Office Documents: New Weapons of Cyberwarfare
|
|
|
- Janel French
- 10 years ago
- Views:
Transcription
1 Office Documents: New Weapons of Cyberwarfare Jonathan Dechaux Eric Filiol Jean-Paul Fizaine Ecole Supérieure en Informatique, Electronique et Automatique Operational virology and cryptology Lab. 38 rue des docteurs Calmette & Guerin, Laval France
2 1 Cyberwarfare and Cyberweapons 2 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature 3 4
3 Cyberwarfare and Cyberweapons Cyberwarfare and Cyberweapons Reallity of cyberwarfare August 2007: Espionage case of China against German chancelery. 163 Gb of Gouvernemental data stolen through a Trojan-infected Office document : Chinese hackers succeeded in stealing economic and financial data from European Banks, through malicious PDFs. Document as cyberweapons (Open)Office document are good vectors. PDF documents are also used nowadays
4 A Critical Context Cyberwarfare and Cyberweapons The Cyberwarfare picture PWN2KILL, May 2010 Paris, challenge has proved the risk is real and high. Huge technical possibilities on one side, quite no protection and detection capability on the other side. Many critical systems are rather secure with a strong security policy enforced. Classical approaches are less and less possible, not say impossible.
5 Context of the Study Cyberwarfare and Cyberweapons Which applications are concerned? Office 2010 OpenOffice 3.x All office applications. The Purpose To install malicious payload into the operating system, whithout being detected by any AV. We do not want to exploit any vulnerability (target = secure sensitive systems; e.g. combat systems).
6 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature 1 Cyberwarfare and Cyberweapons 2 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature 3 4
7 MSO: Execution level security settings Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature Possible level of security Level 4 (0x ): Disable all macros without notification. Level 3 (0x ): Disable all macros with notifiation. Level 2 (0x ): Disable all macros except digitally signed macros. Level 1 (0x ): Enable all macros. Location of settings Registery key : HKEY_CURRENT_USER \Software\Microsoft\Office\ 12.0\ <Application> \Security Application = {Word, Excel, Powerpoint, Access}
8 MSO: Trusted Location Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature Definition Trusted location: A trusted location is a directory where macros of documents stored inside are allowed to be executed automatically. Stored in the registery HKEY_CURRENT_USER \Software\Microsoft\Office12\12.0\ <Application> \Security\ Trusted Location. trust value. Standalone settings: modifying Word s settings does not affect other Office programs settings.
9 OO: Macro Security Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature Security settings Both Macro security level and trusted location are defined in "Common.xcu" file at: Openoffice.org\3\user\registery\data\org\openoffice\Office Example <node oor:name="security"> <node oor:name="scripting"> <prop oor:name="macrosecuritylevel" oor:type="xs:int"> <value>0</value> </prop> </node> </node>
10 OO: Trusted Location Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature Example Set the root directory as Trusted location <node oor:name="security"> <node oor:name="scripting"> <prop oor:name="secureurl" oor:type="oor:string-list"> <value>file:///c:/</value> </prop> </node> </node>
11 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature The use of AutoExec event with MSO The fact Able to naturally bypass the level 2 of execution. Several events are available: AutoNew, Open, Close, Exit, Exec Applied on template named Normal.dotm and stored inside MSO s users settings file. Execute the macro at opening event even if any macro are not allowed to be executed (Level 2).
12 MSO & OO.ORG: The integration Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature MSO&OO.ORG are both: Based on the W3C specification. But the integration is totally different. MSO s integration Office makes it easier to create signatures. It is possible to create self-signed certificates. They are stored inside _rel\.rel file whithin the document. Openoffice s integration: X509Certificate No significant change about signature since 2006, the first study. Black Hat 2009, Amstersdam, E.Filiol J.-P. Fizaine, Openoffice v3.x Security Design Weaknesses.
13 1 Cyberwarfare and Cyberweapons 2 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature 3 4
14 MSO case Change to the lowest level: 0 Interessting Keys: HKEY_CURRENT_USER Path: Software\\Microsoft\\Office\\12.0\\Word\\Security Windows API: RegOpenKeyEx, RegSetValueEx, RegCreateKeyEx, RegCloseKey Example RegOpenKeyEx(HKEY_CURRENT_USER, path, 0, KEY_ALL_ACCESS, &hkey); RegSetValueEx(hKey, warning, 0, REG_WORD, (const BYTE*)nNumber, sizeof(number)); RegClose(hkey);
15 MSO case Set the directory c:\users as a Trusted Location. KEY: HKEY_CURRENT_USER Path: Software\\Microsoft\\Office\\12.0\\Word\\Security\\ Trusted\\Locations Path2: Software\\Microsoft\\Office\\12.0\\Word\\Security\\ Trusted\\Locations\\Location3 Example RegOpenKeyEx(HKEY_CURRENT_USER, path, 0, KEY_ALL_ACCESS, &hkey); RegCreateKeyEx(hkey,location, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_ALL_ACCESS, NULL, &hkey2, NULL) RegOpenKeyEx(HKEY_CURRENT_USER, path2, 0, KEY_ALL_ACCESS, &hkey2);
16 MSO case Set the directory c:\users as a Trusted Location. Example RegSetValueEx(hKey2, description, 0, REG_SZ, (const BYTE*)("1"), 32); RegSetValueEx(hKey2, path_t, 0, REG_SZ, (const BYTE*)TEXT("C:\\Users\\"), 32); RegSetValueEx(hKey2, allow, 0, REG_DWORD, (const BYTE*)&number, sizeof(number)); RegCloseKey(hkey2); RegCloseKey(hkey);
17 OO.ORG case Change the Macro security level to the lowest: 0 Where are the settings? Settings are stored in only one file! No use of specific library is needed, the C Standard Library is sufficient. The Algorithm: based on standard I/O function 1 Forge the Path. 2 Locate the position inside the file. 3 Insert the value: <node oor:name="security"> <node oor:name="scripting"> <prop oor:name="macrosecuritylevel" oor:type="xs:int"> <value>0</value> </prop> </node> </node> 4 Update by restart the application.
18 OO.ORG case Trusted Locations The Algorithm It is exactly the same algorithm that manages the security level. 1 Forge the Path. 2 Locate the position inside the file. 3 Insert the value: <node oor:name="security"> <node oor:name="scripting"> <prop oor:name="secureurl" oor:type="oor:string-list"> <value>file:///c:/</value> </prop> </node> </node> 4 Update by restarting the application.
19 introduction to k-ary malware k-ary malware definition Malware made of k different, innocent-looking (from the AV point of view). Each of them can (inter)act independently or not and can either be executed in parallel or in sequential. Not all the parts are necessarily executable. The cumulative action of each part defines the malware action. E. Filiol, Journal in Computer Virology, Hack.lu 2009, A. Desnos, Implementation of K-ary viruses in Python.
20 Two waves of attack: the use of 2-ary malware The fact Suppose the security level is set to the paranoid mode, it is impossible to change the level from inside the macro. (Journal in Computer Virology, 2006, D. de Drézigué, J.- P. Fizaine, N. Hansma, In-depth Analysis of the Viral Threats with OpenOffice.org Documents). The algorithm External change of settings by a program. Macro performs its payload. Demos 1 How to install in Trojan. 2 How to perfom a simple DoS.
21 Why this approach? The fact Attacking (secure) systems becomes really complex. Just exploiting one or more vulnerability does no longer suffice. Installing a functionnally sophisticated program is less and less easy. The solution is to split the viral information into many pieces! Real case: secure systems generally filter and forbid packed binaries/shellcodes. Using 2-ary malware is a powerful alternative. The first executable performs a innocent, generally legitimate simple action. Equivalent to the packing step/functionality. The office document then installs more complex malware transparently and silently.
22 General Algorithm The same attack exists for Openoffice: Black hat 2009, Amsterdam, E.Filiol, j.-p. Fizaine, OpenOffice v3.x Security Design Weaknesses. Once apon a time, Alice and Bod are working for the Dept. of Industry. Alice sent a sensitive document to her collegue Bob. But Charly a spy is very interested in Alice s work... 1 Get the signature data. 2 Signature Information removal. 3 Forge a new certificate.
23 Get & remove the signature Collect the following informations: Town, compagny, , address and name by analyzing the certificate. Remove from _rel\.rels <Relationship Id="rId4" Type=" openxmlformats.org/package/2006/relationships/ digital-signature/origin" Target="_xmlsignatures/ origin.sigs"/>
24 Get & remove the signature Remove from Content_Types.xml <Default Extension="sigs" ContentType="application/ vnd.openxmlformats-package.digital-signature-origin"/> <Override PartName="/_xmlsignatures/sigs1.xml" ContentType="application/vnd.openxmlformats-package. digital-signature-xmlsignature+xml"/> Refinement Refine the time modification and the author s name.
25 1 Use of Public Key Infrastructure 2 whenever self-signed certificates are used: Check the serial number, timestamp and validity systematically. The serial number is supposed to be unique.
26 Trusted documents Location of settings Activate properties for only one document without modifying the security. Registery key : HKEY_CURRENT_USER \ Software\ Microsoft\ Office\ 14.0\ <Application> \Security\ Trusted Documents\ TrustRecords Application = {Word, Excel, Powerpoint, Access} Binary name = Document path. Binary value = Document creation date and document last opening.
27 Demonstration Mobile storage attack with a 2-ary malware: One Word file protected with a password One executable program to get the password
28 1 Cyberwarfare and Cyberweapons 2 Macro Security in MSO Macro Security in Openoffice Automatic execution of macros Digital Signature 3 4
29 (Open)office are efficient cyberweapons Techniques can be implemented with simple, reduced size code, and be very powerful. Antivirus software fail to detect those attacks systematially, even KAV. (Open)Office documents intensively exchanged. Security no longer relies on the application only (look at the OS levelas well). Futher works: PDF version. Anti-forensics, More execution environments. More powerful cyberweapons.
30 Thanks for your attention. Questions?
Office Documents: New Weapons of Cyberwarfare
Office Documents: New Weapons of Cyberwarfare Jonathan Dechaux, Eric Filiol, Jean-Paul Fizaine ESIEA Laval, Laboratoire de cryptologie et de virologie opérationnelles, 38 rue des Dr Calmette et Guérin,
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
PROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Portable Document Format (PDF) Security Analysis and Malware Threats
Portable Document Format (PDF) Security Analysis and Malware Threats Alexandre Blonce - Eric Filiol 1 - Laurent Frayssignes Army Signals Academy - Virology and Cryptology Laboratory About Author(s) Eric
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Kaspersky Security Network
Kaspersky Security Network Kaspersky Security Network is a progressive technology implemented in the latest versions of Kaspersky Lab s personal products. When it comes to new malware, it ensures a prompt
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
Microsoft Office 2000 and Security Against Macro Viruses
Microsoft Office 2000 and Security Against Macro Viruses A White Paper by Darren Chi Symantec AntiVirus Research Center Symantec Corporation Microsoft Office 2000 and Security Against Macro Viruses 1 Contents
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
Analyzing Word and Excel Encryption An operational solution
Analyzing Word and Excel Encryption An operational solution Eric Filiol, [email protected] ESIEA - Laval Operational Cryptology and Virology Lab (C + V ) O Rescue Keynote - Hack.lu 2009 Rescue Keynote -
Information Assurance Directorate
National Security Agency/Central Security Service Information Assurance Directorate Recommendations for Configuring Adobe Acrobat Reader XI in a Windows July 12, 2013 Revision 1 A product of the Network
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Protection profile of an industrial firewall
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
New possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)
avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products
PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
ESET NOD32 Antivirus. Table of contents
ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32
Microsoft Office Macro Security
Microsoft Macro Security March 2016 Introduction 1. Microsoft applications can execute macros to automate routine tasks. However, macros can contain malicious code resulting in unauthorised access to sensitive
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
New Systems and Services Security Guidance
New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates
File Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
Trust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
11 NETWORK SECURITY PROJECTS. Project 11.1. Understanding Key Concepts. Project 11.2. Using Auditing and Event Logs. Project 11.3
11 NETWORK SECURITY PROJECTS Project 11.1 Project 11.2 Project 11.3 Project 11.4 Project 11.5 Understanding Key Concepts Using Auditing and Event Logs Managing Account Lockout Policies Managing Password
(In)Security of Mobile Banking
(In)Security of Mobile Banking Eric Filiol and Paul Irolla Laboratoire de Cryptologie et Virologie Opérationnelles École Supérieure d Informatique, Électronique, Automatique 31C3 - Hamburg - December 27
Endpoint Security and the Case For Automated Sandboxing
WHITE PAPER Endpoint Security and the Case For Automated Sandboxing https://enterprise.comodo.com A World of Constant Threat We live in a world of constant threat. Hackers around the globe work every hour
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Next Generation Firewalls and Sandboxing
Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Install Guide VirusBlokAda
Antivirus / Anti-spam Vba32 for Microsoft Exchange VirusBlokAda Copyright 1993-2011 ОДО VirusBlokAda Ltd. Documentation version: 0.5 (March 2011) All rights reserved. All contents, graphics and texts,
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
