Home Tags Computer Security
Tag: Computer Security
Classic, defanged files at archive.org won't actually wipe your hard drive.
Media playback is unsupported on your device Lincolnshire County Council hit by £1m malware demand 30 January 2016 Last updated at 22:42 GMT Lincolnshire County Council's computer systems have been closed for four days after being hit by computer malware demanding a £1m ransom.Ransomware encrypts data on infected machines and unscrambles it only if victims pay a fee.The council said it was working with its computer security provider to apply a fix to its systems.Phillip Norton reports.
Australia is blaming China for a cyber attack on a supercomputer at the Bureau of Meteorology (BoM) that has links to multiple government agencies including the Department of Defence. The “massive” attack has raised fears that potentially sensitive national security information may have been compromised, according to the Australian Broadcasting Corporation (ABC). The report said “multiple official sources” have confirmed the attack, that it is expected to cost millions of dollars and possibly take years to plug the security breach, and that government officials are “confident” the attack came from China. The BoM supercomputer contains a lot of research, but could be viewed as a potential gateway to a host of government agencies that have even more sensitive information. In a statement, the BoM said it does not comment on security matters. “Like all government agencies, we work closely with the Australian Government security agencies. “The bureau's systems are fully operational and the bureau continues to provide reliable, ongoing access to high quality weather, climate, water and oceans information to its stakeholders,” the statement said. There are no details on which systems have been affected or if any and whether information was taken, nor on why China was seen as the likely culprit. There was no immediate comment from the Chinese embassy in Canberra. Among other services, the BoM provides climate information for commercial airlines and shipping, analyses national water supplies, gathers climate information and works closely with the defence department. China has repeatedly been accused of using cyber attacks to spy on foreign states and companies. The US said the issue has put an "enormous strain" on their relationship. Chinese officials routinely deny supporting cyber espionage and say China is itself a victim of hacking. The Australian Federal Police declined to comment, while the Department of Defence said in a statement that it was barred by policy from commenting on specific cyber security incidents. CW+ Features Enjoy the benefits of CW+ membership, learn more and join.
What happens when you are forbidden from disclosing that backdoor you found?
LinkedIn's head security honcho shares his proactive security strategy, which begins with everyone buying in. PALO ALTO, Calif.—How safe is your company from malware attacks and security breaches? As the technology and methods behind cyber-attacks are constantly evolving, it's virtually impossible for any company to accurately say it's completely safe, but there are steps you can take to minimize threats. Ganesh Krishnan, who runs security at the popular job site and social network LinkedIn, shared some of the lessons he's learned over a 20-year career in security, including stints at Intel and Yahoo. His "tech talk" was part of a meet-up here this week at online payments firm WePay. The first point he emphasized is that security teams are by definition outnumbered. "There are a lot more hackers than security people. Security has to be everyone's responsibility," he said. This maxim extends to both technical and non-technical employees, as both are needed to help defend against a growing range of threats including so-called phishing attacks. Phishers use social engineering, email and social media to gain access to corporate networks. For example, a phisher might contact a relatively low-level employee under false pretense (e.g., pretending to be an authorized outside contractor), guess the employee's password and get into the network. In another example, the massive security breach at Target in 2013 was traced back to an HVAC service provider whose credentials were stolen, allowing the attackers to compromise the retail giant's network. "Even [the accounts of] salespeople and non-engineers can be compromised. It's not hypothetical, it's happened," said Krishnan. Although there have been many high-profile breaches, Krishnan says a lot has changed for the better. For example, it used to be considered a no-no to let someone outside your company test your software for security weaknesses. "Not anymore. Companies are rewarding the people who find vulnerabilities if it's done ethically and with responsible disclosure," he said. But there still needs to be a shift in the mindset of many developers when it comes to software. "Most engineers want to get the software finished and get the features done," Krishnan said, "but when you write code, think about how someone could abuse it." Because that mindset hasn't been in place, Krishnan says security issues are so pervasive that "if you think you haven't been hacked yet, you just don't know it." If that sounds dire, Krishnan doesn't apologize for raising alarm bells, but says a comprehensive strategy that includes not only prevention, but also a strategy and systems to detect and respond to breaches is what's needed to minimize threats. His key tips include logging everything and keeping that data for at least a year. This includes firewall, virtual private network (VPN), access and antivirus logs. "When there's an issue, having logs will prove to be extremely useful because you can see why you were hacked and take administrative action if necessary," he said. How to Prevent Phishing On the issue of phishing, Krishnan notes it can happen to anyone, but employee training can head off the threat. Rather than simply explain the danger of phishing to employees, he recommends "live training" to sensitize them. "You'll be surprised how many employees will give up their credentials" in a pseudo-phishing attack used for training. "And it's not just a password that's compromised," he said. "It's an attack on the network to plant malware once they can get someone to a bad site or install something." Krishnan says the training has proved very useful. "Someone hears person X fell for it, and they don't want to get caught themselves," he said.
Even the most sophisticated of cyber attacks invariably start with a banal email and a simple attachment or URL. But how should organisations start to p...