Monday, January 07, 2013

Cyber Security News for the Week of January 7, 2013

From our friends at Citadel Information Group

Cyber Crime

Website of US-based gas turbine maker also rigged with new IE exploit: January 03, 2013, 7:59 AM - The attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet Explorer, also targeted the website of Capstone Turbine Corporation, a U.S.-based manufacturer of gas microturbines used for power generation, heating and cooling, according to a security researcher. IT World, January 4, 2013

Cyber Warning

Researchers Bypass Microsoft Fix It for IE Zero Day: Expect amped up pressure aimed in Microsoft's direction for a patch for the Internet Explorer zero day that surfaced last week, now that researchers at Exodus Intelligence reported today they have developed a bypass for the Fix It that Microsoft released as a temporary mitigation. ThreatPost, January 4, 2013

Turkish Registrar Enabled Phishers to Spoof Google: Google and Microsoft today began warning users about active phishing attacks against Google's online properties. The two companies said the attacks resulted from a fraudulent digital certificate that was mistakenly issued by a domain registrar run by a Turkish domain registrar. KrebsOnSecurity, January 3, 2013

Malware SNEAK dons cunning disguise, opens creaky back door to servers: A malicious backdoor designed to infect web servers poses a severe threat, Trend Micro warns. The Register, January 3, 2013

BitLocker, PGP, and TrueCrypt encryption weakened by new attack tool: Russian password-cracking wizards ElcomSoft have announced a new product that can retrieve decryption keys for BitLocker, PGP, and open source favourite TrueCrypt as long as the encrypted volumes were not securely demounted. InfoWorld, January 3, 2013

Attackers Target Internet Explorer Zero-Day Flaw: Attackers are breaking into Microsoft Windows computers using a newly discovered vulnerability in Internet Explorer, security experts warn. While the flaw appears to have been used mainly in targeted attacks so far, this vulnerability could become more widely exploited if incorporated into commercial crimeware kits sold in the underground. KrebsOnSecurity, December 28, 2012

Identity Theft

9 ways to protect seniors from identity theft: My dad was a stickler about identity fraud. He would have special pens that would thwart check fraudsters. He would lecture me about my use (or misuse) of envelopes that weren't "security" envelopes. Like any son, I would think that he was a bit over the top about his concerns and didn't pay attention to yet another of the valuable lessons that he tried to convey to me. The Wall Street Journal, January 3, 2013

Hacktivists

Anonymous hackers release video of football stars bragging about rape: Discussion has been rekindled regarding the August 2013 rape and kidnapping of a teenage girl in Ohio after members of Anonymous have published a video showing a witness making light of the crime on film only moments after. RT, January 3, 2013

Cyber Security Management

TURKTRUST Incident Raises Renewed Questions About CA System: The series of missteps and failures that led to a Turkish government-related agency eventually ending up with a valid wild card certificate for Google domains began in June 2011 when the TURKTRUST certificate authority began preparing for an audit of its systems and started moving some certificate profiles from production systems to test systems. Two months later, a pair of subordinate certificates-which carried the full power and inherited trust of TURKTRUST's root certificate as far as most browsers were concerned-were issued, and one of them later was used by a Turkish government transportation and utility agency to create an attacker's holy grail: a valid certificate enabling him to intercept encrypted Google traffic. ThreatPost, January 4, 2013

Rapid-fire changes to information security strategies: RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, enterprise mobility and social media will transform enterprise IT and hammer away at the foundations of information security strategies in 2013. Net Security, January 3, 2013

Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt: SAN FRANCISCO - The antivirus industry has a dirty little secret: its products are often not very good at stopping viruses. The New York Times, December 31, 2012

Securing the Village

Cybersecurity drive to target schoolchildren and 'risky men': Ministers are planning a major campaign to encourage better online security - pushing into schools and also targeting "risky men" who take a reckless attitude to posting details online - against a backdrop of soaring levels of crime in cyberspace. The Guardian, January 2, 2013

Cyber Defense

To thwart hackers, firms salting their servers with fake data: Brown Printing Co., which prints popular magazines and catalogues, knew that it had valuable assets in its computer systems and that those assets - online editions and subscriber databases - were increasingly at risk with the proliferation of cyber-espionage. The Washington Post, January 2, 2013

Critical Infrastructure

Secret NSA Cybersecurity Program Aims to Defend US Power Grid: Newly released documents confirm that the National Security Agency (NSA), America's top cyberespionage organization, is spearheading a cloaked and controversial program to develop technology that could protect the U.S. power grid from cyberattack. ABC News, January 5, 2013

U.S. Banks Again Hit by Wave of Cyberattacks: For the last week, hackers have - once again - attacked the online banking sites of several American banks. The New York Times, January 4, 2013

Cyber Law

New Laws Keep Employers Out of Worker Social Media Accounts: Employers in Illinois and California cannot ask for usernames and passwords to the personal social media accounts of employees and job seekers under laws that took effect on Jan. 1. CIO, January 4, 2013

Cyber Survey

PayPal, Wells Fargo Among Most-Spoofed Sites During Holidays: PayPal and Wells Fargo topped the list of spoofed e-commerce sites used in phishing campaigns over the holidays. CRN, January 3, 2013

Cyber Misc

SC legislators pledge to tackle cybersecurity: COLUMBIA, S.C. (AP) - South Carolina legislators say they're willing to spend whatever it takes to prevent another massive security breach in state government, once they have a handle on what's necessary. SFGate, January 5, 2013

Securing the Village-Events Calendar

Cloud Security Alliance-LA January Dinner Meeting; January 9, 2013. For more information and to register, go to Meetup.com  

ISSA-LA January Lunch Meeting; January 16, 2013. Topic: Physical Access for IT Professionals: What you don't know could already be hurting you. Speaker: Terry Gold. Visit ISSA-LA.ORG for more information and to register.

OWASP-LA Monthly Dinner Meeting; January 23, 2013. For more information and to register, go to Meetup.com  

ISC2-LA February Meeting; February 5, 2013: Email Bill Zajac at billzajac@gmail.com for more information.

ISSA-LA February Lunch Meeting; February 20, 2013.

ISSA-LA March Dinner Meeting; March 20, 2013.

Santa Monica Rotary Club; May 3, 2013: Dr. Stan Stahl, Citadel and ISSA-LA President, will speak on cybersecurity at the weekly meeting of the Santa Monica Rotary Club. In this non-technical talk - It Takes the Village to Secure the Village SM - Dr. Stahl discusses the financial implications of cyber crime, illustrates how cyber criminals take control of a user's computer, describes the limitations of technology, summarizes emerging cyber security laws, regulations and practices, and provides practical tips to lower the risk of becoming a victim.

ISSA-LA Fifth Annual Information Security Summit; May 21, 2013: SAVE THE DATE. Join over 500 of your colleagues and peers at the Universal City Hilton. Special Keynote Speaker: Howard Schmidt, former White House CyberSecurity Coordinator.

SecurityRecruiter.com's Security Recruiter Blog