pritha's Posts (627)

Sort by

AppSec Awareness: A Blueprint for Security Culture Change

How does an individual change the application security culture of an organization? By deploying an application security awareness program with engaging content, humor and recognition. See the blueprint for how you can build an application security awareness program based on real life experience. Change the security DNA of everyone in your organization.

Speakers

Christopher Romeo (@edgeroute)

Chris Romeo is the Founder and Principal Consultant at Security Journey. He was the Chief Security Advocate at Cisco Systems for five years, where he guided Cisco’s Secure Development Lifecycle (CSDL), empowering engineers to “build security in” to all products at Cisco. He led the creation of Cisco’s internal, end-to-end application security awareness program launched in 2012, which continues to impact more than 20,000 employees. Romeo has 20 years of experience in security, holding positions across application security, penetration testing, and incident response. Romeo is a sought after conference speaker, with experience speaking at the RSA Conference, ISC2 Security Congress, AppSec USA, and many others. Romeo holds the CISSP and CSSLP certifications.

Detailed Presentation

(Source: RSA USA 2016, San Francisco)

8669803085?profile=original
Read more…

People-Centric Security: Transform Culture, Reduce Risk, Drive Success

This session links security culture and program performance, providing tools and guidance that will enable attendees to measure, manage and transform their own organizations’ security culture. Cases studies will be reviewed, and attendees will receive access to proven models, frameworks and tools for measurably improving the cultural maturity and behavioral reliability of their security program.

Speaker

Lance Hayden@hay_lance ); Masha Sedova@modMasha )

Dr. Lance Hayden is a Managing Director at the Berkeley Research Group, an international strategy and consulting firm. Hayden’s security career spans 25 years across the public, private and academic sectors. His interest in human security behaviors and culture began as a HUMINT operations officer with the CIA, and he has held positions at KPMG, FedEx and Cisco. Hayden provides expert advice and guidance on information security strategy, measurement and culture to companies and governments around the globe. He is the author of “People-Centric Security: Transforming Your Enterprise Security Culture” from McGraw-Hill. Hayden received his Ph.D. from the University of Texas, where he teaches courses on security, privacy and identity.

Masha Sedova is the Senior Director of Trust Engagement at Salesforce. She has built a team that drives a secure mindset amongst all employees using user security behavior testing and data analytics paired with elements of gamification and positive psychology. The scope of her work runs the gambit of general awareness such as phishing and reporting activity to secure engineering practices by developers and engineers. She and her team have built security simulations, MOOCs, company-wide competitions and custom lab environments to drive effective learning of vital security behaviors. Her efforts have culminated in a security program that is altering the way Salesforce’s employees, customers, partners and large corporations approach security.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803085?profile=original

Read more…

Securing the “Weakest Link”

Securing the “Weakest Link”

Security professionals often call people “the weakest link.” We claim that they'll always make mistakes, however hard we try, and throw up our hands. But the simple truth is that we can help people do well at a wide variety of security tasks, and it’s easy to get started. Building on work in usable security and threat modeling, this session will give you actionable, proven ways to secure people.

Speaker

Adam Shostack@adamshostack )

Adam Shostack is a technologist, entrepreneur, author and game designer. He’s a member of the BlackHat Review Board, and helped found the CVE and many other things. He’s currently building his fifth startup, focused on improving security effectiveness. Previously, at Microsoft, he drove the Autorun fix into Windows Update, was the lead designer of the SDL Threat Modeling Tool v3 and created the “Elevation of Privilege” game. Shostack is the author of “Threat Modeling: Designing for Security,” and the co-author of “The New School of Information Security.” For more on Shostack, see adam.shostack.org. 

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803288?profile=original

Read more…

Using Behavioral Psychology and Science of Habit to Change User Behavior

Why is it so hard to make users adopt security best practices? The answer lies in human psychology. In this talk the speaker shall explain the “Habit Cycle” and why habits are beyond the control of the conscious mind. The speaker shall deconstruct how habits are formed and the science behind the process. Why is it impossible to change habits? How can you replace old habits with new ones?

Speaker

Bikash Barai ( @bikashbarai1 )

Co-Founder, Cigital India

Bikash Barai is the Co-founder iViZ (acquired by Cigital) – an IDG Ventures funded company. Barai has done double B.Tech and master’s from Indian Institute of Technology (IIT), Kharagpur in computer science (Hons) as well as architecture. He is passionate about artificial intelligence, cognitive hacking and attack simulation. He is credited for several innovations in the domain of IT Security and has multiple patents in USPTO under his name. Barai has received recognition from organizations like UC Berkeley, Intel, Nasscom, Red Herring, TiE, Fortune 40-under-40 in India, etc. Barai actively pursues painting and magic and has spoken at various forums like the University of California, Berkeley, Nasscom, DSCI, CISO Platform, NUS Singapore, TiE, TEDx IIM, TEDx IIT, etc.

Full Video

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803085?profile=original

Read more…

Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?

Cyber-exercises can be used to hone skills, build teams and practice procedures. With several different types of exercises available, which is the right type to achieve your objectives? Which is the right kind for the participants’ skill levels? Cyber-exercise expert Dr. Joe Adams explains the different types of existing exercises, how to create scenarios and how to get results from each event.

Speaker

William Adams ( @meritnetwork )

Dr. Joe Adams is the Vice President for Research and Cyber Security at Merit Network, Inc. He is currently the Director of the Michigan Cyber Range. He retired from the U.S. Army as a Colonel where he taught cybersecurity at the U.S. Military Academy (USMA) as an Associate Professor and was the Chief Information Officer of the National Defense University. Merit Network Inc., a nonprofit corporation owned and governed by Michigan's public universities, operates America’s longest-running regional research and education network. The Michigan Cyber Range is operated by Merit in partnership with the State of Michigan and with the sponsorship of Consumers Energy and DTE Energy. It prepares cybersecurity professionals to detect, prevent and mitigate cyberattacks in a real-world setting.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803288?profile=original

Read more…

The Art of Hacking a Human

The Art of Hacking a Human

This session will review security techniques on how to navigate different personalities using traditional hacking techniques. Determine what “operating system” they are running. What patches are in place? What vulnerabilities can you exploit? What configuration issues does this person have? Your results based off the hack will help you work with the different personalities revealed.

Speaker

Zee Abdelnabi ( @infosec_17 )

In-Vehicle Security Engineer, Major Automotive Company
A dedicated security analyst with comprehensive data and telecommunications experience, Zee Abdelnabi is experienced in SIEM, vulnerability management, security testing and compliance, with expertise in data network security analysis and wireless security. Abdelnabi is technically savvy and adept at solving networking, electronics and computer technology problems. She is effective at training technical and non-technical personnel.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803085?profile=original

Read more…

Proactive Measures to Mitigate Insider Threat

Proactive Measures to Mitigate Insider Threat

The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access are often in conflict. This presentation will walk through several real-world insider threat cases and discuss proactive measures that could have greatly mitigated the damage and losses.

Speaker

Andrew Case (@attrc)

Director of Research, Volexity

Andrew Case is an incident response handler and malware analyst. He has conducted numerous large-scale investigations that span enterprises and industries. Case’s previous experience includes penetration tests, source code audits, and binary analysis. Case is the co-developer of Registry Decoder, a NIJ funded forensics application, as well as a developer of the Volatility memory analysis framework. He is a co-author of the highly popular and technical forensics analysis book “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory.” Case has presented at conferences, including RSA, Black Hat, SOURCE, BSides, DFRWS, SecTor and OMFW. In 2013, Case was voted Digital Forensics Investigator of the Year by his peers within the forensics community.

Detailed Presentation

(Source: RSA USA 2016, San Francisco)

8669803288?profile=original

Read more…

Building an Android Scale Incident Response Process

The Android ecosystem has over one billion active devices from hundreds of OEMs and carrier networks. The Android Security Team will explain how the ecosystem is able to respond quickly and effectively to security incidents. This will be part historical analysis of actual incidents, such as the Stagefright vulnerabilities, and part data-focused analysis of technology and processes we developed.

Speaker

Adrian Ludwig

Adrian Ludwig is the Lead Engineer for Android security at Google. In this role, he is responsible for the security of the Android platform and Google’s applications and services for Android. Prior to joining Google, Ludwig held technical leadership positions at Joyent, Adobe, Macromedia, @stake and the Department of Defense. Ludwig has a B.A. in mathematics from Williams College and an MBA from the University of California, Berkeley.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware

This session will cover two key trends in mobile malware observed over the past 12 months and explore the evolution in fraud-linked mobile malware where criminals are developing credential theft tools that attempt to duplicate the successes of Windows malware in modifying victim interactions with targeted services. Also a look at mobile ransomware variants becoming more numerous and damaging.

Speaker

John Miller 

John Miller leads iSIGHT Partners’ ThreatScape Cyber Crime product, which provides actionable intelligence on financially motivated cyberthreat activity. In this role, Miller directs analysis on topics such as credential theft malware, payment card abuse, ransomware, money laundering and mobile device threats; this analytical work draws from the expertise of iSIGHT Partners’ globally-distributed researcher network. Prior to managing this product, Miller worked in threat intelligence analyst roles focused on multiple others issues, such as distributed denial-of-service (DDoS) threats and South America-based malicious activity.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

Finding Triggered Malice in Android Apps

Finding Triggered Malice in Android Apps

Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger is the mechanism that ensures that the code is only executed at the target. This talk will review how static analysis can be used to detect and leverage triggers for more robust detection.

Speaker

Christopher Kruegel (http://twitter.com/lastlinelabs","@lastlinelabs";)">@lastlinelabs)

Currently on leave from his position as Professor of Computer Science at UC Santa Barbara, Christopher Kruegel’s research interests focus on computer and communications security, with an emphasis on malware analysis and detection, web security and intrusion detection. Kruegel previously served on the faculty of the Technical University Vienna, Austria. He has published more than 100 peer-reviewed papers in top computer security conferences and has been the recipient of the NSF CAREER Award, MIT Technology Review TR35 Award for young innovators, IBM Faculty Award and several best paper awards. He regularly serves on program committees of leading computer security conferences and speaks at industry events such as Black Hat and RSAC.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

How to Analyze an Android Bot

How to Analyze an Android Bot

This presentation will demonstrate a complete end-to-end analysis of an Android bot. This will include the decompilation and static analysis of bot code and the dynamic analysis of the bot’s behavior in a controlled sandboxed environment. The session will provide details of the lab environment and tools used for the analysis.

Speaker

Kevin McNamee (http://twitter.com/KevMcNamee","@KevMcNamee";)">@KevMcNamee)

Kevin McNamee is Director of Alcatel-Lucent’s Motive Security Labs and is responsible for the security research team that supports the ALU’s cloud based malware detection system. Previously he was Director of Security Research at Alcatel-Lucent’s Bell Labs specializing in the analysis of malware propagation and detection. He has recently presented at BlackHat, RSA, (ISC)2 and SECTOR.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

The State of End-User Security—Global Data from 30,000+ Websites

We live in a rapidly changing environment. Mobile commerce is skyrocketing, browsers/OS are changing, web applications enable increasing functionality—yet the only thing that seems constant is the amount of flaws and vulnerabilities we find in these software components. Using data from more than 30,000 websites, this session will explore the state of security ecosystem and myths and assumptions.

Speaker

Andreas Baumhof (http://twitter.com/abaumhof","@abaumhof";)">@abaumhof)

Andreas Baumhof, Chief Technology Officer, ThreatMetrix, is an internationally renowned cybersecurity thought leader and expert with deep experience in the encryption, PKI, malware and phishing markets. Prior to ThreatMetrix, Baumhof was an Executive Director, CEO and Co-founder of Australian-based TrustDefender, a leading provider of security and fraud detection technologies. Baumhof previously served as Co-founder and Chief Technology Officer of Microdasys Inc., a leading provider of deep content security solutions. While there, he developed the first SSL proxy and has patents pending in Europe and the U.S. Baumhof holds a degree in mathematics and computer science from the University of Munich, Germany.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

Android Serialization Vulnerabilities Revisited

Android Serialization Vulnerabilities Revisited

This session is about Android Serialization vulnerabilities. We revisit two vulns found in Android (CVE-2014-7911, CVE-2015-3837) which allowed for privilege escalation. We also present vulns found in third-party SDKs (CVE-2015-2000/1/2/3/4/20) which allowed for arbitrary code execution in apps which used them. But what has been done to prevent similar vulns? The session will answer this question.

Speaker

Rose Hay (http://twitter.com/roeehay","@roeehay";)">@roeehay)

X-Force Application Security Research Team Lead, IBM

Roee Hay leads the X-Force Application Security Research Team in IBM Security. His team focuses on discovering new vulnerabilities and has published dozens of papers or advisories in the past, including several ones in Android.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

Hacking Exposed: The Mac Attack

Hacking Exposed: The Mac Attack

Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically seen in enterprise intrusions. We will also cover practical counter measures to make these alternate platforms more resilient.

Speaker

Dmitri Alpxrovitch (http://twitter.com/DAlperovitch","@DAlperovitch";)">@DAlperovitch); George Kurtz (http://twitter.com/George_Kurtz","@George_Kurtz";)">@George_Kurtz)

Dmitri Alperovitch is the Co-founder and CTO of CrowdStrike Inc., leading its Intelligence, Technology and CrowdStrike Labs teams. A renowned computer security researcher, he is a thought-leader on cybersecurity policies and state tradecraft. Prior to founding CrowdStrike, Alperovitch was a Vice President of Threat Research at McAfee, where he led the company’s global Internet threat intelligence analysis and investigations. In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions and gave those incidents their names.

George Kurtz, President/CEO and Co-founder of CrowdStrike, former CEO/Founder, Foundstone, and former Executive Vice President and worldwide CTO of McAfee, is an internationally recognized security expert, author and entrepreneur. Kurtz holds a B.S. degree from Seton Hall University. He also holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified Public Accountant (CPA). Kurtz also authored the best-selling security book of all time, Hacking Exposed: Network Security Secrets & Solutions.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device

Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciously hacked. In this session learn more about how to successfully secure these medical devices, based on work being conducted at the National Cybersecurity Center of Excellence (NCCoE) with premier health care organizations.

Speaker

Nathan Lesser (@natelsr)

Nathan Lesser, Deputy Director of the National Cybersecurity Center of Excellence (NCCoE) at NIST, has over 15 years of experience in technical and leadership roles. Nate oversees the NCCoE’s engineering initiative and is responsible for cultivating collaboration across government, business, and technology companies to address cybersecurity issues within and across industry sectors. Previously, Nate led a team of cybersecurity engineers at Booz Allen Hamilton, served in the Office of Management and Budget, and the Senate’s Homeland Security and Governmental Affairs Committee. Nate holds bachelor’s and master’s degrees in electrical engineering from Columbia University, and is currently a Senior Fellow at the George Washington University Center for Cyber and Homeland Security.

Detailed Presentation

(Source: RSA USA 2016-San Francisco)

8669803471?profile=original

Read more…

8669807279?profile=original

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. 

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!

Index

(Click on the sections below to go directly to their details)

8669805263?profile=original

image courtesy: https://www.flickr.com/photos/lupuca/8720604364

1) Top 8 'Security Awareness & Human Element' talks from RSA USA 2016, San Francisco

Security Awareness remains the human part of security, largely contributing to security compromises. Here are some selected talks that delve into the various aspects and behaviours that could help us be save our near and dear ones.


Go Back To The Index

8669806685?profile=original

2) Top 15 'Hacking & Attack Technique' talks from RSA USA 2016, San Francisco

The hacks are getting more sophisticated every day. Here we have selected the top hacking trends and techniques from RSA. It covers hacks from IOTs to Drones, everything has a hack.


Go Back To The Index

8669807677?profile=original

3) Top 8 'Mobile Security' talks from RSA USA 2016, San Francisco

Here are some great talks from 'Mobile Security'. It covers the latest OS hacks and vulnerabilities along with the business side of it. Particular interest is drawn by the Incident Response Process Building.


Go Back To The Index

8669807483?profile=original

4) Top 6 'Cloud Security' talks from RSA USA 2016, San Francisco

With all infrastructure, services everything going cloud and becoming more affordable, this is a major section for security. Viability of cloud solutions are gauged here. Our Cloud Partners association as well as our data on the cloud may have some special needs. Below selected slides will help you identify those.

  • Aspirin as a Service: Using the Cloud to Cure Security Headaches
  • Cloud Security Essentials 2.0 Full Stack Hacking & Recovery
  • Security Program Development for the Hipster Company
  • Designing Virtual Network Security Architectures
  • Cloud Breach – Preparation and Response
  • Take It to the Cloud: The Evolution of Security Architecture


Go Back To The Index

8669802465?profile=original

5) Top 10 'Incident Response & SIEM' talks from RSA USA 2016, San Francisco

A Quick Incident Response is still one of the savers in many ways. That is where our Red Teaming efforts go into. Here are some great talks from RSA which can help you build,monitor and execute your incident response efforts. The studies will help you optimise your program if already there or build it.

  • The Incident Response Playbook for Android and iOS
  • Demystifying Security Analytics: Data, Methods, Use Cases
  • The Rise of the Purple Team
  • Building a World-Class Proactive Integrated Security and Network Ops Center
  • Make IR Effective with Risk Evaluation and Reporting
  • Data Breach Litigation How To Avoid and Be Better Prepared
  • Cloud Breach – Preparation and Response
  • Preserving the Privilege during Breach Response
  • Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
  • Data Science Transforming Security Operations


Go Back To The Index

8669808064?profile=original

image courtesy: https://www.flickr.com/photos/purpleslog/2870445260

6) Top 10 'CISO' talks from RSA USA 2016, San Francisco

Chief Information Security Officers remain responsible for the safeguard of the digital data, assets etc. Here are some talks specifically for the CISO role of operation. We thought this could be very helpful.

  • Super CISO 2020: How to Keep Your Job
  • How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
  • Security Program Development for the Hipster Company
  • Partnership with a CFO: On the Front Line of Cybersecurity
  • The Measure of Success: Security Metrics to Tell Your Story
  • From Cave Man to Business Man, the Evolution of the CISO to CIRO
  • Understanding the Security Vendor Landscape Using the Cyber Defense Matrix
  • Vendor Security Practices: Turn the Rocks Over Early and Often
  • Adjusting Your Security Controls: It’s the New Normal
  • Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards


Go Back To The Index

8669808085?profile=original

7) Top 5 'GRC' talks from RSA USA 2016, San Francisco

Governance, Risk & Compliance remain an intrigued area from our members, where a unified GRC program is still a challenge. Below presentations give you some metrics which can help a smooth communication. Integration with Threat Intelligence and Risk Metrics particularly draw some attention.

  • Bridging the Gap Between Threat Intelligence and Risk Management
  • The Newest Element of Risk Metrics: Social Media
  • Building an Effective Supply Chain Security Program
  • Integrating Cybersecurity into Supply Chain Risk Management
  • The Measure of Success:Security Metrics to Tell Your Story


Go Back To The Index

8669808271?profile=original

8) Top 3 'Threat Intelligence' talks from RSA USA 2016, San Francisco

Threat Intelligence seems to be under the adoption hood, it's adoption still being speculated carefully. Here are some presentations that can help you decide.

  • Dreaming of IoCs Adding Time Context to Threat Intelligence
  • STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
  • IOCs Are Dead—Long Live IOCs!
  • Bridging the Gap Between Threat Intelligence and Risk Management


Go Back To The Index

8669808873?profile=original

9) Top 7 'Software/Application Security & DevOps' talks from
RSA USA 2016, San Francisco

Security needs to be built in. The traditional models don't incorporate this, resulting in later stage security integration which is late and expensive. Here are some great talks which will help you build a program for your organisation. It covers the agile structure, embedded systems and fundamentals from 'Why Security'.

  • Embedded Systems Security: Building a More Secure Device
  • Introducing a Security Program to Large Scale Legacy Products
  • Agile Security—Field of Dreams
  • Open-Source Security Management and Vulnerability Impact Assessment
  • DevSecOps in Baby Steps
  • Estimating Development Security Maturity in About an Hour
  • Understanding the “Why” in Enterprise Application Security Strategy


Go Back To The Index

8669809094?profile=original

10) Top 14 'Emerging Areas In Security Technology' talks from RSA USA 2016, San Francisco

Great talks and conferences also give us an advantage of identifying areas of security trends. Here we have put together all the Emerging Security Technology Trends presentations in one place for you.

  • Transforming Security: Containers, Virtualization and Softwarization
  • Embedded Systems Security: Building a More Secure Device
  • Bring Your Own Internet of Things: BYO‐IoT
  • DevSecOps in Baby Steps
  • Lattice Cryptography
  • Hardware Attacks and Security
  • Integrating Cybersecurity into Supply Chain Risk Management
  • Braking the Connected Car: The Future of Vehicle Vulnerabilities
  • Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
  • A New Security Paradigm for IoT (Internet of Threats)
  • What Is Next-Generation Endpoint Security and Why Do You Need It?
  • Attacks on Critical Infrastructure: Insights from the “Big Board”
  • Security Advantages of Software-Defined Networking
  • Smart Megalopolises. How Safe and Reliable Is Your Data?


Go Back To The Index

8669804295?profile=original

11) Top 3 'Information Security Trends' from RSA USA 2016, San Francisco

The following takes you through the Information Security Trends. Here are the great presentations we found for you at the conference.

  • State of Cybersecurity: 2016 Findings and Implications
  • The Seven Most Dangerous New Attack Techniques, and What's Coming Next
  • Introduction and a Look at Security Trends


Go Back To The Index

8669810084?profile=original

12) Top 6 Blogs On IAM,Artificial Intelligence,datasecurity,crypto & Others

This section has some interesting topics like Artificial Intelligence, IAM etc. Moreno, the talks are innovative and out of the box. You will find this section to be an amazing talk section.

  • DON'T Use Two-Factor Authentication...Unless You Need It!
  • Rise of the Hacking Machines
  • Intelligent Application Security
  • Applying Auto-Data Classification Techniques for Large Data Sets
  • Realities of Data Security
  • Crypto 101: Encryption, Codebreaking, SSL and Bitcoin 
  • NSTAC Report to the President on the Internet of Things

Go Back To The Index

8669810455?profile=original

13) 10 Most Innovative Information Security Companies at RSA USA 2016, San FranciscoInnovative Companies

In keeping with the latest happenings in Information security, this article is on the 10 finalists of RSA innovation sandbox contest held at the RSA Security conference, the world's leading Information security conference.


Go Back To The Index

Read more…

8669803072?profile=original

Facebook Fixes Major 'Brute Force' Bug - 9th Mar

Bangalore-based Anand Prakash discovered a serious flaw on the developer sites beta.facebook.com and mbasic.beta.facebook.com. On the regular Facebook site, the limit is set to 10-12 invalid attempts, but on these beta sites there was none, and it’s mean, could launch a brute force attack to crack the code and gain entry to a user’s account. The issue was reported to Facebook in late February via the regular channels and fixed the next day, with a $15,000 reward sent out just eight days later.

Intel buys a 360-degree sports video replay specialis- 9th Mar

Intel announced in a company blog post that it has purchased Israeli company Replay Technologies. The company provides an unusual 3D video rendering capability it calls “free dimensional” or freeD™ video, according to Intel. The system can freeze action from any angle then rotate all around it, much like the bullet-time effect used in the Matrix. it’s compute-intensive and the system takes a bunch of servers running Intel chips to make it work. In fact, to make the 3D broadcasting magic happen at the NBA, Replay created a seamless 3-D video rendering of the court using 28 ultrahigh-definition cameras positioned around the arena and connected to Intel-based servers, a lot of Intel servers.

Red Hat Linux to run on Qualcomm server chips- 9th Mar

Qualcomm is working with Red Hat to port a version of the Enterprise Linux Server for ARM Development Preview. Servers based on ARM-architecture, though, are almost nonexistent commercially. Now, a full port of the Red Hat OS will allow developers to write applications for Qualcomm's server chips. The Enterprise Linux Server port will have drivers and firmware to comply with Qualcomm's server chip specifications as well as ARM's Server Base System Architecture (SBSA) and SBSA is a specification for standardized hardware features across all ARM server chips.

Microsoft's new Dynamics ERP suite is on Azure - 9th Mar

Microsoft has released the next version of its Dynamics AX enterprise resource planning software, giving companies a path to running more of their businesses in the cloud. It’s all run through a browser-based portal, so people can access it wheresver they are, and on any sort of device, whether that’s a desktop PC, a smartphone or something in between. Dynamics AX also connects with Microsoft’s Power BI to do data visualization, which means users can get an easy, at-a-glance look at key business metrics, and implement custom visualizations for understanding data apart from this Dynamics AX joins Microsoft's other cloud-based business applications, including Power BI, Office 365 and Dynamics CRM Online, which are all aimed at letting businesses get away from running on-premises applications and focus on using Microsoft's cloud.

EFF Releases Millionth Free HTTPS Cert - 8th Mar

Electronic Frontier Foundation (EFF) has announced the release of its millionth free HTTPS certificate as part of the company’s ‘Let's Encrypt Certificate Authority’ concept. Last year EFF, who co-founded Let's Encrypt CA with Mozilla and researchers from the University of Michigan, made public its aim of building a more secure future for the World Wide Web. This began with issuing and managing free certificates for any website that needs them, aiding in the transition from HTTP to the more secure HTTPS protocol on the web.

New OS X Ransomware Delivered via BitTorrent Client - 8th Mar

A piece of ransomware designed to target OS X systems has been delivered to users via the official installer for the Bit Torrent client Transmission. There are two installers for Transmission 2.90 contained a new piece of OS X malware that they have dubbed KeRanger and which they believe is the first fully functional ransomware targeting OS X. The ransomware can bypass Apple’s Gatekeeper protection system because the malicious Transmission versions are signed with a valid app development certificate issued by Apple. Once it infects a system, KeRanger looks for 300 different file types — including documents, images, multimedia files, archives, source code, emails, certificates and databases — and encrypts them using the AES specification.

Google Open Sources Vendor Security Assessment Framework - 8th Mar

Google announced on Monday that it has decided to open source its Vendor Security Assessment Questionnaire (VSAQ) framework to help companies improve their security programs. The VSAQ framework released by Google as open source includes four questionnaire templates for web app security, security and privacy programs, physical and data center security, and infrastructure security. These base templates can be modified to include questions specific to the company using the VSAQ. The decision to release VSAQ as open source comes after some of the vendors who completed the questionnaires expressed interest in using them to assess their own suppliers.

Google Patches Critical Vulnerabilities in Android - 8th Mar

Google has patched another series of Critical vulnerabilities in Android, including a remote code execution (RCE) flaw in mediaserver and several elevations of privilege (EoP) issues in various drivers and components. The 16 security patches for 19 vulnerabilities in this month’s Nexus Security Bulletin, which is the eighth monthly update coming from the company since the Stagefright flaw was discovered in July last year to affect nearly 1 billion devices. Those Security Bulletin reveals that seven of these vulnerabilities were rated Critical, ten were rated High, and two Moderate. While many of these flaws were EoP issues, Google also resolved information disclosure bugs in the mobile OS, along with a mitigation bypass vulnerability, and a remote denial of service flaw.

IRS Suspends Identity Protection PIN Tool Over Security Concerns - 8th Mar

The IP PIN tool hosted on irs.gov allows taxpayers to generate or recover a six-digit number that provides an extra layer of protection aginast fraudulent tax returns. But the Internal Revenue Service (IRS) announced on Monday that it has temporarily suspended its Identity Protection (IP) PIN tool while it further strengthens its security. The problem, is that the IP PIN can be easily obtained by answering four knowledge-based authentication (KBA) questions from Equifax. The answers to these questions can often be found on free online services, allowing fraudsters to easily get the PINs they need to file tax returns on behalf of victims.

Adobe Patches Flaws in Acrobat, Reader, Digital Editions - 8th Mar

Adobe released updates on Tuesday for its Acrobat, Reader and Digital Editions products to address several critical vulnerabilities that can lead to code execution. The release of Acrobat and Reader versions 15.010.20060, 15.006.30121 and 11.0.15 for Windows and Mac, Adobe resolved three flaws, including a couple of memory corruption issues (CVE-2016-1007, CVE-2016-1009) and a directory search path bug (CVE-2016-1008) — all of which can be exploited to execute arbitrary code. The company updated the Windows, Mac, Android and iOS versions to 4.5.1 in order to fix a critical memory corruption vulnerability that could lead to code execution.

Strange bug sending undeletable ghost mails from 1969-70 to iPhone users - 8th Mar

Apple’s iOS operating system for iPhones and iPads is no stranger to eerie bug’s .a bug which causes users to receive ghost emails from 1969 and 1970 that cannot be deleted. the issue probably stems from the way iOS handles UNIX time, or Epoch time as it’s also called. In UNIX time, January 1, 1970, at midnight, is the starting time when counting started. From the looks of it, this bug looks the extension of the earlier infamous ‘January 1, 1970’ bug which can brick some devices. The Jan 1, 1970 has been fixed by Apple in the forthcoming iOS 9.3 software update. But Apple has so far not commented on the bug.

Toyota Develops Wearable Mobility Device For The Blind - 8th Mar

Project BLAID is a wearable device dedicated to helping blind and visually impaired people navigate via a device worn around the shoulders. Users will be able to interact with the device by means of voice recognition and buttons. The device itself is equipped with cameras that detect the user's surroundings and communicate information to the individual via speakers and vibration motors and Toyota also plans to eventually integrate mapping, object identification, and facial recognition technologies.

Microsoft Opens SQL Server To Linux Users - 8th Mar

Microsoft announced plans to port its SQL Server software onto Linux. Microsoft, this move aims to give it a competitive edge against its database rivals like Oracle and IBM's DB2, and to boost the market for its SQL Server by a large margin. The research firm also noted that mainstream commercial distributors like Red Hat Enterprise Linux and SUSE Linux Enterprise Server will likely be supported before the formal product release in mid-2017. The main goal of this strategy is to serve as an on-ramp to bring these folks onto Microsoft's Azure cloud. Azure has the capability to work with both Linux and Windows servers, so having a SQL Server stack that can sit on top of either one may make it more attractive to customers shopping for cloud services.

U.S. military spending millions to make cyborgs a reality - 7th Mar

The U.S. military is spending millions on an advanced implant that would allow a human brain to communicate directly with computers. The Defense Advanced Research Projects Agency (DARPA), hopes the implant will allow humans to directly interface with computers, which could benefit people with aural and visual disabilities, such as veterans injured in combat. The implantable device aims to convert neurons in the brain into electronic signals and provide unprecedented data-transfer bandwidth between the human brain and the digital world and In January, DARPA announced it plans to spend up to $62 million on the project, which is part of its Neural Engineering System Design program.

Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials - 4th Mar

Researchers with Dell SecureWorks here this week released an open-source homegrown tool that detects when attackers attempt to steal Windows Active Directory domain administrator credentials. DCEPT (Domain Controller Enticing Password Tripwire) tool is basically a deception-style “honeytoken” approach to catch the bad guys in the act of scraping domain credentials. It places phony credentials on the network as a lure. So if an attacker tries to pull cached credentials from a server, DCEPT detects the activity and then alerts a SIEM or other monitoring mechanism. DCEPT comes as a Docker container build for its server component. It alo decrypts Kerberos pre-authentication packets and inspects them to see if they were the fake passwords being used in the network

Built-in PDF Reader in Windows can leak Edge Browser users data - 4th Mar

The Windows Runtime (WinRT) PDF Renderer library, or just WinRT PDF, is one of the powerful components built into the recent releases of Windows OS that allows the developers to integrate PDF viewing functionality in their own apps. However, it has been discovered that WinRT PDF, the default PDF reader for Windows 10, leaves Edge users susceptible to a new series of attacks that are amazingly similar to how Flash, Java, and Acrobat have exposed Web users in the past few years. security researcher with IBM’s X-Force Advanced Research team said that since Microsoft Edge uses WinRT PDF as its default reader, any PDF embedded in the web page will be opened within the library. This makes room for the attackers to abuse the vulnerability via a PDF file. They can open a PDF secretly off-screen with help of CSS and execute the malicious code.

Google AI Can Spot Image Location With 'Superhuman' Accuracy - 2nd Mar

The Google's convolutional neural network called PlaNet that can identify where photos were taken based on the pixels in the image. PlaNet doesn't rely directly on image metadata, which often includes geolocation information. Rather, it calculates likely locations from the massive set of geocoded images used to train it (490 million Google+ images) and to test it (126 million Google+ images). And also Emphasizing on artificial intelligence, Google CEO Sundar Pichai said, "Machine learning is a core, transformative way by which we're rethinking everything we're doing."

Scientists Discover Matrix-like Technique To ‘Upload Knowledge To Your Brain’- 2nd Mar

Scientists have discovered that feeding knowledge directly into the brain could be as easy as going to sleep. This was made possible at HRL laboratories based in California where researchers claimed a 33 percent improved learning. It seems, soon the Matrix-movie like realities could be a possibility. Researchers working on this claim to have developed a simulator which can feed information directly into a person’s brain. Once the information is fed, that can be used to teach a person new skills in a shorter amount of time.

Chinese Threat Intel Start-up Finds DarkHotel Exploiting Chinese Telecom-1st Mar

According to researchers at Beijing-based threat intelligence start-up ThreatBook that the DarkHotel threat group is targeting executives at telecommunications companies in North Korea and China. The group is using spearphishing messages with malicious documents attached -- specifically, a crafted SWF file embedded as a downloadable link in a Word document & the SWF file exploits Adobe Flash vulnerability CVE-2015-8651 and also the payload, update.exe, is a Trojan downloader, disguised as a component of OpenSSL to compromise a variety of anti-detection measures, including anti-sandbox, and anti-anti-virus, as well as just-in-time decryption.

Google Launches Gmail Security Enhancements For Business Users-1st Mar

Google's data loss prevention system for Gmail can now recognize text in images to block sensitive information from passing through corporate communication channels. Gmail DLP has been enhanced with optical character recognition (OCR) technology, which cans identity alphanumeric characters in image files as per Google announced. OCR will allow Google for Work administrators to analyze common image file types that accompany Gmail messages and extract any text pictured within for compliance with content rules. Non-compliant content can be blocked, before any damage is done, or reviewed.

Read more…

Taking Control Of Shadow IT

Your organization is already moving to the cloud; the question is, are you going to blindly follow the movement or will you lead the charge? Your IT security team needs the right tools to gain visibility and understanding into your employees’ use of cloud applications, both sanctioned and “shadow IT.”You can take back control and enable employees to use the cloud application.

Why Read This Report?

  • Gain visibility into mobile and overall cloud usage with your enterprise
  • Identify and understand risk ratings of cloud applications
  • Measure improvements in approved and “shadow IT” usage of cloud applications
  • Establish controls for cloud access and policy enforcement

>>Download the Complete Report

Read more…

8669803072?profile=original

Glibc Flaw Affects Thousands Of Linux Apps But How Dangerous Is It? -17 Feb

Researchers at Google and Red Hat disclosed the vulnerability in glibc on Tuesday. They described the issue as a critical buffer overflow vulnerability which, when exploited, could give an attacker complete remote control of systems running the affected software. The vulnerability affects all version of the GNU C Library, commonly known as glibc that UNIX systems rely on to run. The flaw itself is present in the glibc DNS client side resolver and is triggered when a particular library function called getaddrinfo() is used.

Spear Phishing Incident Average Cost is $1.6M -16 Feb

Spear phishing has become an endemic scourge: 95% of US and 83% of UK respondents in a recent Cloudmark survey said that they have experienced spear phishing attacks (91% combined). Of those Spear Phishing attacks over the last 12 months, 81% suffered some negative impact as a result, with an average financial cost of $1.6 million—and some losses in the tens of millions of dollars.

Fake Netflix Apps Deliver Banking Trojans -11 Feb

According to Symantec researchers, Netflix users are targeted by a new malware campaign that advertises itself as a cheaper method of accessing and watching movies on Netflix. These malware on ads that redirect interested users to a direct download website from where they get the malicious files themselves. These files are spiked with a malware family named Infostealer.Banload, a known banking trojan that steals credentials for various online banking portals.

Android Malware Spread To Generate Fake Ad Revenue -16 Feb

Researchers have spotted a new type of mobile malware that roots Android devices with the purpose of generating fraudulent ad revenue for its operator. HummingBad is a complex root kit whose components are encrypted, in an attempt to avoid being flagged by security solutions as malicious. If the malware is able to gain root, it will contact one of its command and control (C&C) servers. After the malware has successfully called home for instructions, its C&C server can download APKs for installation on the, send referrer requests to create Google Play advertisement revenue, and launch different applications.

Mazar BOT Can Erase Android Phones -16 Feb

Heimdal Security uncovered the Mazar BOT Android malware, which, aside from being new on the scene, is notable in that it gains administrative rights that give it the ability to do almost anything with the victim's phone. The attack chain begins with a message: “You have received a multimedia message from +[country code] [sender number] Follow the link http: //www.mmsforyou [.] Net / mms.apk to view the message.” If the APK, a program file for Android, is run, it will gain administrator rights on the victim’s device.

CryptoWall 3.0 Bags Small Cybercrime Ring Over $300K -18 Feb

CryptoWall is one of the most dangerous pieces of ransomware around today and it is estimated to have resulted in $325 million in damages. Imperva’s report clearly demonstrates that peeling the layers behind the financial infrastructure of ransomware is achievable and such investigations could be a powerful tool if undertaken by the appropriate authorities. Imperva believes one of the reasons ransomware is thriving is the lack of action from law enforcement agencies.

Instagram Tightens Security With 2-Factor Authentication -17 Feb

According to TechCrunch, Instagram has been testing two-factor authentication for some users, and is now planning to roll out the security feature for anyone who wants it. With two-factor authentication, users receive a text message containing a one-time code whenever they try to login on a new device. Users must then enter that code along with their email and regular password. This helps prevent remote hacking attempts by requiring physical access to the phone where the text message is sent.

Unpatched Flaw Plagues Cisco Industrial Switches -16 Feb

Cisco informed customers on Monday that the IOS software running on some of the company’s industrial switches is plagued by a denial-of-service (DoS) vulnerability. The flaw, assigned the identifier CVE-2016-1330 and a CVSS score of 6.1, affects Cisco Industrial Ethernet 2000 Series Switches running IOS Software 15.2(4)E. This vulnerability, which affects Cisco Emergency Responder 11.5(0.99833.5), also remains unpatched with no workarounds available.

DB Networks Unveils Layer 7 Database Security for OEMs -16 Feb

DB Networks has launched a new Layer 7 Database Sensor to provide original equipment manufacturers (OEMs) with advanced database security capabilities. the new Layer 7 Database Sensor delivers real-time deep protocol analysis of database traffic to OEMs, which can integrate it into their products to offer deep visibility into data-tier cyber threats. The solution also provides machine learning and behavioral analysis technology that can help identify database attacks.

Google Wants to Save News Sites From Cyber attacks—For Free -24 Feb

Google Project Shield service, designed to stop DDOS attacks from being used as a censorship tool, currently protects close to a hundred similar sites focused on human rights, election monitoring and independent political news. And now it’s finally coming out of its invite-only beta phase to offer its free cyber attack protection to not just the most at-risk sites on the Internet, but to virtually any news site that requests it.

Operation Dust Storm State Hackers Target Japan- 24 Feb

Operation Dust Storm has been active since 2010 and initially was detected by several security vendors via its use of the Misdat backdoor. Over the time the group has narrowed its focus to almost exclusively Japanese companies or foreign organizations headquartered in Japan. It designed a unique S-Type backdoor variant to infect a Japanese car-maker last year, for example, and has also been actively targeting Android devices with customized backdoors.

PCI DSS 3.2 Expected As Soon As March - 19 Feb

The next version of card data security standard PCI DSS could land as soon as next month, replacing the expected November release as the only update in 2016, according to the PCI Security Standards Council (SSC).The 3.2 we are evaluating additional multi-factor authentication for administrators within a Cardholder Data Environment (CDE); incorporating some of the Designated Entities Supplemental Validation (DESV) criteria for service providers; clarifying masking criteria for primary account numbers (PAN) when displayed; and including the updated migration dates for SSL/early TLS.

Baidu Web Browsers Leaked sSnsitive Information, Researchers Say - 24 Feb

Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study. The sensitive data was leaked by thousands of apps that use a Baidu SDK (software development kit). With the browsers, Citizen Lab found that a user's search terms, GPS coordinates, the addresses of websites visited and device's MAC address were sent to Baidu's servers without using SSL/TLS encryption.

MasterCard Set For Global ‘Pay-by-Selfie’ Launch- 22 Feb

Credit card giant MasterCard is set to extend its ‘pay-by-selfie’ facial recognition technology to 14 countries including the UK this summer as part of its ongoing attempt to crack down on identity fraud. The idea is that, like other biometric authentication systems, it will reduce the risk of identity fraud because it doesn’t rely on the user inputting passwords or other credentials which can be phished and reused by scammers.

New Trojan Xbot A Swiss-Army Knife Of Malicious Features - 19 Feb

Security vendor Palo Alto Networks, which sounded the alert on it this week, described Xbot as capable of taking a variety of malicious actions, including stealing banking credentials and credit card data, remotely locking Android devices, encrypting data on external storage, and asking for ransom. So far, the malware appears to be targeting only Android users in Australia and Russia. Once installed on a system, Xbot connects with a command-and-control server and launches phishing attacks when a user interacts with Google Play or any of the banking apps on its target list.

HSBC Set For UK’s Biggest Biometrics Roll-Out - 19 Feb

The banking HSBC giant will offer its 15 million customers the chance to log into their accounts via Apple’s Touch ID fingerprint scanning service or voice-activated authentication powered by speech recognition specialist Nuance.

Here Comes Locky, A Brand New Ransomware Threat - 18 Feb

The newly increasing crowded ranks of ransomware tools is "Locky," a somewhat awkwardly named but just as dangerous tool as the ones already floating out there. Locky is being distributed via a Microsoft Word attachment with malicious macros in it. Victims typically receive an email with an attached Word document purporting to be an invoice seeking payment for some product or service. Recipients who click on the attachment are presented with a document containing scrambled content and an instruction to click on an Office macro to unscramble it. Once enabled, the macro downloads Locky, stores it in the Temp folder and executes it.

Dangerous RCE Flaws Found in Popular E-Com Software- 24 Feb

The two Remote Code Execution vulnerabilities branded high-risk, after the e-commerce software vendors osCommerce and osCmax responsible failed to patch the issues despite being told about them at the end of December. Both are remote code execution flaws made possible by Cross Site Request Forgery (CSRF) and have been given a CVSSv3 base score of 5.3

Sony Hackers Behind Previous Cyberattacks Tied To North Korea - 24 Feb

A rare team investigation effort by researchers from multiple security vendors has traced the 2014 cyber attack on Sony Pictures Entertainment that wiped data and doxed its executives and sensitive company information, to earlier aggressive attacks on military, government, media, and other commercial interests mainly against South Korea and the US, but also Taiwan, Japan, and China. They also connected the dots to Operation DarkSeoul, which targeted banks and media in South Korea in 2013, as well as other attacks mainly targeting South Korean interests. South Korea government officials later called out North Korea as the culprit of the hacks.

Read more…