Blog Archive
-
2016
(627)
-
avril(626)
- India to become second largest smartphone market b...
- Researchers develop a mobile app that lets visuall...
- Facebook usage over Tor surpasses one million mont...
- Free Wi-Fi content on trains and buses; this is ho...
- China ban on Apple services is a challenge for key...
- Android N Developer Preview moves beyond Nexus dev...
- Apple may be exempted from local sourcing norms fo...
- Acer Liquid Zest Plus announced with massive 5,000...
- US Justice Department withdraws NY iPhone unlockin...
- Microsoft, Google agree to withdraw regulatory com...
- Does the IRS Know If I Cashed Out a 401(k)?
- Surprise! Halliburton Company Pre-Announces Q1 Res...
- How Microsoft Won the Buyback Game
- What Happens to Stock Prices After Exiting Bankrup...
- Apple Inc's WWDC 2016: 3 Important Product Moves t...
- Can You Deduct a Fund's Expense Ratio?
- LinkedIn's College Student App Has Huge Profit Pot...
- This Research Report Is Horrible News for Apple
- Americans Spend Twice As Much Time on the Mobile I...
- Starbucks Corporation and Boston Beer Sink on Flat...
- Danger Lurks for These 2 High-Yield Dividend Stocks
- What Investors Might Have Missed in the Stock Mark...
- Is Big Lots a Big Buy?
- Why Microsoft, Hawaiian Holdings, and Tempur-Sealy...
- 1 Reason Wells Fargo Makes So Much Money
- Biogen Inc Earnings Explode Higher, Revenue Not So...
- Why Advanced Micro Devices, Southwestern Energy, a...
- Why Hawaiian Holdings, Inc. Stock Plummeted Today
- Facebook, Inc. Earnings: 3 Questions for Mark Zuck...
- BJ's Restaurants, Inc. Stock Up Big on Earnings: K...
- Better Buy: TransEnterix or Intuitive Surgical
- After Earnings, Is IBM a Buy?
- Has IPG Photonics Stock Gotten Ahead of Its Earnin...
- A Smart Strategy for Claiming Social Security At 62
- 3 Reasons Why the Apple Car May Fail
- What to Watch When Westinghouse Air Brake Technolo...
- Starbucks Corporation Earnings: 10 Reasons Results...
- Why Sarepta Therapeutics Inc. Is Bouncing Back Today
- Why Did Southwestern Energy Take Out a $1.5 Billio...
- GE Earnings: Another Quarter of Tough Conditions
- Is VR too dangerous for kids? We asked the experts
- Don’t let the kids have all the fun, ace Snapchat ...
- Use only clean energy with the flip of a switch th...
- The NHTSA is using Twitter to personally call out ...
- iPhone running low on memory? SanDisk's iXpand Fla...
- MTV Cribs is making a comeback … on Snapchat
- What’s new on Netflix and what’s leaving in May 2016
- Eizo Foris FS2735 review
- New trailer for Woody Allen's Cafe Society feature...
- Art imitating life: 7 great crime movies based on ...
- id Software responds to PC gamers' complaints abou...
- Big sound, small package: Here’s our 9 favorite so...
- Relive the horror and the glory of the top ten Gam...
- China’s National Space Administration just announc...
- Scared of zombies? Inkas’ upgraded Sentry APC will...
- Ingenious Brazilian billboards use fake sweat to a...
- Close that torrent! Here’s how to legally watch Ga...
- UCI scientists stumble upon the key to never-endin...
- Zotac teases tether-free VR gaming using a Zbox mi...
- Two weeks on the road with digital ear plugs made ...
- A swing and a miss: ten car brands that didn’t mak...
- Prince’s autopsy is complete, but official results...
- There's nothing subtle about MSI's new Aegis gamin...
- How the DMCA silences cybersecurity experts, and m...
- Trends with Benefits: Celebrating TechfestNW and n...
- Legless duck walks again with 3D printed prostheti...
- Deal alert! The Alcatel POP 7 LTE has Android 6.0 ...
- Crispy Rice Cooker lets you push a button and walk...
- Between the Streams: Game of Thrones preview, Jaso...
- Where is sensitive cloud data physically stored? M...
- DoT wing issues notification to liberalise CDMA sp...
- Soon dial mobile numbers from WhatsApp, Skype as D...
- Does the IRS Know If I Cashed Out a 401(k)?
- Surprise! Halliburton Company Pre-Announces Q1 Res...
- How Microsoft Won the Buyback Game
- What Happens to Stock Prices After Exiting Bankrup...
- Apple Inc's WWDC 2016: 3 Important Product Moves t...
- Can You Deduct a Fund's Expense Ratio?
- LinkedIn's College Student App Has Huge Profit Pot...
- This Research Report Is Horrible News for Apple
- Americans Spend Twice As Much Time on the Mobile I...
- Starbucks Corporation and Boston Beer Sink on Flat...
- Danger Lurks for These 2 High-Yield Dividend Stocks
- What Investors Might Have Missed in the Stock Mark...
- Is Big Lots a Big Buy?
- Why Microsoft, Hawaiian Holdings, and Tempur-Sealy...
- 1 Reason Wells Fargo Makes So Much Money
- Why Advanced Micro Devices, Southwestern Energy, a...
- Why Hawaiian Holdings, Inc. Stock Plummeted Today
- Facebook, Inc. Earnings: 3 Questions for Mark Zuck...
- BJ's Restaurants, Inc. Stock Up Big on Earnings: K...
- Better Buy: TransEnterix or Intuitive Surgical
- After Earnings, Is IBM a Buy?
- Has IPG Photonics Stock Gotten Ahead of Its Earnin...
- A Smart Strategy for Claiming Social Security At 62
- 3 Reasons Why the Apple Car May Fail
- What to Watch When Westinghouse Air Brake Technolo...
- Starbucks Corporation Earnings: 10 Reasons Results...
- BSNL 20GB 3G data offer for Rs 50 could help win n...
- Why Sarepta Therapeutics Inc. Is Bouncing Back Today
- février(1)
-
avril(626)
Sumsung Galaxy User Guide
Android Tutorials
Labels
- Acer
- all-news
- Android
- Android Tutorials
- Apple
- BlackBerry
- Chromebook
- Galaxy
- Galaxy User Guide
- Galaxy-note
- galaxy-phone
- Google Play
- High-tech-news
- HTC
- Iphone
- Jeux-Consoles
- Laptop
- MacBook
- Microsoft
- Motorola
- Nitendo
- PC
- Smartphone
- Software
- Sony
- Sumsung
- Sumsung - Galaxy
- Surface
- Tablets
- TV
- Video
- Virus
- Xbox
Recent Posts
Blog Archive
-
▼
2016
(627)
-
▼
avril
(626)
- India to become second largest smartphone market b...
- Researchers develop a mobile app that lets visuall...
- Facebook usage over Tor surpasses one million mont...
- Free Wi-Fi content on trains and buses; this is ho...
- China ban on Apple services is a challenge for key...
- Android N Developer Preview moves beyond Nexus dev...
- Apple may be exempted from local sourcing norms fo...
- Acer Liquid Zest Plus announced with massive 5,000...
- US Justice Department withdraws NY iPhone unlockin...
- Microsoft, Google agree to withdraw regulatory com...
- Does the IRS Know If I Cashed Out a 401(k)?
- Surprise! Halliburton Company Pre-Announces Q1 Res...
- How Microsoft Won the Buyback Game
- What Happens to Stock Prices After Exiting Bankrup...
- Apple Inc's WWDC 2016: 3 Important Product Moves t...
- Can You Deduct a Fund's Expense Ratio?
- LinkedIn's College Student App Has Huge Profit Pot...
- This Research Report Is Horrible News for Apple
- Americans Spend Twice As Much Time on the Mobile I...
- Starbucks Corporation and Boston Beer Sink on Flat...
- Danger Lurks for These 2 High-Yield Dividend Stocks
- What Investors Might Have Missed in the Stock Mark...
- Is Big Lots a Big Buy?
- Why Microsoft, Hawaiian Holdings, and Tempur-Sealy...
- 1 Reason Wells Fargo Makes So Much Money
- Biogen Inc Earnings Explode Higher, Revenue Not So...
- Why Advanced Micro Devices, Southwestern Energy, a...
- Why Hawaiian Holdings, Inc. Stock Plummeted Today
- Facebook, Inc. Earnings: 3 Questions for Mark Zuck...
- BJ's Restaurants, Inc. Stock Up Big on Earnings: K...
- Better Buy: TransEnterix or Intuitive Surgical
- After Earnings, Is IBM a Buy?
- Has IPG Photonics Stock Gotten Ahead of Its Earnin...
- A Smart Strategy for Claiming Social Security At 62
- 3 Reasons Why the Apple Car May Fail
- What to Watch When Westinghouse Air Brake Technolo...
- Starbucks Corporation Earnings: 10 Reasons Results...
- Why Sarepta Therapeutics Inc. Is Bouncing Back Today
- Why Did Southwestern Energy Take Out a $1.5 Billio...
- GE Earnings: Another Quarter of Tough Conditions
- Is VR too dangerous for kids? We asked the experts
- Don’t let the kids have all the fun, ace Snapchat ...
- Use only clean energy with the flip of a switch th...
- The NHTSA is using Twitter to personally call out ...
- iPhone running low on memory? SanDisk's iXpand Fla...
- MTV Cribs is making a comeback … on Snapchat
- What’s new on Netflix and what’s leaving in May 2016
- Eizo Foris FS2735 review
- New trailer for Woody Allen's Cafe Society feature...
- Art imitating life: 7 great crime movies based on ...
- id Software responds to PC gamers' complaints abou...
- Big sound, small package: Here’s our 9 favorite so...
- Relive the horror and the glory of the top ten Gam...
- China’s National Space Administration just announc...
- Scared of zombies? Inkas’ upgraded Sentry APC will...
- Ingenious Brazilian billboards use fake sweat to a...
- Close that torrent! Here’s how to legally watch Ga...
- UCI scientists stumble upon the key to never-endin...
- Zotac teases tether-free VR gaming using a Zbox mi...
- Two weeks on the road with digital ear plugs made ...
- A swing and a miss: ten car brands that didn’t mak...
- Prince’s autopsy is complete, but official results...
- There's nothing subtle about MSI's new Aegis gamin...
- How the DMCA silences cybersecurity experts, and m...
- Trends with Benefits: Celebrating TechfestNW and n...
- Legless duck walks again with 3D printed prostheti...
- Deal alert! The Alcatel POP 7 LTE has Android 6.0 ...
- Crispy Rice Cooker lets you push a button and walk...
- Between the Streams: Game of Thrones preview, Jaso...
- Where is sensitive cloud data physically stored? M...
- DoT wing issues notification to liberalise CDMA sp...
- Soon dial mobile numbers from WhatsApp, Skype as D...
- Does the IRS Know If I Cashed Out a 401(k)?
- Surprise! Halliburton Company Pre-Announces Q1 Res...
- How Microsoft Won the Buyback Game
- What Happens to Stock Prices After Exiting Bankrup...
- Apple Inc's WWDC 2016: 3 Important Product Moves t...
- Can You Deduct a Fund's Expense Ratio?
- LinkedIn's College Student App Has Huge Profit Pot...
- This Research Report Is Horrible News for Apple
- Americans Spend Twice As Much Time on the Mobile I...
- Starbucks Corporation and Boston Beer Sink on Flat...
- Danger Lurks for These 2 High-Yield Dividend Stocks
- What Investors Might Have Missed in the Stock Mark...
- Is Big Lots a Big Buy?
- Why Microsoft, Hawaiian Holdings, and Tempur-Sealy...
- 1 Reason Wells Fargo Makes So Much Money
- Why Advanced Micro Devices, Southwestern Energy, a...
- Why Hawaiian Holdings, Inc. Stock Plummeted Today
- Facebook, Inc. Earnings: 3 Questions for Mark Zuck...
- BJ's Restaurants, Inc. Stock Up Big on Earnings: K...
- Better Buy: TransEnterix or Intuitive Surgical
- After Earnings, Is IBM a Buy?
- Has IPG Photonics Stock Gotten Ahead of Its Earnin...
- A Smart Strategy for Claiming Social Security At 62
- 3 Reasons Why the Apple Car May Fail
- What to Watch When Westinghouse Air Brake Technolo...
- Starbucks Corporation Earnings: 10 Reasons Results...
- BSNL 20GB 3G data offer for Rs 50 could help win n...
- Why Sarepta Therapeutics Inc. Is Bouncing Back Today
-
▼
avril
(626)
-
Apple Watch 2 fans have a happy news here: At last, the brand has opened the box and confirmed its launch date which will be during the Worl...
-
As the Zika virus continues to plague South America, two Brazilian companies have designed a small billboard sign that traps and kills the c...
-
Verity Milligan tells how her evolution as a photographer has been aided by people she found on Instagram. In 2012 I moved to Birmingham and...
-
Written by Amrita Dutta | Updated: April 22, 2016 6:25 pm Among Juggernauts’ first re...
-
BENGALURU: Global professional services company Accenture on Thursday said it opened a cyber centre here to expand its global security p...
-
Qualcomm on Wednesday posted sales and earnings ahead of what many analysts were expecting amid strength in both its chip and licensing busi...
-
That $50 tablet Amazon introduced not too long ago is coming in several new colors starting this week. Amazon calls the Amazon Fire the comp...
-
Autonomous sphere drone delivers water and other news 15 April 2016 Last updated at 00:07 BST BBC Click's Stephen Beckett looks at som...
-
By: Reuters | Published:April 22, 2016 1:38 pm Google’s parent company Alphabet missed its firs...
-
Great news for Motorola fans, as the next couple of months will probably belong to the US handset maker. Even though it’s one of the fe...
Like US On Facebook
Followers
Total Pageviews
Hacking Team is back in the news again. Last weekend, the person responsible for Hacking Team's meltdown posted a recap of the incident, including a detailed overview of how they hacked the Italian firm.
It's a fascinating read on its own, but the postmortem should be essential reading for anyone that supports or manages a security program.
Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago, their world was rocked after someone exfiltrated nearly 400GB of data form their network, including source code and contracts.
The irony is that Hacking Team developed tools that enabled hostile governments to do the exact things that were done to them, so many in the security industry experienced no small amount of schadenfreude at their expense. Over the weekend, the person responsible for the Hacking Team data breach, Phineas Fisher, outlined the hack from start to finish.
"You used to have to sneak into offices to leak documents. You used to need a gun to rob a bank. Now you can do both from bed with a laptop in hand," Phineas Fisher wrote.
"That's the beauty and asymmetry of hacking: with 100 hours of work, one person can undo years of work by a multi-million dollar company..."
To be clear, what happened to Hacking Team is a classic example of a targeted attack. Few organizations could outlast an attacker with knowledge, time, and resources. At the same time, the way Hacking Team managed and developed their network did them no favors.
Fisher took the time to reverse engineer some firmware in an embedded device and develop a new exploit. This Zero-Day vulnerability enabled persistent access, because he used it once (and only once) to plant a backdoor into the network.
Ultimately, a poorly configured iSCSI was Hacking Teams downfall, but there were other issues too – such as services deep within the network exposed to less secure subnets, MongoDB instances with no authentication, backups that had passwords stored in plaintext, as well as weak passwords everywhere – including on critical systems.
So what are some takeaways form the post-hack outline? Sarah Clarke, from infospectives.co.uk, shared some of her thoughts on the matter, including the fact that everyone's threat level just went up a bit.
"Despite being almost a decade away from the network coalface, I, without much trouble, and a little help from my friends, could do everything listed. What will stop me is fear of prosecution, ethics, and a strong analytical ability to see short, medium, long-term implications," she said.
Considering the outline and processes documented by Phineas Fisher, Clarke did what many security leaders would and searched for "what's next" – what can organizations with concerns about these types of attacks monitor for?
If your organization faced a similar attack, what would common enterprise monitoring tools spot, if configured correctly? What amendments to IDS/IPS, log monitoring, vulnerability scanning, pen test scoping, SIEM alerting, or alert analysis need to be made or augmented?
Andy Settle, head of special investigations for Austin-based Forcepoint, had some additional thoughts, which are produced below.
"The attack was targeted and had every intention of getting in. This type of threat needs to be addressed by asking 'when?' and not simply 'if?' Once inside the company network, the hacker managed to traverse the company infrastructure with little difficulty," he said.
Read more: Google to stop patching Chrome for 60M Android users this May
"Protecting the soft-skinned inner workings of an organizational infrastructure is equally important. Minimizing the services within a company network is just as essential to minimizing those presented to the outside world."
Monitor & Assess:
Firewall logs can give advanced warning of these types of attacks. Network mapping, port scanning and enumeration may well be countered by the firewall and Intrusion Prevention Devices (IPS) but to not monitor and assess the data they produce is to lose the Indicators & Warnings (I&Ws) that could indicate that something was likely to happen.
Updates & Patching:
"There should be no surprise that updates and patching are essential. [Phineas Fisher] was able to exploit a known vulnerability within the network management system Nagios. Interestingly, the attacker became aware of the Nagios system only after they "spied" on the sysadmins," Settle explained.
Read more: Agile doesn't (necessarily) mean fragile
Separation of Networks:
This attack was possible because backup and management networks that should have been segregated were not. Separation of operational and management networks is a useful technique for protecting infrastructure, especially when the management network requires administrative privileges. In this attack, [Phineas Fisher] was able to interrogate and dump the email server backup images.
Watch and Protect the Privileged:
We often say that one of the greatest challenges is monitoring those with privileged accounts. Many organizations, especially government related require security clearances to protect from the insider threat. However, what this incident teaches us that once in, the bad guys make a beeline for the sysadmins to monitor their activities in order to gain greater knowledge and understanding of the company and its infrastructure.
"There is somewhat of a mind-set change here, should we not be monitoring the privileged users and their workstations? Not because we do not trust them, but for their own protection and to ensure they are too are not being watched by network sniffers, key-loggers etc.?" he added.
Egress Monitoring:
"One final observation is that a lot of data was ex-filtrated. Why was this not noticed? This is hardly uncommon in attacks where intellectual property is the target. Implementing a Data Theft or Data Loss Prevention (DTP/DLP) solution and monitoring will lessen the likelihood and potential impact of this type of attack," Settle said.
Join the CSO newsletter!
Error: Please check your email address.
Tags separationHacking TeamProtect the PrivilegedIDS/IPSNagiosNetwork Management Information System (NMIS)meltdownForcepointDLPmonitorMongoDBupdatesDTPgovernmentransomwaresubnetsAccesspatching
Source : www.cso.com.au/
Category
- Acer
- all-news
- Android
- Android Tutorials
- Apple
- BlackBerry
- Chromebook
- Galaxy
- Galaxy User Guide
- Galaxy-note
- galaxy-phone
- Google Play
- High-tech-news
- HTC
- Iphone
- Jeux-Consoles
- Laptop
- MacBook
- Microsoft
- Motorola
- Nitendo
- PC
- Smartphone
- Software
- Sony
- Sumsung
- Sumsung - Galaxy
- Surface
- Tablets
- TV
- Video
- Virus
- Xbox
0 commentaires:
Enregistrer un commentaire