Annual Review January

Size: px
Start display at page:

Download "Annual Review 2011 31 January 2012 1"

From this document you will learn the answers to the following questions:

  • Can encryption methods used for phone calls and data traffic be completely secure?

  • What was the name of the username and password of user of napsu . fi?

  • What year did several information security breaches take place?

Transcription

1 Annual Review January

2 CERT-FI review 2011 Abstract annual The year 2011 was characterised by many information security breaches getting a lot of public attention. The information obtained from these break-ins was also published on the internet. The usernames, passwords and other information of several Finnish and foreign services were given a lot of publicity in discussion forums and file sharing services. The data theft against Sony's services can be considered as the most wide-spread data leak of all times. The company suffered significant financial loss on account of the break-in. The trustworthiness of the certificate system has been tested due to information security breaches and hacking attempts against companies acting as root Certificate Authorities (CA's). The cases have drawn attention to the information security level of certificate providers and the weaknesses in the system in general. Due to an operator's error, secret mobile phone numbers ended up in publicity during the spring and summer. Due to the mistake, the numbers meant to be secret were temporarily available in the nationwide database of Suomen Numeropalvelu Oy. The mistake concerned approximately 37,000 DNA customers who switched subscription types between 10 April and 28 June. Data related to the SecurID tokens used for strong authentication and belonging to the American security firm, RSA, were stolen due to a data theft against the company. The tokens are widely-used in Finland, too. Detailed information on the information that fell in the hands of third parties has not been published. It is assumed that the information will possibly be used for copying the functionality of the token and using the copied token for login. Due to the incident, RSA has replaced its customers' SecurID key generators by new ones. Increasingly more often, the configuration files of malware hijacking online banking connections have references to Finnish banks. Several scam attempts using malware and phishing sites were targeted at customers of Finnish banks. Especially man-in-the-middle attacks and malware hijacking browser connections became general in Finland, too. The malware have mainly been the different versions of the Zeus malware family. The shortcomings in the vulnerabilities of e-shop applications have in some cases enabled malpractice where the person who is ordering products has been able to make believe that s/he has paid for the products s/he has ordered. CERT-FI has coordinated the patching of several software vulnerabilities. The evasion methods found by the Stonesoft company received the most publicity. In 2011, CERT-FI arranged two meetings for Finnish vulnerability researchers. The encryption methods used for telephone calls and data traffic in 2G GSM mobile telephone networks can no longer be considered completely secure. Eavesdropping telephone calls or taking over someone else's identity on the internet still require expertise, but are technically possible with the help of publicly-available tools. It is possible to improve the security of GPRS data traffic by means of encryption methods at application level, and the introduction of the 3G network improves the security of voice traffic. 2

3 Major information security breaches to Finnish and foreign services Drawing public attention to themselves, several information security breaches involving users' personal data, credit card information and confidential documents took place in Several successful information security breaches have shown that not enough attention is paid to the secure implementation and maintenance of online services. Stealing information from systems is often possible by means of publicly-available software which search for vulnerabilities and exploit them. The data released by the hackers leads to believe that it is all too easy to crack user passwords. In addition, the same password is used for different services, which multiplies the risk related to the exploitation of stolen data. Information security breaches led to discussions about whether it is safe enough to authenticate users by using a username and password. However, there are no widely-used alternatives for using a password. During the year, CERT-FI released several articles in the series 'Information security Now!'. For example, on how to choose a safe password, as well as Guidelines 1/ on the selection of network service software platforms and maintenance of secure service. Several Finnish services became targets of hacking Finnish network services were breached in the latter part of the year, in particular. The breached data was published on online discussion forums and at sites for file download services. Data related to the member applications of a grouping named 'Kansallinen 1 vastarinta' (National resistance) was published in October. The breached data included the name, age and contact details of persons who had applied for the group's membership. A link on a Finnish discussion forum leading to a file containing the personal data of approximately 16,000 Finns was published in November. The data comprised the persons' identity number, complete name, home address, address and telephone number. The list was based on several different sources. There is no certainty over when the breach was made or how it was made. The Police are investigating the case. A list containing the addresses of more than half a million Finns was published in November. Some addresses on the list had obviously not been used for quite a long time. It is likely that several sources over a longer stretch of time have been used to produce the list. The user database of the discussion forum helistin.fi, part of the website group named 'Terve', fell into wrong hands when it was breached. The database contained the username, password and address of 73,000 users. The same credentials also give access to the other Darwin Media services, which are: tohtori.fi, poliklinikka.fi, kimallus.fi, huoltamo.com, terve24.fi, mustapippuri.fi, terkkari.fi and verkkoklinikka.fi. Furthermore, the usernames, passwords and addresses of users of napsu.fi and netcar.fi were published in a file sharing service. The list contained the details of 16,000 users. The respective user data of netcar.fi were also published online. The database contained the username, password and address of 12,000 users. Hackers remain unknown A group named Anonymous Finland announced to be the perpetrator behind several data leaks and information security breaches. Very little is known about the perpetrators. At least two different sources have announced to acting in the name of the group 3

4 Anonymous. It is typical of the groupings to publish Twitter messages and longer texts, such as username lists and other messages in file sharing services. The attack not only involved information security breaches and data leaks, but several websites had been defaced by adding unauthorized content to them. Corporate subscribers are not obliged to report of information security breaches. Companies and organisations which have filed a telecommunications notification are obliged to notify if they have been the targets of information security breaches or attempted attacks. CERT-FI has also been informed of other lists containing user credentials which have been published online. For the most part, the lists are based on stolen information from earlier breaches. It is probable that similar lists will be published in the future, too. After the holiday season, a list of 50,000 names was published including credit card infor-mation. It did not take long to see that the list was made up. Breaches to Sony concerned Finns, too Among the breached foreign services, it was the breaches targeted at Sony's services that received the most publicity. The impact also extended to the Finnish users of these services. Before Easter, an attack was targeted at the Sony PlayStation Network service, and hackers succeeded in stealing the user information of 77 million users of the PSN service. At the same time, an information security breach occurred at the Sony Online Entertainment online game service. During this break-in, the hackers obtained the user information of 24 million users. In total, information of more than 100 million users was stolen in these security breaches, which makes them the vastest on record in regard to the amount of stolen user information. According to Sony, the Playstation Network service had approximately 330,000 Finnish us-ers. In late April, CERT-FI released the Alert 1/ concerning the information security breaches (in Finnish). Due to the publicity the data breaches had gained, several of Sony's other online services and sites were attacked as well. Hackers managed to steal user information in almost 20 of these attacks. Sony reported a loss of $ 170 million caused by the information security breaches. According to experts, most of the attacks could have been prevented by following the standard information security practices. Secret telephone numbers revealed by accident Due to a mistake that was made in connection with a system update, the secret telephone numbers belonging to DNA's customers ended up in public during the spring and summer. The mistake concerned some of DNA's customers who switched subscription types within the telecom operator between 10 April and 28 June. More than 37,000 subscriptions were switched over the time period. Due to the mistake, the numbers meant to be secret were temporarily available in the nationwide database of Suomen Numeropalvelu Oy. Companies providing number enquiry services use the database for updating their data. After the mistake was detected, DNA corrected the data and confidentiality of the numbers was restored. A letter informing of the matter was sent to all customers whose data may have changed in connection of the case. In addition, DNA informed FICORA of the matter in accordance with the Act on the Protection of Electronic Communications

5 The EC Directive on privacy and electronic communications was amended in the spring of Telecom operators are now obliged to notify of information security breaches targeted at personal data related to telecommunications. This had minor impact on the situation in Finland because the notification obligation was already embedded in the general notification obligation. GSM network security tested The weaknesses of the encryption portion of the A5/1 have been known for several years already, but the new decryption methods published just lately enable much faster decryption than the earlier methods. The weaknesses found in the encryption method can be exploited for the purpose of finding the encryption key related to the telephone call. Not only can the key be used for decrypting a phone call, but also for presenting oneself as the victim's terminal device. This enables the making of calls or sending of text messages so that they seem to be coming from another person's telephone number. Decryption of calls and unauthorized use of another subscriber's identity require good knowledge of GSM technology and tools. Furthermore, the attacker must be located nearby the targeted user. There are many solutions available for the weaknesses of network protection. Some of them have already been standardised. It is not likely that all of the proposed patches will be implemented in the networks of Finnish operators, because they are already switching to 3G networks, which cannot be eavesdropped by means of currently available methods. Research results related to the information security of GPRS data traffic and Tetra networks were also published in The GEA/1 encryption algorithm used for protecting GPRS data traffic in GSM networks has been partially cracked by means of algebraic methods. It is recommended to protect the encryption of GPRS data traffic at application level or by encrypted VPN connections, because some operators do not use any encryption for GPRS traffic. Foreign mobile operators used mobile network monitoring software Certain international mobile telephone operators have admitted to have installed an intelligence tool named Carrier IQ on their customers' handsets. The software has been used in devices using the operating systems Android and Apple ios. The software allows operators to collect data related to the mobile phone's performance, for example. In some cases, the reports sent from phones have, however, contained information that the user had meant to be private, such as text messages, pressings of a key and browser history. Once it became known that the software was being used, a few operators announced that they would give it up. Apple had also said that the company's ios 5 operating system no longer contains the Carrier IQ code. Finnish mobile telephone operators have stated that they do not use Carrier IQ. Furthermore, Carrier IQ does not ship products for any Nokia devices. Certification authorities' reliability suffered due to information security breaches The trustworthiness of the certificate system became weaker due to several information se-curity breaches and attempts, which gained a lot of publicity in The access rights obtained by crackers have been used for the creation of server certificates in the name of third parties. Software manufacturers have had to release updates for their products, because the design of certification technology has not taken into consideration situations where the top level of the hierarchy, in other words the root certification authority becomes unreliable. 5

6 In the summer, hackers broke into the systems of the Dutch DigiNotar. The hackers succeeded in creating several server certificates for Google services. A hacker known as Comodohacker not only took responsibility for the attack made against a subcontractor of a Comodo named company that issues certificates in March, but also the failed break-in targeted at Globalsign. Certificates are used, for example, for verifying the authenticity of a website. They are also used for verifying the authenticity of software or software updates and for identifying persons. The significance of software signatures is growing along with the Windows 7 operating system and smartphone applications. Identification is based on a confidence chain in which various pieces of software trust a limited set of root certificates and certificates issued by root certificate holders. This has resulted in one of the greatest weaknesses of the certificate system: there is no hierarchy between root certificates, but each root certificate is good for the certificate signer of all sites. Even if the service provider had obtained the certificate from a certain CA, a certificate issued by any other trusted CA is considered the equivalent of the real certificate. In order for certificate authorities to get on the root certificate list, they must pass an information security auditing process. However, this did not ensure that information security would have been at a sufficient level. Falsified certificates can be used to carry out a man-in-the-middle (MITM) attack, hijacking the connection between the service and its user. In this case, the attacker must also control the network infrastructure, the name server must be in the attacker's control or the attacker must be located in the same local network as the target of the attack. For example, open WLAN networks may provide a suitable environment for carrying out attacks. The user can also be tricked by manipulating the name service to direct network connections to an address that contains a falsified website and certificate. The authentic-looking website can be used to find out user information such as usernames and passwords. Information security researchers and software developers have developed several parallel solutions to improve the security of certificates. However, some of the solutions are rather complicated to use and familiarity with the matter is required from the user. RSA SecurIDs replaced due to break-in In March, the information security company RSA announced that the company had been attacked by hackers. The breach was made by sending an Excel file containing malware code to a group of RSA employees. The file contained an exploitation method whose purpose was to exploit a vulnerability in a software for showing Adobe's Flash files. The attackers got their hands on user accounts, which helped to steal information from RSA's systems. RSA has not reported what sort of data fell to hackers, but has admitted that the data is related to SecurID products. It has been speculated that the attackers had succeeded in stealing the so-called seed files, which are needed for deploying SecurID key generators. In principle, seed data can be used for making copies of key generators that are already in use. SecurID key generators are used for strong identification as users log into services. The token generates a new number code for example once a minute. To log in to a system secured with SecurID, the user has to enter a username, personal password and a frequently changing number code generated by the token. Approximately 40 million SecurID tokens are used worldwide. In addition to these, some 2.5 million people use application-based solutions. 6

7 Due to the attack, RSA announced that it will replace all SecurID key generators manufactured before the breach. The replacement of tokens has not cost some of the customers any money. Neither has the initiation of the replacement required any initiative on the part of customers. In Finland, nearly all key generators whose users had wished replacement, had been replaced by the end of The cost of the replacement depends, for example, on the number of SecurIDs in use and their age. According to the questionnaire CERT-FI sent to critical infrastructure actors in August, more than half of the respondents were about to replace or had already replaced their SecurID tokens by new ones. One of five respondents said that they were not planning to replace their tokens or that they had already started using an alternative technology. The data stolen at the break-in was probably exploited in late May when there was an attempted information security breach to the information systems of the American Lockheed-Martin, the country's largest defence contractor. Lockheed- Martin said to have prevented the attack. CERT-FI published the Alert 2/ about the lowered information security level of SecurID products after the word spread of RSA information security breach. The alert included advice to organisations and individual users of SecurID. Finnish online banking service users targets of malware In 2011, several cases were reported to CERT-FI where Finnish computers had been infected by malware targeted at users of online banking services. There has been a lot of variation among the malware. The simplest ones are similar to phishing sites once the login has taken place. The more advanced ones function inside the browser and make use of JavaScript. At least one malware has a feature called balance adjustment. The 3 malware puts forward a fake balance which is shown on the website and hides the transactions made by criminals. Among the more advanced malware versions are the malware containing a feature called Man-In-The-Middle. When a user logs into the online banking service, a box is initiated by the malware stating that the user is requested to wait while the 'information security of the online banking service is being improved'. The malware enables the criminals to monitor the telecommunications of the user's online banking service and use the codes given by the user for the purpose of confirming the transactions. The detected malware mainly represented the different versions of the Zeus malware family. The anti-virus software were not initially able to detect the previously unknown malware versions. The manufacturers of anti-virus software have, however, been immediately delivered samples of malware, after which anti-virus software have detected the malware. CERT-FI has been notified of various botnets containing Finnish internet users. They have exploited the various versions of the Zeus malware. The addresses of computers belonging to botnets have been reported to the internet operators. The addresses of the botnet command and control servers have been reported to CERT-FI's foreign cooperation partners. Users of online banking services as phishing targets There has been a sharp increase in the number of Finnish online banking service users who have fallen as victims of phishing attempts during the latter half of the year. The phishing targets have received messages from criminals. The messages have often contained a link leading to a hacked web server. In the messages, the users are threatened that their bank identifiers or accounts will be closed, unless they follow the link. These messages are long from being credible. Although they are written in Finnish, the language is rather clumsy and contains spelling mistakes. 7

8 In some cases, criminals have registered domain names for the purpose. These domain names look similar to those of online banks. Phishing sites have been put together by copying the online bank's real login page. Shortcomings in e-shop data security The Police and CERT-FI were informed of cases where design errors or vulnerabilities in e-shop applications had been exploited in scams. These errors made it possible to order products from certain e-shops without payment. Online e-shop applications were misled to believe that the payment had been made. As far as is known, these vulnerabilities have been used in fraud, resulting in financial losses totalling more than EUR 300,000. This was not an information security issue of a single application or of a single manufacturer, but a vulnerability caused by the implementation method of e-shops. Not all e-shop implementations have followed the technical definitions of banks or other providers of pay-ment transaction services by the book. E-shop administrators are responsible for the information security of e-shops. Vulnerabilities have never concerned customers who shop online, and the online shoppers' information security has not been compromised due to the possibilities for misuse. In investigating this matter, CERT-FI cooperated with the information security company Nixu Oy, the Helsinki Police Department, and E-commerce Finland to share information with software manufacturers and e-shop administrators. It is likely that similar vulnerabilities and related exploitation attempts will occur in the future. BEAST attack revealed flaws in the security of SSL/TLS connections The BEAST (Browser Exploit Against SSL/TLS), method introduced in September, revealed that a web session based on TLS 1.0 protocol may be hijacked by third parties, if certain conditions are met. An attack may succeed, if the TLS session is based on block cipher encryption. In addition, the attacker must feed his or her program code to the victim's browser, and be able to listen to the victim's network traffic. An efficient way to protect oneself from a BEAST attack is to start using TLS 1.2 protocol. In practise, the transition period from the current protocol may be long, because many browsers or server software do not support the more recent protocol version. Browser manufacturers have added precise updates to their products. They prevent the exploitation attempts of the BEAST attack. Vulnerability coordination work is versatile In 2011, CERT-FI coordinated the repair and publication of vulnerabilities that were very different from one another. The interest in the research of open source software security is reflected in the number of vulnerabilities reported to CERT-FI. An example of open source software is the Chrome browser. The bug bounty program pays rewards for vulnerabilities reported in the Chrome browser. As a result, several vulnerabilities have been found. Amongst the Finnish researchers who have excelled in the discovery of vulnerabilities are the Oulu university information security group OUSPG's researchers Aki Helin and Atte Kettunen. Cooperation with OUSPG has been intensive and fruitful and dates back to the establishment of CERT-FI. A vulnerability in the SNMP protocol published ten years ago drew a lot of attention to itself and afterwards, the patches and release of several software vulnerabilities have been coordinated in cooperation. 8

9 New evasion techniques kept CERT-FI busy at the beginning of the year Due to the protection evasion methods researched by the information security company Stonesoft Oy, CERT-FI has been in contact with several software and device manufacturers during the year. Vulnerabilities involve protocol messages which enable the evasion of the protection provided by various IDS/IPS devices. Only few device and software manufacturers have reported of their vulnerability to the evasion methods in question or whether they have patches for their products. It is difficult for end users to find out whether their products need updates due to possible evasions. Interest in the security of smartphones is growing The first smartphone vulnerability coordinated by CERT-FI was that of Nokia E75 s security code bypass method. In recent years, attitudes towards vulnerabilities requiring the physical management of computers and telephones have become more serious. This may be the result of tighter information security requirements. Various data transfer networks as research subjects CERT-FI participated in the publication processes of several vulnerabilities. Similar vulnerabilities have still been detected in the implementations of various networks, which tells of the same implementation errors lying beneath, especially in input verification and memory handling. A vulnerability in the Linux Bluetooth tools was patched. Bluetooth is a network technology used for the wireless connection of various devices, such as telephones and headphones. iscsi is a standard used for linking data storage devices over a network. A 9 vulnerability in Solaris operating system's implementation was patched. Patches were made for the Quagga software's routing protocol at the end of the year. The latest security patches were related to the BGP and OSPF routing protocol implementations in Quagga. In early 2011, a vulnerability in the RTP protocol of Cisco products (Real-time Transport Protocol) was fixed. During the latter part of the year, a patch was made available for a vulnerability in the RTPS streaming services (Real-time Signaling Protocol) of the VLC media player. RTP and RTSP are commonly used for the implementation of internet telephone calls and streaming of video and sound. Meetings with vendors and researchers In February, CERT-FI participated in a meeting held in connection with a RSA conference bringing together several software manufacturers. The meeting was arranged by the CERT Coordination Center in San Francisco. During the same trip, CERT-FI met several software manufacturer representatives in the Silicon Valley. In 2011, CERT-FI arranged two meetings for Finnish vulnerability researchers. The first one was held in Espoo in cooperation with Microsoft, the other one in Oulu at the premises of VTT Technical Research Centre of Finland. The meetings brought together more than 30 parties interested in the technical implementation of information security. Outlook for 2012 The legislative projects related to the regulation of the internet have been objected and there are protests online, too. It is probable that network attacks will also be used as an in-strument for protesting in the coming year. It is to be expected that there will be attempts to steal user information from inadequately protected network services. The data will either be exploited or published on the internet.

10 Statistical data on contacts made to CERT-FI CERT-FI contacts by title Change Interview % Vulnerability or threat % Malware % Advice % Preparation of attack % Information security breach % Denial-of-service attack % Other information security issue % Social engineering % Total % 10

INFORMATION SECURITY REVIEW

INFORMATION SECURITY REVIEW INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Advanced Biometric Technology

Advanced Biometric Technology INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

ADDITIONAL Information Security Review, 3b/2011. 28 November 2011 On vulnerabilities in the certificate system

ADDITIONAL Information Security Review, 3b/2011. 28 November 2011 On vulnerabilities in the certificate system ADDITIONAL Information Security Review, 3b/2011 28 November 2011 On vulnerabilities in the certificate system 1 CERT-FI Information Security Review 3b/2011 On vulnerabilities in the certificate system

More information

SITUATION REPORT 1/2007 1 (5) 11.4.2007 INFORMATION SECURITY REVIEW 1/2007

SITUATION REPORT 1/2007 1 (5) 11.4.2007 INFORMATION SECURITY REVIEW 1/2007 1/2007 1 (5) INFORMATION SECURITY REVIEW 1/2007 During the first quarter of the year, received word about an unusual number of denial-ofservice attacks or attempts of those. The most noteworthy attacks

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

BYPASSING THE ios GATEKEEPER

BYPASSING THE ios GATEKEEPER BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY

More information

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Inspection of Encrypted HTTPS Traffic

Inspection of Encrypted HTTPS Traffic Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Keystroke Encryption Technology Explained

Keystroke Encryption Technology Explained Keystroke Encryption Technology Explained Updated February 9, 2008 information@bluegemsecurity.com (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

ADVANCE AUTHENTICATION TECHNIQUES

ADVANCE AUTHENTICATION TECHNIQUES ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

2012 Data Breach Investigations Report

2012 Data Breach Investigations Report 2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information

More information

TOLL FRAUD POLICIES AND PREVENTION

TOLL FRAUD POLICIES AND PREVENTION TOLL FRAUD POLICIES AND PREVENTION What is Toll Fraud? Toll Fraud is the theft of long-distance service. It s the unauthorized use of phone lines, services or equipment to make long distance calls. When

More information

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Monitoring mobile communication network, how does it work? How to prevent such thing about that? Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one

More information

Security Challenges and Solutions for Higher Education. May 2011

Security Challenges and Solutions for Higher Education. May 2011 Security Challenges and Solutions for Higher Education May 2011 Discussion Topics Security Threats and Challenges Education Risks and Trends ACH and Wire Fraud Malware and Phishing Techniques Prevention

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

2015 CENTRI Data Breach Report:

2015 CENTRI Data Breach Report: INDUSTRY REPORT 2015 CENTRI Data Breach Report: An Analysis of Enterprise Data Breaches & How to Mitigate Their Impact P r o t e c t y o u r d a t a Introduction This industry report attempts to answer

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Tutorial on Smartphone Security

Tutorial on Smartphone Security Tutorial on Smartphone Security Wenliang (Kevin) Du Professor wedu@syr.edu Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Basics of SSL Certification

Basics of SSL Certification Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

Security in Global IP Networks

Security in Global IP Networks Security Technology for the Internet Security in Global IP Networks Tatu Ylönen SSH Communications Security Corp What are global IP networks? The Internet The consumer internet Global uncontrolled

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse

More information

Reducing Email Threats

Reducing Email Threats Reducing Email Threats MyMail Solves Common Privacy and Security Email Threats MyMail Technology, LLC 2009 West Beauregard Avenue San Angelo, TX 76901 (866) 949-8572 www.mymail.com March 2008 REDUCING

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

A Proper Foundation: Extended Validation SSL

A Proper Foundation: Extended Validation SSL A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Device Fingerprinting and Fraud Protection Whitepaper

Device Fingerprinting and Fraud Protection Whitepaper Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com Agenda Current State of Web Application Security Understanding

More information

Board Portal Security: How to keep one step ahead in an ever-evolving game

Board Portal Security: How to keep one step ahead in an ever-evolving game Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

A Case for Managed Security

A Case for Managed Security A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction

More information

BEST PRACTICES IN WEB CONFERENCING SECURITY. A Spire Research Report April 2003. By Pete Lindstrom, Research Director. Sponsored By: www.cisco.

BEST PRACTICES IN WEB CONFERENCING SECURITY. A Spire Research Report April 2003. By Pete Lindstrom, Research Director. Sponsored By: www.cisco. BEST PRACTICES IN WEB CONFERENCING SECURITY A Spire Research Report April 2003 By Pete Lindstrom, Research Director Sponsored By: www.cisco.com BEST PRACTICES IN WEB CONFERENCING SECURITY A Spire Research

More information

Innovations in Network Security

Innovations in Network Security Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Oakland Family Services - Was Your Email Hacked?

Oakland Family Services - Was Your Email Hacked? Oakland Family Services Information Breach FAQs 1. What happened? An unauthorized individual remotely gained access to the email account of one Oakland Family Services employee July 14, 2015 resulting

More information

Defensible Strategy To. Cyber Incident Response

Defensible Strategy To. Cyber Incident Response Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information