Ads 468x60px

11/29/2011

Predispose Your Security Risks Part 2

      As you discovred on the Predispose PART 1, the perpose of using the scanner in the companies is avoiding the hack of thier systms. Please complete reading this Chapter II off Predispose Your Security Risks.

Passive Aggressive :


Vulnerability scanners come as either passive or active devices, each of which have their advantages and disadvantages. Passive scanners are monitoring devices that work by sniffing the traffic that goes over the network between systems, looking for anything out of the ordinary. Their advantage is that they have no impact on the operation of the network and so can work 24 x 7 if necessary, but they can miss vulnerabilities particularly on more quiet parts of a network.

Active scanners probe systems in much the way hackers would, looking for weaknesses through the responses devices make to the traffic the scanners send to them. They are more aggressive and in some ways more thorough than passive scanners, but they can cause service disruptions and crash servers.

Many people see the two as complementary and recommend using passive and active scanners alongside each other. The passive scanners can provide the more continuous monitoring, while active scanners can be used periodically to flush out the cannier vulnerabilities.

Software vs. Hardware :


The scanners can also come as either software-based agents placed directly on servers or workstations, or as hardware devices. Host-based scanners can use up processor cycles on the system, but are generally considered more flexible in the kinds of vulnerabilities they can scan. The network-based scanners are plug-and-play hardware devices that are self-contained and need less maintenance than software agents.

The focus of vulnerabilities has been changing over the past several years. On the one hand, organizations have become savvier about protecting their networks and systems, and hackers have had a harder time penetrating those defenses. At the same time, as Web-based services have become the lifeblood of many witnesses, hackers have found a goldmine of potential exploits.

That’s because Web traffic flows back and forth primarily through Port 80 on a network, which has to be kept open if those Web-bases services are to be available to a company’s customers and business partners.

It’s a hard to defend weak spot in enterprise defenses, and once hackers gain access to Web applications they can use them to get information from databases, retrieve files from root directories, or use a Web server to send malicious content in a Web page to unsuspecting users.

Interpreting the Results :


Vulnerability scanning works with Web applications by launching simulated attacks against those applications and then reports the vulnerabilities it finds with recommendations on how to fix or eliminate them.

However, as powerful an addition as vulnerability scanning can be to the overall security of an enterprise, some observers advise caution in interpreting those results.

Kevin Beaver, an independent security consultant with Atlanta-based Principal Logic, LLC, says it takes a combination of the vulnerability scanner and a human knowledge of the network and context in which the scans were carried out to accurately interpret the results.

Left to themselves, he says, scanners will tend to spit information that their vendors think is important. What’s also needed is an understanding of what was being tested at the time, how it was being tested, why the vulnerability is exploitable and so on. That will show whether vulnerabilities flagged as high priority actually are important in a particular user’s environment, and therefore whether it’s worthwhile putting in the effort to remediate them.

You absolutely need vulnerability scanners, Beaver said, because they take a lot of the pain out of security assessments.

“But you cannot rely on them completely,” he said. “A good tool plus the human context is the best equation for success.”

I hop you'll Find it purposive Like i did.

Predispose Your Security Risks Part 1

    Vulnerability scanning got its start as a tool for the Hackers (Bad guys); now it's helping companies to do penetrate test thier systems.

    For something that can be such an effective weapon against "Hackers", it’s ironic that vulnerability scanning got its start as a tool for the Them (Hackers). Before they can get into networks, hackers need to know where the most vulnerable spots are in an enterprise’s security. That means using scanning tools to trawl for such things as open network ports or poorly secured applications and operating systems.

    In the past few years these intentions have been turned around, to where scanning tools now give the guys in the white hats (ethical* hackers) a good idea of where the vulnerabilities are and a chance to repair them before the crackers get there. At least they provide the potential for that. The fact is, many companies don’t seem to be taking advantage of these tools or if they do have them, they are not making much use of them. Gartner Research believes as many as 85% of the network attacks that successfully penetrate network defenses are made through vulnerabilities for which patches and fixes have already been released.

Illimite Exploits :


     Now there is the rapidly expanding universe of Web based applications for hackers to exploit. A recent study by security vendor Acunetix claimed that as many as 70% of the 3,200 corporate and non-commercial organization Web sites its free Web based scanner has examined since January 2006, contained serious vulnerabilities and were at immediate risk of being hacked. A total of 210,000 vulnerabilities were found, the company said, for an average of some 66 vulnerabilities per web site ranging from potentially serious ones such as SQL injections and cross-site scripting, to relatively minor ones such as easily available directory listings. “Companies, governments and universities are bound by law to protect our data,” said Kevin Vella, vice president of sales and operations at Acunetix. “Yet web application security is, at best, overlooked as a fad.”

Patch Patrol :


Vulnerability scanners seek out known weaknesses, using databases that are constantly updated by vendors to track down devices and systems on the network that are open to attack. They look for such things as unsafe code, misconfigured systems, malware and patches and updates that should be there but aren’t.

They also have several plus factors. They can be used to do a “pre-scan” scan, for example, to determine what devices and systems there are on the network. There’s nothing so vulnerable as something no-one knew was there in the first place, and it’s surprising how often those turn up in large and sprawling enterprises.

Many scanners can also be set to scan the network after patches have been installed to make sure they do what they are supposed to do. What vulnerability scanners can’t do is the kind of active blocking defense carried out by such things as firewalls, intrusion prevention systems and anti-malware products though, by working in combination with them, vulnerability scanners can make what they do more accurate and precise.

Please stay and complete your reading in the second part above.

*: Ethical Hackers or White Hat Hackers are people who are indeed Hackers but they give thier abilities for good causes (e.g : helping other companies, ...etc).

11/27/2011

Google Goes After Impersonator Scammers

As huge corporations go, Google's a pretty cuddly one, but according to the search giant itself, everyone should be careful about offers of employment or wealth that involve its name. "Google Money" scammers represent a growing problem that the company is trying to combat.


Google Goes After Impersonator Scammers
Google Goes After Impersonator Scammers


A post on the Official Google Blog announced today, "[D]espite hundreds of consumer complaints and our own efforts to keep these sites from tricking people, some scams continue. To fight back, we're working to stop various fraudulent 'Google Money' schemes, and this week filed suit against Pacific WebWorks and several other unnamed defendants."

The post then added, "[W]e're still working constantly to remove scammy URLs from our index, and we'll permanently disable AdWords accounts that provide a poor or harmful user experience, whether or not they use Google's trademarks illegally."

The problem continues to exist, though.

So fair warning: The scams are known to operate under names like the Earn Google Cash Kit, Google Adwork, Google ATM, Google Biz Kit, Google Cash, Google Fortune, Google Marketing Kit, Google Profits, Google StartUp Kit, Google Works, and the Home Business Kit for Google. From there, they tend to be fairly standard make-money-from home affairs.

As always, stay sharp.

Facebook Becomes A Favorite Target Of Phishers

Due to widespread concerns about its thoughts on users' privacy, Facebook has been under all sorts of fire lately, facing criticism from U.S. senators, European data protection authorities, and many tech experts. Now, yet another problem's cropped up, as Facebook's been called a top target of phishers.


Facebook Becomes A Favorite Target Of Phishers
Facebook Becomes A Favorite Target Of Phishers

The Securelist division of Kaspersky Labs issued a report yesterday, and the identities of the top three organizations that have been targeted by phishers may not come as a surprise to anyone; they're PayPal (with 52.2 percent of all attacks aimed at it), eBay (with 13.3 percent), and HSBC (with 7.8 percent).

The report, which covered the period between January and March of this year, next stated, though, "Facebook popped up unexpectedly in fourth place. This was the first time since we started monitoring that attacks on a social networking site have been so prolific."

By way of explanation, the report then continued, "Having stolen users' accounts, the fraudsters can then use them to distribute spam, sending bulk emails to the account owners and their friends in the network. This method of distributing spam allows huge audiences to be reached. Additionally, it lets the fraudsters take advantage of the social networking sites' additional options, like being able to send different requests, links to photo's and invitations, all with the advertisement attached, both within the network and to users' inboxes."

Obviously, this isn't good news for Facebook's users or the security community as a whole. Facebook acts as a sort of point of entry to information about a whole lot of people (the social network had 400 million users in early February).

This isn't good news for Facebook, either, though - nothing that makes its users uncomfortable or unhappy, and therefore likely to leave, is - so perhaps we'll at least see the company make some attempt(s) to address this problem.

Anyway, if you're curious, the list of phishers' targets picked up after Facebook with Google, the IRS, Rapidshare, Bank of America, UBI, and Bradesco.

Online Game Service Steam Gets Hacked!

Valve corporation, make of many popular game series' such as Half-Life, Team Fortress and Portal, had its popular video game on-demand service hacked on November 6th, although it is not yet known whether they all were taken or not . Apparently an outrageous 35 million possibly had their personal information compromised in the attack. According to the BBC, "The attackers used login details from the forum hack to access a database that held ID and credit card data" which could now be used for any number of purposes. Valve issued a statement letting users know the extent of the situation:


Online Game Service Steam Gets Hacked!
Online Game Service Steam Gets Hacked!

"We learned that intruders obtained access to a Steam database in addition to the forums. This database contained information including user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information. We do not have evidence that encrypted credit card numbers or personally identifying information were taken by the intruders, or that the protection on credit card numbers or passwords was cracked. We are still investigating."

Adding this as well:

"We don't have evidence of credit card misuse at this time. Nonetheless you should watch your credit card activity and statements closely."

They alerted customers that they will have to change their forum passwords the next time they login, and suggested that they change their Steam passwords (which are apparently separate) as well. This is not a great time for this to happen to Steam, as many high profile titles such as Modern Warfare 3 and The Elder Scrolls: Skyrim, have come out this week, and this may make users a bit more wary about using the service now and in the future.

Facebook Gets Hacked!

Recently Facebook, headed up by billionaire entrepreneur Mark Zuckerberg, was hacked and violent, pornographic photos were posted on millions of users profiles.


Facebook Gets Hacked!
Facebook Gets Hacked!

Apparently, this attack did not actually compromise any user data, but at the same time, that does not mean it wasn't serious. With over 800 million active users, Facebook is responsible for protecting a lot of personal data. Currently, the company is blaming the attack on a flaw in certain browsers. Apparently, users were tricked by the hacker(s) into inserting malicious javascript code into their address bars which granted the hacker(s) access to their profiles.

Obviously the people at Facebook aren't just sitting around not doing anything about this. According to a spokesperson for the company, "Protecting the people who use Facebook from spam and malicious content is a top priority for us, and we are always working to improve our systems to isolate and remove material that violates our terms," which is somewhat relieving. However, many are still surprised and upset that this happened in the first place.

What the public needs to understand is that Facebook is not the only major company out there that has been hacked recently. Sony, Valve, Google, Lockheed Martin, and others have all been victim to major attacks in the past few months. Facebook is trying their best to control the situation and is advising its members not to enter anything into their address bar that they don't know is safe.

Security Manager's Journal: Sensitive company data gets released into the wild

Computerworld - If you don't think it's a big challenge to protect sensitive company information and intellectual property, listen to this story

Last week, one of our sales associates visited a customer to review the road map for one of our flagship products. This discussion was to be confidential, so you can imagine the sales associate's consternation when the customer said he had already viewed the presentation on the Web.
He simply searched SlideShare.net, an online community for sharing presentations, and found ours. Access wasn't restricted (though restricting it is an option), so he was able to download it and have a look -- ignoring the "Restricted Use Only" label slapped across it.

The uproar that this situation created reached me quickly, and I was asked to remove the file from SlideShare.

One difficulty with that request was that only the user who uploaded the file could remove it, and that user had uploaded it anonymously, so I couldn't just send him an email and tell him to take it down. I might have been able to get his attention by blogging about the problem, but then we would've been advertising our misstep to the public. I contacted SlideShare and asked that the file be removed, but like most social media and file-sharing sites, it wouldn't act on a request from a third party, even though that third party was the security guy at the company that created the presentation. That left legal action as our last resort; our legal department filed a request through the Digital Millennium Copyright Act.
Because I am a security guy, this turn of events didn't come as a great surprise. Things like this are inevitable in an era of proliferating social media and cloud-based data sharing and storage. I've denied several requests to use the cloud to store corporate data -- I'm not satisfied with the security these services offer -- but reports generated from our firewall show widespread use of these technologies.

Two options

This event, as well as other situations that arise because it's so easy for users to move things to the cloud on their own, can be handled internally in two ways: administratively and technologically.
Administratively, I suggested that the vice president of sales tell his team that whoever uploaded the file must remove it, because it put the organization at risk. I also suggested that our vice president of marketing and public affairs or our legal counsel send a stern message to the entire workforce, stressing the importance of obtaining approval from marketing or public affairs before releasing any nonpublic data to the Internet. Luckily, I've already included these scenarios in a mandatory security awareness training module I recently released.
Technologically, I don't have much to work with, given our current budget and resource constraints, but I will enable URL content filtering rules on our new Palo Alto Networks firewalls to block access to any personal storage sites, with appropriate exceptions. I know that doing this will have a business impact, since certain departments use these sites to disseminate training materials and marketing and sales information to the public. It will take quite a bit of time to minimize the business impact.
The other issue with URL filtering is that it isn't in effect when an employee goes off our network. Of course, laptops can be configured to force all network traffic over a VPN, and software can push URL content filtering rules to each laptop, but those are the sorts of things we can't afford to do. I have data leak prevention in my budget for 2012, and that will help prevent nonpublic data from leaving the company.
But without solid technical controls, we will have to rely on stern words and employees' sense of responsibility.
This week's journal is written by a real security manager, "Mathias Thurman," whose name and employer have been disguised for obvious reasons. Contact him at mathias_thurman@yahoo.com.

Four rising threats from cybercriminals

Computerworld - Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers.
Whether you're protecting corporate data or simply trying to keep your personal files safe, these threats -- some rapidly growing, others still emerging -- put your systems at risk. Fortunately, security procedures and tools are available to help you win the fight.

1. Text-message malware

While smartphone viruses are still fairly rare, text-message attacks are becoming more common, according to Rodney Joffe, senior vice president and senior technologist at mobile messaging company Neustar and director of the Conficker Working Group, a coalition of security researchers that came together to fight the malware known as Conficker. PCs are fairly well protected today, he says, so some black-hat hackers are now targeting mobile devices. Their incentive is mostly financial: Text messaging provides a way to break into devices and make money.
Khoi Nguyen, group product manager for mobile security at Symantec, confirmed that text-message attacks aimed at smartphone operating systems are commonplace now that people are increasingly reliant on mobile devices. It's not just consumers who are at risk, he adds. Any employee who falls for a text-message ruse using a company smartphone can jeopardize the business's network and data and possibly cause a compliance violation.
"This is a similar type of attack as [is used on] a computer -- an SMS or MMS message that includes an attachment, disguised as a funny or sexy picture, which asks the user to open it," Nguyen explains. "Once they download the picture, it will install malware on the device. Once loaded, it would acquire access privileges, and it spreads through contacts on the phone, [who] would then get a message from that user."
In this way, says Joffe, hackers create botnets for sending text-message spam with links to a product the hacker is selling, usually charging you per message. In some cases, he adds, the malware even starts buying ring tones that are charged on your wireless bill, lining the pockets of the hacker selling the ring tones.
Wireless carriers say they do try to stave off the attacks. For instance, Verizon spokeswoman Brenda Raney says the company scans for known malware attacks, isolates them on the cellular network, and even works with federal crime units to block them.
To keep such malware off users' phones, Joffe recommends that businesses institute strict corporate policies limiting whom employees can text using company networks and phones, and what kind of work can be done via text messaging. Another option is a policy that prohibits text messaging entirely, at least until the industry figures out how to deal with the threats

2. Hacking into smart grids

A common misconception is that only open networks -- say, corporate wireless LANs that visitors may use -- are hackable. Not true, says Justin Morehouse, a principal consultant at Stratum Security who spoke about network security at last year's DefCon hacker convention. Morehouse says it's actually not that difficult to find an access point for a so-called closed system.
Some nuclear plants and power grids have wireless networks that are vulnerable to attack. And supervisory control and data acquisition (SCADA) systems aren't safe either.
For example, the Stuxnet worm last year infected tens of thousands of Windows PCs running Siemens SCADA systems in manufacturing and utility companies, most notably in Iran. It was largely spread via infected USB flash drives. "Stuxnet proved that it is relatively simple to cause potentially catastrophic damage" to an industrial control network, says Neustar's Joffe.
According to Morehouse, another new attack point will be smart grids that use electronic metering to streamline power management. Utility companies around the world have begun testing and rolling out smart grids to homes and businesses. The technology, which can send data to and receive it from a central system, can also be very helpful for IT: You can open a console to see the power usage for one section of a building, for example.
But smart grids might be vulnerable to attacks that would allow nefarious hackers to cut off electricity at homes and businesses and wreak other kinds of havoc. One possible attack vector is a smart grid's communications infrastructure. For example, Morehouse says, a German utility company called Yello Strom uses a consumer smart grid system that works like a home automation kit -- the sensors report energy usage back to the central server via the user's home Wi-Fi network.
The most effective preventive measure, says Morehouse, is rigid isolation -- a smart grid should not touch any other network. Given the dangers that can arise if a hacker gains access to a smart grid, he says, companies should conduct penetration tests and make sure that firewalls in closed networks are secure. He advises using tools such as Core Impact and Metasploit.

3. Social network account spoofing

Users of Facebook, LinkedIn and other social networks are vulnerable to attacks that rely on account spoofing. A scammer poses as either someone you know or a friend of a friend, in order to fool you into revealing personal information. He then uses that information to gain access to your other accounts and eventually steal your identity.
In a typical exploit, says Joffe, someone contacts you on a site like Facebook or LinkedIn, pretending to be a friend of a friend or a co-worker of someone you trust. Then, this new "friend" contacts you directly through text message or email. The correspondence seems legitimate because you believe he has a connection with an individual you trust.
In another scenario, a scammer might impersonate someone you already know -- claiming to be an old friend from high school, for instance. Spoofers can find out your connections by following your public feeds or looking up the names of co-workers on sites like LinkedIn, where you've posted your work information.
Once the scammer has established a connection with you, he uses devious means to steal personal data, such as chatting online to find out the names of your family members, favorite bands, hobbies and other seemingly innocuous information. Then he uses that information to try to guess your passwords or answers to security questions for banking sites, webmail accounts or other online services.
Morehouse describes another type of attack that targets companies as well as individuals. The spoofer might set up a Facebook page that claims to be the official company page for, say, a major retailer. The spoofer might claim that the page is a formal method to contact the company or register complaints.
The page might offer fake coupons to entice people to join, and it soon goes viral as people share it with their friends. Once hundreds or thousands of users have joined the page, says Morehouse, the owner tricks them into giving out personal information, perhaps by signing up for additional coupons or special offers.
This ends up being a double attack: Consumers are harmed because their personal data is compromised, and the company is harmed because its customers now associate the fake Facebook page with the real company -- and decide not to buy from that company anymore.
Joffe says there is no way to prevent a criminal from setting up a fake Facebook page, but companies can use monitoring tools such as Social Mention to see how the company name is being used online. If an unauthorized page turns up, companies can ask the social network to remove the fake listing.

4. GPS jamming: Threat or nuisance?

An emerging criminal tactic -- interfering with GPS signals -- has security experts divided on just how harmful it could become.
Jamming a GPS signal at the source is next to impossible, says Phil Lieberman, founder of enterprise security vendor Lieberman Software. Blocking the radio signals that are broadcast from orbiting GPS satellites would require a massive countertransmission. And because the satellites are operated by the U.S. military, jamming them would be considered an act of war and a federal crime, says Lieberman.
However, it is easy to jam GPS receivers using low-cost jamming devices like one sold by Brando. The devices jam a receiver by overloading it with a signal that's similar to the real GPS signal. The receiver then becomes confused because it can't find a steady satellite transmission.

Lieberman doesn't give much credence to fears about jammers disrupting airplanes or air traffic control systems, because those networks use a completely different GPS signal from the one we use in cars and handheld devices. Jamming could, however, be a potentially dangerous issue when it comes to financial records, he says, because GPS devices are used in the banking industry to add time stamps to financial transactions. Although completely blocking transactions would be difficult, Lieberman says, an industrious hacker could theoretically disrupt transactions and cause headaches for banks.
Security expert Roger Johnston, a systems engineer at the Argonne National Laboratory in Chicago, says spoofing GPS signals is the greater danger, explaining that GPS receivers are low-power devices that latch on to any strong signal. He says spoofing could be used for serious crimes -- tricking a delivery truck driver into turning down a dark alley, changing the time stamps on financial transactions, delaying emergency vehicles from finding their routes. There have been no reported cases of GPS spoofing to commit a criminal act, but Johnston warns that the government and businesses should work to deter such attacks.
Taking some extra precautions -- using strong encryption technology, engaging only with trusted friends on social networks, and using penetration testing software on corporate networks -- can alleviate some fears and help you sleep at night, even if the bad guys keep coming up with new exploits.
Brandon is a former IT manager at a Fortune 100 company who now writes about technology. He's written more than 2,500 articles in the past 10 years. Follow his tweets at @jmbrandonbb.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.

Shock: Council dumps data wad - doesn't break any laws

Surrey county council has launched a website which brings together a wide range of information on the area.
Named Surrey-i, the local authority said that the website will provide residents with data on issues such as roads covered by gritting trucks in severe winter weather, care homes offering places for the elderly and crime rates on local streets.
Peter Martin, deputy leader of the council, told GGC that the local authority holds large amounts of information and that it was right to share it with residents.
"It's all about transparency. We want to make as much information available to the public as they want. So for example, if you've just moved to Surrey you'll be able to see where the nearest schools are and so on," he said. "In a sense it's like a Wikipedia for Surrey."
The website has a built-in map, and by entering their postcode residents can find services and facilities in their community. These include the nearest schools and libraries, as well as information on local doctors, hospitals, charities and councillors. Other features will allow people to find their closest railway station, bus stop, dentist or beauty spot.
The site was soft launched in September on a restricted basis, but is now fully available to everyone. Martin said that the project is ongoing and will continue to evolve. He revealed that if there is an appetite for it, people may be able to have the service as an app on their mobile phones in future.
"But we're just at the experimental stage at the moment, so we'll monitor and track what people say about the service," he added.
Martin said that people trying to provide services in the area will also find the tool useful as there will be data for businesses to access, such as workforce skills, the county's economic performance and the success start-ups.
The site was developed by the council on behalf of the Surrey strategic partnership, which includes the local authority, borough and district councils, the Surrey County Association of Parish Town Councils, Surrey police, NHS Surrey and the voluntary and business sectors. As part of the launch, the council is also tweeting a fact an hour from the website during this week.
Surrey council said that other public bodies like the health service and police are already using the website to help them plan more integrated services and target their resources better. The council is currently using the website as part of a review of buildings which aims to make sure they continue to be in the right location to provide the best services for residents.
This article was originally published at Guardian Government Computing.

Google protects HTTPS-enabled services against future attacks

IDG News Service - Google has modified the encryption method used by its HTTPS-enabled services including Gmail, Docs and Google+, in order to prevent current traffic from being decrypted in the future when technological advances make this possible.
The majority of today's HTTPS implementations use a private key known only by the domain owner to generate session keys that are subsequently used to encrypt traffic between the servers and their clients.
This approach exposes the connections to so-called retrospective decryption attacks. "In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today's email traffic," explained Adam Langley, a member of Google's security team, in a blog post.
In order to mitigate this relatively low, but real security risk, Google has implemented an encryption property known as forward secrecy, which involves using different private keys to encrypt sessions and deleting them after a period of time.
In this way, an attacker who manages to break or steal a single key won't be able to recover a significant quantity of email traffic that spans months of activity, Langley said. In fact, he pointed out that not even the server admin will be able to decrypt HTTPS traffic retroactively.
Because SSL wasn't designed to support key exchange mechanisms capable of forward secrecy by default, the Google engineers had to design an extension for the popular OpenSSL toolkit. This was integrated into OpenSSL 1.0.1, which has yet to be released as a stable version.
The new Google HTTPS implementation uses ECDHE_RSA for key exchange and the RC4_128 cipher for encryption. Unfortunately, this combination is only supported in Firefox and Chrome at the moment, which means that HTTPS connections on Internet Explorer will not benefit from the added security.
This isn't necessarily a problem with Internet Explorer, which does support a combination of EDH (Ephemeral Diffie--Hellman) key exchange and RC4. EDH also provides forward secrecy, but Google chose ECDHE (Elliptic curve Diffie--Hellman) instead for performance reasons.
The company plans to add support for IE in the future and hopes that its example will encourage other service providers that use HTTPS to implement forward secrecy so that one day it can become the norm for online traffic encryption.

Will 2012 REALLY be the year of the cyberwar?

What defines an act of cyberwar? Is it a sophisticated hack from China or Russia that shuts down the U.S. power grid? Is it a rogue group like Anonymous breaking into government sites? Is it all the spying China has been doing for several years now? And what about Stuxnet and Duqu? Were those creations an act of war by the U.S. and Israel against Iran? Does a cyberwar involve government and military sites only or does it include the networks of private enterprise as well?
Related material: Security Upgrades Needed with Growing Cyberwar Threats
The debate will continue to limp along in 2012. Don't expect a clearer definition, because you probably won't get one. Still, on a much smaller, targeted scale, we have plenty of evidence that online battlefields between nations isn't beyond reality. Instead of waiting for the perfect metrics and verbiage, we may as well accept that the tools and know-how exist for cyberwar and plan our defenses accordingly.
Spy vs. spyClearly, governments have been using hackers to spy on other countries via weaknesses in computing infrastructure for years now. Back in 2009, colleague Grant Gross wrote about cyberspies from China, Russia and elsewhere gaining access to the U.S. electrical grid and installing malware tools designed to terminate service. One could interpret those actions as an act of war, though it's difficult to know for certain what the motives are.
Just a couple weeks ago, colleague Jeremy Kirk wrote about a report in which the Office of the National Counterintelligence Executive warned of more aggressive spying in the coming months. Specifically, he wrote, the U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing
"Chinese actors are the world's most active and persistent perpetrators of economic espionage," the report said. "Russia's intelligence services are conducting a range of activities to collect economic information and technology from U.S. targets."
Lack of preparednessCSO correspondent George V. Hulme has spent a lot of time researching the issue this past year. In one article, he asks, " If Stuxnet was an act of cyberwar, is the U.S. ready for a response?"
The short answer from security experts was no.
"The biggest challenge we face isn't that we're not ready for a Stuxnet. The biggest problem we face is that we're not really ready for anything. If you were to do a pen test -- and there's plenty of research out there to support this -- most utility companies are extremely vulnerable," says Eric Knapp, director of critical infrastructure markets at NitroSecurity.

PDF: HOW TO SECURE YOUR WEBSITE

When i was searching on the net, i found a PDF That i think is usefull to learn more about how to secure your website and. It Countain important informations about exploit and it's solutions and how to avoid it.
So i bring it to you (my prefered visitors), so that you can learn more and be careful from Lamerz and Crackers.

I hope that you'll find it usefull and helpfull.

This is The link to Download it :
HERE.

Source: IPA (INFORMATION-TECHNOLOGY PROMOTION AGENCY).

Germany's Merck wants Facebook page back

IDG News Service - Germany's Merck KGaA has threatened legal action after it said it lost its Facebook page apparently to rival Merck & Co. in the U.S., though it has yet to identify defendants in the case.
In a filing before the Supreme Court of the State of New York, Merck said it intends to initiate an action based on the apparent takeover of its Facebook page at www.facebook.com/merck by its similarly-named but unrelated competitor, Merck & Co.
The filing reflects the growing importance of social networks as marketing tools, with companies willing to go to court to safeguard their perceived rights on these networks.
Because Facebook is an important marketing device, the page is of great value, and its misappropriation is causing harm to the company, said Merck KGaA in the filing. The company in Darmstadt claims to be the oldest and one of the largest producers of pharmaceuticals and chemicals worldwide.
The Facebook page contained on Friday information on Merck in Whitehouse Station, New Jersey, which is described as "a global healthcare leader working to help the world be well". The site is said to be intended only for residents of the United States and its territories. On Sept. 16, it carried a post welcoming users to "Merck's official Facebook page!"
Merck in Germany said in the filing that it entered into an agreement with Facebook on or about March, 2010 for the exclusive use of the web page. Merck said it assigned administrative rights to the web page to a limited number of people, who are its employees, or its external service provider for registration of domain names and social media user names.
By about Oct. 11 this year, Merck Germany said it found that it no longer had administrative rights to the page which now had content that appeared to be "created by, and is related to" Merck & Co. in the U.S.
Merck & Co. was formed in 1891, but became an independent American company after World War I, according to the website of Merck in Germany. The two companies are no longer linked to one another, and they only have in common the name Merck, which the U.S. operation is only allowed to use in North America, according to Merck KGaA.
Merck in the U.S. was not immediately available for comment on the filing. "We're looking into this but have no comment at this time," said Facebook spokesman Andrew Noyes in an email.

Merck KGaA said it requires "pre-action disclosure from Facebook to determine the nature of the misconduct, to frame the pleadings, and to identify the proper defendants." It decided to file in New York where California headquartered Facebook has an office, as it has been advised that pre-action disclosure to identify defendants is not available through courts in California, leaving Merck KGaA without remedy in California until after it identifies a proper defendant or defendants.
While it is clear that Merck KGaA's Facebook page has been misappropriated, it is not yet clear how that happened or who is at fault, nor is Facebook providing clear information about what happened, the company said.

"Cyberattacks a top national security concern" GOP candidates say

Computerworld - Three Republican presidential candidates at Tuesday's CNN-sponsored GOP debate said that cyberattacks pose an emerging national security threat to the United States.
In closing comments during the debate, GOP hopeful Newt Gingrich, the former Speaker of the House, said that he views cyberattacks as one of three major security threats the U.S. is currently unprepared to deal with.
Prior to the terrorist attacks of 9/11 -- and even today -- the biggest threat to the U.S is the use of a weapon of mass destruction in an American city, Gingrich said. "The second is an electromagnetic pulse attack, which would literally destroy the country's capacity to function," and the third is a cyberattack.
Herman Cain noted that as a former ballistics analyst and computer scientist, he also sees cyberattacks as a national security threat. "That's something that we do not talk enough about, and I happen to believe that that is a national security area that we do need to be concerned about."
Both Cain and Gingrich were responding to a question posed by Marc Thiessen, a visiting fellow at the American Enterprise Institute, who asked the GOP candidates to identify what they see as unexpected security threats of the future.
During the 2000 Presidential debates, then-Texas Gov. George W. Bush was never asked about the threat from Al Qaida, though the battle with that group dominated his presidency, Thiessen said. "What national security issue do you worry about that nobody is asking about, either here or in any of the debates so far?" he asked.
The third Republican candidate to raise cybersecurity as an issue in response to the question was current Texas Gov. Rick Perry. In comments stating his belief that China was destined for the "ash heap" of history, Perry said that the People's Liberation Army's (PLA) involvement with cybersecurity is a major issue that the U.S. has to deal with now.
Later, his press office issued a statement saying that Perry viewed cyberattacks as an emerging threat to the nation. "As president, he will view them as seriously as a physical attack," the statement said. "Cyber attacks could target our military, important utilities, and the countless computer systems upon which our economy depends."
The statement advocated the need for both defensive and offensive cyber capabilities so that China and others who launch cyberattacks against the U.S. know there will be repercussions.
The comments by the GOP hopefuls suggest that cybersecurity issues will be a major topic for discussion in the upcoming 2012 presidential election. Currently, Congress is considering more than a dozen pieces of cybersecurity legislation and there is a growing awareness in Washington about the need for a strong national policy for dealing with emerging threats.

Cyber Defence & Network Security

Cyber Defence and Network Security 2012 is the seminal and leading conference focusing on information operations, cyber attacks, defence, exploitation, network security and information assurance. 2012 will be Defence IQ's 6th annual conference in the series making Cyber Defence and Network Security one of the most established events of its kind. All of our cyber events attract a truly international delegation with only the leading authorities and programmes on the speaker faculty.
2012 Speakers include:
- Andro Barnovi, Deputy Defence Minister, Georgia
- Mr. Christopher Painter, Coordinator for Cyber Issues, US Department of State
- Major General Jonathan Shaw, Commander, UK Cyber Policy and Plans Team, UK MoD
- Lieutenant General Rhett Hernandez, Commander, ARCYBER
- Lieutenant General Kurt Herrmann, Director NCSA, NATO
- Dr John Meakin, CISO and Director, Digital Security, BP
Held in London, 24th-27th January, Cyber Defence and Network Security, aims to discuss solutions to the following problems affecting industry, military, government and intelligence services:
- Defending networks against state sponsored cyber attacks
- Information assurance
- What security measures can be implemented to protect the Cloud
- Monitoring networks to sift out intruders
- Protecting customer records and ensuring access to systems with confidence
- Using cyber weapons as a game changing approach to warfare
- Validating and assessing networks for vulnerabilities
- Use of cyber test ranges to improve network security - And much, much more!
For further details about the conference, please download the agenda at http://www.cdans.org/redForms.aspx?id=598084&pdf_form=1 or visit the media centre at http://www.cdans.org/Event.aspx?id=598076 for complimentary articles, podcasts, and reports. Please note that complimentary passes are available to all serving Flag Officers 1 Star and above.

Anonymous: 'We hacked cybercop's email'

The Anonymous hacking collective's AntiSec group has launched a fresh assault on law enforcement agencies with the release of what they claim are personal emails stolen from a Californian cybercrime investigator.
The cache of emails – which according to AntiSec are from the account of Fred Baclagan, a retired special agent supervisor of the Californian Department of Justice – includes 30,000 emails detailing various computer forensic techniques and cybercrime investigation protocols.
The hacktivists claim to have hacked into Baclagan's Gmail account and to have accessed his voicemails and SMS message logs using unspecified techniques as part of their ongoing campaign against law enforcement officials and their "allies" in the computer security industry.
The email dump, released as a torrent last Friday in part of what has become the group's regular FuckFBIFriday release, is also said to contain personal information including Baclagan's home address and phone number.
"Possibly the most interesting content in his emails are the IACIS.com* internal email list archives (2005-2011), which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests," a member of Anonymous said on a statement accompanying the release, adding that knowledge of these techniques will help hacktivists to develop better tradecraft and anti-forensic techniques.
"There are discussions about using EnCase forensic software, attempts to crack TrueCrypt encrypted drives, sniffing wireless traffic in mobile surveillance vehicles, how to best prepare search warrants and subpoenas, and a whole lot of clueless people asking questions on how to use basic software like FTP. In the end, we rickrolled the entire IACIS list, causing the administrators to panic and shut their list and websites down.
But Baclagan told the Huffington Post that he was nobody special in the Justice Department ... which is what he would say, of course. He said that he had specialised in identity theft before he retired last year. "I'm really just a nobody," he told the Post, "just a local investigator, not involved in anything dynamic or dramatic. ®

Bootnote

*IACIS is the International Association of Computer investigative Specialists, an volunteer-led non-profit organisation made up of law enforcement pros and geared towards developing and etching best practice in computer forensics.

'Organized' hack targets AT&T wireless subscribers

Hackers used automatic scripts to target AT&T wireless subscribers in an unsuccessful attempt to steal information stored in their online accounts, company officials said.
In an email sent to targeted subscribers, AT&T warned of an “organized attempt” to break into their accounts. The advisory was sent to less than 1 per cent of the company's wireless subscribers, spokesman Mark Siegel told The Register. The company informed the users "out of an abundance of caution."
“The people in question appear to have used 'auto script' technology to determine whether AT&T telephone numbers were linked to online AT&T accounts,” company officials said in an accompanying statement.
If the script was able to isolate phone numbers that were linked to online accounts, AT&T's website may be configured in a way that puts subscriber privacy at risk. Last year, hackers obtained the email addresses of 114,000 early adopters of Apple's iPad by exploiting weaknesses in an AT&T website.
Security advisors say login mechanisms on websites should never return error messages that indicate an email address, phone number, or user name is valid. Siegel declined to elaborate on the attack or how AT&T's website responded to the attack script.
“No accounts were breached and our investigation is ongoing to determine the source or intent of the attempt to gather this information,” the statement said. ®

The top five spam subjects sullying inboxes

Security biz Websense has drawn up a list of the five most common spam subject lines.
The nuisance list, based on the subject lines of the millions of spam messages blocked by the firm every day, highlights the danger of opening attachments or clicking dodgy links. The most commonly seen subject lines fall into the one of the five categories listed below:
  1. Bogus online orders - For example, "Order N21560", although the numbers vary. These pose as Adobe CS4 licences but actually redirect to sites serving up the Blackhole exploit kit.
  2. Fake fines - "FW: Re: UNIFORM TRAFFIC TICKET (ID: 239127922)", numbers vary and subject might appear without FW: or RE:, or "Fwd: Your Flight Order N125-9487755", again numbers vary. Users are lured to click on a link, which redirects to another malicious site serving the Blackhole exploit kit.
  3. Package delivery lies- For example, "USPS Invoice copy ID46298", "FedEx: New Agent File Form, trackid: 1V6ZFZ7FEOHUQ" or "DHL Express Notification for shipment 90176712199". As before, numbers vary between different spam messages. "Fake emails pretending to be invoices or tracking emails have been around for several years and usually would have an attachment, such as a Trojan like Zeus or SpyEye," Websense reports. Malicious emails of this type are still been sent out in bulk, using attachments that are repackaged for every campaign, as a tactic designed to get around antivirus defences.
  4. Tests for working addresses - These often appear under the guise of a patch for World of Warcraft. "Unfortunately, for the criminals, the archive is corrupt and therefore harmless to the recipients," Websense reports, though other campaigns using the same subject line do appear with working malicious code attached. In other cases the subject line is used by spammers to validate email addresses as active.
  5. Payment and tax cons - For example "FRAUD ALERT for ACH", "Your Wire Transfer", "IRS requires new EIN", and "IRS Tax report". Many spam-bots spewing this type of email are misconfigured so that they automatically send out dodgy emails with an August date stamp, even though we are now reaching towards the end of November.
Websense adds that spam slurries normally follow the pattern of running for only about an hour or less before disappearing for a while, sometimes only to return with another short-lived tsunami of email crud.
Miscreants often switch between attachments and using links to malicious or compromised websites to distribute malware. Repackaging attachments so they will not be detected automatically by antivirus scanners is also commonplace. Changing the template of spam emails is also extremely commonplace.
A blogpost by Websense on spam subject lines and associated tactics, which features a rogues' gallery of dodgy emails, can be found here. ®

11/26/2011

FBI: No evidence of water system hack destroying pump

Federal officials said there's no evidence to support a report that hackers destroyed a pump used by an Illinois-based water utility after gaining unauthorized access to the computer system it used to operate its machinery.
In an email sent on Tuesday afternoon to members of the Industrial Control Systems Joint Working Group, officials with the ICS-CERT, an offshoot of the US Computer Emergency Readiness Team, said investigators from the US Department of Homeland Security and the FBI have been unable to confirm the claims, which were made in a November 10 report issued by the Illinois Statewide Terrorism and Intelligence Center, also known as the Fusion Center.
“After detailed analysis, DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system of the Curran-Gardner Public Water District in Springfield, Illinois,” the email, which carries a subject of “UPDATE - Recent Incidents Impacting Two Water Utilities,” stated.
“There is no evidence to support claims made in the initial Fusion Center report – which was based on raw, unconfirmed data and subsequently leaked to the media – that any credentials were stolen, or that the vendor was involved in any malicious activity that led to a pump failure at the water plant.”
The email went on to say the investigators “have concluded that there was no malicious or unauthorized traffic from Russia or any foreign entities, as previously reported.”
DHS representatives didn't respond to an email seeking comment.
The statement comes five days after Joe Weiss, an ICS security expert, disclosed contents of the Illinois report claiming that attackers triggered a pump failure after accessing the supervisory control and data acquisition system used by a US-based water utility. The report, he went on to say, warned that the intruders hacked into the maker of the SCADA system used by the utility and stole passwords belonging to the manufacturer's customers. If true, that would have meant that other industrial systems might have been breached by the same actors.
A day after the report, Curran-Gardner Water District Chairman Don Craver was quoted by a local ABC News affiliate as saying: “There's some indication there was a breach of some sort into a software program – the SCADA system – that allows remote access to the wells, and the pumps, and those sorts of things.” He has yet to explain his comments in light of Tuesday's statement.
Weiss said he was surprised by the competing versions of events provided in the latest report.
“If they're right, that means what in the world is the Illinois Center doing putting out a report like that that has no verification,” he told The Register. The earlier report “was straightforward. There were no caveats in there.”
The update went on to say that officials are still investigating additional claims that a second water plant in Texas was breached by someone who gained unauthorized access to systems controlling its machinery.
The entire text of Tuesday's update is:
Sent: Tuesday, November 22, 2011 2:38 PM Subject: UPDATE - Recent Incidents Impacting Two Water Utilities
Greetings:
After detailed analysis, DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system of the Curran-Gardner Public Water District in Springfield, Illinois.
There is no evidence to support claims made in the initial Fusion Center report – which was based on raw, unconfirmed data and subsequently leaked to the media – that any credentials were stolen, or that the vendor was involved in any malicious activity that led to a pump failure at the water plant.  In addition, DHS and FBI have concluded that there was no malicious or unauthorized traffic from Russia or any foreign entities, as previously reported.  Analysis of the incident is ongoing and additional relevant information will be released as it becomes available.
In a separate incident, a hacker recently claimed to have accessed an industrial control system responsible for water supply at another U.S. utility. The hacker posted a series of images allegedly obtained from the system. ICS-CERT is assisting the FBI to gather more information about this incident.
ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events. If DHS ICS-CERT identifies any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available. ICS-CERT encourages those in the industrial control systems community who suspect or detect any malicious activity against/involving control systems to contact ICS-CERT.
Regards,
ICS-CERT
E-mail: ics-cert@dhs.gov Toll Free: 1-877-776-7585 For CSSP Information and Incident Reporting: www.ics-cert.org

Thanksgiving menaced by virus-laden fake iTunes vouchers

Supposed iTunes gift certificates doing the rounds in the run-up to Thanksgiving are actually loaded with malware.
Spoofed emails purportedly offering $50 vouchers for the iTunes Store, which arrive with email subject lines such as "iTunes Gift Certificate", come with an attachment supposedly containing a certificate code. In reality, these zip file attachments are infected with the Windows PC-compatible malware, detected by Sophos as BredoZp-B and first spotted by German infosec group eleven-security*.
The scam - illustrated with screenshots and explained in more depth by net security firm Sophos here - is likely to be repeated by similar scams in the run up to Christmas, at least if previous years are anything to go by. ®

Apache developers scramble to fix proxy flaw

Apache developers are working on a fix of a flaw in its web server software that creates a possible mechanism to access internal systems.
The zero-day vulnerability only rears its ugly head if reverse proxy rules are configured incorrectly and is far from easy to exploit ... but it is nonetheless nasty. A possible patch for the vulnerability was suggested by an Apache developer from Red Hat on Wednesday but has yet to be fully tested. In the meantime, web admins would be well advised to nail down their systems.
The as-yet-unpatched bug was discovered by Prutha Parikh, a security researcher at Qualys, who came across it while in the process of researching another reverse proxy issue.
Parikh has published a detailed explanation of the flaw – alongside proof of concept code – in a post on the Qualys blog here. ®

It's the ALL NEW FUTURISTIC WEAPONS Black Friday Roundup!

It's Thanksgiving again, the time of year when denizens of our former American colonies - alas, still in a distressingly successful and prolonged state of rebellion against their rightful sovereign - like to assemble as families and fortify themselves for a punishing day of shopping by scoffing a mountain of tuck while watching men in protective equipment running into one another on TV.
Refreshed, all true Americans then head out today and splurge any cash or credit they have left (after buying all the food) in a Black Friday bargain-binge consumer orgy. This practice, like many another, has now reached our shores in a small way. In this case we at Vulture Central are minded to surf the zeitgeist and accept something of an American theme this weekend - and, as we established last year, nothing seems to us more American in spirit than a celebration of personal weapons.
We're taking no particular stance here on whether the right to bear arms is a good thing or a bad one: nor on whether guns are more dangerous to their owners or their families than to possible domestic intruders, nor on the relative dangers attendant on having guns in the home compared to having swimming pools, patio gas, powered gardening implements, members of one's beloved extended family etc. Nor are we going to get sucked into the possibly even more acrimonious debate over just what kind of gun - in particular what kind of handgun - is best in a gunfight. (The .45ACP-vs-the-rest debate has already played out at great length in our comments pages. It seems likely that we might, again, get some people doubting that any Limey journo wiener could possibly know anything of guns or weapons, so your correspondent's death-tech CV is attached at the end of this piece.)
We're choosing to see personal shooters as an American thing partly because the USA - at least according to these guys - has the highest number of privately-owned guns per head of population in the world*. Also, of the world's major powers it is the only one whose recorded history has been played out only in the era of firearms. The other big hitters - Russia, China, Japan, the heftier European nations etc - have all seen much of their histories punctuated by the clash of steel and twang of bowstrings rather than gunshots, but America went straight from stone axes to muskets. There have been no samurai swordsmen, no knights in shining armour, no apple-shooting crossbow artists, no warrior monks or legionaries or longbowmen in US or colonial history. Rather, America has had its "minute men" with their flintlocks, its sixgun-packing western pistol fighters, its cops and robbers tooled up with Tommy guns (and even full-blown machine guns, on occasion**).
This being the Reg we generally prefer a bit of a tech angle - that is, where there are no obvious Paris Hilton implications to a story - and so it is that today we are again featuring only futuristic, unusual, high-tech weapons. You'll find no everyday lead-spitters here. Needless to say, heavy ordnance which can only be used from a fixed mount or a vehicle or which requires a crew of more than one is out too: weapons which can only be deployed by large organised groups are surely for the guvmint - the very people who might seek to pry one's trusty shooting iron from one's cold dead fingers - not for proud, freedom-loving individualists fixin' to defend their remote wilderness compounds.
Thus we have once again limited ourselves to weapons suitable for individual carry, and to make it sporting we have included only those which actually exist or genuinely appear likely to shortly. Again in the interests of fair play with our readers, this year we have a completely new line-up: none of last year's hardware is back for a repeat appearance.
So, without further ado, let's get on to the weapons.

Cruel new punishment for hackers: Twitter, Facebook bans

Fraudsters and hackers could soon get slapped with social media bans as the government plans to encourage judges to dish out online punishments for online crime. The online tagging system is one of several recommendations announced today in the 2011 Cyber Security Strategy.
Intended to protect Britain and Britain's web business from the effects of cyber-crime, other plans in the report include getting spooks to warn UK consumers to update their anti-virus software on Facebook, and a focus on giving IT training to police.
Outlining the opportunities and also the dangers of the internet – particularly for UK online retail – the report advocates a programme of education and training to make everyone safer online. The government intends to leverage the cybersecurity knowledge it has in spy and intelligence central, GCHQ. It is not telling us about the other stuff it's doing as it's a secret.

Crim-slapping

Criminals who commit online crimes will be more likely to receive online sentences – as well as meatspace ones – as judges are encouraged to make use of laws that allow them to restrict or monitor the use of computers by convicted criminals outside prison. Internet fraudsters could be prevented from selling things online, the document suggests. People convicted of sexual offences, harassment or anti-social behaviour could have their internet access restricted to protect the public.
The idea will work like a cyber-version of the tags that criminals are given in the physical world. They explain:
The Ministry of Justice and the Home Office will consider and scope the development of a new way of enforcing these orders, using ‘cyber-tags’, which are triggered by the offender breaching the conditions that have been put on their internet use, and which will automatically inform the police or probation service. If the approach shows promise we will look at expanding cyber-sanctions to a wider group of offenders

Cyber-hygiene tips from the government

The document suggests that new routines of "cyber hygiene" could prevent 80 per cent of the current cyber crimes that affect businesses and the general public. And they'd like to deliver the new hygiene tips to us over social media.
"By 2015 we want a UK where [..] individuals are wary of email attachments or links from unrecognised senders," says the document. The government wants people to know that they need to update their operating systems and virus software. Specialists from GCHQ – the UK's intelligence and spy service – as well as private companies such as Microsoft and HSBC, will collaborate on the advice, which they then hope to spread to the general public via the medium of Facebook.
The report says that social media is one of the best ways to warn people about scams. One of their aims is to "help consumers respond to the cyber threats that will be the ‘new normal’ by using social media to warn people about scams or other online threats."

PC Plods get an e-makeover

And, finally, police constables will have to up their game too and get to grips with this new world of technology. Embedded "cyber-specials" will be providing training. A cross-departmental body – the new National Crime Agency (NCA) – will pool existing specialists in cybercrime and farm them out across other government departments as needed. The government plans to create a public-private cybersecurity hub leveraging the knowledge of their spooks in GCHQ for the benefit of the wider economy.
In general, the government wants to grow the number of IT security people – or the "cadre of cyber security professionals" as they like to call them – and plan to introduce a new certificate scheme to to accredit the sector and maintain standards.
Both Minister for Cyber Security Francis Maude and Prime Minister David Cameron affirmed that they were committed to the freedom of the internet and welcomed the boom it had brought to UK business. Maude said:
"The growth of the internet has revolutionised our everyday lives and promises untold economic and social opportunities in years to come. This strategy sets out how we will realise the full benefits of a networked world by building a more trusted and resilient digital environment, from protecting the public from online fraud to securing critical infrastructure against cyber attacks."

Scareware slingers stumped by Google secure search

Google made secure search the default option for logged in users last month – primarily for privacy protection reasons. But the move has had the beneficial side-effect of making life for difficult for fraudsters seeking to manipulate search engine rankings in order to promote scam sites, according to security researchers.
Users signed into Google were offered the ability to send search queries over secure (https) connections last month. This meant that search queries sent while using insecure networks, such as Wi-Fi hotspots, are no longer visible (and easily captured) by other users on the same network.
However Google also made a second (under-reported) change last month by omitting the search terms used to reach websites from the HTTP referrer header, where secure search is used. The approach means it has become harder for legitimate websites to see the search terms surfers fed through Google before reaching their website, making it harder for site to optimise or tune their content without using Google's analytics service.
But the change in the referrer header makes life proportionately much more difficult for black hat SEO operators, who commonly use link farms and other tactics in an attempt to manipulate search results so that links to scareware portals appear prominently in the search results for newsworthy searches. Surfers who stray onto these sites will be warned of non-existent security problems in a bid to coax them into paying for fake anti-virus software of little or no utility.

Black hats thwarted

Fraudsters normally set up multiple routes through to scam sites. The changes introduced by Google when it launched secure search will leave them clueless about which approaches are bringing in prospective marks and which have failed. David Sancho, a senior threat researcher at Trend Micro, explains that it is very useful for black hat SEO-promoted sites to know which search term they have successfully hijacked, information that Google's changes denies them.
"When these sites receive visits from search engine visitors, they will have no idea what search sent them there," Sancho writes. "They won’t have a clear idea which search terms work and which don’t, so they are essentially in the dark. This can have a lot of impact on the effectiveness of their poisoning activities. This is, of course, good for Google as their search lists are cleaner but it’s also good for all users because they’ll be less likely to click on bad links from Google."
Regular no-padlock HTTP searches remain unaltered. Search terms are only concealed where secure search is applied, which means surfers are already logged in to Google’s services.
"Given how many people already use Google Mail and Google+, this may not be such a big obstacle – but it still poses one," Sancho explains. "If people keep using regular no-padlock HTTP searches, they will keep disclosing their search terms and keeping things unchanged."
"The more people use HTTPS, the less information we’re giving the bad guys ... one more reason to use secure connections to do your web searching," he concludes.
Google introduced encrypted search last year but changes that came in last month that make it a default option for logged-in users will inevitably mean that it becomes more widely used, rather than the preserve of security-aware users who are unlikely to fall victim to scareware scams in the first place. ®

patching a day after

Microsoft has released an emergency security update for a broad swath of its users that patches a critical security hole that is already being exploited in the wild.

The vulnerability - which has been subjected to "limited, targeted attacks" - could allow miscreants to create wormable exploits that remotely execute malicious code on vulnerable machines, Microsoft said. No interaction is required from the end user. It was the first patch released outside Microsoft's regular update cycle in 18 months.
A day after Microsoft released an emergency patch for a critical flaw that could allow self-replicating attacks, researchers have identified a nasty trojan that attempts to exploit the vulnerability.
Source : http://www.theregister.co.uk/2008/10/24/trojan_exploits_wormable_microsoft_flaw/