Sunday, July 26, 2015

Cyber Security Vulnerability and Patch Report for the Week of July 26, 2015


 CYBER SECURITY VULNERABILITY AND PATCH REPORT

 

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Cyber Crime

Spike in ATM Skimming in Mexico?: Several sources in the financial industry say they are seeing a spike in fraud on customer cards used at ATMs in Mexico. The reason behind that apparent increase hopefully will be fodder for another story. In this post, we’ll take a closer look at a pair of ATM skimming devices that were found this month attached to a cash machine in Puerto Vallarta — a popular tourist destination on Mexico’s Pacific coast. KrebsOnSecurity, July 22, 2015

Cyber Privacy

Online Cheating Site AshleyMadison Hacked: Large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information. The still-unfolding leak could be quite damaging to some 37 million users of the hookup service, whose slogan is “Life is short. Have an affair.” KrebsOnSecurity, July 19, 2015

Identity Theft

As Many as 4.5M People’s Personal, Medical Information Put at Risk During UCLA Health Cyber Attack: The prominent medical provider was clear to point out that although hackers accessed parts of the computer network that contained personal and medical information of patients and providers, it didn’t have evidence attackers “actually accessed or acquired” that data. Featuring Dr. Stahl – NBC4, July 17, 2015

Cyber Warning

Jeep owners urged to update their cars after hackers take remote control: Security experts are urging owners of Fiat Chrysler Automobiles vehicles to update their onboard software after hackers took control of a Jeep over the internet and disabled the engine and brakes and crashed it into a ditch. The Guardian, July 21, 2015
Leaking bugs : Wikileaks dumps contain malware: Josh Wieder, a researcher was browsing through the Wikileaks dump of the Stratfor leak found that the documents were laced with malware. TechWorm. July 19, 2015

Cyber Security Management

Information security governance maturing, says Gartner: Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cyber security incidents, is making IT risk a board-level issue, says Gartner. ComputerWeekly, July 21, 2015
Confidence in Information Security Capabilities is Lacking: Data breaches and cyberattacks happen daily, across industries and to businesses of all sizes. However, as these attacks become more sophisticated, companies admit that they are at a loss on how to best protect the data. According to eWeek, a study from RSA shows that those responsible for protecting the network don’t necessarily trust their information security capabilities. ITBusinessEdge, July 21, 2015
OPM Break-In an Object Lesson for CIOs: There are days when your only consolation is that someday, somewhere, your mistake might help prevent someone else’s. The Federal government’s Office of Personnel Management (OPM) has been having a bunch of days like that recently, which gives us all an opportunity to learn what to do differently. Featuring Dr. Stahl – Laserfiche, July 20, 2015
Los Angeles County Security Audits Identify Weak Information Security Practices: Three recent audits have found security lapses in several departments of Los Angeles County government putting residents’ medical information, Social Security numbers and other sensitive information at risk of being stolen. – Featuring Dr. Stahl – Sunday Morning Newsmakers with Larry Marino, AM 870 The Answer, July 19, 2015
U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent Push: WASHINGTON — In the month since a devastating computer systems breach at the Office of Personnel Management, digital Swat teams have been racing to plug the most glaring security holes in government computer networks and prevent another embarrassing theft of personal information, financial data and national security secrets. The New York Times, July 18, 2015
What’s worrying today’s CISO?: Find out now. Download the 2014 IBM Chief Information Security Assessment to gain the latest insights. IBM Chief Information Security Assessment, 2014

Cyber Security Management – Cyber Defense

Using Wi-Fi in-flight? Employ information security best practices: When you are 30,000 feet in the air and your flight offers Wi-Fi, are you really thinking about hacker Jon who is sitting in seat 44C? Probably not. Most people do not even consider that in-flight Wi-Fi is just like public Wi-Fi at a coffee shop. When you purchase time on an in-flight wireless network, your credit card transaction is encrypted. Once the transaction is complete, your laptop and devices are flying high in their birthday suits, again, if you do not take information security hygiene seriously. In the eye of a cybercriminal, in-flight Wi-Fi-gorging passengers are like a shiny tin of pungent tightly-packed sardines. Dell Power More, July 24, 2015
Free Hacking Team malware checker released: A security company has released a free tool to users who suspect they may be a victim of Hacking Team’s exploit cache. ZDNet, July 21, 2015

Securing the Village

Google boots ‘porn clicker’ malware from Play Store: Google has removed dozens of apps from its Play Store that purport to be games but secretly click on advertisements on pornographic websites. PCWorld, July 24, 2015
Facebook info security chief: ‘Death to Adobe Flash': The social network’s Internet protection provocateur is wasting no time in his new post. He wants this buggy software condemned to death. Fortune, July 14, 2015

Cyber Politics

Why the FBI Wants “Special Access” to Your Smartphone: Yesterday, FBI Director James Comey told Congress that the federal government was increasingly concerned about the widespread use of data encryption in consumer technology, implying—although not explicitly demanding—that tech companies give law enforcement easier access to cryptographically scrambled customer data. Comey’s testimony came one day after some of the world’s top cybersecurity experts and computer scientists issued a report arguing that the government’s call for special access to encrypted information is technically unfeasible and unworkably vague. Law enforcement officials need to get specific about what they want, the report’s authors argued, instead of simply waving their hands and hoping for a technological unicorn that gives them on-demand access to personal information while also protecting user privacy and securing data. Scientific American, July 9, 2015

National Cyber Security

Israel, US commit to beef up cybersecurity cooperation: WASHINGTON — The US deputy secretary of Homeland Security and the top Israeli official handling cybersecurity have cosigned a statement committing to US-Israel cooperation in the area. Times of Israel, July 19, 2015

Cyber Underworld

It’s disturbingly easy to become a hacker millionaire: All it takes to make over $900,000 a year is to learn some code, pick up some Russian, decide to become a criminal, and have no fear. That’s it. Put it all together, take a deep breath, and then even you can become a novice cybercriminal. Business Insider, July 19, 2015

Cyber Law

F.T.C. Accuses LifeLock of Violating Settlement: The Federal Trade Commission on Tuesday accused LifeLock, an identity theft protection service, of making deceptive claims in its advertising, in violation of an agreement the company made with the agency in 2010. The New York Times, July 21, 2015
Experian Hit With Class Action Over ID Theft Service: Big-three credit bureau Experian is the target of a class-action lawsuit just filed in California. The suit alleges that Experian negligently violated consumer protection laws when it failed to detect for nearly 10 months that a customer of its data broker subsidiary was a scammer who ran a criminal service that resold consumer data to identity thieves. KrebsOnSecurity, July 21, 2015

Cyber Misc

Regulators Investigating Fiat Chrysler Cybersecurity Recall: Federal regulators launched an investigation into Fiat Chrysler Automobiles’s recall of 1.4 million vehicles with a potential cybersecurity flaw first identified by the auto maker in January 2014, ratcheting up concerns about broader automobile security days after hackers demonstrated an ability to remotely commandeer a Jeep’s controls through wireless communications systems. Wall Street Journal, July 24, 2015

Cyber Security News and Education for the Week of July 26, 2015

 

CYBER SECURITY NEWS

OF THE WEEK

 

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Cyber Crime

Spike in ATM Skimming in Mexico?: Several sources in the financial industry say they are seeing a spike in fraud on customer cards used at ATMs in Mexico. The reason behind that apparent increase hopefully will be fodder for another story. In this post, we’ll take a closer look at a pair of ATM skimming devices that were found this month attached to a cash machine in Puerto Vallarta — a popular tourist destination on Mexico’s Pacific coast. KrebsOnSecurity, July 22, 2015

Cyber Privacy

Online Cheating Site AshleyMadison Hacked: Large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information. The still-unfolding leak could be quite damaging to some 37 million users of the hookup service, whose slogan is “Life is short. Have an affair.” KrebsOnSecurity, July 19, 2015

Identity Theft

As Many as 4.5M People’s Personal, Medical Information Put at Risk During UCLA Health Cyber Attack: The prominent medical provider was clear to point out that although hackers accessed parts of the computer network that contained personal and medical information of patients and providers, it didn’t have evidence attackers “actually accessed or acquired” that data. Featuring Dr. Stahl – NBC4, July 17, 2015

Cyber Warning

Jeep owners urged to update their cars after hackers take remote control: Security experts are urging owners of Fiat Chrysler Automobiles vehicles to update their onboard software after hackers took control of a Jeep over the internet and disabled the engine and brakes and crashed it into a ditch. The Guardian, July 21, 2015
Leaking bugs : Wikileaks dumps contain malware: Josh Wieder, a researcher was browsing through the Wikileaks dump of the Stratfor leak found that the documents were laced with malware. TechWorm. July 19, 2015

Cyber Security Management

Information security governance maturing, says Gartner: Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cyber security incidents, is making IT risk a board-level issue, says Gartner. ComputerWeekly, July 21, 2015
Confidence in Information Security Capabilities is Lacking: Data breaches and cyberattacks happen daily, across industries and to businesses of all sizes. However, as these attacks become more sophisticated, companies admit that they are at a loss on how to best protect the data. According to eWeek, a study from RSA shows that those responsible for protecting the network don’t necessarily trust their information security capabilities. ITBusinessEdge, July 21, 2015
OPM Break-In an Object Lesson for CIOs: There are days when your only consolation is that someday, somewhere, your mistake might help prevent someone else’s. The Federal government’s Office of Personnel Management (OPM) has been having a bunch of days like that recently, which gives us all an opportunity to learn what to do differently. Featuring Dr. Stahl – Laserfiche, July 20, 2015
Los Angeles County Security Audits Identify Weak Information Security Practices: Three recent audits have found security lapses in several departments of Los Angeles County government putting residents’ medical information, Social Security numbers and other sensitive information at risk of being stolen. – Featuring Dr. Stahl – Sunday Morning Newsmakers with Larry Marino, AM 870 The Answer, July 19, 2015
U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent Push: WASHINGTON — In the month since a devastating computer systems breach at the Office of Personnel Management, digital Swat teams have been racing to plug the most glaring security holes in government computer networks and prevent another embarrassing theft of personal information, financial data and national security secrets. The New York Times, July 18, 2015
What’s worrying today’s CISO?: Find out now. Download the 2014 IBM Chief Information Security Assessment to gain the latest insights. IBM Chief Information Security Assessment, 2014

Cyber Security Management – Cyber Defense

Using Wi-Fi in-flight? Employ information security best practices: When you are 30,000 feet in the air and your flight offers Wi-Fi, are you really thinking about hacker Jon who is sitting in seat 44C? Probably not. Most people do not even consider that in-flight Wi-Fi is just like public Wi-Fi at a coffee shop. When you purchase time on an in-flight wireless network, your credit card transaction is encrypted. Once the transaction is complete, your laptop and devices are flying high in their birthday suits, again, if you do not take information security hygiene seriously. In the eye of a cybercriminal, in-flight Wi-Fi-gorging passengers are like a shiny tin of pungent tightly-packed sardines. Dell Power More, July 24, 2015
Free Hacking Team malware checker released: A security company has released a free tool to users who suspect they may be a victim of Hacking Team’s exploit cache. ZDNet, July 21, 2015

Securing the Village

Google boots ‘porn clicker’ malware from Play Store: Google has removed dozens of apps from its Play Store that purport to be games but secretly click on advertisements on pornographic websites. PCWorld, July 24, 2015
Facebook info security chief: ‘Death to Adobe Flash': The social network’s Internet protection provocateur is wasting no time in his new post. He wants this buggy software condemned to death. Fortune, July 14, 2015

Cyber Politics

Why the FBI Wants “Special Access” to Your Smartphone: Yesterday, FBI Director James Comey told Congress that the federal government was increasingly concerned about the widespread use of data encryption in consumer technology, implying—although not explicitly demanding—that tech companies give law enforcement easier access to cryptographically scrambled customer data. Comey’s testimony came one day after some of the world’s top cybersecurity experts and computer scientists issued a report arguing that the government’s call for special access to encrypted information is technically unfeasible and unworkably vague. Law enforcement officials need to get specific about what they want, the report’s authors argued, instead of simply waving their hands and hoping for a technological unicorn that gives them on-demand access to personal information while also protecting user privacy and securing data. Scientific American, July 9, 2015

National Cyber Security

Israel, US commit to beef up cybersecurity cooperation: WASHINGTON — The US deputy secretary of Homeland Security and the top Israeli official handling cybersecurity have cosigned a statement committing to US-Israel cooperation in the area. Times of Israel, July 19, 2015

Cyber Underworld

It’s disturbingly easy to become a hacker millionaire: All it takes to make over $900,000 a year is to learn some code, pick up some Russian, decide to become a criminal, and have no fear. That’s it. Put it all together, take a deep breath, and then even you can become a novice cybercriminal. Business Insider, July 19, 2015

Cyber Law

F.T.C. Accuses LifeLock of Violating Settlement: The Federal Trade Commission on Tuesday accused LifeLock, an identity theft protection service, of making deceptive claims in its advertising, in violation of an agreement the company made with the agency in 2010. The New York Times, July 21, 2015
Experian Hit With Class Action Over ID Theft Service: Big-three credit bureau Experian is the target of a class-action lawsuit just filed in California. The suit alleges that Experian negligently violated consumer protection laws when it failed to detect for nearly 10 months that a customer of its data broker subsidiary was a scammer who ran a criminal service that resold consumer data to identity thieves. KrebsOnSecurity, July 21, 2015

Cyber Misc

Regulators Investigating Fiat Chrysler Cybersecurity Recall: Federal regulators launched an investigation into Fiat Chrysler Automobiles’s recall of 1.4 million vehicles with a potential cybersecurity flaw first identified by the auto maker in January 2014, ratcheting up concerns about broader automobile security days after hackers demonstrated an ability to remotely commandeer a Jeep’s controls through wireless communications systems. Wall Street Journal, July 24, 2015

Monday, July 20, 2015

Cyber Security Vulnerability and Patch Report for the Week of July 20, 2015


CYBER SECURITY Vulnerability and Patch report

 

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Important Security Updates

Adobe Acrobat/Reader: Adobe has released updated versions of Acrobat and Reader to fix at least 46 vulnerabilities. Updates are available through the program or from Adobe’s website.
Adobe Flash Player: Adobe has released version 18.0.0.209 to fix multiple critical vulnerabilities. Updates are available from Adobe’s website.
Adobe Shockwave Player: Adobe has released version 12.1.9.159 of Shockwave Player running on Windows and Macintosh to address critical vulnerabilities. Updates are available through the program or from Adobe’s Shockwave Web Site.
Apple iTunes: Apple has released version 12.12.1 (64-bit and 32-bit) of iTunes for Windows 7 and 8. Updates are available from Apple’s website.
Avast: Avast! has released version 10.3.2223 of its Free Antivirus, Internet Security 2015, and Premier. Updates are available on Avast’s website.
AVG Free Edition: AVG has released version 2015.0.6086 of its 64 and 32 bit Free Edition. Updates are available on AVG’s website.
AVG Internet Security: AVG has released version 2015.0.6086 of its Internet Security 2015. Updates are available on AVG’s website.
Google Chrome: Google has released Google Chrome version 43.0.2357.134. Updates are available from within the browser or from Google Chrome’s website.
Microsoft Patch Tuesday: Microsoft’s Patch Tuesday released 14 updates to address dozens of vulnerabilities within Windows operating systems, Internet Explorer, and Office products. Details on the updates are available from Microsoft’s website.
Opera: Opera has released version 30.0.1835.125. Updates are available from within the browser or from Opera’s website.
Oracle Java: Oracle has released versions Java SE 8 Update 51 to fix at least 25 vulnerabilities. The update is available through Windows Control Panel or Java’s website. [See Citadel’s recommendation below]

Current Software Versions

Adobe Flash 18.0.0.209 [Windows 7: IE, Firefox, Mozilla]
Adobe Flash 18.0.0.209 [Windows 8: IE]
Adobe Flash 18.0.0.209 [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader DC 2015.008.20082
Dropbox 3.6.9 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange syatems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]
Firefox 39.0
Google Chrome 43.0.2357.134
Internet Explorer 11.0.9600.17905
Java SE 8 Update 51 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
QuickTime 7.7.7.80.95
Safari 7.1.7, 8.07, 6.2.7 [Mac OS X Mavericks, Yosemite, Mountain Lion]
Skype 7.6.0.105

Newly Announced Unpatched Vulnerabilities

None

For Your IT Department

Cisco Multiple Products: Secunia reports patched vulnerabilities in Cisco’s TelePresence Advanced Media Gateway Series, Identity Services Engine (ISE), Unified Communications Manager (UCM), Unified Intelligence Center, Contact Center Express, Aggregation Services Routers (ASR) 5000 Series, Telepresence Integrator C Series, WebEx Meetings Server, and Prime Collaboration Assurance. Apply updates. Secunia also reports unpatched security vulnerabilities in Cisco’s Adaptive Security Appliance (ASA) and Unified Communications Manager (UCM). No official solutions are currently available.
McAfee Firewall Enterprise: Secunia reports a vulnerability in McAfee Firewall Enterprise. Update to a fixed version.
Microsoft SQL Server: Secunia reports multiple vulnerabilities in Microsoft SQL Server. Apply update.
Moodle: Secunia reports 2 vulnerabilities in Moodle. Update to a fixed version.
Oracle Multiple Products: US-CERT reports that Oracle has released updates to address 193 vulnerabilities across multiple products as part of its quarterly Critical Patch Update. See the Critical Patch Update Advisory, and apply updates.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2015 Citadel Information Group. All rights reserved.




Cyber Security News and Education for the Week of July 20, 2015



CYBER SECURITY NEWS

OF THE WEEK

 

FROM OUR FRIENDS AT CITADEL INFORMATION GROUP


Cyber Crime

CVS, Walmart: More Third-Party Breaches?: A possible payments breach at a third-party vendor used by CVS and Walmart Canada to manage their online photo services highlights why vendor management is a critical security issue. BankInfoSecurity, July 17, 2015

Cyber Privacy

Google Exec Turned Obama Official Won’t Describe Magic Solution to Encryption Debate: According to Alan Davidson, former Google executive turned Commerce Department official, strong encryption and law enforcement interests are not “irreconcilable.” But he won’t speculate as to how that’s possible. TheIntercept, July 15, 2015

Identity Theft

UCLA Health System hit by cyber attack affecting 4.5 million patients: In another high-profile data breach, hackers broke into UCLA Health System’s computer network and may have accessed sensitive information on as many as 4.5 million patients. Citadel’s Dr. Stan Stahl interviewed by NBC4 Reporter Ted Chen. NBC4 Video, July 17, 2015
Federal personnel files still very vulnerable and ‘prime targets’ for hackers, audit finds: An audit due out Friday found 3,000 “critical” and “high-risk” vulnerabilities in three key bureaus at the Interior Department, the agency hosting the hacked personnel files of 4.2 million federal employees. The Washington Post, July 16, 2015

Cyber Warning

Hacking Team’s malware uses a UEFI rootkit to survive operating system reinstalls: The feature allows the company’s software to persist even if the hard disk drive if replaced. PCWorld, July 14, 2015
Mozilla Blocks Flash Player on Firefox: Mozilla has blocked all versions of Adobe Flash Player in its Firefox browser after a recent breach left Flash vulnerable to attack. PC Magazine, July 14, 2015
Third Hacking Team Flash Zero-Day Found: For the third time in a week, researchers have discovered a zero-day vulnerability in Adobe’s Flash Player browser plugin. Like the previous two discoveries, this one came to light only after hackers dumped online huge troves of documents stolen from Hacking Team — an Italian security firm that sells software exploits to governments around the world. KrebsOnSecurity, July 13, 2015

Cyber Security Management

Why Cybersecurity Leadership Must Start At The Top: If the past year has shown us anything, it’s that companies should no longer ask if they are going to be hacked and instead when. With every company becoming digital, the pace of change is only accelerating and our ability to make the right decisions on cybersecurity needs to move even faster. Some estimate that between $9 and $21 trillion of global economic value creation could be at risk if companies and governments are unable to successfully combat cyber threats. Forbes, July 13, 2015
The CSA is the new VIP of information security: In the piece I wrote in December (“What the Sony breach means for security in 2015″), I noted that while a good CISO is important; great security architects are critical. While a CISO may get the glory; security architects are what most organizations need. CSO, July 9, 2015
2015 State of Cybercrime: Enterprise fight is stuck in stall: The year of cybercrime since our most recent US State of Cybercrime Survey has been nothing less than stunning. There were the Home Depot and JP Morgan Chase data breaches, the Sony Pictures fiasco, and most recently the devastating breach at the US Office of Personnel Management (OPM) that appears to be worse than first believed. CSO, July 9, 2015
Inside the Sony Hack: A cyber-invasion brought Sony Pictures to its knees and terrified corporate America. The story of what really happened—and why Sony should have seen it coming. A special three-part investigation. Fortune, July 2015

Cyber Security Management – Cyber Defense

Facebook info security chief: ‘Death to Adobe Flash': The social network’s Internet protection provocateur is wasting no time in his new post. He wants this buggy software condemned to death. Fortune, July 14, 2015
Apple Introduces Revamped Two-Factor Authentication for iOS 9 and OS X El Capitan: With the third betas of iOS 9 and OS X 10.11 El Capitan, Apple is introducing a revamped two-factor authentication system, according to both the beta release notes and a detailed support FAQ that outlines the changes. MacRumors, July 8, 2015

Cyber Security Management – Cyber Update

Adobe, MS, Oracle Push Critical Security Fixes: This being the second Tuesday of the month, it’s officially Patch Tuesday. But it’s not just Microsoft Windows users who need to update today: Adobe has released fixes for several products, including a Flash Player bundle that patches two vulnerabilities for which exploit code is available online. Separately, Oracle issued a critical patch update that plugs more than two dozen security holes in Java. KrebsOnSecurity, July 15, 2015

National Cyber Security

Cybersecurity task force looks to next administration: A group of former feds and industry experts are getting together to ensure major cybersecurity initiatives don’t fall through the cracks as more candidates pile into the 2016 race and Washington prepares for a transition in leadership. FederalTimes, July 16, 2015
Senator Sasse: The OPM Hack May Have Given China a Spy Recruiting Database: AS A NEWLY elected Senator, I am here to tell you a hard truth: Washington does not take cybersecurity seriously. Wired, July 9, 2015

Cyber Underworld

The Darkode Cybercrime Forum, Up Close: By now, many of you loyal KrebsOnSecurity readers have seen stories in the mainstream press about the coordinated global law enforcement takedown of Darkodeme, an English-language cybercrime forum that served as a breeding ground for botnets, malware and just about every other form of virtual badness. This post is an attempt to distill several years’ worth of lurking on this forum into a narrative that hopefully sheds light on the individuals apprehended in this sting and the cybercrime forum scene in general. KrebsOnSecurity, July 15, 2015
Darkode Shutdown: FireEye Intern Accused Of Creating $65,000 Android Malware: One of the more successful English-speaking cybercrime forums, Darkode, was shut down today and 28 arrests of individuals linked to the site made across the world, the FBI and Europol confirmed this morning. Charges were filed in the US against 12 individuals. They included the apparent Darkode creator, 27-year-old Wisconsin resident Daniel Placek, an alleged admin, Swedish 27-year-old Johan Anders Gudmunds, and the accused creator of Facebook Spreader, malware designed to ensnare users of the social network into a massive botnet – a network of infected machines. Forbes, July 15, 2015
Hacking Team Used Spammer Tricks to Resurrect Spy Network: Last week, hacktivists posted online 400 GB worth of internal emails, documents and other data stolen from Hacking Team, an Italian security firm that has earned the ire of privacy and civil liberties groups for selling spy software to governments worldwide. New analysis of the leaked Hacking Team emails suggests that in 2013 the company used techniques perfected by spammers to hijack Internet address space from a spammer-friendly Internet service provider in a bid to regain control over a spy network it apparently had set up for the Italian National Military Police. KrebsOnSecurity, July 13, 2015

Cyber Career

A closer look at the Certified Information Security Manager certification: The Certified Information Security Manager certification has been around for over a decade now, and it’s only grown in prominence. What makes the ISACA CISM so important and how does it compare to its peers? SearchSecurity, July 2015

Cyber Misc

United Airlines pays researcher bug bounty of 1M air miles: Security researcher Jordan Wiens will be flying after submitting a security flaw to the United Airlines bug bounty program, launched in May, and receiving one million air miles as a reward. SCMagazine, July 14, 2015
Beware Cybersecurity Charlatanism: As cybersecurity intersects with big money, rhetoric, mudslinging, and fallacies will add further confusion to an already muddled market. NetworkWorld, July 7, 2015
Argentina Rewards Programmer Who Exposed E-Voting Vulnerabilities With A Complimentary Home Police Raid: An Argentinian programmer who was trying to do a good thing in exposing severe vulnerabilities in the country’s e-voting system was rewarded for his actions — with a police raid on his home. According to Argentinian news outlet La Nación, Joaquín Sorianello informed MSA, the company than makes the Vot.ar e-voting system, that the SSL certificates used by the system to encrypt transmissions between the voting stations and the central election office could be easily downloaded, allowing for potential voting fraud (or just a good old-fashioned DDOS attack). TechDirt, July 7, 2015

Cyber Sunshine

Darkode bust: Feds shutter ‘cyber hornet’s nest of criminal hackers’ (+video): Federal investigators have seized and shut down Darkode, the largest English-speaking malware forum in the world. Christian Science Monitor, July 15, 2015
ID Theft Service Proprietor Gets 13 Years: A Vietnamese man who ran an online identity theft service that sold access to Social Security numbers and other personal information on more than 200 million Americans has been sentenced to 13 years in a U.S. prison. KrebsOnSecurity, July 15, 2015



Friday, July 17, 2015

Security Jobs: Senior Information Security Analyst / Team Lead, New Jersey, New York City Area, Relocation: Some


Senior Information Security Analyst / Team Lead

Location: New Jersey – Northern, Close to New York City
Compensation: $140,000+, 3 Weeks Vacation, $7K+ Training Yearly
Relocation: Some
Education: BA/BS Preferred, not required
Certification: CISSP, CCSP, CCNA, GCVA, GSEC appreciated

SecurityRecruiter.com has been engaged by a highly desirable and highly recognized employer to add to its information security team. This is an opportunity to be part of a tightly knit team working for a manager who is unlike many managers you’ll likely find across the security profession.  You’ll be eligible for 3 weeks of vacation in your first year of employment.  Vacation can grow to 28 days plus regular holidays in future years. Your new employer will financially support coaching, training and certification renewal for you.

In this lead analyst level role, you will evaluate and implement security technologies and controls to protect networks an applications to maintain confidentiality and integrity of our client’s information systems.  You will be a Subject Matter Expert in many areas of security and will be called upon for multiple areas of expertise.  You will help the manager of this department to build members of his team.  This role will expose you to many business unit leaders, outside law enforcement and more. Your exposure to people will be significant.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability or protected veteran status.

Responsibilities: 
  • Penetration Testing, Incident Handling, Security Auditing, Computer Forensics.
  • Design, manage and implement reliable and secure information infrastructure solutions.
  • Provide guidance for and manage all aspects of information security architecture projects in a highly complex network environment that includes UNIX, Linus and Exchange.
  • Create and implement security controls for the network environment including DNS enumeration, network discovery and TCP/IP.
  • Create methods for management and control of access to information.  Provide deep technical assistance related to the design and implementation of security controls for distributed systems, operating system platforms and networks.
  • Prepare and analyze incident investigations on security violations reported by end-users or discovered through monitoring processes.
  • Perform security monitoring for networks, applications and critical systems.
  • Review system logs and alerts related to possible security incidents.
  • Review security related websites to keep up with common exploits, threats, vulnerabilities and countermeasures.
  • Evaluate and implement data security systems to ensure the protection of data against unauthorized access, use, interruption, disclosure, accidental or intentional loss.
  • Escalate high-risk security threats to information security leadership.

Requirements:


  •  BA/BS in Computer Science, Information Systems, Engineering or a related field of study.  Equivalent work experience will be considered if a candidate does not have a 4-year degree.
  • Requires 5+ years of information security experience.  This experience should include exposure to information security at the enterprise level along with audit and compliance practice experience.
  • Demonstrated problem solving skills, relationship building skills, presentation skills, communication skills and customer service skills.
  • Demonstrate an ability to build security, risk and compliance solutions around business needs.
  • The ability to design and manage information security solutions from functional requirements through the implementation of security controls and technologies (design, testing, implementation and maintenance)
  • Knowledge of network infrastructures to include Web Application and Device Security, Vulnerability Assessments, Intrusion Detection, VPN, Firewalls, etc.
  • Knowledge of Perl, Shell and/or HTML, C, SQL, J2EE
  • Certifications to include the CISSP, GSEC, GCFA, CCNA or CCSP are preferred.

Preferred Technical Skills

  • Experience designing and engineering secure architectures
  • Knowledge of Trojans, Spyware, Malware, Viruses, etc
  • Proper evidence handling procedures for Computer Forensics.  Experience handling evidence such as hard drives and volatile data.
  • Extensive knowledge of FAT/NTFS/Ext2/Ext3 File Systems
  • Cryptography, PKI, and Steganography Fundamentals
  • Advanced Computer Forensic Concepts
  • Security Incident Handling/Response and Risk Management
  • HIDS, NIDS, Firewalls, Networking, and Perimeter Security Fundamentals and Best Practices
  • Risk Assessment Fundamentals
  • Computer, Network, and Policy Auditing Fundamentals
  • Wireless Network Security and RF Characteristics

Apply Online: https://www.securityrecruiter.com/submit_resume_and_profile.php

SecurityRecruiter.com's Security Recruiter Blog