Sunday, March 29, 2015

Cyber Security News, Education and Vulnerability Patch Report for the Week of March 29, 2015





Cyber Crime

Gloucester County School District Targeted By Hackers: Swedesboro Woolwich School District felt like it was thrown back into the Stone Age after hackers wreaked havoc, taking over the district’s computer network and holding it for ransom. ABC, March 25, 2015
Tax Fraud Advice, Straight from the Scammers: Some of the most frank and useful information about how to fight fraud comes directly from the mouths of the crooks themselves. Online cybercrime forums play a critical role here, allowing thieves to compare notes about how to evade new security roadblocks and steer clear of fraud tripwires. And few topics so reliably generate discussion on crime forums around this time of year as tax return fraud, as we’ll see in the conversations highlighted in this post. KrebsOnSecurity, March 25, 2015
Kreditech Investigates Insider Breach: Kreditech, a consumer finance startup that specializes in lending to “unbanked” consumers with little or no credit rating, is investigating a data breach that came to light after malicious hackers posted thousands of applicants’ personal and financial records online. KrebsOnSecurity, March 24, 2015

Identity Theft

Hilton Honors Flaw Exposed All Accounts: Hospitality giant Hilton Hotels & Resorts recently started offering Hilton HHonors Awards members 1,000 free awards points to those who agreed to change their passwords for the online service prior to April 1, 2015, when the company said the change would become mandatory. Ironically, that same campaign led to the discovery of a simple yet powerful flaw in the site that let anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number. KrebsOnSecurity, March 23, 2015

Cyber Warning

Big Vulnerability in Hotel Wi-Fi Router Puts Guests at Risk: GUESTS AT HUNDREDS of hotels around the world are susceptible to serious hacks because of routers that many hotel chains depend on for their Wi-Fi networks. Researchers have discovered a vulnerability in the systems, which would allow an attacker to distribute malware to guests, monitor and record data sent over the network, and even possibly gain access to the hotel’s reservation and keycard systems. Wired, March 26, 2015
Hackers Use an Android App for Sex Extortion: For years, criminals have been tricking people into performing embarrassing sexual acts on the Internet, and then blackmailing them with recordings of that behavior. The New York Times, March 24, 2015

Cyber Security Management

The ongoing war against cybercrime: Cybercrime is estimated to cost the global economy upwards of US$400 billion a year, and these costs are expected to continue to rise., March 24, 2015

Cyber Security Management – Cyber Defense

Information Security Management Boot Camp for IT Professionals: Information security has become part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Adding to the security management challenge, users are demanding to work from anywhere on any device. Designed for both in-house IT staff and IT vendors, ISSA-LA’s Information Security Management Boot Camp combines practical advice with sound security management insight. ISSA-LA, Event Date: June 4, 2015

Cyber Awareness

The #1 Information Security Policy That IT Managers Would Change: Every person within an organization can accidentally break the company’s information security policies if they are not careful. Cyber security is a top concern in the IT industry today. In this series, we will look at various threats to cyber security and their corresponding information security policies – and what steps businesses can take to meet those threats head on. CIO, March 23, 2015

Securing the Village

Nonprofits Get Free Entry to ISSA-LA 7th Annual Info Security Summit on Cybercrime Solutions: The Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) is offering executives and IT personnel of nonprofits to attend, at no charge, the Seventh Annual Information Security Summiton June 4 – June 5, 2015 at the Los Angeles Convention Center. This year’s Summit, The Growing Cyber Threat: Protect Your Business, will highlight practical solutions every organization can implement to better secure their sensitive information from cybercriminals. PRLog, March 19, 2015

Cyber Underworld

Who Is the Antidetect Author?: Earlier this month I wrote about Antidetect, a commercial tool designed to help thieves evade fraud detection schemes employed by many e-commerce companies. That piece walked readers through a sales video for Antidetect showing the software being used to buy products online with stolen credit cards. Today, we’ll take a closer look at clues to a possible real-life identity of this tool’s creator. KrebsOnSecurity, March 26, 2015

Cyber Law

‘Threat-sharing’ cybersecurity bill introduced in U.S. House: Leaders of the House of Representatives Intelligence Committee introduced legislation on Tuesday to make it easier for companies to share information about cybersecurity threats with the government, without the fear of being sued. Reuters, March 24, 2015

Weekend Vulnerability and Patch Report

Important Security Updates

Avast: Avast! Free Antivirus has released version Updates are available on Avast’s website.
AVG Free Edition: AVG has released version 2015.0.5863 of its 64 and 32 bit Free Edition. Updates are available on AVG’s website.
Foxit Reader: Foxit has released version of its Reader. Updates are available on Foxit Software’s website.
Piriform CCleaner: Piriform has released version 5.04.5151 for CCleaner. Updates are available from Piriform’s website.

Current Software Versions

Adobe Flash [Windows 7: IE, Firefox, Mozilla]
Adobe Flash [Windows 8: IE]
Adobe Flash [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader 11.0.10
Dropbox 3.2.9 [Citadel warns against relying on Dropbox security. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the Dropbox password be at least 15 characters long and different from other passwords.]
Firefox 36.0.4
Google Chrome 41.0.2272.101
Internet Explorer 11.0.9600.17633
Java SE 8 Update 40 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Safari 5.1.7 
Safari 7.1.4 [Mac OS X]

Newly Announced Unpatched Vulnerabilities

For an updated list of previously announced Unpatched Vulnerabilities, please see the resources section of Citadel’s website.

For Your IT Department

Cisco Multiple Products: Secunia reports Cisco has released updates and partial fixes for its IOS, IOS XE, IOS XR, Mobility Services Engine, WebEx Meetings Server, 5500 Series Wireless Controllers,  and others. Apply updates.
Citrix Multiple Products: Secunia reports Citrix has released updates and partial fixes for its Command Center, VDI-in-a-Box,  and others. Apply updates.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2015 Citadel Information Group. All rights reserved.
The post Weekend Vulnerability and Patch Report, March 29, 2015 appeared first on Citadel Information Group.'s Security Recruiter Blog