Thursday, April 30, 2009
Adobe confirms new flaw, recommends turning off JavaScript
Note that this is only the Acrobat Javascript functionality, you don't need to do it system wide. However, this also makes it pretty tough in a large (i.e. more than 20 workstations) environment unless you're going to roll out a cusomized version of Acrobat. I'd suggest telling your user base not to open any PDF's from the web until this is fixed.
I found this an interesting quote:
"This is not the first time that critical vulnerabilities have been found in Adobe's software," Sophos' Graham Cluley said on Wednesday his blog. "And there is growing concern tha the vendor's dominant market share of the PDF reader market is proving extremely attractive for hackers hellbent on infecting as many PCs as possible."
It is very true, could Adobe be the next big target? The advantage to hackers is that most Adobe products are cross-platform and therefore have the potential to create a lot more havoc. If nothing else however, it will hopefully get Adobe to shape up and be a little better at dealing with this kind of thing. For all their flaws, Microsoft's reporting of vulnerabilities and patching timelines only improved as their products became significant targets.
Here is Adobe's official response:
Adobe PSIRT
Monday, April 27, 2009
Swine Flu/Pandemic Planning - Updated
Update #4 – Not a lot new that isn’t already widely public. However the CDC has launched a new site focusing on social media tools for health emergencies in general. It’s at the bottom of this post
Update #4 – WHO raises alert level to 5, didn’t take long for the spammers to arrive, list of “spamvertised” domains
Update #3 – Canadian airlines stop flights to Mexico, First Death Reported in US
Update #2 - Follow the CDC on twitter - @CDCemergency
Update #1 – The WHO has raised their alert level to 4, additional links at the bottom of the post.
__________________________________________________________
While it is still too early to tell if the Swine Flu outbreak will turn into a pandemic, it is never too early to start your planning. There are a number of sites available with some preliminary information as well as ways to track the outbreak and suggestions for planning. I'll continue to update this page as I get more information.
From the CDC:
The CDC currently recommends that you cover your nose and mouth with a tissue when you cough or sneeze, wash your hands often with soap and water, avoid touching your eyes, nose or mouth, and try to avoid close contact with sick people.
The CDC also suggests that if one does contract an illness, they should stay home from work or school and limit contact with others to avoid spreading the infection.
If you develop an illness with fever and respiratory symptoms and you live in or near a region in which the virus has been identified, the CDC recommends that you immediately seek attention from your health care provider to determine whether further influenza testing is needed.
Skeleton plan from the SANS Institute:
Don’t Panic!
Initial monitoring stage (where we are right now)
- If you’re sick, stay home
- Family is sick, stay home
- Close contact with someone showing symptoms, stay home
- Wash your hands, cover your cough
Then, if multiple cases in your area,
- Think about telling non-essential workers to stay home
- Recommend workers take kids out of daycare
Pandemic stage
- Everyone will be staying home, how will you handle it?
- Do you have enough laptops?
- Can your VPN concentrators handle the load
Some links with valuable and/or interesting information:
2009 Swine Flu Outbreak Map - Google Maps
SANS Institute: Pandemic Watch 2009
Mashable: How to Track Swine Flu Online
TED Interview with “Virus Hunter” Nathan Wolfe
Canada Foreign Affairs Department Travel Warnings
List of domains being used by spammers
CDC Social Media Tools for Partners and Consumers
Friday, April 24, 2009
Bruce Perens - A Cyber-Attack on an American City
Bruce Perens - A Cyber-Attack on an American City
Wednesday, April 15, 2009
The Human Factor in Laptop Encryption
"56% of business managers have disengaged their laptop’s encryption "
"61% of business managers share their passwords, compared to only 4% of IT managers."
The Human Factor in Laptop Encryption
Tuesday, April 14, 2009
Microsoft Security Bulletin Summary for April 2009
TechNet Summary
Microsoft Security Bulletin Summary for April 2009
Consumer Friendly Summary
http://www.microsoft.com/protect/computer/updates/bulletins/200904.mspx
Monday, April 13, 2009
I’ll Be Speaking at the WCIS Conference this week.
This Thursday April 16 I’ll be speaking at the ISACA - Western Canada Information Security Conference in Winnipeg - http://www.wcisc.ca/program2009.htm
I’ll be doing the end-of-day keynote and will be teaching an excerpt from the SANS SEC401 Security Essentials course. If you’re going to the conference and are curious about SANS courses this is a perfect opportunity to evaluate one for free (well aside from the conference fees…).
Aside from SANS you can also hear talks from Microsoft, Compugen, RSA, Checkpoint, and many others.
NERC Advises Industry on Cyber Assets
It seems to me that if they haven't even identified these assets then they have a long way to go before they can actually defend them. Let's hope the government gets involved and really forces the operators to start working on security.
Here is a list of articles relating to the infiltration of the power grid:
http://online.wsj.com/article/SB123914805204099085.html
http://fcw.com/Articles/2009/04/08/FERC-needs-to-step-up-oversight-to-safeguard-grid.aspx
http://www.nextgov.com/nextgov/ng_20090408_1423.php
http://www.washingtonpost.com/wp-dyn/content/article/2009/04/08/AR2009040803904_pf.html
http://www.cnn.com/2009/TECH/04/08/grid.threat/index.html
http://www.eweek.com/c/a/Security/Before-Grid-Hack-Reports-NERC-Advises-Industry-on-Cyber-Assets-479748/
And the letter from NERC - http://online.wsj.com/public/resources/documents/CIP-002-Identification-Letter-040609.pdf
Wednesday, April 1, 2009
Welcome!
There is no silver bullet in security, but if you take the time to implement basic security and educate yourself about the threats, as well as the tools available to combat them, you and your information will be much more secure.
Stay tuned...