1-888-643-2217 Email ABEX
Keeping you updated

Archives

Hackers can tap USB devices

Source: mobile.reuters.com

USB Flash DriveUSB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday.

Karsten Nohl, chief scientist with Berlin’s SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.

“You cannot tell where the virus came from. It is almost like a magic trick,” said Nohl, whose research firm is known for uncovering major flaws in mobile phone technology.

The finding shows that bugs in software used to run tiny electronics components that are invisible to the average computer user can be extremely dangerous when hackers figure out how to exploit them. Security researchers have increasingly turned their attention to uncovering such flaws.

Nohl said his firm has performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.

Computers do not detect the infections when tainted devices are inserted because anti-virus programs are only designed to scan for software written onto memory and do not scan the “firmware” that controls the functioning of those devices, he said.

Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week’s Black Hat hacking conference in Las Vegas, in a presentation titled: “Bad USB – On Accessories that Turn Evil.”

Thousands of security professionals gather at the annual conference to hear about the latest hacking techniques, including ones that threaten the security of business computers, consumer electronics and critical infrastructure.

Nohl said he would not be surprised if intelligence agencies, like the National Security Agency, have already figured out how to launch attacks using this technique.

Last year, he presented research at Black Hat on breakthrough methods for remotely attacking SIM cards on mobile phones. In December, documents leaked by former NSA contractor Edward Snowden demonstrated that the U.S. spy agency was using a similar technique for surveillance, which it called “Monkey Calendar.”

An NSA spokeswoman declined to comment.

SR Labs tested the technique by infecting controller chips made by major Taiwanese manufacturer, Phison Electronics Corp, and placing them in USB memory drives and smartphones running Google Inc’s Android operating system.

Alex Chiu, an attorney with Phison, told Reuters via email that Nohl had contacted the company about his research in May.

“Mr. Nohl did not offer detailed analysis together with work product to prove his finding,” Chiu said. “Phison does not have ground to comment (on) his allegation.”

Chiu said that “from Phison’s reasonable knowledge and belief, it is hardly possible to rewrite Phison’s controller firmware without accessing our confidential information.”

Similar chips are made by Silicon Motion Technology Corp and Alcor Micro Corp. Nohl said his firm did not test devices with chips from those manufacturers.

Google did not respond to requests for comment. Officials with Silicon Motion and Alcor Micro could not immediately be reached.

Nohl believed hackers would have a “high chance” of corrupting other kinds of controller chips besides those made by Phison, because their manufacturers are not required to secure software. He said those chips, once infected, could be used to infect mice, keyboards and other devices that connect via USB.

“The sky is the limit. You can do anything at all,” he said.

In his tests, Nohl said he was able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were coming from a keyboard. He was also able to change what are known as DNS network settings on a computer, essentially instructing the machine to route Internet traffic through malicious servers.

Once a computer is infected, it could be programmed to infect all USB devices that are subsequently attached to it, which would then corrupt machines that they contact.

“Now all of your USB devices are infected. It becomes self-propagating and extremely persistent,” Nohl said. “You can never remove it.”

Christof Paar, a professor of electrical engineering at Germany’s University of Bochum who reviewed the findings, said he believed the new research would prompt others to take a closer look at USB technology, and potentially lead to the discovery of more bugs. He urged manufacturers to improve protection of their chips to thwart attacks.

“The manufacturer should make it much harder to change the software that runs on a USB stick,” Paar said.


Scammers More Sophisticated, Warns Competition Bureau

phishing emailThe Competition Bureau reports that phishing is one of the growing scamming techniques, and users of social networking sites are especially vulnerable. Almost 95 per cent of fraud-related crimes in Canada go unreported, according to an estimate by the Canadian Anti-Fraud Centre. One glaring reason for this is because people are usually too embarrassed to admit that they fell for a fraud scam, especially one that happened on a social networking site.

A phishing scam is a phony email or pop-up message used to lure unsuspecting Internet users into divulging personal information, such as credit card numbers and account passwords, that will later be used by hackers for identity theft. A phisher’s email can be very persuasive and believable if he or she is impersonating a well-known organization or individual.

Keep employees safe from phishing scams by teaching them to:

  • Be extremely wary of urgent email requests for any personal or financial information (their information or a client’s).
  • Call the company or individual in question with the number listed on the corporate website or in the phone book. Avoid using phone numbers provided in the email, as they could be phony too.
  • Do not use the links included in the email unless you are certain that the email is legitimate.
  • Do not divulge personal or financial information on the Internet unless the site is secure (sites that start with “https”).
  • Never disable anti-virus software.

The only way that the authorities can keep tabs on new scams that pop up is if individuals report crimes when they happen. When these crimes go unreported, the public can’t be alerted to watch out for scams, which can in turn affect many more people.

A computer intrusion could cripple your company, costing you thousands or millions of dollars in lost sales and/or damages. Make sure your employees are alerting you when they encounter suspicious emails or websites.

 

 

© 2014 Zywave, Inc. All rights reserved


Facebook Bullying Grounds for Dismissal

BullyingA postal clerk in Canada was dismissed from her job in May after her employer discovered Facebook posts she had written that were described as contemptuous, undermining managerial authority, and so harmful to her managers that they needed to take time off work to seek medical care and ease their emotional distress.

The employee stated that she had believed her posts were private and that her toxic work environment was the reason she needed to vent on Facebook. The arbitrator of the case ruled that due to the content of the posts and the effect they had on her managers, the termination of the employee was justified.

This case brought to life an interesting dynamic of the modern workplace: Because of social media, workplace relationships, and sometimes workplace bullying, don’t solely occur at work anymore. After work, employees can still log on to social media sites and harass co-workers or managers, or post hostile things about them.

At a minimum, workplace bullying affects safety, productivity, trust and the workplace culture. Being bullied not only puts a huge emotional strain on someone, but in turn could put a financial strain on the company due to unhappy or less-productive employees.

There has been an increase in court cases pertaining to social media and its influence on the workplace, and the number is projected to get higher. This case demonstrates how an employee can be justly terminated for posting offensive content—more serious than just a normal negative critique—about his or her company, manager or co-workers on social media sites.

 

 

© 2014 Zywave, Inc. All rights reserved.

 


Simple Steps to Cyber Security

Security concept: data security on digital backgroundRecent Internet bugs and vulnerabilities have had a widespread impact, compromising the security of computers as well as personal information you may enter online.

Although you can’t stop criminals from attempting a cyber attack, you can take several steps to reduce your risk of having your personal information stolen, misused or deleted. Start by using strong passwords, avoiding malware and viruses, and protecting yourself against scams and security breaches.

Password security

  • Do not use the same password for multiple accounts, especially important accounts such as online banking or an online store with your credit card on file.
  • Passwords should not be a word found in the dictionary or a combination easily guessed by a friend; be creative and mix up letters, numbers and symbols to make a strong password.
  • Passwords should be periodically changed, especially in the wake of the Heartbleed bug that left much encrypted information vulnerable to exploitation.

Malware

  • Don’t click on links or download attachments in unsolicited emails.
  • Don’t download anything from sites you don’t trust.
  • Don’t enter personal information on a website if you clicked on a link; instead, type the URL into the address bar to make sure you go to the site you want.
  • Scan all external devices, such as USB flash drives, for viruses and malicious software (malware) before using.
  • Install antivirus security software.

Scams and other security breaches

  • Never email personal information on an unsecured Wi-Fi network; the network can be hacked and the information accessed by unauthorized users.
  • Don’t disclose private information unless necessary, and always verify the source if asked to input sensitive information into a website or email.
  • Before entering credit card numbers or other payment information when shopping online, double-check that you’re on the website you think you are and check the URL for “https,” which is a general indication that the page is encrypted for your security. Some browsers also display a “lock” icon to indicate that a website is secure.

 

© 2014 Zywave, Inc. All rights reserved.

 


Policies to Manage Cyber Risk

Security concept:: Protection key on keyboardAll companies should develop and maintain clear and robust policies for safeguarding critical business data and sensitive information, protecting their reputations and discouraging inappropriate behaviour by employees. Many companies already have these types of policies in place, but they may need to be tailored to reflect the increasing impact of cyber risk on everyday transactions, both professional and personal. As with any other business document, cyber security policies should follow good design and governance practices—not so long that they become unusable, not so vague that they become meaningless, and reviewed regularly to ensure that they stay pertinent as your business’ needs change.

Establish security roles and responsibilities. One of the most effective and least expensive means of preventing serious cyber security incidents is to establish a policy that clearly defines the separation of roles and responsibilities with regard to systems and the information they contain. Many systems are designed to provide for strong role-based access control (RBAC), but this tool is of little use without well-defined procedures and policies to govern the assignment of roles and their associated constraints. At a minimum, such policies need to clearly identify company data ownership and employee roles for security oversight and their inherent privileges, including:

  • Necessary roles, and the privileges and constraints accorded to those roles
  • The types of employees who should be allowed to assume the various roles
  • How long an employee may hold a role before access rights must be reviewed
  • If employees may hold multiple roles, the conditions defining when to adopt one role over another

Depending on the types of data regularly handled by your business, it may also make sense to create separate policies governing who is responsible for certain types of data. For example, a business that handles large volumes of personal information from its customers may benefit from identifying a chief steward for customers’ privacy information. The steward could serve not only as a subject matter expert on all matters of privacy, but also as the champion for process and technical improvements to handling of personally identifiable information (PII).

Develop a privacy policy. Privacy is important for your business and your customers. Continued trust in your business practices, products and secure handling of your clients’ unique information impacts your profitability. Your privacy policy is a pledge to your customers that you will use and protect their information in ways that they expect and that adhere to your legal obligations. Your policy should start with a simple, clear statement describing the information you collect about your customers (physical addresses, email addresses, browsing history, etc.) and what you do with it. It’s important to create your privacy policy with care and post it clearly on your website. It’s also important to share your privacy policies, rules and expectations with all employees and partners who may come into contact with that information. Your employees need to be familiar with your privacy policy and what it means for their daily work routines.

Establish an employee Internet usage policy. The limits on employee Internet usage in the workplace vary widely from business to business. Your guidelines should allow employees the maximum degree of freedom they require to be productive (for example, short breaks to surf the Web or perform personal tasks online have been shown to increase productivity). At the same time, rules for behaviour are necessary to ensure that all employees are aware of boundaries, both to keep themselves safe and to keep your company successful. Some guidelines to consider:

  • Personal breaks to surf the Web should be limited to a reasonable amount of time and to certain types of activities.
  • If you use a Web filtering system, employees should have clear knowledge of how and why their Web activities will be monitored, and what types of sites are deemed unacceptable by your policy.
  • Workplace rules for behaviour should be clear, concise and easy to follow. Employees should feel comfortable performing both personal and professional tasks online without making judgment calls as to what may or may not be deemed appropriate. Businesses may want to include a splash warning upon network sign-on that advises employees about the company’s Internet usage policy so that all employees are on notice.

Establish a social media policy. Social networking applications present a number of risks that are difficult to address using technical or procedural solutions. A strong social media policy is crucial for any business that seeks to use social networking to promote its activities and communicate with its customers. At a minimum, a social media policy should clearly include the following:

  • Specific guidance on when to disclose company activities using social media, and what kinds of details can be discussed in a public forum
  • Additional rules of behaviour for employees using personal social networking accounts to make clear what kinds of discussion topics or posts could cause risk for the company
  • Guidance on the acceptability of using a company email address to register for, or get notices from, social media sites
  • Guidance on selecting long, strong passwords for social networking accounts, since very few social media sites enforce strong authentication policies for users

All users of social media need to be aware of the risks associated with social networking tools and the types of data that can be automatically disclosed online when using social media. Taking the time to educate your employees on the potential pitfalls of social media use, especially sites with geo-location services, may be the most beneficial social networking security practice of all.

Identify potential reputation risks. All organizations should take the time to identify potential risks to their reputations and develop a strategy to mitigate those risks with policies or other measures as available. Specific types of reputation risks include:

  • Being impersonated online by a criminal organization (e.g., an illegitimate website spoofing your business name and copying your site design, then attempting to defraud potential customers via phishing scams or other methods)
  • Having sensitive company or customer information leaked to the public via the Web
  • Having sensitive or inappropriate employee actions made public via the Web or social media sites

All businesses should set a policy for managing these types of risks and plan to address such incidents if and when they occur. Such a policy should cover a regular process for identifying potential risks to the company’s reputation in cyber space, practical measures to prevent those risks from materializing and plans to respond and recover from incidents as soon as they occur. Precept Insurance & Risk Management has numerous sample cyber security policies available to our clients upon request. These policies are a great starting point for your policy-creation efforts and can be modified to fit the unique needs of your business.

 

© 2014 Zywave, Inc. All rights reserved.


Blog

FOLLOW OUR BLOG

Receive notifications of new posts automatically.



ABEX - AFFILIATED BROKERS EXCHANGE IS ON FACEBOOK.

Like us on Facebook

Connect with us on LinkedIn