<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-10430888</id><updated>2024-09-11T19:52:58.564-07:00</updated><category term="insider threat"/><category term="internet crime"/><category term="anti virus"/><category term="attacks"/><category term="authentication"/><category term="hacking"/><category term="risk analysis"/><category term="spam"/><category term="espionage"/><category term="infosec fortune cookie"/><category term="risk management"/><category term="social engineering"/><category term="Facebook"/><category term="privacy"/><category term="threats"/><category term="trojan"/><category term="vulnerabilities"/><category term="DRM rootkit stealthware"/><category term="PCI"/><category term="access management"/><category term="authorization"/><category term="backups"/><category term="browsers"/><category term="confidentiality"/><category term="ecommerce"/><category term="email"/><category term="exploits"/><category term="firewall perimeter"/><category term="foreign software"/><category term="identity breach"/><category term="identity management"/><category term="intellectual property"/><category term="law"/><category term="operating system"/><category term="phishing"/><category term="reverse engineering"/><category term="security engineering"/><category term="security management"/><category term="security technology"/><category term="spam authentication"/><category term="underground"/><category term="vulnerabilities google"/><category term="worms"/><title type='text'>Good Fences: An Information Security Blog</title><subtitle type='html'>Observations, thoughts, comments, new and ramblings about information security ranging from anti-virus to incident handling, policies, patch management, secure coding, security engineering, and more.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>47</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-10430888.post-4914350428374538329</id><published>2010-09-03T07:00:00.000-07:00</published><updated>2010-09-03T07:00:04.927-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="risk analysis"/><title type='text'>The Password is Dead, Long Live the Password</title><content type='html'>&lt;a href=&quot;http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=226700303&quot;&gt;This article from Information Week&lt;/a&gt; relates the ease by which a Graphics Processing Unit on a readily available graphics card renders 7 character passwords useless because they are too easily guessed.&lt;br /&gt;
So is the Password dead?&amp;nbsp; Beyond dead, a pile of bones picked clean?&lt;br /&gt;
&lt;br /&gt;
To answer that, you have to think of the threat in the larger context. That&#39;s true of any security&amp;nbsp; arm-waving you encounter.&lt;br /&gt;
&lt;br /&gt;
Consider other attack vectors sharing the same outcome (credential theft) or the same ultimate goal.&lt;br /&gt;
&lt;br /&gt;
Then, think about the various security controls that address the steps in each of these attack vectors.&lt;br /&gt;
&lt;br /&gt;
Only with this sort of methodical, thorough analysis can you get a good handle on the issue. For example...&lt;br /&gt;
&lt;br /&gt;
Consider that the attack described in the article, a brute force password guessing attack, where the ciphertext / hash of a password is known ahead of time, is just one vector for password compromise.&lt;br /&gt;
&lt;br /&gt;
Provided that the attacker cannot get the ciphertext in the first place (the /etc/shadow or the NTLM hash or what have you), then this kind of offline password guessing is rendered useless, itself.&lt;br /&gt;
&lt;br /&gt;
So don&#39;t let the bad guys get your encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
Your controls (flaw remediation/patching, access control enforcement, and so forth) should reduce the likelihood of this significantly.&lt;br /&gt;
&lt;br /&gt;
Another attack vector is that of brute force guessing against a logon interface. This attack can be hampered by logon failure delays that slow down the process and by account lockouts where several failed logons within a particular time window lock the account.&lt;br /&gt;
&lt;br /&gt;
A way around these controls is to guess one password, each, for a long list of accounts. This delays the time between guesses for any one account.&amp;nbsp; Even if you exceed threshold of failed logons on that account, it happens outside the time window.&lt;br /&gt;
&lt;br /&gt;
Logging combined with solid monitoring will, hopefully, notify someone of repeated logon failures. The logging part is easy. The monitoring can be harder, requiring some combination of technical and people/process solution (think SOC / incident response / CIRT).&lt;br /&gt;
&lt;br /&gt;
Using a keylogger delivered through malware is probably a much easier way to steal credentials. A host of controls have to be in place to protect users from themselves, and protect operating systems from infection by such stuff.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So should we protect ourselves from GPU-based password cracking?&amp;nbsp; The problem is that the solutions are expensive or onerous.&amp;nbsp; Complex 12-character passwords are going to wreak havoc amongst the user community and use of smart cards or tokens or whatever, are going to cost a fortune.&lt;br /&gt;
&lt;br /&gt;
Is this the best place to spend scant security dollars?&amp;nbsp; Or should you spend your infosec budget on a stone that takes out two birds?&lt;br /&gt;
&lt;br /&gt;
That is, controls that not only protect password hashes but the other sensitive data on your servers and networks?&amp;nbsp; You need to do that anyway.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/4914350428374538329/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2010/09/password-is-dead-long-live-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/4914350428374538329'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/4914350428374538329'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2010/09/password-is-dead-long-live-password.html' title='The Password is Dead, Long Live the Password'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-2969920570423410547</id><published>2010-08-27T07:00:00.000-07:00</published><updated>2010-08-27T07:00:03.770-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="insider threat"/><title type='text'>Verizon&#39;s Insider Threat</title><content type='html'>You&#39;ve heard the psuedo-axiomatic bull-puckey that 80% of attacks are internal. As if this were universally true everywhere on Earth and everyone just &quot;knows&quot; this fact, like they know the hue of the sky.&lt;br /&gt;
&lt;br /&gt;
Somewhere along the way (I was hearing this when I first got into infosec in the mid 90&#39;s) some government study came to this conclusion. Quite possibly the CSI/FBI computer crime surveys were at the root, I really don&#39;t know and it really doesn&#39;t matter.&lt;br /&gt;
&lt;br /&gt;
I&#39;m not saying there isn&#39;t insider threat. Or that insider access increases impact of successful attacks thus increasing risk. I&#39;m not even particularly disagreeing with 80% because I&#39;m sure there are &lt;i&gt;cases &lt;/i&gt;where that figure is accurate.&lt;br /&gt;
&lt;br /&gt;
But we as infosec professionals have to understand our own unique threats rather than blindly quoting some nearly urban-legendary statistics as if it applies everywhere.&lt;br /&gt;
&lt;br /&gt;
Verizon&#39;s insider threat data, &lt;a href=&quot;http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=226700346&quot;&gt;according to this article&lt;/a&gt;, lends some credence to the notion of insider threat being a big deal. Where bigness of deal varies from company to company. It also suggests that the problem--at Verizon, specifically--isn&#39;t as bad as the oft-quoted 80%.&lt;br /&gt;
&lt;br /&gt;
Less interesting than the actual numbers, to me, is the fact that they collect these metrics in the first place. Do you?&amp;nbsp; Should you?&amp;nbsp; I think so.&amp;nbsp; How do/would you go about it?&lt;br /&gt;
&lt;br /&gt;
And at the same time remain mindful of the fact that we don&#39;t know what we don&#39;t know? I hate it when infosec professionals tell me, for example, &quot;we&#39;ve had xxx incidents this year&quot; and forget to add on the phrase &quot;that we know of&quot;.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/2969920570423410547/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2010/08/verizons-insider-threat.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2969920570423410547'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2969920570423410547'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2010/08/verizons-insider-threat.html' title='Verizon&#39;s Insider Threat'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-5910479800956884213</id><published>2010-08-19T07:00:00.000-07:00</published><updated>2010-08-19T07:00:07.516-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><title type='text'>Facebook Clickjacking Scam</title><content type='html'>More bad things on Facebook: &lt;a href=&quot;http://www.networkworld.com/news/2010/081810-facebook-warns-of-clickjacking.html?source=nww_rss&quot;&gt;This Network World article&lt;/a&gt; speaks of a Facebook clickjacking scam that entices users to view some photos or some such.  It hides a functional Share button underneath a Next button with some social engineering that entices users to click, unknowningly spreading the worm/thingy, then they are taken to a survey that generates money for the scammers.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.google.com/url?sa=t&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CCMQFjAA&amp;amp;url=http%3A%2F%2Fnoscript.net%2F&amp;amp;ei=-LxsTNLTMdKHnQfh5cHOCA&amp;amp;usg=AFQjCNG6f-6kQ1nuYLCdbdDXbHA9r3LjHQ&quot;&gt;No Script&lt;/a&gt; detects the attack.  Cool. I&#39;ve just started using this add on myself.  It seems to add a pretty solid layer of defense to Firefox.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/5910479800956884213/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2010/08/facebook-clickjacking-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/5910479800956884213'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/5910479800956884213'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2010/08/facebook-clickjacking-scam.html' title='Facebook Clickjacking Scam'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-6597181731547804723</id><published>2010-08-18T07:00:00.000-07:00</published><updated>2010-08-18T08:52:19.195-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><title type='text'>Facebook Dislike Button Scam</title><content type='html'>All you overly paranoid Infosec people who scoff at the slightest hint of risk taking can just take a chill pill right now. It&#39;ll take you a few years to learn--and I hope you do learn for the sake of the companies you&#39;re supposed to be protecting--that there&#39;s no place for ultra paranoia in the business world.&amp;nbsp; Maybe I&#39;ll explain that in another post.&lt;br /&gt;
&lt;br /&gt;
I bring up this point because I can just hear some infosec folks sniffing arrogantly when I admit that I use Facebook. Well, guess what, I am balancing risk versus benefit, something those sniffly infosec people should try sometime.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4YdPNPBZmyKYkl5EN8Z0l0guqni351haoDzNUsPhvAa-YCdrpN2OLPgFwGA81gEG1Xfxdek4dcMvBXw63oGfDwgcAfsgS2MDAPzmz0D5GxOWlohOj1XK_-2GilVxRisPw8zTeGw/s1600/dislike.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4YdPNPBZmyKYkl5EN8Z0l0guqni351haoDzNUsPhvAa-YCdrpN2OLPgFwGA81gEG1Xfxdek4dcMvBXw63oGfDwgcAfsgS2MDAPzmz0D5GxOWlohOj1XK_-2GilVxRisPw8zTeGw/s1600/dislike.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;There are risks I&#39;m taking using Facebook and, in fact, I did get &lt;i&gt;partially &lt;/i&gt;snookered by the &lt;a href=&quot;http://www.sophos.com/blogs/gc/g/2010/08/16/facebook-dislike-button-scam-spreads-virally/&quot;&gt;Facebook Dislike Button Scam&lt;/a&gt;. In that I clicked &quot;like&quot; when I saw the thing. &lt;u&gt;I didn&#39;t actually use it&lt;/u&gt;.&amp;nbsp; And I&#39;d like to believe that if I had, I&#39;d get suspicious of it trying to do a survey and I would disallow access to it in the end.&lt;br /&gt;
&lt;br /&gt;
Guess what, social engineering works beautifully, even occasionally on an infosec pro. There&#39;s no way to reliably patch wetware against it.&lt;br /&gt;
&lt;br /&gt;
The best we can do is achieve a reasonable, helpful level of paranoia that prevents us from doing overly stupid things.&lt;br /&gt;
&lt;br /&gt;
Then hope the rest of our technology defenses protect us from our slightly stupid mistakes.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/6597181731547804723/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2010/08/facebook-dislike-button-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/6597181731547804723'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/6597181731547804723'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2010/08/facebook-dislike-button-scam.html' title='Facebook Dislike Button Scam'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4YdPNPBZmyKYkl5EN8Z0l0guqni351haoDzNUsPhvAa-YCdrpN2OLPgFwGA81gEG1Xfxdek4dcMvBXw63oGfDwgcAfsgS2MDAPzmz0D5GxOWlohOj1XK_-2GilVxRisPw8zTeGw/s72-c/dislike.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-7751408197756327573</id><published>2009-07-13T06:00:00.000-07:00</published><updated>2009-07-13T06:00:10.893-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="insider threat"/><category scheme="http://www.blogger.com/atom/ns#" term="intellectual property"/><title type='text'></title><content type='html'>Yet another &lt;a href=&quot;http://www.computerworld.com/s/article/9135216/Programmer_steals_Wall_Street_trading_code_FBI_alleges&quot;&gt;example&lt;/a&gt; of the trusted insider threat against intellectual property.&lt;br /&gt;&lt;blockquote&gt;In the days before his June 5 resignation from Goldman Sachs, Aleynikov copied, encrypted and transferred approximately 32MB of proprietary code to a server located in Germany, the FBI claimed&lt;/blockquote&gt;Exfiltration is a difficult threat to address.  You can try to prevent it by limiting outbound protocols and connectivity.  But covert channels are always possible, even something as simple as uploading using a protocol other than HTTP running over port 80/tcp.&lt;br /&gt;&lt;br /&gt;Detection may be possible if you have a device that can detect proprietary keywords.  A proxy server requiring authentication and providing adequate logging can facilitate incident response: determining the extent of the incident and finding the culprit.&lt;br /&gt;&lt;br /&gt;I deduce that Goldman Sachs is either lucky or has a pretty good start on solving this problem.&lt;br /&gt;&lt;blockquote&gt;Aleynikov resigned to take a job with a new company &quot;that intended to engage in high-volume automated trading,&quot; for triple his $400,000 salary, the complaint said.&lt;br /&gt;&lt;/blockquote&gt;&lt;blockquote&gt;...he was allegedly a vice president of equity strategy.&lt;br /&gt;&lt;/blockquote&gt;The reality is, the higher you go up the executive chain, usually the harder it is to enforce rules.  That&#39;s another reason that security programs are only successful when the CEO and board want it, demand it, and make sure they get it.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/7751408197756327573/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2009/07/yet-another-example-of-trusted-insider.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/7751408197756327573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/7751408197756327573'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2009/07/yet-another-example-of-trusted-insider.html' title=''/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-442612115593755305</id><published>2009-07-08T12:47:00.000-07:00</published><updated>2009-07-08T12:58:49.204-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><title type='text'>FTC persuades court to shutter rogue ISP</title><content type='html'>I feel the recent action of the FTC against a rogue ISP, documented in &lt;a href=&quot;http://www.securityfocus.com/news/11552?ref=rss&quot;&gt;this article&lt;/a&gt;, marks a shift in the tides in the war against spam.&lt;br /&gt;&lt;br /&gt;It seems much of the junk email originates from ISPs that refuse to follow the rules, allowing anonymous spammers to register domains with false information.&lt;br /&gt;&lt;br /&gt;As a user of &lt;a href=&quot;http://www.knujon.com/&quot;&gt;Knujon&lt;/a&gt; for some time, I&#39;ve been eagerly reading about their recent successes working with &lt;a href=&quot;http://en.wikipedia.org/wiki/ICANN&quot;&gt;ICANN&lt;/a&gt; for stricter enforcement of rules, resulting in many rogue ISPs being shut down.&lt;br /&gt;&lt;br /&gt;As of this writing, Knujon has shut down over 200 thousand junk email sites according to their website.  I&#39;ve already &lt;a href=&quot;http://shimsec.blogspot.com/2008/05/you-know-about-knujon.html&quot;&gt;written&lt;/a&gt; about Knujon, but it seems the momentum is building.&lt;br /&gt;&lt;br /&gt;Shutting down rogue ISPs can be successful in making the cost/benefit equation less favorable for spammers and criminals by making domains harder and more expensive to obtain. If so, perhaps we will start to see a noticeable decline in spam around the world.  Maybe it has &lt;a href=&quot;http://tech.yahoo.com/blog/null/137384&quot;&gt;already started&lt;/a&gt;?  Or &lt;a href=&quot;http://blogs.zdnet.com/security/?p=3566&quot;&gt;maybe not&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The problem is giant, so I suspect it will still be some years away, but I think we are seeing the signs that this approach will work.&lt;br /&gt;&lt;br /&gt;The article above also mentions that other criminal activity was curtailed by shutting down this rogue ISP.  Cool.&lt;br /&gt;&lt;br /&gt;Sometimes non-technical solutions really are the answer.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/442612115593755305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2009/07/ftc-persuades-court-to-shutter-rogue.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/442612115593755305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/442612115593755305'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2009/07/ftc-persuades-court-to-shutter-rogue.html' title='FTC persuades court to shutter rogue ISP'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-3548927863963880054</id><published>2009-07-03T23:32:00.001-07:00</published><updated>2009-07-04T00:25:11.947-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet crime"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><title type='text'>Criminals Steal $415k from Bullitt County</title><content type='html'>I am getting kind of burned out on computer security.  I know, I know, it&#39;s &lt;span style=&quot;font-style: italic;&quot;&gt;only&lt;/span&gt; been 14 years that I have been in the trenches and, after all, we are making such &lt;span style=&quot;font-style: italic;&quot;&gt;tremendous&lt;/span&gt; progress in the infosec industry in that brief span of time.&lt;br /&gt;&lt;br /&gt;Now instead of curious geeks hacking computers for fun and irritating people, we have widespread criminal activity. Instead of passwords, we&#39;re now using... um.  Nevermind.  And we went from having no network boundary enforcement to... err... having no network boundaries.   Software security bugs are a thing of the past.  And present.  And forseeable future.  But hey, at least hackers are targeting networks and systems less.  Now they&#39;re just targeting people and client software.  Cool.  That&#39;s lots better.&lt;br /&gt;&lt;br /&gt;Speaking of criminal activity. Here&#39;s yet another example of a phishing attack working. &lt;a href=&quot;http://www.wlky.com/news/19922512/detail.html&quot;&gt;Criminals stole over $400,000 from a municipality&#39;s bank account&lt;/a&gt;. Why did this attack work?  You could blame user(s) for giving away the info, falling for the phishing scheme. Or blame it on a lack of awareness training. But folks, the phishing attacks are getting so sophisticated even very experienced infosec professionals have a hard time.&lt;br /&gt;&lt;br /&gt;Seems to me these attacks work because it is difficult to reliably verify trustworthiness of messages or senders.  The same issue makes it easy for spammers to make / steal money.  With a widely deployed SMTP infrastructure, how do we make improvements?</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/3548927863963880054/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2009/07/criminals-steal-415k-from-bullitt.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3548927863963880054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3548927863963880054'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2009/07/criminals-steal-415k-from-bullitt.html' title='Criminals Steal $415k from Bullitt County'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-8756987657406299611</id><published>2009-05-13T13:15:00.000-07:00</published><updated>2009-05-13T13:21:16.012-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="browsers"/><category scheme="http://www.blogger.com/atom/ns#" term="exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>CanSecWest Browser Hacking Contest - what a help</title><content type='html'>SecurityFocus article is &lt;a href=&quot;http://www.securityfocus.com/news/11549?ref=rss&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Security researcher Charlie Miller held onto a vulnerability for an entire year, before using it on Wednesday to win $5,000 and an Apple laptop at the Pwn2Own contest here at the CanSecWest conference.&lt;/blockquote&gt;&lt;br /&gt;I&#39;m not sure which is least responsible, someone hanging onto a vulnerability for a year or holding contests that encourage this kind of behavior.  Ok, sure, Safari isn&#39;t exactly widely deployed so maybe the bad guys didn&#39;t also discover this and exploit it for a year.&lt;br /&gt;&lt;br /&gt;Another individual, Nils, successfully exploited an out of the box Explorer 8 on Windows 7. Given all the security features added to both, I think that&#39;s a pretty impressive feat.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/8756987657406299611/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2009/05/cansecwest-browser-hacking-contest-what.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8756987657406299611'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8756987657406299611'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2009/05/cansecwest-browser-hacking-contest-what.html' title='CanSecWest Browser Hacking Contest - what a help'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-2443468949322819444</id><published>2008-10-19T07:31:00.000-07:00</published><updated>2008-10-19T07:45:57.356-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="espionage"/><category scheme="http://www.blogger.com/atom/ns#" term="internet crime"/><title type='text'>USA Today: Hackers got into 18 computer servers at World Bank</title><content type='html'>Did you see the &lt;a href=&quot;http://www.usatoday.com/money/industries/banking/2008-10-12-world-bank-hackers_N.htm&quot;&gt;USA Today article&lt;/a&gt; on the World Bank intrusions?&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Cyberintruders used the Internet to crack into at least 18 computer servers at the World Bank Group last July.&lt;br /&gt;&lt;br /&gt;One bank memo lists the breached servers and makes this assessment: &quot;As of 9/9/08 we have determined that 5 of the compromised servers contain sensitive data, and care must be taken to determine the amount of information that may have been transmitted outside of the World Bank Group.&quot;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Wow, sounds like old school system penetrations.  And here we thought all the hacking nowadays was through browser and email exploits.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Banks, indeed, are not the only targets. Corporate intrusions in general are on the rise, says Phil Neray, vice president at database security firm Guardium. Cybercrooks seek out PCs used by privileged insiders so they can access sensitive databases and other PCs. &quot;Many organizations don&#39;t have any real-time monitoring or alerting mechanisms in place to identify unauthorized activities,&quot; Neray says.&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Hopefully the state of information security in private industry is a lot better these days but somehow I doubt it.  The risk needs to be palpable enough for CEOs to give a crap. As for the realtime monitoring, that should really be the last line of defense. The detective control to catch whatever preventative controls don&#39;t.&lt;br /&gt;&lt;br /&gt;To me this type of article underscores the need to look at security in breadth across the enterprise as well as in depth.  It&#39;s like securing a house. You don&#39;t put an iron door on a tin shed. Hackers are looking for the one way in. So make all the ways in a little bit harder.&lt;br /&gt;&lt;p class=&quot;inside-copy&quot;&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/2443468949322819444/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/10/usa-today-hackers-got-into-18-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2443468949322819444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2443468949322819444'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/10/usa-today-hackers-got-into-18-computer.html' title='USA Today: Hackers got into 18 computer servers at World Bank'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-1753618320782303565</id><published>2008-09-05T13:04:00.001-07:00</published><updated>2008-09-05T13:27:09.389-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="infosec fortune cookie"/><title type='text'>Infosec Fortune Cookie Friday</title><content type='html'>Mitigating a risk with a stringent security control can create its own risk: that of business interruption.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/1753618320782303565/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/09/infosec-fortune-cookie-friday.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1753618320782303565'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1753618320782303565'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/09/infosec-fortune-cookie-friday.html' title='Infosec Fortune Cookie Friday'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-403583506531353369</id><published>2008-09-04T05:27:00.000-07:00</published><updated>2008-09-04T05:34:07.850-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="authentication"/><title type='text'>Replacing Passwords</title><content type='html'>NY Times has &lt;a href=&quot;http://www.nytimes.com/2008/08/10/technology/10digi.html?_r=2&amp;amp;ref=technology&amp;amp;oref=slogin&amp;amp;oref=slogin&quot;&gt;an article on authentication&lt;/a&gt; without using passwords.&lt;br /&gt;&lt;blockquote&gt;The solution urged by the experts is to abandon passwords — and to move to a fundamentally different model, one in which humans play little or no part in logging on. Instead, machines have a cryptographically encoded conversation to establish both parties’ authenticity, using digital keys that we, as users, have no need to see.&lt;br /&gt;...&lt;br /&gt;As users, we would replace passwords with so-called information cards, icons on our screen that we select with a click to log on to a Web site. The click starts a handshake between machines that relies on hard-to-crack cryptographic code.&lt;br /&gt;...&lt;br /&gt;“Users on shared systems can easily set up a simple PIN code to protect any card from use by other users,” Mr. Cameron said. &lt;/blockquote&gt;While I don&#39;t deny that passwords have their problems, I want to think this solution over a little. Meanwhile, if anyone out there is awake, I&#39;m curious to hear your thoughts.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/403583506531353369/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/09/replacing-passwords.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/403583506531353369'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/403583506531353369'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/09/replacing-passwords.html' title='Replacing Passwords'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-9094124709154861811</id><published>2008-08-08T03:45:00.000-07:00</published><updated>2008-08-08T04:04:02.037-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="risk management"/><category scheme="http://www.blogger.com/atom/ns#" term="security management"/><title type='text'>Changes</title><content type='html'>All I can say to this is, &#39;bout time:&lt;br /&gt;&lt;blockquote&gt;IT directors will play a dramatically reduced role in working with security professionals, says the Information Security Forum, which has issued a report that outlines how businesses&#39; view of security is evolving. Chief risk officers, chief security officers and chief operation officers will be more involved in security strategy, according to the ISF. The change is fueled by Enterprise Risk Management and companies&#39; increasing vision of merging physical security with information security, reports the ISF. &lt;a href=&quot;http://www.networkworld.com/news/2008/073108-security-set-to-move-beyond.html&quot; target=&quot;_blank&quot;&gt;Network World&lt;/a&gt; (07/31) &lt;/blockquote&gt;The downside of the above is that information security requires highly technical solutions and so either security talent has to migrate and disperse into IT organizations (not a bad thing) or strong ties between infosec talent and IT have to remain, or perhaps both. Otherwise infosec becomes all high level strategy with extremely poor execution.  The Network World article goes on to say:&lt;br /&gt;&lt;blockquote&gt;less than 3 out 10 information security professionals believe they are focused on delivering solutions to the business.&lt;/blockquote&gt;When you hear people talking about information security enabling the business, this is what they are talking about.  The goal isn&#39;t simply to prevent or reduce risk. It&#39;s to enable the business to move forward with opportunities but with a tolerable level of risk. To do that you have to come up with creative solutions-- finding ways to say yes instead of no.&lt;br /&gt;&lt;blockquote&gt;Davies points out that there is currently a large increase in information security professionals reporting to chief risk officers (CRO), chief security officers (CSO) and chief operation officers.&lt;br /&gt;&lt;/blockquote&gt;Infosec stepping away from IT makes it more difficult to build trust and alliances at the worker level which is crucial in building a security culture where IT personnel help the security group rather than avoiding them.  Appointing infosec point of contact within various IT organizations can help.&lt;br /&gt;&lt;br /&gt;The upside of this move outside of IT is that the struggle between sometimes opposing goals of IT and Infosec can happen at a higher management level where it often belongs. Infosec can gain a bit more authority, to be weilded very carefully, of course. This arrangement also gives the proper business focus to security groups and provides better visibility of security issues to upper management.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/9094124709154861811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/08/all-i-can-say-to-this-is-bout-time-it.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/9094124709154861811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/9094124709154861811'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/08/all-i-can-say-to-this-is-bout-time-it.html' title='Changes'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-3790157075283903459</id><published>2008-08-01T08:31:00.000-07:00</published><updated>2008-08-01T08:45:24.888-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilities"/><title type='text'>DNS</title><content type='html'>So, how about that &lt;a href=&quot;http://www.doxpara.com/?p=1185&quot;&gt;DNS vulnerability&lt;/a&gt;, huh?&lt;br /&gt;&lt;br /&gt;Brings back memories of the days gone by when vulnerabilities and attacks regularly threatened the entire internet rather than being as targeted as they are now.  Well, I guess this time there&#39;s a pretty ubiquitous hole that can be used for targeted attacks until folks patch. If they haven&#39;t they&#39;re nuts.&lt;br /&gt;&lt;br /&gt;Meanwhile... Dan K suggests using &lt;a href=&quot;http://www.opendns.com/&quot;&gt;OpenDNS&lt;/a&gt; since they were fixed before many ISPs.  Having one place provide DNS to a lot of people kind of paints a giant target on their backs but then again that&#39;s no different than any major ISP&#39;s DNS servers. OpenDNS beat a lot of ISP&#39;s to the punch in patching so maybe that is an indiciation of the kind of shop they run.  Plus they offer content filtering, typo fixing, and phishing protection &lt;a href=&quot;http://www.opendns.com/features/overview/&quot;&gt;features&lt;/a&gt;. Nice.&lt;br /&gt;&lt;br /&gt;But, you probably knew all that, right?&lt;br /&gt;&lt;br /&gt;So why didn&#39;t you tell me? :)</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/3790157075283903459/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/08/dns.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3790157075283903459'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3790157075283903459'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/08/dns.html' title='DNS'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-2039957539029157350</id><published>2008-08-01T08:29:00.000-07:00</published><updated>2008-08-01T08:31:00.916-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="infosec fortune cookie"/><title type='text'>Infosec Fortune Cookie Friday</title><content type='html'>It is written: One who swings the great bat of authority cannot spare a helping hand.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/2039957539029157350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/08/friday-infosec-fortune-cookie.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2039957539029157350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/2039957539029157350'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/08/friday-infosec-fortune-cookie.html' title='Infosec Fortune Cookie Friday'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-4685370694965482673</id><published>2008-07-11T08:37:00.000-07:00</published><updated>2008-07-11T08:44:53.507-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="infosec fortune cookie"/><title type='text'>Infosec Fortune Cookie Friday</title><content type='html'>It is written, one who only says &quot;no&quot; with arms folded and lips pursed builds only adversaries, not security.  And should be slapped.  Hard.&lt;br /&gt;&lt;br /&gt;One who seeks a way to say &quot;yes&quot; shall find many allies to help him along the long and twisting road to a secure organization... unless the CEO drives him nuts first...&lt;br /&gt;&lt;br /&gt;One who says &quot;no&quot; should not merely explain why afterwards, but beforehand, too...&lt;br /&gt;&lt;br /&gt;One who writes fortune cookie sayings about security really needs a vacation...</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/4685370694965482673/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/07/infosec-fortune-cookie-friday.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/4685370694965482673'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/4685370694965482673'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/07/infosec-fortune-cookie-friday.html' title='Infosec Fortune Cookie Friday'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-6268841582728192310</id><published>2008-06-10T11:13:00.000-07:00</published><updated>2008-06-10T11:26:20.034-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity breach"/><title type='text'>Missing Backup Tapes</title><content type='html'>C|Net News article: &lt;a href=&quot;http://news.cnet.com/8301-10784_3-9959976-7.html?part=rss&amp;amp;tag=feed&amp;amp;subj=NewsBlog&quot;&gt;Bank of New York Mellon says customer data exposed&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;The Bank of New York Mellon says sensitive data of more than 4 million people owning shares in public companies was exposed after a box of back-up data storage tapes went missing in February. The data included names, addresses, and Social Security numbers.&lt;br /&gt;&lt;/blockquote&gt;Where the hell do these tapes go, anyway?  When I read these tapes-gone-missing articles I always picture armed robbers running the tape truck off the road ala some kind of armored car heist.  But no, they just go missing, they&#39;re not proven to be stolen.  It must be the work of Chinese hackers taking a break from &lt;a href=&quot;http://blog.wired.com/27bstroke6/2008/05/did-hackers-cau.html&quot;&gt;planting rogue trees to disable the nation&#39;s power infrastructure&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I&#39;ve been out of the loop on backups for awhile.  Does backup software make it easy (if not the default) to encrypt data?  If not, it&#39;s definitely time.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/6268841582728192310/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/06/cnet-news-article-bank-of-new-york.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/6268841582728192310'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/6268841582728192310'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/06/cnet-news-article-bank-of-new-york.html' title='Missing Backup Tapes'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-8697223229390955263</id><published>2008-05-30T08:32:00.000-07:00</published><updated>2008-05-30T10:17:43.236-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ecommerce"/><title type='text'>Hacker Safe</title><content type='html'>Does McAfee&#39;s &lt;a href=&quot;http://www.scanalert.com/RatingVerify?ref=www.cabelas.com&quot;&gt;Hacker Safe&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; &lt;/span&gt;badge (aka &lt;a href=&quot;http://www.mcafeesecure.com/us/merchants-benefits.jsp&quot;&gt;ScanAlert&lt;/a&gt;) really suggest a consumer is safer shopping at a site displaying this badge?  By now you&#39;ve probably heard the answer is no.&lt;br /&gt;&lt;br /&gt;Russ McRee&#39;s &lt;a href=&quot;http://holisticinfosec.blogspot.com/2008/04/still-not-hacker-safe-roll-video.html&quot;&gt;blog post&lt;/a&gt; and &lt;a href=&quot;http://holisticinfosec.org/video/HS_ISSA/ISSA_Regional_HackerSafe.html&quot;&gt;video&lt;/a&gt; show that &quot;Hacker Safe&quot; should not be taken too literally: the websites displaying this badge are not necessarily safe from hacking. Many are explicitly vulnerable.&lt;br /&gt;&lt;br /&gt;Rather than adding to the emotion and arm waving, I thought it might be helpful to look at a couple of specific points.&lt;br /&gt;&lt;br /&gt;Assuming &quot;Hacker Safe&quot; is intending to suggest the site is safe from hackers; nevertheless, security professionals know, as should the general public, that perfect security and perfect safety are not possible in an imperfect world populated with error prone people.&lt;br /&gt;&lt;br /&gt;Scanning a site and finding no &lt;span style=&quot;font-style: italic;&quot;&gt;known&lt;/span&gt; vulnerabilities has never meant the site was safe, and it never really showed a completely accurate view of risk. Although five or ten years ago this type of scan offered more assurance than it does today.  Why?  The growth of criminal hacking activity, 0-day attacks, targeted attacks, and the increase in browser- and malware-based attacks means the other attack vectors and &lt;span style=&quot;font-style: italic;&quot;&gt;unknown&lt;/span&gt; attacks are more likely to be used now than they used to be.&lt;br /&gt;&lt;br /&gt;So what gives an accurate picture, other certifications like &lt;a href=&quot;http://www.truste.org/&quot;&gt;TRUSTe&lt;/a&gt;?  Maybe. Any certification, whether of website&#39;s security or a security professional&#39;s skills and experience, or a &lt;a href=&quot;http://www.jeep.com/en/4x4/trail_rated/index.html&quot;&gt;Jeep&#39;s off-road capability&lt;/a&gt;, are a shortcut to highly detailed, long term, careful, knowledgeable evaluation of real world performance.  Certifications are, in a sense, a mechanism for transferring trust (or, call it confidence), from the certifier in the subject under scrutiny to the individual evaluating the subject. If the individual trusts (has confidence in) the certification, then they can transfer their trust (confidence) to the certified subject.&lt;br /&gt;&lt;br /&gt;The key question is how much trust you have in the certification. The hacker doesn&#39;t care if you&#39;re certified, she just finds a vulnerability and uses it.  A person can have an alphabet soup after their name but what matters is whether they can do a good job as a security pro.  The rocks that you hang up your Jeep on probably knocked the Trail Rated badge off already.&lt;br /&gt;&lt;br /&gt;But if the certification is objective, considers enough factors, and tests thoroughly enough, then the certification more closely approaches a measure of real world performance without taking the time necessary for each person to evaluate the subject in depth.  All we have to do is evaluate the evaluation.&lt;br /&gt;&lt;br /&gt;Some type of certification is usually better than nothing at all but in the case of &quot;Hacker Safe&quot; it appears to be more focused on &lt;a href=&quot;http://www.scanalert.com/content/affiliate/pitch.jsp?a=63&amp;amp;c=55&amp;amp;k=VrFppjPpQN&quot;&gt;marketing&lt;/a&gt; than on a useful, objective evaluation. Combined with the name of the program itself, trust in this certification probably should be fairly low. Perhaps McAfee will improve it as ScanAlert, looking for XSS, and denying use of the banner to sites that don&#39;t pass the tests.&lt;br /&gt;&lt;br /&gt;Meanwhile we continue to rely on personal methods for risk mitigation: watching our bank and credit card statements, checking credit ratings periodically, etc.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/8697223229390955263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/05/hacker-safe.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8697223229390955263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8697223229390955263'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/05/hacker-safe.html' title='Hacker Safe'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-8336934892747496069</id><published>2008-05-24T04:48:00.000-07:00</published><updated>2008-05-24T04:59:54.109-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet crime"/><title type='text'>Targeting Restaurants</title><content type='html'>Just in case we forgot that modern computer criminals are intelligent, motivated human beings, likely to select whatever target works best to meet their goals, here&#39;s an &lt;a href=&quot;http://news.softpedia.com/news/Banks-No-Longer-Attractive-Hackers-Now-Targeting-Restaurants-85539.shtml&quot;&gt;article&lt;/a&gt; on several who decided to put the crosshairs on Dave &amp;amp; Busters restaurants for financial info and came away with thousands of credit cards.  As internet crime becomes more of a widespread daily threat to the average Joe, I guess we all need to get better at personal risk mitigation.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/8336934892747496069/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/05/targeting-restaurants.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8336934892747496069'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/8336934892747496069'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/05/targeting-restaurants.html' title='Targeting Restaurants'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-917071335842141900</id><published>2008-05-21T04:21:00.001-07:00</published><updated>2008-05-21T04:28:45.544-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><title type='text'>You Know about KnujOn?</title><content type='html'>Who loves spam? Anyone? Well, some boneheads out there actually send money to attempt to buy stuff listed in spam. Grr.  The rest of us hate it and want it gone.&lt;br /&gt;&lt;br /&gt;There&#39;s a guy out there who decided to fight back and formed &lt;a href=&quot;http://www.knujon.com/&quot;&gt;KnujOn&lt;/a&gt; (spell it backwards).  Anyway, he&#39;s been really successful in shutting down sites and turns out most of the spam is &lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/05/most_spam_sites_tied_to_a_hand_1.html&quot;&gt;concentrated among a small number of registrars&lt;/a&gt;, some in China and one, &lt;a href=&quot;http://maps.google.com/maps?ie=UTF8&amp;amp;oe=UTF-8&amp;amp;q=5023+W+120th+Ave,+Broomfield,+CO+80020,+USA&amp;amp;ll=39.917472,-105.050068&amp;amp;spn=0.014647,0.034547&amp;amp;t=p&amp;amp;z=15&amp;amp;iwloc=addr&quot;&gt;Dynamic Dolphin&lt;/a&gt;, not far from my home here in Colorado if one is to believe the address information.&lt;br /&gt;&lt;br /&gt;Here&#39;s his &lt;a href=&quot;http://www.knujon.com/registrars/&quot;&gt;article on the top 10 worst offenders&lt;/a&gt;.  Want to help?  Have a look at his website and start reporting your spam to him per the directions.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/917071335842141900/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/05/you-know-about-knujon.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/917071335842141900'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/917071335842141900'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/05/you-know-about-knujon.html' title='You Know about KnujOn?'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-1028536130508447733</id><published>2008-05-01T06:47:00.000-07:00</published><updated>2008-05-01T07:12:33.167-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="insider threat"/><title type='text'>The Insider Threat</title><content type='html'>How many times have you heard it?  Insider threat makes up 75% of cyber attacks.  Or, is it 80% ?  Or 85%?&lt;br /&gt;&lt;br /&gt;Enough already! I can&#39;t take it any more!&lt;br /&gt;&lt;br /&gt;I first heard this 10 years ago as a fledgling infosec geek from a company called Trident Data Systems who quoted a government study pegging the number at 80%.  Since then I&#39;ve heard this type of statistic quoted at anywhere from 50% to 90%.  &lt;a href=&quot;http://www.cert.org/insider_threat/&quot;&gt;Studies&lt;/a&gt; and &lt;a href=&quot;http://www.gosci.com/forms/csi_survey.html&quot;&gt;surveys&lt;/a&gt; seem to post lower, but similarly diverse, numbers. &lt;br /&gt;&lt;br /&gt;So, I&#39;m getting a wee bit weary of hearing people quoting this &lt;a href=&quot;http://www.snopes.com/crime/statistics/superbowl.asp&quot;&gt;apocryphal statistic&lt;/a&gt;, passing it around.  So much so that now I have to coin a new term: &quot;urban statistic.&quot;&lt;br /&gt;&lt;br /&gt;...On the other hand, being able to play the FUD card at any time &lt;span style=&quot;font-style: italic;&quot;&gt;is&lt;/span&gt; kind of handy.  Why analyze threats and risk and apply appropriate controls?  That&#39;s too hard.  It&#39;s so much more fun to just scare people.  F-U-D -- that spells &quot;security&quot;!&lt;br /&gt;&lt;br /&gt;And besides, everyone knows 90% of all statistics can be made to say anything....&lt;br /&gt;&lt;br /&gt;50% of the time.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/1028536130508447733/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/05/insider-threat.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1028536130508447733'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1028536130508447733'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/05/insider-threat.html' title='The Insider Threat'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-3196494788166673696</id><published>2008-04-18T05:24:00.000-07:00</published><updated>2008-04-18T05:48:42.630-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>Google Street View Becomes Driveway</title><content type='html'>This &lt;a href=&quot;http://www.securitypronews.com/news/securitynews/spn-45-20080407GoogleStreetViewBecomesDrivewayView.html&quot;&gt;article on SecurityProNews&lt;/a&gt; describes a situation where a &lt;a href=&quot;http://maps.google.com/help/maps/streetview/&quot;&gt;Google Street View&lt;/a&gt; camera car enters and films someone&#39;s driveway.&lt;br /&gt;&lt;blockquote&gt;When The Smoking Gun tipped off Janet McKee as to Google&#39;s impromptu visit, she said it was &quot;a little bit creepy to think of someone filming our home without me knowing about it.&quot;&lt;br /&gt;&lt;/blockquote&gt;The Google camera car left public property (prohibited by Google) and drove up the couple&#39;s winding driveway. The reaction would have probably been different had the images not found themselves at the fingertips of &lt;a href=&quot;http://www.internetworldstats.com/stats.htm&quot;&gt;billions&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;This is dumb, but I admit it does creep me out a little bit that my own house is viewable by the planet. But why? Instead of people having to physically be present to ogle my abode -- so I can see them by peeking out the window -- they can anonymously view it  at any time, entirely unknown to me.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9zhhkebaJR6xSxa8xxN1HibayRDZWuRHjJ4gL1NeVTX4eoLxummw9qsIr3SBcpu69WDLg65AKX1jy3eMQFLeqSCLP9oLlDCes9sLKmiebrCzPI0rCus_lWqbnV1yflxFECM-Kow/s1600-h/TC-SV.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9zhhkebaJR6xSxa8xxN1HibayRDZWuRHjJ4gL1NeVTX4eoLxummw9qsIr3SBcpu69WDLg65AKX1jy3eMQFLeqSCLP9oLlDCes9sLKmiebrCzPI0rCus_lWqbnV1yflxFECM-Kow/s320/TC-SV.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5190565308819098946&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Whereas I rely on the obscurity afforded by the physical world&#39;s limitations, when those limitations go away, what is the impact to my privacy, confidentiality?&lt;br /&gt;&lt;br /&gt;Should I throw a tarp over the Jeep lest someone stumble across my street view and find themselves a cheap source for parts? &lt;br /&gt;&lt;br /&gt;Should I worry that criminals now have an easier time casing my house?&lt;br /&gt;&lt;br /&gt;For now, the world&#39;s internet users still have to click their way to our houses. But as more information comes online about each of us, we&#39;ll have to rethink some basic assumptions about our security and privacy.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/3196494788166673696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/04/google-street-view-becomes-driveway.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3196494788166673696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/3196494788166673696'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/04/google-street-view-becomes-driveway.html' title='Google Street View Becomes Driveway'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9zhhkebaJR6xSxa8xxN1HibayRDZWuRHjJ4gL1NeVTX4eoLxummw9qsIr3SBcpu69WDLg65AKX1jy3eMQFLeqSCLP9oLlDCes9sLKmiebrCzPI0rCus_lWqbnV1yflxFECM-Kow/s72-c/TC-SV.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-1940211073329410560</id><published>2008-04-15T13:35:00.000-07:00</published><updated>2008-04-15T13:51:53.606-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti virus"/><category scheme="http://www.blogger.com/atom/ns#" term="espionage"/><category scheme="http://www.blogger.com/atom/ns#" term="threats"/><title type='text'>Targeting Oddball Platforms</title><content type='html'>Another &lt;a href=&quot;http://www.eweek.com/c/a/Security/The-Chinese-eWars-Past-and-Future-Reports-From-the-Front/&quot;&gt;article on targeted attacks&lt;/a&gt;. Larry Seltzer makes an interesting point towards the end of the article about the use of oddball operating systems and applications.&lt;br /&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;txt&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Some experts might recommend that you use alternative platforms like the Mac or OpenOffice, but these really don&#39;t help &lt;strong&gt;&lt;em&gt;at all&lt;/em&gt;&lt;/strong&gt; with targeted attacks. If someone&#39;s rolling out a new vulnerability for a targeted attack, it&#39;s just as easy for them to do it on OpenOffice and the Mac, which have numerous vulnerabilities, as for Windows. In fact, it&#39;s easier and cheaper for them to do it on the alternatives, where the price for a new, unpatched vulnerability is probably much cheaper than for Windows.&lt;/p&gt; &lt;p&gt;&lt;/p&gt;&lt;/blockquote&gt;I&#39;d think oddball platforms probably help with mass attacks.  Those attacks are more likely to target Windows and more likely to be a bigger issue for home users.  So, switching over to an alternative platform could make more sense for the home user; the cost/benefit analysis probably looks different than it would to an enterprise.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;txt&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;Article_Date&quot;&gt;&lt;span class=&quot;txt&quot;&gt;&lt;br /&gt;What makes the most sense, I think, is to make sure you continue patching regularly, and use security software like firewall, anti-spyware / anti-virus.  When I say &quot;firewall&quot; I mean the kind that detects and blocks &lt;span style=&quot;font-style: italic;&quot;&gt;outbound&lt;/span&gt; network traffic on a per-process basis as well as inbound traffic.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/1940211073329410560/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/04/targeting-oddball-platforms.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1940211073329410560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1940211073329410560'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/04/targeting-oddball-platforms.html' title='Targeting Oddball Platforms'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-5321750075272438437</id><published>2008-04-02T05:17:00.000-07:00</published><updated>2008-04-02T05:48:10.216-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="internet crime"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI"/><title type='text'>Advance Auto Parts Store Data Breach</title><content type='html'>&lt;p&gt;From &lt;a href=&quot;http://www.theregister.co.uk/2008/04/01/auto_parts_store_hack/&quot;&gt;The Register&lt;/a&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Advance Auto Parts, the US motoring parts retailer, is the latest firm to give up customer credit card data to hackers.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The bad guys gleaned financial information on up to 56,000 customers, through an attack affecting 14 stores nationwide...&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/blockquote&gt;Advance Auto Parts website provides &lt;a href=&quot;http://www.advanceautoparts.com/creditsecurity/default.asp&quot;&gt;more information&lt;/a&gt;.  So this only affects a handful of stores.  Interesting. Methods and perps unknown.&lt;br /&gt;&lt;br /&gt;I&#39;m a big fan of companies being held accountable to standards of due care in the form of PCI standards and legal obligations.  Significant penalties encourage companies to do the right thing.&lt;br /&gt;&lt;br /&gt;Having worked at companies whose execs and upper management didn&#39;t give a rip about data security, due care, or anything that didn&#39;t involve raking in money, and having heard from more than a few infosec peers that this is the rule, not the exception, the only way my data and yours is going to stay protected is through penalties.&lt;br /&gt;&lt;br /&gt;Penalties that significantly affect the bottom line --- or better, penalties that personally affect CEOs: in the form of wearing orange jumpsuits.  The only reason SOX got any traction in companies is the threat of jail time for management.   HIPAA has been largely &lt;a href=&quot;http://www.eweek.com/c/a/Health-Care/HIPAA-Compliance-SoSo-and-Stalling/&quot;&gt;ignored&lt;/a&gt; by a surprising number of healthcare companies. Bigger fines and jail time for execs would fix that fast.&lt;br /&gt;&lt;br /&gt;And remember, we wouldn&#39;t even be hearing about these breaches in the first place if it weren&#39;t for California&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/SB_1386&quot;&gt;SB1386&lt;/a&gt; and all the copycat state laws that states created thereafter.  The effect of these laws should be obvious to anyone following infosec news before and after 2003.  Companies were hardly voluntarily disclosing data breaches --- until they were required to by law.&lt;br /&gt;&lt;br /&gt;Even then, I&#39;ll bet cash money there are still companies ignoring this requirement.  I&#39;ve already posted about delayed notifications.  Penalties and laws don&#39;t fix everyone and everything, but they do help to counter temptation and encourage honesty.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/5321750075272438437/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/04/us-auto-parts-store-spills-data-to.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/5321750075272438437'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/5321750075272438437'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/04/us-auto-parts-store-spills-data-to.html' title='Advance Auto Parts Store Data Breach'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-7219767062816771998</id><published>2008-04-01T06:11:00.000-07:00</published><updated>2008-04-01T06:25:43.725-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="backups"/><category scheme="http://www.blogger.com/atom/ns#" term="confidentiality"/><category scheme="http://www.blogger.com/atom/ns#" term="security technology"/><title type='text'>Radio Tracking for Backup Tapes</title><content type='html'>&lt;a href=&quot;http://www.theregister.co.uk/2008/03/29/fujifilm_tracking/&quot;&gt;Fujifilm bugs backup tapes with LoJack device&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;Looks like it runs $150/mo to track your tapes and reduce the likelihood of tapes going missing as has happened to quite a number of organizations over the last few years.&lt;br /&gt;&lt;br /&gt;Is this really the best solution?  How often do tapes go missing and how much damage does it cause?  What level of risk mitigation does this technology afford?  How does encryption of the data on the tapes compare in cost?  Those are the questions I&#39;d be asking myself if I were in a position of managing this risk.&lt;br /&gt;&lt;br /&gt;I think I&#39;d rather know my lost tapes were &lt;span style=&quot;font-style: italic;&quot;&gt;unreadable&lt;/span&gt; than to &lt;span style=&quot;font-style: italic;&quot;&gt;possibly &lt;/span&gt;know where my &lt;span style=&quot;font-style: italic;&quot;&gt;readable&lt;/span&gt; lost tapes were.  Y&#39;know?&lt;br /&gt;&lt;br /&gt;I say &quot;possibly&quot; because I am guessing the lojack thingy is probably not 100% tamper resistant. &lt;br /&gt;&lt;br /&gt;Michael</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/7219767062816771998/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/04/radio-tracking-for-backup-tapes.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/7219767062816771998'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/7219767062816771998'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/04/radio-tracking-for-backup-tapes.html' title='Radio Tracking for Backup Tapes'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10430888.post-1354355422588106993</id><published>2008-03-28T17:24:00.000-07:00</published><updated>2008-03-28T17:27:30.782-07:00</updated><title type='text'>Laptop theft exposes patients&#39; medical data</title><content type='html'>&lt;a href=&quot;http://www.news.com/8301-10784_3-9902692-7.html?part=rss&amp;amp;tag=feed&amp;amp;subj=NewsBlog&quot;&gt;Laptop theft exposes patients&#39; medical data (C|Net News)&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;The computer was stolen in February ... but officials did not notify the patients of the theft until Thursday, saying they didn&#39;t want to spread unnecessary alarm, &lt;a class=&quot;external-link&quot; href=&quot;http://www.washingtonpost.com/wp-dyn/content/article/2008/03/23/AR2008032301753.html&quot;&gt;according to &lt;i&gt;The Washington Post&lt;/i&gt;&lt;/a&gt;.&lt;/blockquote&gt;Pure infosec brilliance.</content><link rel='replies' type='application/atom+xml' href='http://shimsec.blogspot.com/feeds/1354355422588106993/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://shimsec.blogspot.com/2008/03/laptop-theft-exposes-patients-medical.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1354355422588106993'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10430888/posts/default/1354355422588106993'/><link rel='alternate' type='text/html' href='http://shimsec.blogspot.com/2008/03/laptop-theft-exposes-patients-medical.html' title='Laptop theft exposes patients&#39; medical data'/><author><name>Mike Shimniok</name><uri>http://www.blogger.com/profile/17602015624941667574</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry></feed>