Nov 22 2010

Business Analysis Techniques: 72 Essential Tools for Success

Category: Information SecurityDISC @ 9:41 pm

A guide to effective techniques for business analysis – order your copy now!
This book provides 72 possible techniques for business analysts and applies them within a framework of stages. Some of these stages are Investigate Situation, Define Requirements and Manage Change.

The development of business analysis as a professional discipline has extended the role of the business analyst who now needs the widest possible array of tools. This is where this book will help you succeed. It is packed chock-full of the tools that will allow to succeed where you would have once failed.

The book complements Business Analysis, Second Edition.

Key Features and Benefits
Business Analysis Techniques: 72 Essential Tools for Success details 72 easy-to-use techniques for business analysis. Using these techniques you will find new and more efficient ways of working.
Written by a highly knowledgeable team of authors with years of experience in business analysis, this book shares their experience with you.
Designed to be used as a companion manual to Business Analysis, Second Edition – the official BCS textbook on business analysis.
Authors: James Cadle, Debra Paul and Paul Turner
Publisher: BCS
ISBN 10: 1906124612
ISBN 13: 9781906124236
Pages: 250
Format: Softcover
Published Date: 1 February 2010

Using the right techniques for any task is essential. This guide for business analysts is one that will shed light on the techniques that business analysts need to function effectively and efficiently. Buy today – Business Analysis Techniques: 72 Essential Tools for Success


Nov 22 2010

Stuxnet virus could target many industries

Category: MalwareDISC @ 1:25 pm
I constructed this image using :image:Computer...
Image via Wikipedia

By LOLITA C. BALDOR, Associated Press

A malicious computer attack that appears to target Iran’s nuclear plants can be modified to wreak havoc on industrial control systems around the world, and represents the most dire cyberthreat known to industry, government officials and experts said Wednesday.

They warned that industries are becoming increasingly vulnerable to the so-called Stuxnet worm as they merge networks and computer systems to increase efficiency. The growing danger, said lawmakers, makes it imperative that Congress move on legislation that would expand government controls and set requirements to make systems safer.

The complex code is not only able to infiltrate and take over systems that control manufacturing and other critical operations, but it has even more sophisticated abilities to silently steal sensitive intellectual property data, experts said.

Dean Turner, director of the Global Intelligence Network at Symantec Corp., told the Senate Homeland Security and Governmental Affairs Committee that the “real-world implications of Stuxnet are beyond any threat we have seen in the past.”

Analysts and government officials told the senators they remain unable to determine who launched the attack. But the design and performance of the code, and that the bulk of the attacks were in Iran, have fueled speculation that it targeted Iranian nuclear facilities.

Turner said there were 44,000 unique Stuxnet computer infections worldwide through last week, and 1,600 in the United States. Sixty percent of the infections were in Iran, including several employees’ laptops at the Bushehr nuclear plant.

Iran has said it believes Stuxnet is part of a Western plot to sabotage its nuclear program, but experts see few signs of major damage at Iranian facilities.

A senior government official warned Wednesday that attackers can use information made public about the Stuxnet worm to develop variations targeting other industries, affecting the production of everything from chemicals to baby formula.

“This code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product and indicate to the operator and your antivirus software that everything is functioning as expected,” said Sean McGurk, acting director of Homeland Security’s national cybersecurity operations center.

Stuxnet specifically targets businesses that use Windows operating software and a control system designed by Siemens AG. That combination, said McGurk, is used in many critical sectors, from automobile assembly to mixing products such as chemicals.

Turner added that the code’s highly sophisticated structure and techniques also could mean that it is a one-in-a-decade occurrence. The virus is so complex and costly to develop “that a select few attackers would be capable of producing a similar threat,” he said.

Experts said governments and industries can do much more to protect critical systems.

Michael Assante, who heads the newly created, not-for-profit National Board of Information Security Examiners, told lawmakers that control systems need to be walled off from other networks to make it harder for hackers to access them. And he encouraged senators to beef up government authorities and consider placing performance requirements and other standards on the industry to curtail unsafe practices and make systems more secure.

“We can no longer ignore known system weaknesses and simply accept current system limitations,” he said. “We must admit that our current security strategies are too disjointed and are often, in unintended ways, working against our efforts to address” cybersecurity challenges.

The panel chairman, Sen. Joe Lieberman, I-Conn., said legislation on the matter will be a top priority after lawmakers return in January.

Tags: anti virus, Associated Press, Dean Turner, Industrial control systems, Iran, Joe Lieberman, Siemens, United States


Oct 20 2010

Incidence Of Cybertheft Surpasses Incidence Of Physical Theft

Category: cyber securityDISC @ 1:17 pm
私は No Click!
Image by mie_journal via Flickr

Fraud-related losses rose 20 percent to $1.7 billion in the past year, Kroll study says

Incidence of theft of information and electronic data at global companies has overtaken physical theft for the first time, according to a study released yesterday.

According to the latest edition of the Kroll Annual Global Fraud Report, the amount lost by businesses to fraud rose from $1.4 million to $1.7 million per $1 billion of sales in the past 12 months — an increase of more than 20 percent.

The findings are the result of a study commissioned by Kroll and conducted by the Economist Intelligence Unit, which surveyed more than 800 senior executives worldwide.

To read more: Incidence Of Cybertheft Surpasses Incidence Of Physical Theft

Tags: Computer crime, crime, Economist Intelligence Unit, fraud, Identity Theft, Security, Theft, United States


Oct 01 2010

Stuxnet, world’s first “cyber superweapon,” attacks China

Category: CybercrimeDISC @ 2:01 pm
Computer worm
Image by toastiest via Flickr

Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran’s nuclear facilities — especially that country’s centrifuge farms and the nuclear reactor in Bushehr; it has now infected Chinese industrial control systems as well; one security expert says: “The Stuxnet worm is a wake-up call to governments around the world— It is the first known worm to target industrial control systems”

To read the remaining article …..

Tags: Bushehr, Business, Computer worm, Control system, Iran, Israel, Malware, Nuclear


Sep 21 2010

ArcSight offers $49.00 entry-level audit logging package

Category: Security ComplianceDISC @ 9:25 am
Image representing ArcSight as depicted in Cru...
Image via CrunchBase

Security Log Management: Identifying Patterns in the Chaos

Arcsight offer $49 entry level logging solution – a monumental change from the SIEM vendors, since they were trouncing their clients at price of 200K and up.

Data security and compliance specialist ArcSight has taken the wraps off a slew of product updates – Enterprise Security Manager 5.0, Identityview 2.0 and Logger 5.0 – with the offer of a $49.00 version of Logger, its universal log management software.

For more detail on the article: ArcSight offers $49.00 entry-level audit logging package

Tags: ArcSight, Consultants, General and Freelance, Identityview 2.0, Logger 5.0, Security, Security event manager


Sep 15 2010

Cloud Computing: A Treasure Trove for Hackers

Category: Cloud computingDISC @ 10:10 am
IBM Cloud Computing
Image by Ivan Walsh via Flickr

Above the Clouds: Managing Risk in the World of Cloud Computing

By Dick Weisinger
Security usually tops the lists of concerns that people have about the cloud. And now it seems like there is good reason. On a recent survey of 100 “elite” hackers at the 2010 Defcon conferenece, 96 of them said that the cloud offered up more opportunity for them to hack. 89 of them said that they thought that cloud providers weren’t being proactive enough in beefing up their security, and 45 of them admitted to already have engaged in cloud hacking, and 12 of them said that they hack for financial gain.

When asked about what areas of the cloud that they thought were most vulnerable, 21 percent said Software as a Service (SaaS), 33 percent said problems with the Domain Name System (DNS). 16 percent said that cracking the information in log files was on their list of things to hack, and 12 percent said that they’ve hacked into communication profiles.

Barmak Meftah, chief products officer at Fortify, sponsor of the survey, said that “more than anything, this research confirms our ongoing observations that cloud vendors – as well as the IT software industry as a whole – need to redouble their governance and security assurance strategies when developing solutions, whether cloud-based or not, as all IT systems will eventually have to support a cloud resource.”

Another highlight at the Defcon conference was a $1500 device that was able to intercept any GSM mobile phone call.

Tags: Barmak Meftah, Business, Cloud computing, Defcon, Domain Name System, Hacker (computer security), Information Technology, Software as a service


Sep 12 2010

‘Here You Have’ worm and who takes the credit

Category: MalwareDISC @ 11:16 pm
Computer Worm
Image via Wikipedia

Malicious Mobile Code & How to Protect from Malware

If you receive an email with the subject ‘Here You Have.’ or ‘Just For You’ delete the message without clicking the link. Do NOT forward the email to Security or anyone else.

One version of the spam e-mail simply says, “Hello: This is The Document I told you about, you can find it here” and includes a link that appears to be a pdf document.

Another version of the worm includes the subject “Just For you” and says “This is The Free Dowload Sex Movies, you can find it Here.”

If a user clicks the link and downloads the virus, it spreads to contacts in that individual’s e-mail account and continues to propagate. McAfee also said that it attempts to stop and delete security services.

Organizations including NASA, Comcast, AIG, Disney, Proctor & Gamble, Florida Department of Transportation and Wells Fargo are just a few of the organizations apparently affected by the worm.

Who Takes the Credit

The hacker, known as Iraq Resistance, responded to inquiries sent to an e-mail address associated with the “Here you have” worm, which during a brief period early Thursday accounted for about 10 percent of the spam on the Internet. He (or she) revealed no details about his identity, but said, “The creation of this is just a tool to reach my voice to people maybe… or maybe other things.”

To read more “Who takes the credit”

Tags: Comcast, Computer worm, Email, McAfee, NASA, Procter & Gamble, Spam, Wells Fargo


Sep 09 2010

DHS Cyber security Watchdogs Miss Hundreds of Vulnerabilities on Their Own Network

Category: cyber securityDISC @ 8:36 am
Seal of the United States Department of Homela...
Image via Wikipedia

By Kevin Poulsen @wired.com

The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems, according to the results of an audit released Wednesday.

The United States Computer Emergency Readiness Team, or US-CERT, monitors the Einstein intrusion-detection sensors on nonmilitary government networks, and helps other civil agencies respond to hack attacks. It also issues alerts on the latest software security holes, so that everyone from the White House to the FAA can react quickly to install workarounds and patches.

But in a case of “physician, heal thyself,” the agency — which forms the operational arm of DHS’s National Cyber Security Division, or NCSD — failed to keep its own systems up to date with the latest software patches. Auditors working for the DHS inspector general ran a sweep of US-CERT using the vulnerability scanner Nessus and turned up 1,085 instances of 202 high-risk security holes (.pdf).

“The majority of the high-risk vulnerabilities involved application and operating system and security software patches that had not been deployed on … computer systems located in Virginia,” reads the report from assistant inspector general Frank Deffer.

Einstein, the government’s intrusion-detection system, passed the security scan with flying colors, as did US-CERT’s private portal and public website. But the systems on which US-CERT analysts send e-mail and access data collected from Einstein were filled with the kinds of holes one might find in a large corporate network: unpatched installs of Adobe Acrobat, Sun’s Java and some Microsoft applications.

In addition to the 202 high-risk holes, another 106 medium- and 363 low-risk vulnerabilities were found at US-CERT.

“To ensure the confidentiality, integrity, and availability of its cybersecurity information, NCSD needs to focus on deploying timely system-security patches to mitigate risks to its cybersecurity program systems, finalizing system security documentation, and ensuring adherence to departmental security policies and procedures,” the report concludes.

In an appendix to the report, which is dated Aug. 18, the division wrote that it has patched its systems since the audit was conducted.

DHS spokeswoman Amy Kudwa said in a statement Wednesday that DHS has implemented “a software management tool that will automatically deploy operating-system and application-security patches and updates to mitigate current and future vulnerabilities.”

Tags: Adobe Acrobat, Computer security, Intrusion detection system, Microsoft, National Cyber Security Division, Security, United States, United States Computer Emergency Readiness Team


Aug 30 2010

Cyber attacks against Water, Oil and Gas Systems

Category: CybercrimeDISC @ 9:49 am
National Security Authority
Image via Wikipedia

“This summer the Norwegian National Security Authority (NSM) discovered for the first time targeted computer attacks directed against internal process and control systems to ensure supply of electricity and water. Similar attacks were discovered in Germany and Belarus. EU’s cyber-security unit, ENISA, will in late October or early November carry out the first ever pan-European cyber security exercise.”

Cyber Criminals Attack Critical Water, Oil and Gas Systems

Tags: Belarus, Business, Computer security, Control system, European Union, Germany, National Security Authority, NSM


Aug 27 2010

Cost of Cyber Crime

Category: CybercrimeDISC @ 12:31 pm

Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.

Key highlights from this report (Ponemon Annual Cost of Cyber Crime Study) include:

  • Cyber crimes can do serious harm to an organization’s bottom line.
  • Cyber attacks have become common occurrences.
  • The most costly cyber crimes are those caused by web attacks, malicious code and malicious insiders.
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet


    Aug 23 2010

    How a digital copier can be a treasure trove for a identity thief

    Category: Information Privacy,Information SecurityDISC @ 12:19 pm

    How a digital copier can become a treasure trove for an identity thief, because they have a hard drive which permanently store all images which have been digitally printed, scanned, faxed, emailed or copied on that printer. Storing images on the hard drive can be a huge threat to the security of an organization and a serious breach to the privacy law when these printers need maintenance, needed to be returned at end of a lease period or simply retired without erasing the data from the hard drive.

    Due diligence of erasing the data before an identity thief gets their paws on it is squarely falls on the shoulder of the organization who owns the digital printer.

    Below is the video which optimize the risk of digital copier


    Aug 23 2010

    13 Things an Identity Thief Won’t Tell You

    Category: Identity TheftDISC @ 11:10 am
    Identity Thief, Incognito
    Image by CarbonNYC via Flickr

    Stopping Identity Theft: 10 Easy Steps to Security

    by Reader’s Digest Magazine, on Thu Aug 12, 2010 Interviews by Michelle Crouch

    Former identity thieves confess the tactics they use to scam you.

    1. Watch your back. In line at the grocery store, I’ll hold my phone
    like I’m looking at the screen and snap your card as you’re using it.
    Next thing you know, I’m ordering things online-on your dime.

    2. That red flag tells the mail carrier-and me-that you have outgoing
    mail. And that can mean credit card numbers and checks I can reproduce.

    3. Check your bank and credit card balances at least once a week. I can
    do a lot of damage in the 30 days between statements.

    4. In Europe, credit cards have an embedded chip and require a PIN,
    which makes them a lot harder to hack. Here, I can duplicate the
    magnetic stripe technology with a $50 machine.

    5. If a bill doesn’t show up when it’s supposed to, don’t breathe a sigh
    of relief. Start to wonder if your mail has been stolen.

    6. That’s me driving through your neighborhood at 3 a.m. on trash day. I
    fill my trunk with bags of garbage from different houses, then sort
    later.

    7. You throw away the darnedest things-preapproved credit card
    applications, old bills, expired credit cards, checking account deposit
    slips, and crumpled-up job or loan applications with all your personal
    information.

    8. If you see something that looks like it doesn’t belong on the ATM or
    sticks out from the card slot, walk away. That’s the skimmer I attached
    to capture your card information and PIN.

    9. Why don’t more of you call 888-5-OPTOUT to stop banks from sending
    you preapproved credit offers? You’re making it way too easy for me.

    10. I use your credit cards all the time, and I never get asked for ID.
    A helpful hint: I’d never use a credit card with a picture on it.

    11. I can call the electric company, pose as you, and say, “Hey, I
    thought I paid this bill. I can’t remember-did I use my Visa or
    MasterCard? Can you read me back that number?” I have to be in
    character, but it’s unbelievable what they’ll tell me.

    12. Thanks for using your debit card instead of your credit card.
    Hackers are constantly breaking into retail databases, and debit cards
    give me direct access to your banking account.

    13. Love that new credit card that showed up in your mailbox. If I can’t
    talk someone at your bank into activating it (and I usually can), I
    write down the number and put it back. After you’ve activated the card,
    I start using it.

    Tags: Automated teller machine, Business, Credit card, debit card, Financial services, Identity Theft, MasterCard, Visa


    Aug 18 2010

    Card Skimmers let thieves steal ATM Info in Bay Area

    Category: CybercrimeDISC @ 8:50 am

    More identity thieves using card skimmers

    During a routine maintenance check in late February a 7-Eleven employee in Martinez found something that didn’t belong inside one of his gas pumps: a debit and credit card skimmer. Local authorities switched the device for a decoy, waited for the crooks to…

    “We ended up getting 11 skimmers all together all over the Bay Area, the Peninsula and the East Bay,”

    Card Skimmers let thieves steal ATM Information….


    Aug 13 2010

    PCI SSC releases highlights for 2.0 changes

    Category: pci dssDISC @ 10:34 pm
    Information Security Wordle: PCI DSS v1.2 (try #2)
    Image by purpleslog via Flickr

    PCI SSC has pre-announced the summary of changes for expected PCI 2.0 in October 2010. Based on summary report most of the changes are clarification or guidance.

    According to Bob Russo, general manager of the PCI Security Standards Council.

    “This version is 2.0, and the connotation is that there will be major changes, but that isn’t the case,” he told CSNews Online in a telephone interview. Most of the changes are “clarifications” such as combining requirements 10 and 11 for the PA-DSS (Payment Application Data Security Standard), which the council found redundant.

    “The standard is pretty strong at this point and is maturing, so there are no major changes this time around,” Russo said in the interview. “Basically we are releasing clarifications and explanations on how to comply further down the line.”

    Time will tell if PCI SSC will allow organizations to pick controls based on their enviroment or risk appetite during risk management. Basically most of the industry icluding some government agencies are following risk based approach to address secrity risks. Instead of saying Yes at each control, SSC should give small organization some flexibility to pick contols which fits their needs, we might see higher rate of compliance in small to medium size businesses. Also risk based approch will help larger organizations to tie up PCI DSS to their existing security management system.

    Remember PCI DSS still addresses the cardholder data infrastructure of an organization. Let’s hope the future versions will involve some guidance for small to medium size companies how to address risks outside the scope of PCI DSS.

    Summary of changes for PCI DSS 2.0

    Tags: Payment Card Industry Data Security Standard, PCI Security Standards Council, SBN


    Aug 09 2010

    Identity theft: How to protect your kids

    Category: Identity TheftDISC @ 10:34 am
    identity theft
    Image by TheTruthAbout… via Flickr

    Stopping Identity Theft: 10 Easy Steps to Security

    Identity theft that targets children is rising. Here are five steps to protect your family

    By Alissa Figueroa

    Identity theft has grown into a multibillion-dollar problem. And it’s not only adults who are targeted.

    At least 7 percent of the reported cases of identity theft target children. The number could actually be much higher, since many families don’t discover theft until a child applies for credit.

    And the problem is likely to get worse before it gets better, the Associated Press reports, as identity thieves steal children’s dormant Social Security numbers and use them to create phony lines of credit and rack up debt, sometimes for years.

    The scam, which has popped up only in the last year, is difficult to guard against, says Linda Foley, cofounder of the Identity Theft Resource Center (ITRC), an organization that offers counseling and resources to identity theft victims. The ITRC has seen a notable jump in the number of children identity-theft cases in the last year, reaching about 9 percent of its caseload this month.

    “There’s no way to protect your child completely,” says Ms. Foley. That’s partly because these thieves are likely using sophisticated programs that mine for dormant numbers through school or doctor’s offices databases, which often require that children’s Social Security numbers be provided. And partly because tactics for selling the numbers are constantly evolving, making this kind of theft difficult to track.

    Since credit issuers do not keep track of the age of Social Security number holders, they cannot alert families when a child’s number is being used. That’s something Foley’s organization has been trying to change since 2005, and a protection she considers vital for preventing child identity theft on a large scale.

    There is some advice that parents can follow, though, to reduce the risk of identity theft:

    1. Be cautious with your child’s Social Security number. Always ask why an organization needs the number and when possible, do not give it out. Be careful about which individuals, even friends and family, have access to your child’s number. Many identity thieves know their victims. Destroy extra documents that list your child’s number.

    2. Talk to your kids about identity theft. Teach children not to divulge their personal information on the telephone and online.

    3. Do not check your child’s credit report unless you have reason to believe there’s a problem. A minor should not have a report unless someone has applied for credit using that child’s Social Security number. To order reports unnecessarily can establish a credit report, opening a door to thieves, according to the ITRC.

    4. Watch for red flags. If you receive pre-approved credit card offers or calls from collection agencies, run a credit report on your child immediately to see if there has been fraud.

    5. Contact an identity theft specialist if you suspect a problem. There are several resources for families concerned with issues of identity theft. Visit the ITRC’s website for facts and information, or call its hotline at (888) 400-5530. You can also find information on the Federal Trade Commission’s identity-theft-prevention website.

    Tags: Credit card, crime, Federal Trade Commission, Identity Theft, ITRC, Linda Foley, Social Security number, Theft


    Aug 08 2010

    TSA Approved – checkpoint freindly laptop case

    Category: Laptop SecurityDISC @ 10:57 pm

    HP EZ Check Laptop Case – TSA Approved – Checkpoint Freindly to Easy Your Travel

    HP EZ Check Laptop Case – TSA Approved – Black Protect your laptop in this HP EZ Check Briefcase, carry it-and your accessories in style. This case has been tested and meets the new Transportation Security Administration (TSA) guidelines for carry-on luggage.

    Now you can travel through airport screening checks more quickly as you can keep the notebook inside the bag when going through the X-Ray

  • Fits up to 16″ laptop
  • Pad and cushion your laptop with the durable materials and nylon zipper
  • Zip through airport security with the checkpoint friendly design
  • Store accessories like as your AC adapter, mouse, extra battery, or Ipod in the front zippered pocket
  • Carry easily with the padded shoulder strap
  • 15.7 inches Length X 11 inches Height and 2 inches Wide

  • Aug 05 2010

    Security and vulnerability assessments

    Category: Network securityDISC @ 9:41 pm

    Must have official EC-Council guide to security and vulnerability assessments!

    Network Defense: Security and Vulnerability Assessment (Ec-Council Press Series: Network Defense)

    This book will provide you with the fundamental knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This book will prepare you to take and pass the EC-Council Network Security Administrator (ENSA) exam.

    Proactive vulnerability assessment is key to any organisation’s security posture. Constant assessment for potential weakness is required to maintain a security edge. New vulnerabilities in operating systems, software, hardware, and even human elements are identified and exploited every day. This book will give you the information necessary to master this skill.

    Contents of the Book:

  • Web Security
  • E-mail Security.
  • Authentication: Encryption, Cryptography and Digital Signatures
  • Virtual Private Networks
  • Creating Fault Tolerance
  • Incident Response
  • Disaster Recovery and Planning
  • Network Vulnerability Assessment

  • Key Features and Benefits:
    * Will provide you with the fundamental knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. Helping you to ensure your organisation is well protected.

    * Using this book, as well as the other four books in the Network Defense series, to prepare for the ENSA exam you can ensure yourself of the best chance possible of passing on your first attempt.

    * Includes Hands-On Projects to encourage you to problem-solve and apply your knowledge. Helping you to ingrain the information in your mind in a practical way.

    Book Details:
    Paperback: 192 pages
    Publisher: Course Technology; 1 edition (April 14, 2010)
    Language: English
    ISBN-10: 1435483596
    ISBN-13: 978-1435483590
    Product Dimensions: 10.7 x 8.5 x 0.6 inches
    Shipping Weight: 15.2 ounces

    Network Defense: Security and Vulnerability Assessment (Ec-Council Press Series: Network Defense)


    Aug 05 2010

    DHS Quietly Dispatching Teams to Test Power Plant Cybersecurity

    Category: cyber securityDISC @ 1:22 pm
    DHS Logo
    Image via Wikipedia

    The Department of Homeland Security is quietly creating teams of experts charged with assessing the cyber security needs of power plants in the U.S. The question is why the secrecy? When plants vulnerabilities are known facts in both security and hacker communities, perhaps it is time to pay attention or impossible to ignore anymore even by DHS.

    Utility Security: The New Paradigm

    By Jaikumar Vijayan
    The Department of Homeland Security (DHS) is quietly creating specialized teams of experts to test industrial control systems at U.S power plants for cybersecurity weaknesses, according to a report published today by the Associate Press.

    According to the Associate Press report, DHS has so far created four teams to conduct such assessments, according to Sean McGurk, director of control system security. McGurk told the news service that 10 teams are expected to be in the field next year as the program’s annual budget grows from $10 million to $15 million.

    To read the rest of the article….

    Tags: Computer security, Control system, Homeland Security Department, power plants, Power station, United States Department of Homeland Security, utilities


    Aug 02 2010

    Why Your Business may need to be PCI-DSS Compliant?

    Category: pci dssDISC @ 10:18 pm

    There is a myth out there that we are a small company and PCI DSS does not apply to us. It does not matter how small or big your business is you must comply to PCI DSS if you process, store and transmit credit card data.

    Don’t store the credit card data, if you don’t have real a business need for it. If you do have to store the credit card data, know your risks and liabilities which happen to be many. Basically small business owner cannot afford to pay for the liabilities and fines if they have a security breach in state on non-compliance (PCI DSS).

    Take a few minutes to watch this and see what an ultimate risk of non-compliance can do to a business, my advice, find a professional who can help you to make sure you are PCI DSS compliant so if a breach DOES occur, you are protected with a safe harbor against the fines and non compliant liabilities.

    Watch how downstream liability affect a small merchant


    Jul 29 2010

    Hacker finds a way into ATM computers

    Category: CybercrimeDISC @ 6:23 pm
    Nice ATM
    Image via Wikipedia

    Understanding and Managing Cybercrime

    by Jordan Robertson
    A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

    The attacks demonstrated Wednesday at a security conference were done at stand-alone ATMs. But they could potentially be used against the ATMs operated by mainstream banks, the hacker said.

    Criminals use many ways to tamper with ATMs, ranging from sophisticated to foolhardy: installing fake card readers to steal card numbers, and even hauling the machines away with trucks in hopes of cracking them open later.

    Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. These were stand-alone machines, the type seen in front of convenience stores, rather than the ones in bank branches.

    His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines.

    He showed off his results at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

    In one demonstration Tuesday, Jack, director of security research for IOActive Inc. in Seattle, showed how to get ATMs to spit out money:

    He found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got with pictures of other keys, found on the Internet.

    He used his key to unlock a compartment in the ATM that had standard USB slots. He then inserted a program he had written into one of them, commanding the ATM to dump its vaults.

    This article appeared on page D – 6 of the San Francisco Chronicle

    Tags: ATM, Automated teller machine, Barnaby Jack, BlackHat, Computer security, San Francisco Chronicle, Seattle, Silicon Valley


    « Previous PageNext Page »