IT Security News Blast 2-3-2017

The Victims of Cyber Security Training

There is a cottage industry of training programs that victimize these individuals. The desire to quickly “break into” glamorous penetration testing jobs with high salaries is exploited by these programs, which are designed to quickly separate ambitious potential hackers from their money. They’re priced affordably, and are either provided in quick “boot camp” formats, or as self-paced online material. Low overhead and minimalist pricing provide training providers with lucrative volume. I recently saw a class that advertised itself (in its title, no less) as a path to a six-figure salary in penetration testing, at a discounted price of $39.99.

http://blog.hornecyber.com/the-victims-of-cyber-security-training

THN Deal: Join Certified Ethical Hacker Boot Camp Online Course (99% Off)

Just last week, we introduced an online Computer Hacker Professional Certification Package for those seeking for online training in need to pass professional hacker certifications, such as CISSP, CEH, CISA, CHFI, and CISM. However, practical skills are just as important as formal qualifications. So, the THN Deals Store brings the Certified Ethical Hacker Bootcamp course for the beginners seeking for practical skills to pass the Certified Ethical Hacker (CEH v9) certification exam and get a significant boost on your ethical hacking resume.

http://thehackernews.com/2017/02/learn-ethical-hacking.html

Cisco: Data breaches costing some businesses 20 percent of revenue

The report, which is based on a survey of 3,000 chief security officers and security operations leaders from 13 countries, found that 22 percent of breached organizations lost at least some customers with 40 percent of that group losing at least 20 percent of their customer base. Another 29 percent said their firms lost revenues due to a cyberattack – with 38 percent of that group saying losses exceeded 20 percent. Although somewhat harder to define, 23 percent reported losing business opportunities.

https://www.scmagazine.com/cisco-data-breaches-costing-some-businesses-20-percent-of-revenue/article/635851/

Should security firms Symantec, Cisco, IBM, Check Point and Intel be worried?

After growing 11.5 per cent year-to-year in 2016, Technology Business Research findings paints a new picture for the security industry in the years ahead, with market incumbents set to be challenged by emerging vendors. Looking forward, the five largest security vendors – Symantec, Cisco, IBM, Check Point and Intel – will continue to innovate and acquire to sustain revenue growth over the next five years. However, each will control a smaller share of the market by 2021 as mid-size vendors play a larger role in customers’ evolving security strategies.

http://www.csoonline.com/article/3164588/security/should-security-firms-symantec-cisco-ibm-check-point-and-intel-be-worried.html

Hacker Dumps iOS Cracking Tools Allegedly Stolen from Cellebrite

The company’s flagship product, the Universal Forensic Extraction Device (UFED), typically comes as a small, laptop-sized device, and can pull SMS messages, emails, and more from thousands of different mobile phone models. […] The hacker claimed to have taken the newly released data from a remote Cellebrite server, and said they had extracted them from UFED images. They told Motherboard that the files were encrypted, likely in an attempt to protect Cellebrite’s intellectual property, but that they managed to bypass the protections. “The ripped, decrypted and fully functioning Python script set to utilize the exploits is also included within,” the hacker wrote in a README file accompanying the data dump. The hacker posted links to the data on Pastebin.

https://motherboard.vice.com/en_us/article/hacker-dumps-ios-cracking-tools-allegedly-stolen-from-cellebrite

Wake Up to the Threat of Cyber Fatigue

Today, CIOs and CISOs need to connect the cyber dots to what is really important to the business, Buffomante explains. Asking for another $5 million? The board needs to understand how that impacts the overall corporate strategy, such as expansion plans, and how the organization can mitigate risk to meeting their goals and objectives. “These are business conversations that, frankly, legacy cybersecurity leadership practitioners aren’t always comfortable having,” he says. “They’re comfortable with the bits and bytes, but not about how to be part of the solution in bringing a medical device, for example, to market in the best way.”

http://www.cio.com/article/3164471/leadership-management/wake-up-to-the-threat-of-cyber-fatigue.html

Hackers Offering Money to Company Insiders in Return for Confidential Data

According to a new report from the US-based risk security firm RedOwl and Israeli threat intelligence firm IntSights, staff at corporations are selling company’s internal secrets for cash to hackers on one of the most famous dark web markets Kick Ass Marketplace (Onion URL). Besides selling their company’s secret information, researchers also found evidence of rogue staff, in some cases, even working with hackers to infect their company networks with malware.

http://thehackernews.com/2017/02/insider-threat-darkweb-trading.html

Why 2017 will be the worst year ever for security

All the big breaches thus far have had one thing in common: The initial malware infections or network intrusions that gave attackers a point of entry into the network “all hark back to 2013,” Rothrock says. “A lot of bad stuff got unleashed into the world then, which found its way into corporate and government networks.” […] “There is an executive awareness that the fox is in the henhouse and we have to do something about it, to solve the problem they know they have,” Rothrock says.

http://www.csoonline.com/article/3164581/security/why-2017-will-be-the-worst-year-ever-for-security.html

Could hackers really take over a hotel? WIRED explains

“It might be possible to lock a person out of a hotel room, depending on how the lock system is designed,” Nolen Scaife a security researcher with a background in ransomware and a PhD student at the University of Florida, told WIRED. When maliciously inserted into systems, ransomware will cause them to lock and not be accessed until a fee is paid to the attacker. Ransomware can be deployed through trojans, viruses, or worms.

http://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackers

Now more than ever, don’t neglect America’s cyber infrastructure

Our nation’s cybersecurity posture will only be as strong as our weakest links, particularly given the increasingly-interconnected nature of electronic systems. Assessment of critical infrastructure sectors must also emphasize clear metrics for success and failure. These metrics must also be comparable across sectors so that — once achieved — a capability baseline can be used to assess the efficacy of solutions deployed in different critical infrastructures and  jurisdictions.

http://thehill.com/blogs/pundits-blog/technology/317568-now-more-than-ever-dont-neglect-americas-cyber-infrastructure

Federal workers turn to encryption to thwart Trump

Whether inside the Environmental Protection Agency, within the Foreign Service, on the edges of the Labor Department or beyond, employees are using new technology as well as more old-fashioned approaches — such as private face-to-face meetings — to organize letters, talk strategy, or contact media outlets and other groups to express their dissent. The goal is to get their message across while not violating any rules covering workplace communications, which can be monitored by the government and could potentially get them fired.

http://www.politico.com/story/2017/02/federal-workers-signal-app-234510

Printing and Marketing Firm Leaks High-Profile Customers’ Data

The data dates back to 2010 and ranges from sensitive health records belonging to a former professional athlete, private business and employment records for an adult retail chain, and paperwork related to a lawsuit involving an actress and a Hollywood studio. Also included in the cache of data are tens of thousands more sensitive documents belonging to lesser known clients.

https://threatpost.com/printing-and-marketing-firm-leaks-high-profile-customers-data/123530/

Areas for Cybersecurity Innovation this Year

  • Deep Learning for Attack Analysis
  • Big Data for Log Correlation
  • Strengthening Container Security
  • Securing vCPE
  • Helping Enterprises Leverage SD-WAN

http://www.cio-today.com/article/index.php?story_id=00100015QKU9

Cybersecurity and freedom of speech under President Trump

Cybersecurity is more important than some people can comprehend – it touches everything these days, but another “very sacred” thing to Americans that needs to be protected is freedom of speech. There shouldn’t be a chilling effect on free speech because of any president. The news needs to continue to be the news, not news like that which is reported from state-owned news outlets in authoritarian regimes. Reuters pointed out, “It’s not every day that a U.S. president calls journalists ‘among the most dishonest human beings on earth’ or that his chief strategist dubs the media ‘the opposition party’.”

http://www.computerworld.com/article/3163628/security/cybersecurity-and-freedom-of-speech-under-president-trump.html

EU tools up for cyber war

The stakes are also being raised. At least 15 EU members have incorporated a military element into their cyber strategies, although “few admit to having invested in cyber weapons”, according to a European Parliament working paper. France is a leader in the European cyber arms race. In December, it launched its first cyber unit, which is designed specifically to counter attacks and which is expected to grow to employ 2,600 specialists.

http://www.satprnews.com/2017/02/02/eu-tools-up-for-cyber-war/

Why Iran’s favorite weapon is the cyber attack

[Iran] has a weak conventional military that couldn’t possibly hope to push around stronger countries. For that reason, cyber attacks represent the perfect weapon. Cyber attacks are cheap, ambiguous, hard to pin on any one actor, and almost completely without precedent when it comes to gauging a military response.  Cyber attacks allow Iran “to strike at adversaries globally, instanta­neously, and on a sustained basis, and to potentially achieve strategic effects in ways it cannot in the physical domain,” writes Eisenstadt.

http://www.businessinsider.com/why-iran-favorite-weapon-cyber-attack-2017-2

Pair arrested in London over crippling cyber attack on Washington DC’s CCTV network just days before Trump was sworn in as president

The Sun reported that police swooped on a house in Streatham, south London last month after the US government reported 123 of 187 security cameras in Washington went offline, amid fears it may be linked to an attempt on Trump’s life. Just hours before the 45th President was sworn in, a 50-year-old British man and a Swedish woman, also 50, were detained by the National Crime Agency. It was believed the cyber attack could have been a dry run for another attempt on January 20, the day of the inauguration.

http://www.dailymail.co.uk/news/article-4182714/Pair-arrested-London-cyber-attack-Washington-DC.html

Trump administration doubles down on alarming social media tracking practices

The White House is reportedly considering expanding border data collection by requiring that any visitor provide access to social media and device data. We have also seen unconfirmed reports that individual agents are already seeking access to the data from persons detained at borders under the new executive action. The increased focus on social media and digital data at the borders conforms with the new administration’s decision to target persons based solely on who they are.

https://www.accessnow.org/trump-administration-doubles-alarming-social-media-tracking-practices/

Why government agencies must embrace CDM

[Touhill] also endorsed modernizing IT systems and implementing the Continuous Diagnostics and Mitigation program, which means identifying cybersecurity risks on an ongoing basis, prioritizing risks based upon potential impacts and enabling cybersecurity personnel to mitigate the most significant problems first. CDM embraces a risk-based approach to security, shifting cybersecurity from solely a technical issue to an everyday business priority. In the private sector, this shift is old news; however, across many government agencies, it continues to be a novelty.

https://gcn.com/articles/2017/02/02/cdm-business-priority.aspx?admgarea=TC_SecCybersSec