2013 and 2014 its revenue grew 142% and its customer base more than tripled, two reasons Google Capital GOOG 0.63% , the tech giant’s growth equity arm, led a $100 million investment in CrowdStrike in July, its first ever for a computer security company. Kurtz used to travel hundreds of thousands of miles a year as CTO of McAfee, now called Intel Security INTC 0.17% , to meet with beleaguered customers. It struck him that they did not need more anti-malware and antivirus products, the traditional realm of information security, so much as software oriented toward tradecraft and technique, the domain of cyberspies. Co-founder and CTO Dmitri Alperovitch, then McAfee’s head of threat intelligence, agreed. […]
http://www.theregister.co.uk/2015/06/04/mad_mcafee/ By Alexander J Martin The Register 4 June 2015 Infosec 2015 – John McAfee delivered a surprisingly non-controversial keynote speech to the London Infosec Conference on Wednesday afternoon, lauding the value of privacy, doing so – to the concern of his bewildered audience – whilst seemingly tickling himself through the cloth of his pocket. McAfee’s talk was essentially a rant against governments’ security-compromising activities, summed up by his statement: “We cannot allow a fearful government to create weaknesses in the very software we are trying to protect. By putting backdoors in the software, we have given hackers the access we are trying to prevent.” Easily the rockstar of infosec, McAfee took to the stage fashionably late – though his audience had remained comfortable, being plied with free alcohol, free food and an enjoyable musical set (wasted on Infosec’s more senior attendees) during their wait. The man himself, a young 70-year-old in a handsome navy suit, looking and seeming much like a millionaire version of Matthew McConaughey’s Rust Cohle, was quick to address what he regarded as the major political influences upon security and explicitly criticised governments’ notions of backdooring software. A strong approach to a conference which has always had plenty of government security bods attending. “Take control of your lives,” McAfee urged Infosec. “Say ‘I am going to be responsible for myself, at least to some extent.’ Governments cannot protect you.” […]
http://www.computerworld.com/article/2889469/researchers-uncover-signs-of-superfish-style-attacks.html By Gregg Keizer Computerworld Feb 26, 2015 Researchers at the Electronic Frontier Foundation (EFF) yesterday said that they had found evidence that implies attackers have exploited a security vulnerability in the Superfish adware and a slew of other programs. Superfish, a company that markets a visual search product, made the news last week when Lenovo was found to have pre-loaded the program on its consumer-grade PCs during a four-month span late last year. Lenovo has acknowledged that Superfish poses a security threat to customers, and has released a tool to eradicate the software. Microsoft, McAfee
http://www.zdnet.com/article/another-reason-to-hate-the-nsa-china-is-backing-away-from-us-tech-brands/ By Zack Whittaker Zero Day ZDNet News February 25, 2015 China is no longer using high-profile US technology brands for state purchases, amid ongoing revelations about mass surveillance and hacking by the US government. A new report confirmed key brands, including Cisco, Apple, Intel, and McAfee
https://finance.yahoo.com/news/inside-hack-sought-cyber-security-180006948.html By Sweta Killa Zacks.com Jan 20, 2015 The cyber security industry has gained immense popularity in recent years and is the fastest-growing corner of the broad technology space. This is because cyber-attacks on enterprises and government agencies are widespread with growing Internet usage, raising the need for more stringent cyber security from hackers. Hacking has become more sophisticated, dangerous and harder for companies (and even governments) to stop. According to the report from the Global State of Information Security Survey 2015, cyber attacks across the globe have risen about 66% over the past five years and 48% from 2013. Some of the well-known companies in the recent spate of data breaches include Target (TGT), eBay (EBAY), Home Depot (HD), AT&T (T) and JPMorgan Chase (JPM). The situation will likely to worsen in 2015, as hackers will continue to adopt advanced techniques and strategies to infiltrate networks hiding their tracks (read: PureFunds to Stop Hackers with This Cyber Security ETF). Solid Long-Term Prospects As per McAfee, cyber-warfare and espionage attacks are expected to increase in frequency. Attacks on Internet of Things (IoT) devices will rise rapidly due to whopping growth in the number of connected objects, poor security and the high value of data on IoT devices. And new mobile technologies will allow more mobile attacks. […]
Please note: The following is not an endorsement of the specific referenced products or solutions, these are examples of ways that users can better protect themselves online. The effectiveness of these solutions varies widely. Used in combination with each other can provide significant added protection to your internet usage.
Additional Disclaimer: There is no such thing as 100% secure, so don’t misconstrue or misinterpret this guidance to be some sort of guarantee of safety online.
Top 5 Home User Protection Measures
1. First and foremost, you must install a NON-FREE Anti-Virus Suite. Prefer anti-virus software that has been tested. The following sites are good for reviewing the test results of Antivirus Detection Rates:
2. Ensure you are using a Browser Plugin to evaluate the security of websites you go to and if possible use Anti-Spam features of your Anti-Virus software. Some examples of browser plugins are: McAfee Site Advisor, Avira Browser Safety, Norton Browser Protection
3. Load up on some software and system exploit prevention, regularly change your website passwords and select passwords based on website category such as financial, entertainment and miscellaneous. Some examples of Anti-Exploit browser and software protection are: Microsoft EMET, Malwarebytes Anti-Exploit Premium
4. Use a DNS service to help block malicious websites BEFORE your computer has a chance to connect to them. Some examples are
5. The last step is a personal training thing that I advise any user online to do. Treat every single link on a web page as suspicious, never click on emailed links, it is best to browse to the specific website manually without clicking. Never open attachments that you do not first scan with your Anti-Virus software first and never ever open attachments from random people where you are not expecting an attachment. Whenever a web page claims that you must update your software and to “click here” to do so, you should be suspicious of it, unless of course you are purposely browsing to your computer manufacturer’s website, graphics card software website or some official Microsoft or Adobe website for updates to your software.
http://www.cnet.com/news/jimmy-kimmel-tops-macaffees-list-of-most-dangerous-cybercelebrities/ By Chris Matyszczyk @ChrisMatyszczyk CNet News October 1, 2014 You might think that, with his little quips and pokes after many have gone to bed, Jimmy Kimmel is a sweet, mischievous kitten. Beneath that furry exterior, though, lies a criminal mind. No, I’m not suggesting Kimmel is an embezzler
http://venturebeat.com/2014/09/18/the-greatest-john-mcafee-email-ever/ By Richard Byrne Reilly VentureBeat September 18, 2014 At the Defcon security conference in Las Vegas in early August, I waited in line with my esteemed colleague Dean Takahashi for 40 minutes in order to get our pictures taken with perhaps the most unabashed instigator in the history of technology. John McAfee. McAfee, of course, is the security software legend who founded McAffee, Inc. For nearly a month I had been reaching out to McAfee in order to score an interview about his latest security startup, Brownlist. Brownlist, which aims to help the little guy battle big government, was unveiled at Defcon to a packed house of nearly 700 people who were hanging on McAfee’s every word. McAfee and I exchanged digits and posed for the picture. And he promised to be in touch. But he never emailed. Or called. Weeks passed. I began to lose interest. Meanwhile, McAfee had been on CNN, Bloomberg, and other channels, railing about technology and how he would once again change the paradigm. […]