Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

No, not eating more broccoli, or going to the gym ... Im referring to security related resolutions only. It is time to think about them now, so that you dont have to pick the first thing that comes to mind at midnight on December 31. Because, knowing you geeks, that first thing would probably be MUST buy new toy :).

Heres a couple suggestions for improved security in your everyday computing use in 2016:


1. Remove Flash.

You wont miss it, and if you miss it, youll get over it. Todays vulnerability advisory was just one more in a long list of issues. I actually think Adobe should edit the corresponding text on their web page a little, to change it into something like this: Adobe Flash Player is the standard for delivering high-impact, rich Web content exploits. Designs, animation, and malicious applications user interfaces are deployed immediately across all browsers and platforms, attracting and engaging crooks users with a and making them rich Web experience.

2. Enable 2-Factor authentication where available.

Yes, logging in can be a bit more annoying and time consuming. And no, the security advantage that it provides isnt perfect. But you dont have to be perfect. You just have to be slightly better than average, because the average crooks are making their money off the average user. Dont be in that group.

3. Take the time to enable storage encryption on your mobile device

Yes it asks for the PIN more often. Maybe it even gets a bit more sluggish to use. But the number of mobile phones that are lost or misplaced every day in New York City alone would make a pile that can be seen from space. Imagine the doubt and anguish of the former owners, whose entire life is on those phones. Backups help against the loss, but only PIN encryption help against the feeling of likely being violated by someone, somewhere, who browses through your private life.

What are your security resolutions, either for you personally or for your day job? Please share in the comments below, or via our contact form.

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstrated by researchers Karsten Nohl and Fabian Bräunlein at the Chaos Computing Club security conference.

Much research has been done into the chips found on credit cards and the readers and number pads used with these cards, but Nohl decided to take a different approach, looking instead at the communications protocols used by those card readers. There are two that are significant; the first, ZVT, is used between point of sale systems and the card readers. The second, Poseidon, is used between the card reader and the merchant's bank. Nohl found that both had important flaws.

The ZVT protocol was originally designed for serial port connections, but nowadays is used over Ethernet, both wired and wireless. The protocol has no authentication, meaning that if an attacker can put themselves on the same network, they can act as a man-in-the-middle between the point-of-sale system and the card reader. The attacker can then read the magnetic stripe data from the card, and can also request a PIN.

Read 22 remaining paragraphs | Comments

 

About once a year, we run a brief survey of our readers to figure out how to improve our site. This year, we want to focus on issues people have submitting logs. We added a lot of new features and new methods to access our data. We for example significantly expanded our API, added features like color my logs to make it easier to use our data without having to write code, and added additional data sources with external open threat feeds.

In the end the, core data we provide comes from users who submit firewall and other logs on an ongoing basis. In particular, home users can be very valuable submitters in that they can provide good data illuminating the internets Background Radiation of port scan and similar activity. One issue we have been running into is that routers and firewalls often used by home users no longer provide logs. So we are trying to figure out what is holding back users who would like to submit logs.

If you would like to submit logs, but can not do so currently, then please take 5 minutes to fill out our survey.

https://dshield.typeform.com/to/t5g9K8

Please share this link with friends/social media.

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
WebKitGTK+ Security Advisory WSA-2015-0002
 

California Newswire

EaseUS Conducts a Survey for Personal Data and InfoSec
California Newswire
NEW YORK, N.Y., Dec. 28, 2015 (SEND2PRESS NEWSWIRE) — Recent reports have revealed that data or information security is a higher risk at the end of every year. EaseUS, an international leader in data backup and recovery utilities, has conducted an ...

and more »
 
 
libtiff bmp file Heap Overflow (CVE-2015-8668)
 
Internet Storm Center Infocon Status