Information Security News
Badware purveyors trying to capitalize on the ongoing Pokémon Go frenzy have achieved an important milestone by sneaking their fake wares into the official Google Play marketplace, security researchers said Friday.
Researchers from antivirus provider Eset report finding at least three such apps in the Google-hosted marketplace. Of the three, the one titled "Pokemon Go Ultimate" posed the biggest threat because it deliberately locks the screen of devices immediately after being installed. In many cases, restarting an infected phone isn't enough to unlock the screen. Infected phones can ultimately be unlocked either by removing the battery or by using the Android Device Manager.
Once the screen has been unlocked and the device has restarted, the app—which by now has the title PI Network—is removed from the device's app menu. Still, it continues to run in the background and surreptitiously clicks on ads in an attempt to generate revenue for its creators.
With our more and more complex environments and processes, we have to handle a huge amount of information on a daily basis. To improve the communication with our colleagues, peers, it is mandatory to speak the same language and to avoid ambiguities while talking to them. A best practice is to apply a naming convention to everything that canbe labeled. It applies to multiple domains and not onlyinformation security. Examples:
A good naming convention is the one that is approved by all the parties and that will help you to perform your job better. If everybody is free to define a new one (while I was working fora company in Belgium, the servers were named with Belgian beers), there are some rules to follow. The example of Belgian beers is a good one: even we have many beers, a big organization withplenty of servers will be limited in the choice of names. Some names will be very simple, other too complex. Here are some rules to follow if you need to implement a naming convention:
Some rules are more specific to certain types of data. Example for files and directories, use timestamps like YYYYMMDDHHMMSS in the beginning of file names to have an automatic order. Prependingnames with the project number or the customers ID can be useful to find quickly details about a customer.
In the security landscape, we can apply naming conventions to many objects or assets. In the configuration ofsecurity tools, objects must respect a naming convention. Examples:
This sounds easy to implement but it" />
This isnt a recent issue, it was already discussed in 1991(!): http://www.caro.org/articles/naming.html.
And you? Do you have good rules to share to build a naming convention? What did you normalize? Feel free to share.
Xavier Mertens (@xme)
ISC Handler - Freelance Security Consultant