Wednesday, June 11, 2014

Hackers are not satisfied with payment data

Last year, Trustwave company saw a 33% increase in the data theft of sensitive and confidential information, such as financial credentials, internal communications, personally identifiable information and various customer records. In all, 45% of thefts involved non-payment data, according to the “2014 Trustwave Global Security Report.”

Payment card data the main target for data compromises, but increasingly thieves are starting to go after other types of personal and sensitive data to steal, according to a new report from security firm Trustwave.

Trustwave based the findings in the 123-page report on an analysis of 691 data-breach investigations conducted last year (a 54% increase from 2012), along with threat intelligence from its global security operations, telemetry from security technologies and research.

Without a strong defense mechanism set up almost universally, data thieves will continue to thrive, Trustwave contents.

“A global, thriving underground provides for quick monetization of stolen data no matter where the victim or attacker resides,” the company said in the report. “As long as criminals can make money by stealing data and selling that sensitive information on the black market, we don’t expect data compromises to subside.”

Weak passwords contributed to 31 percent of compromises Trustwave investigated. More than half, 59%, of compromised victims resided in the U.S., 14 percent in the United Kingdom and 11 percent in Australia.

In 2013, eCommerce accounted for 54% of assets targeted by hackers, and point-of-sale breaches accounted for 33 percent of Trustwave’s investigations.

Retail was the top industry compromised, accounting for 35 percent of the attacks investigated. Food and beverage ranked second at 18 percent, hospitality ranked third at 11 percent, and finance ranked fourth at 9 percent.

The median number of days from initial intrusion to detection was 87. Some 71% of all compromised victims did not know they were compromised, though self-detection can shorten to one day from 14 days the timeline from detection to containment when detected by a third party, Trustwave noted in its report. The median number of days from detection to containment was seven.

“Victims that identify a breach on their own detect it sooner and reduce clean-up time by two weeks,” Trustwave said. “A plan will help make your organization aware of a compromise sooner, limit its repercussions and shorten its duration.”

Among the exploits detected, 85% involved third-party plug-ins, including Java applets, Adobe Flash and Adobe Acrobat/Reader. “78% of exploits we detected took advantage of Java vulnerabilities,” Trustwave said in its report.

At 49%, Blackhole topped the list of most prevalent exploit kits. “However, the arrest of its creator and a lack of updates to the kit spurred a 15% decline in Blackhole’s prevalence,” Trustwave said. “We expect the second-most prevalent kit, Magnitude at 31%, to fill the gap.”

Moreover, 96% of applications, and 100% of mobile applications, Trustwave scanned harbored one of more serious security vulnerabilities. Based on attack-source IP addresses, the top three hosting countries for malware last year were the U.S., at 42%; Russia, at 13%; and Germany, at 9%t.

“This may be a result of foreign attackers adapting to businesses blocking connections from foreign IP addresses by compromising other assets within the target country and using them as “jump servers” to launch attacks against primary targets,” Trustwave said.

In the report, Trustwave suggested a few ways to counter breach attacks, including educating staff and employees on the best security practices, enforcing strong authentication policies and practices, assessing data protections across all assets, testing system resilience to attacks, and developing and rehearsing incident response plans.

“Secure all of your data, and don’t lull yourself into a false sense of security just because you think your payment card data is protected,” Trustwave advised. “Assess your entire set of assets from endpoint to network to application to database. Any vulnerability in any asset could lead to the exposure of data.”

Many of the multi-site breaches centered on franchise business models. As such, the information technology used must be strong, Trustwave advised. “Franchisees are often required to deploy information technology defined by the franchisor for efficiency purposes and to simplify management of those environments,” the company noted. “While a well-designed technology template can help to improve security, a poor design can result in a vulnerability present across potentially thousands of locations. If an attacker discovers and takes advantage of a flaw at one franchise, they can replicate the exploit at other locations.”



Monday, June 9, 2014

Windows XP can get updates till today!

Microsoft stopped its support for Windows XP officially on April 8, 2014. This move made a large number of users to switch to the latest version of Windows, but still a wide range of users are using Microsoft oldest and most widely used operating system XP despite not receiving security updates from Microsoft.

But some companies and organizations who were not able to migrate their operating system’s running Windows XP to another operating system before the support phase ended, are still receiving updates by paying Microsoft for the security patches and updates. Now a relatively simple method has emerged as a trick for the XP users which makes it possible to receive Windows XP security updates for the next five years i.e. until April 2019.

It makes use of updates for Windows Embedded POSReady 2009 based on Windows XP Service Pack 3, because the security updates which are being released for POSReady 2009 are the same updates Microsoft would have rolled out for its Windows XP, if it was still supporting XP Operating System.

Windows Embedded POSReady 2009 is the operating system installed in "point-of-sale" (POS) systems such as restaurant machine, ticket machines or other customized version of Windows Embedded systems. POS machine most likely uses the XP operating system, therefore receives the same updates that are delivered by Microsoft for the officially unsupported version of Windows XP.

You are not allowed to directly install these Windows updates for your OS. In order to download new security updates for your Windows XP, you just need to perform a simple intervention into the Windows registration database.

FOLLOW THESE STEPS:
1. Open Notepad and create a new file.
2. Add Below given code to it:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady]
"Installed"=dword:00000001
3. Save file as .reg (test.reg) extension and run it by double clicks.
4. Once executed, you will find lots of pending updates in your Windows Action Center.

Because the extended support for Windows Embedded POSReady 2009 systems ends after 5 years, Microsoft will continue to deliver new security updates and patches for this version of its embedded operating system till April 9th, 2019, so users can use this trick to get security updates of Windows XP for another five years.

Despite receiving security updates for Windows XP by using such tricks, it is not possible to secure the complete system appropriately. So all of you to upgrade your operating system to the latest versions, i.e. Windows 7 or 8 or any Linux OS.


Thursday, May 29, 2014

Secure your passwords with Password Manager

Using a different password for every online site and service is critical to your cyber security.

There's a war raging between hackers and companies, and you're caught in the crossfire. Every time a company gets hacked, you have to change your password. And don't you dare reuse it somewhere else.

Dreaming up a different password for every site and service is the only way to keep your stuff safe online, but it's also a gigantic nuisance. There's one thing you can and should do to help: Get a password manager program. Password managers hide your information behind a master password that only you know.

There is a way to manage all your passwords together i.e., password manager, here are the password manager softwares; 1Password, Dashlane, LastPass and PasswordBox.

LastPass is a good choice for people who use newer technology like fingerprint scanners. For the really paranoid, 1Password offers the most control over where your encrypted vault of passwords gets stored.

For most people, I recommend Dashlane. It's simple, so you'll actually use it. It may even save you clicks.

Nothing is 100% guaranteed, but all four of these managers take the additional security step of never sending your master password over the Internet. They're like a safe-deposit box that a professional keeps without knowing what's inside, or even holding a key to open it.

In an age where more of our personal information lives, password protected, up in the cloud, we need defenses beyond antivirus software. Using a password manager is the next step.

Now keep all your passwords in a password manager and relax.