I was recently asked by a small business how could they secure their
IT on a budget this made me stop to think about that tricky subject
"security meets cost". It is in these terms that a business must be
practical, you need to stand back and identify your actual financial
loss were a cyber attack or unforeseen event to occur resulting in the
loss of data. And to be quite honest if your spending thousands on
perimeter controls and don't have anyone in your business who can
properly configure, monitor and maintain these devices then your really
just throwing money down the drain.
After going through the business I advised them to put in place a number of steps that would go a long way towards protecting them. It must be noted that the business in question did not deal with any payments card information (PCI), personally identifiable information (PII) or personal health information (PHI) if your business is dealing with the above then you will need to put more controls in place.
My plan for the business was pretty simple and I will lay it out below.
1) Education:
This is one of the fundamental roles that small businesses neglect, there are hundreds of services out there that will do training days on different areas in an easy to understand and education manner. If you can train staff to identify Phising, Smishing and other everyday threats then you are starting to win a war on the front line. Education helps get employees to think before opening an attachment or giving out "harmless" information over the phone. For the more adventures small business there are packages available for you to run harmless attacks that contain educational videos when clicked. PhishMe would be one such company that comes to mind in that regard.
2) Backups:
This one is quite simple but often forgotten, with the rise of ransomware every small business should keep daily or weekly backups. These backups should be occasionally tested to ensure that they can restore systems in the event of an emergency such as a ransomware infection.
3) Business Continuity Plan:
Every business should have one and should test it, you can work on building this up over a period of time but you need to start somewhere. EG. if the building floods are our desktops on the floor? Maybe we should elevate them to mitigate this problem. During this flood do employee have the ability to work from home? Yes we have remote access to the building over our companies VPN.
The above are just suggestions but you get the drift if you start to disect your company and compare it to potential events you might be surprised what you come up with. Fail to prepare then prepare to fail.
4) Virus and Anti- malware protection:
Again this is simple but neglected in many small businesses, buy a good antivirus and anti-malware package and set the updates to times you know your employees wont shut them down eg lunch time or after working hours. A good antivirus and malware solution is like having a security guard in your network throwing out all the bad guys.
5) Enable Bit-locker or the equivalent:
Bit-locker encrypts your disk so if someone breaks in and robs your physical machine in theory bit-locker will keep that information safe, unless of course the thief is Homeland security or the equivalent in which case your data is the least of your worries.
6) Password Policy:
Put in place a robust password policy that includes the rotation of passwords regularly and password history check to prevent the re-use of passwords.
7) Third party checks:
If you are using a third party to store data or to provide remote support ask them to provide you with a list of controls that are in place to protect you from a security point of view. If they tell you they are super secure and you need to trust them get worried because this means they haven't got anything to give you and your cloud solution is some guy with a laptop and 15 housemates that use it to stream illegal movies.
8) Document everything!
You should document all of your procedures and workflows because if one guy has all this information and gets hit by a bus your knowledge is dead. Good documentation is key to smooth transition and helps aid security through clarity.
If you get all the above in order you will have made a decent move towards securing your business at a minimal cost, of course there is plenty of room to do more but the hardest part is always to make a start.
Thursday, 16 February 2017
Wednesday, 13 July 2016
Pokemon Go grants itself "full access" to your Google account
In one of the most bizarre events in recent history Nintendo's new location-based augmented reality game Pokémon GO
has been making the news since it launched a few days ago. People are
so excited to catch 'em all that Nintendo's market-value has jumped
to $7.5 Billion (£5.8 Billion) in just two days – the highest surge since 1983.
Due to the huge interest surrounding Pokémon GO, even hackers are using the game's popularity to distribute malicious versions of Pokémon GO that could install DroidJack malware on Android phones, allowing them to compromise user's devices completely. Now I have watched the videos of grown men running around with this game and I must say this might just be the end for society. If you do actually care this app also comes with a huge privacy concern that if your not to busy trying to catch imaginary Pokemon then you should take a break and fix it. The latest threat is related to the privacy concerns raised about the iOS version of the official Pokémon GO app.
According to an article via The Hackers News: Adam Reeve labeled the game "malware," saying that Pokémon GO is a "huge security risk" as the game, for some reason, grants itself "full account access" to your Google account when you sign into the app via Google on iPhone or iPad.
Any app, according to Google's own support page, that granted Full account access, can:
If you want to fix this there are two things that you can do:
The second and simplest approach is to use a burner Google account. For this, create an all new Google account, with nothing in it, and use this account to sign into Pokémon GO as well as other apps that you may find doubtful.
Due to the huge interest surrounding Pokémon GO, even hackers are using the game's popularity to distribute malicious versions of Pokémon GO that could install DroidJack malware on Android phones, allowing them to compromise user's devices completely. Now I have watched the videos of grown men running around with this game and I must say this might just be the end for society. If you do actually care this app also comes with a huge privacy concern that if your not to busy trying to catch imaginary Pokemon then you should take a break and fix it. The latest threat is related to the privacy concerns raised about the iOS version of the official Pokémon GO app.
According to an article via The Hackers News: Adam Reeve labeled the game "malware," saying that Pokémon GO is a "huge security risk" as the game, for some reason, grants itself "full account access" to your Google account when you sign into the app via Google on iPhone or iPad.
Any app, according to Google's own support page, that granted Full account access, can:
"See and modify nearly all information in your Google Account (but it can't change your password, delete your account, or pay with Google Wallet on your behalf)."What exactly this means is quite unclear, but Reeve claimed that the Nintendo's Pokémon GO – developed by Niantic – can now:
- Read all your email.
- Send email on your behalf.
- Access your Google Drive documents (including deleting them).
- Look at your search history as well as Maps navigation history.
- Access your private photos stored in Google Photos.
- And a whole lot more.
If you want to fix this there are two things that you can do:
- Head onto your Google account permission page and look for Pokémon GO.
- Select Pokémon GO Release and click "REMOVE" button to revoke full account access.
- Launch Pokémon GO on your device and confirm it still works.
The second and simplest approach is to use a burner Google account. For this, create an all new Google account, with nothing in it, and use this account to sign into Pokémon GO as well as other apps that you may find doubtful.
Friday, 8 July 2016
Hackers can use smart watch motion sensors to steal your ATM pin
As you constantly add the latest gadgets to your daily life be it fitness trackers, smart watches, timed networked heating, networked toasters etc.. do you ever stop to think that with such convince also comes risk? Well I can safely tell you that the more connected you become the wider you make the threat surface that is your personal security. A recent study from Binghamton University cites that it may be possible for hackers to obtain your ATM password from your smart watch or fitness tracker.
The risk lies in the motion sensors used by these wearable devices. The sensors also collect information about your hand movements among other data, making it possible for "attackers to reproduce the trajectories" of your hand and "recover secret key entries."
And just in case you are doubtful the paper, titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN," computer scientists from the Stevens Institute of Technology and Binghamton University used a computer algorithm that can guess your password and PIN with about 80% success rate on the first attempt, and over 90% of the time with 3 tries.
Now I'm not sure about you but an 80-90% success rate within 3 tries seems pretty dam high to me. The paper also goes on to state that their "Backward PIN-Sequence Inference" algorithm can be used to capture anything a person type on any keyboard – from automatic teller machine or ATM keypads to mobile keypads – through infected smartwatches, even if the person makes the slight hand movements while entering PINs. The paper also states that at this time there is no way to avoid such an attack but have made the suggestion that manufacturers add random white noise to there devices in order to disorient patterns that can capture sensitive information.
The risk lies in the motion sensors used by these wearable devices. The sensors also collect information about your hand movements among other data, making it possible for "attackers to reproduce the trajectories" of your hand and "recover secret key entries."
And just in case you are doubtful the paper, titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN," computer scientists from the Stevens Institute of Technology and Binghamton University used a computer algorithm that can guess your password and PIN with about 80% success rate on the first attempt, and over 90% of the time with 3 tries.
Now I'm not sure about you but an 80-90% success rate within 3 tries seems pretty dam high to me. The paper also goes on to state that their "Backward PIN-Sequence Inference" algorithm can be used to capture anything a person type on any keyboard – from automatic teller machine or ATM keypads to mobile keypads – through infected smartwatches, even if the person makes the slight hand movements while entering PINs. The paper also states that at this time there is no way to avoid such an attack but have made the suggestion that manufacturers add random white noise to there devices in order to disorient patterns that can capture sensitive information.
Thursday, 30 June 2016
Find out how much Google knows about you using "My Activity" Dashboard
It is widely understood that Google as a company holds masses of information on the majority of us. If you have ever wanted to know just how much information Google knows about you this is now possible. Google tracks the majority of what you do on the Internet, including your searches, music you listen to, videos you watch, and even the places you travel to, and it does this for targeting relevant ads to its users and better improve its service. Now the technology giant has a plan to make it easier to control all the data the company collects throughout all your different devices.
So how are Google going to make this information easier for you to access and control? The answer to this is through the roll out of there new "My Activity" page that shows a searchable history of pretty much everything you do online, including previously visited websites, voice searches, searched things and places, watched Netflix programs, and all activities you did on each of its products. These activities are sorted by most recent and broken down into individual items some items may be part of groups that bundle similar activities together. You can log into this page here.
The feature along with been terrifying is beneficial for those who want more granular control over how ads work across all their devices linked with Google account and gives them the ability to block some ads they don't want to see. However, thankfully the feature also offers you an option to delete items as well — everything in a particular date range or by specific topics.
If you are privacy conscious, you can adjust your settings in the Privacy Checkup. You can change your settings for ultimate privacy, depending on how much of your online activity you allow Google to track. I would recommend that you do this but if you like targeted adds and a super computer giant knowing everything you do online, well then don't change a thing.
Tuesday, 21 June 2016
Citrix's GoToMyPc users exposed after password leak
If you are a user of Citrix's GoToMyPC unfortunately you will have to reset your passwords (use something long varied and strong, don't reuse an old password!).
The service, which lets users remotely access PCs over the internet, was hit by a "very sophisticated password attack," Citrix said Sunday in a blog post. The company is requiring users to reset their passwords using the "forgot password" link. This is just another hack in a long line that have been disclosed in the past few weeks as hackers seem to be targeting website with huge user databases in an attempt to reap the rewards of cybercrime.
"Citrix takes the safety and security of its customers very seriously, and is aware of the password attack on GoToMyPC," said John Bennett, product line director at Citrix, in a statement. "Once Citrix learned about the attack, it took immediate action to protect customers. Citrix can confirm the recent incident was a password re-use attack, where attackers used usernames and passwords leaked from other websites to access the accounts of GoToMyPC users. Further, there is no indication of compromise to any other Citrix product line."
To reset your GoToMyPC password, go to the site and click on the Log In link.
I would recommend along with resetting your password that you enable two-step verification, a process that sends a code to your phone each time you want to sign in. If you've used the same password for GoToMyPC at other websites or for other accounts, you should change it at those places as well and don't make up a new password and use it on your other sites to, not that you would do such a thing.
Wednesday, 15 June 2016
Ransomware now targets Smart TV's
And the saga continues...... just when you thought it couldn't get any worse some ass just created a strain of ransomware that can infect Smart Tv's. Lets set the mood, you come home from a stressful day at the office get some dinner and sit down to watch your favorite channel to discover a message demanding bitcoin to gain access to your Tv, now I'm guessing that will put you in great form for the evening. Thanks to a new version of the Frantic Locker (better known as FLocker) Ransomware has now the ability to infect and lock down your Smart TVs until you pay up the ransom making the above scenario much more realistic.
Researchers at Trend Micro have discovered the updated version of FLocker that is capable of locking Android smartphones as well as Smart TVs. Originally launched in May 2015, the FLocker ransomware initially targeted Android smartphones with its developers constantly updating the ransomware and adding support for new Android system changes. So what exactly does Smart Tv locking ransomware do ? is it the same as the other nasty laptop/desktop strains ? Well the answer to those questions is yes and no.
- FLocker locks the device's screen.
- Displays a fake notice from United States Cyber Police or other law enforcement agency, accusing potential victims of crimes they did not commit.
- Demands $200 worth of iTunes gift card as Ransom to unlock the infected TV.
However, if FLocker detects devices outside these countries, the malware
will wait for 30 minutes before requesting admin privileges for the
device. If the victim rejects the request, FLocker freezes the screen,
faking a system update.
"The C&C [command and control] then delivers a new payload misspelled.apk and the ‘ransom’ HTML file with a JavaScript (JS) interface enabled," Trend Micro said. "This HTML page has the ability to initiate the APK installation, take photos of the affected user using the JS interface, and display the photos taken in the ransom page."
"The C&C [command and control] then delivers a new payload misspelled.apk and the ‘ransom’ HTML file with a JavaScript (JS) interface enabled," Trend Micro said. "This HTML page has the ability to initiate the APK installation, take photos of the affected user using the JS interface, and display the photos taken in the ransom page."
Although the new variant of FLocker does not encrypt files on the infected device, it has the capability of stealing data from the device, including contacts, the phone number, device information and location data. Trend Micro's report does not make it clear that how FLocker infects smart TVs, but it does note that typically ransomware infection arrives via SMSes or malicious links.
Therefore, like always you should be wary while browsing the Internet, and receiving text messages or emails from unknown sources. In the event that you do get hit with Flocker there are a number of steps that you can take to get your device back.
How to Remove FLocker from Your Smart TV?
If your Android smart TV gets infected, you should contact the device vendor (phone carrier or TV merchant), or if you are kind of technical, you can remove the ransomware after removing its device admin privileges.
"Users can connect their device with a PC and launch the ADB shell and execute the command 'PM clear %pkg%'," Trend Micro said. "This kills the ransomware process and unlocks the screen. Users can then deactivate the device admin privilege granted to the application and uninstall the app."I would advise however that you contact your vendor first before you go all tech wizard on your Tv. Just incase you get infected by some new strain that may not have been thought up yet as this may signal the start of a new targeting faze in the age of the iot.
Labels:
android,
Cyber security,
FLocker,
hacking,
Ransomware,
recover,
smart TV,
Update
Monday, 6 June 2016
TeamViewer Confirms Hack
For those who are not familiar with the service TeamViewer allows computer professionals and consumers to log into their computers from remote locations. For just over month, a growing number of users have reported their accounts were accessed by cyber criminals who used their highly privileged access and drain PayPal and bank accounts. On Sunday, TeamViewer spokesman Axel Schmidt acknowledged to Ars that the number of takeovers was "significant," but he continued to maintain that the compromises are the result of user passwords that were compromised through a cluster of recently exposed megabreaches involving more than 642 million passwords belonging to users of LinkedIn, MySpace, and other services.
So if you have a TeamViewer account the hackers news have put together the steps that you should take to make sure that you are secure, see below.
Here's What you should do:
TeamViewer users are strongly recommended to change their account passwords and use a strong one, and of course, NOT to use the same credentials across multiple sites.
I know, remembering different passwords for different accounts is a real pain, but you can use a good password manager to solve this issue.
Meanwhile, users should also ensure their TeamViewer accounts are protected with a randomly generated password that is at least 10 characters long, contains numbers, symbols, and uppercase and lowercase letters, and is unique.
It is always a good idea to run the TeamViewer software only when it's truly needed, instead of allowing it to auto-start each time your PC is turned on.
Subscribe to:
Posts (Atom)