Over the last seven years, the amount of fraud from stolen credit card data has doubled in the U.S. This has been the primary driver pushing American credit card companies and retailers into adopting the use of credit cards with computer chips in them. The problem with the old magnetic stripe credit cards we are so familiar with is that the data on the magnetic stripe is static – it never changes. Because of this, fraudsters have been able to simply copy the magnetic stripe data from your card to a blank one, and then use the new card to make purchases. The computer chips in Europay, MasterCard and Visa (EMV) cards, on the other hand, set up a one-time transaction code that is useless to intercept or copy. If a thief attempts to make another transaction using this information, the transaction will simply be denied.
These kinds of credit and debit cards have been used in Europe for decades, and have greatly reduced the amount of credit card fraud there. But the American versions of these cards are going to be different for some years to come. For one thing, EMV cards issued to Americans are still going to have the magnetic stripe on them until at least 2017. This is to give retailers a chance to install the necessary (and expensive) equipment needed to process EMV cards. Also, even though most retailers are supposed to have EMV card reader hardware in place as of October this year, gasoline retailers are not required to change their pump card readers until 2017.
Another difference is the use of a PIN with the cards. In Europe, they have found that requiring a 4 to 6 digit PIN number when cards are used greatly adds to the security of the transaction (just like inputting a PIN when you use your debit card here does). But most companies in America are just going to require a signature, and are not going to allow the use of PINs with these cards for a while. This is not only to spread out the cost of re-equipping for the merchant, but is also to allow American consumers to get used to the new cards. Eventually, America will probably be using the same setup they currently use in Europe, but until then, remember that your cards will still suffer from some of the same old vulnerabilities as always.
Privacy Concerns With Facebook’s iPhone App
I just wanted to give everyone a quick example of why you should always exercise caution when modifying an application’s privacy settings.
Facebook is rolling out a feature in the US that allows people to automatically identify and share things they’re listening to or watching. It’s important to keep in mind that this leveraging this feature requires that you grant Facebook access to your iPhone’s microphone. This means that Facebook will turn on your microphone every time you write a status update. It is worth considering the sacrifice in privacy compared to the convenience that you gain by leveraging this feature. Is it really worth allowing an organization to hear your conversations just so you can gain the ability to easily share what TV show you’re watching?
Facebook has stated that they do not record or archive these transmissions. However, using this feature requires that you trust that a 3rd-party (Facebook) will handle your data appropriately. Do you really need to provide them with this data? Does it really save you that much time to have your background noise automatically analyzed? These are questions you should ask yourself prior to providing Facebook with this level of access.
Management Participation in the Infosec Program: A Must!
As a risk management guy, I’m often asked why I think information security programs fail or are less effective than they should be. There are certainly a number of answers to that question, but I think one of the main causes is lack of management participation in the program.
First, it should be recognized that these programs are driven from the top down. Upper management must demonstrate real interest in the infosec program to make it work. Right or wrong, people take all their main cues from upper management, and an apathetic CIO or CEO is a death knell for an infosec program.
Once you have achieved high level buy-in, it is very important to ensure that mid and operational level management are also properly involved in the program. Managers on these levels need to demonstrate their interest in the infosec program just as upper management does. However, beyond that, these individuals should also be involved in the program in a much more direct way.
It isn’t enough that information security policies and procedures have been established and communicated to all appropriate personnel. There also needs to be regular documented processes in place for management oversight of the information security program. Managers sometimes tend to become complacent about the information security program; they don’t really demonstrate interest in it and don’t seem to check up much. And if managers become complacent about infosec, you are safe to bet that the personnel in their purview will as well.
Old School Google Hacking Still Works…
Did some old school Google hacking last night.
“Filetype:xls & terms” still finds too much bad stuff.
Check for it lately for your organization?
Try other file types too. (doc/ppt/pdf/rtf, etc.)
Information leakage happens today, as it always has. Keeping an eye on it should be a part of your security program.
Ashley Madison Blackmail Campaigns Prowling Again
If you were involved in the Ashley Madison service, or know someone who was, it might be time to discuss the continuing issues of ongoing blackmail campaigns stemming from the breach. This article appeared this week in SC Magazine, reporting on just such a campaign, that has been potentially identified.
Please be aware that this is happening, and can represent a significant threat, especially for organizations associated with critical infrastructure, IP protection and/or government agencies.
If you, or someone you know, is being harassed or targeted by black mailers, here are some resources:
WikiHow Advice from the public.
Stay safe out there!
Hiring Data Analysts Who Love Security
MSI is growing again! We are interested in talking to folks about a full time position in our Columbus HQ to help our Intelligence Team.
If you dig being heads down with data, performing deep research and chasing threats around the Internet, this is the gig for you! These folks will be focused primarily on threat profiling, research of companies, crime rings and security news from around the world. The job requires you be familiar with Linux, have an understanding of information security and to be a power user of the Internet. You should also enjoy python, BASH scripting, command line kung fu and staying bleeding edge current on security happenings. Light public speaking on webinars and conference calls, familiarity with the Mac and excellent writing skills are also preferred.
MSI is an interesting place to work. Our team is seriously dedicated to helping our clients. We are known for doing excellent work, thinking outside the box, going deep into a problem and laser focusing on customer success. Our conversations among team members are fast and full of high density data exchange. It is exciting, fulfilling and demanding work, but we do it with joy, precision and mindful innovation!
Sound like something you might enjoy? If so, get in touch. Send your resume and a cover letter that explains why you are the best choice for our team to aluck@microsolved.com. You can also touch base with me on Twitter if you have questions (@adamjluck). We hope to hear from you if you truly love deep diving on data and hammering out the truth from content all around the web!
Podcast Episode 9 Available
Check out Episode 9 of the State of Security Podcast, just released!
This episode runs around an hour and features a very personal interview with me in the hot seat and the mic under control of @AdamJLuck. We cover topics like security history, my career, what I think is on the horizon, what my greatest successes and failures have been. He even digs into what I do every day to keep going. Let me know what you think, and as always, thanks for listening!
Last Week in InfoSec
In case you weren’t able to catch up on the news last week, I’ve published some of the top Information Security stories that were identified by TigerTrax.
- New NTP vulnerabilities were disclosed by Cisco and Boston University http://www.securityweek.com/new-ntp-vulnerabilities-put-networks-risk
- Drupal released version 7.41 to address an open-redirect vulnerability http://news.softpedia.com/news/drupal-releases-version-7-41-to-fix-open-redirect-vulnerability-495083.shtml
- A new strain of ransomware is installing itself by brute force attacking Remote Desktop Services http://news.softpedia.com/news/new-ransomware-infects-computers-via-windows-remote-desktop-services-495067.shtml
- Apple patched flaws in OS X, iOS and other products http://www.securityweek.com/apple-patches-flaws-os-x-ios-other-products
- Oracle released security updates that addressed over 154 vulnerabilities in 54 products https://threatpost.com/oracle-quarterly-security-update-patches-154-vulnerabilities/115120/
- Researchers discovered weaknesses affecting Western Digital My Passport hard drives http://news.softpedia.com/news/western-digital-my-passport-hard-drives-come-with-a-slew-of-security-holes-494990.shtml
- Adobe patched a Flash zero-day that was exploited by Pawn Storm http://www.securityweek.com/adobe-patches-flash-zero-day-exploited-pawn-storm
- Fake “support services” that have affected Windows users for years are now starting to target Mac users http://arstechnica.com/security/2015/10/support-scams-that-plagued-windows-users-for-years-now-target-mac-customers/
- Researchers discovered over 250 iOS apps that collect user’s personal information and violate Apple’s App Store privacy policy http://arstechnica.com/security/2015/10/researchers-find-256-ios-apps-that-collect-users-personal-info/?utm_source=kwestin&utm_medium=twitter
Have a great week!
—Adam
Next CMHSecLunch is Monday, November 9th
Just a heads up that the next CMHSecLunch is scheduled for Monday, November 9th at Tuttle Mall food court.
As always, the games begin at 11:30am and continue to around 1pm. Admission is FREE and everyone is welcome. Bring a friend!
Come by, hang out, have some food and great conversation. Talk about the threats and issues your team is facing and hear what others in the community have to say on the topic. It’s like hallway conversations at security conferences, without the travel, con-flu and noise.
Check it out and see you there!
HoneyPoint Security Server Allows Easy, Scalable Deception & Detection
Want to easily build out a scalable, customizable, easily managed, distributed honey pot sensor array? You can do it in less than a couple of hours with our HoneyPoint Security Server platform.
This enterprise ready, mature & dependable solution has been in use around the world since 2006. For more than a decade, customers have been leveraging it to deceive, detect and respond to attackers in and around their networks. With “fake” implementations at the system, application, user and document levels, it is one the most capable tool sets on the market. Running across multiple operating systems (Linux/Windows/OS X), and scattered throughout network and cloud environments, it provides incredible visibility not available anywhere else.
The centralized Console is designed for safe, effective, efficient and easy management of the data provided by the sensors. The Console also features simple integration with ticketing systems, SEIM and other data analytics/management tools.
If you’d like to take it for a spin in our cloud environment, or check out our localized, basic Personal Edition, give us a call, or drop us a line via info (at) microsolved (dot) com. Thanks for reading!