blog trackingRealtime Web Statistics puts Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘puts’

Arizona Sheriff Arpaio puts 38 prisoners on bread and water while prepping for deposition in Justice Dept lawsuit for racially profiling Latinos

Top Priority Sector:  border_security Sheriff Joe Arpaio of Maricopa County, AZ, is scheduled for a March 11 deposition in the civil rights lawsuit being brought against him by the U. Read More….

View full post on The Cyber Wars

Spurned Delhi youth puts up Mumbai student’s profile on porn site

 Mumbai cyber crime investigation cell (CCIC) detained a 21-year-old computer engineering student from New Delhi last week for allegedly posting a girl’s photos, personal details and mobile number on a porn website. But the youth was let off after the girl refused to file an FIR on learning the culprit was a relative of her neighbours.  […]

View full post on Gregory d. evans

Anonymous declares cyber war against Israel and puts Tel Aviv in the Dark


Thousands of Israeli websites were hacked in early morning hours Sunday, including pages of the prime minister’s office and the Tel Aviv stock exchange, in t…

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Action Bronson Puts Unruly Fan In Time Out [VIDEO]

Action Bronson has zero tolerance for unreasonable tomfoolery from fans while he performs. During a recent show at the Bluebird Cafe in Bloomington, Ind., the Queens native checked a fellow who thought it was appropriate to toss a cigarette on stage. After the crowd dimed him out, Bronsolino ordered the perpetrator to sit alongside him during […]

View full post on Hip Hop Security

What do you do if she puts up a fat picture at the last minute on her online dating profile?

What do you do if she puts up a fat picture at the last minute? Oh shit! That’s what I said. I was going out with the first chick I met online and BAM! There… Read More….

View full post on Select From Our Menu

CBO puts a price tag on implementing the Jaime Zapata border enforcement program

Jacob Goodwin Top Priority Sector:  border_security Image Caption:  Rep. Henry Cuellar (D-TX)is legislation’s sponsor If Congress passes and President Obama signs the Jaime Zapata Border Enforcement Security Task Force Act — which calls for closer collaboration and better info-sharing among U.S. agencies and foreign governments — it would cost DHS about $1 million per year [...]

View full post on The Cyber Wars

Symantec conference puts focus on mobile security

At its annual Symantec Vision conference attended by enterprise customers and business partners, Symantec laid out its management and security product strategy for mobile endpoint devices, including the iPhone, iPad and Google Android devices.
View full post on Computerworld Security News

View full post on National Cyber Security » Announcements

MHA puts cops on duty to nab young cyber criminals

The Union home ministry has issued an unusual advisory for cops across the country, listing out measures to reduce growing instances of cyber crime by minors.

View full post on cyber stalking – Yahoo! News Search Results

View full post on National Cyber Security

MHA puts cops on duty to net young cyber criminals

The Union home ministry has issued an unusual advisory for cops across the country—it has listed out various measures to reduce growing instances of cyber crime among minors.

View full post on cyber stalking – Yahoo! News Search Results

View full post on National Cyber Security

Flashback Malware Puts Apple in Security Spotlight: Experts Weigh In

It was a busy week for Apple malware hunters fighting the Flashback Trojan horse, which has infected between 270,000 and 600,000 Macs. A bevy of tools to find and remove the malware debuted this week. And two days after promising to release a detection and removal tool, Apple finally offered its own fix.

Now, as the dust settles on what is considered to be the largest Mac malware threat to date, experts have started pointing fingers at Apple as being partially to blame for the scope of the Flashback malware infection. They argue that if Apple were more transparent about security issues–and if it had promptly released a Flashback fix–the extent of the damage could have been smaller. Also contributing to the magnitude of the infections is a boost in the number of Mac OS users, they say.

“When the installed base [of an OS] is 10 percent or less, the bad guys don’t care,” says Peter James, spokesperson for Mac antivirus and security product vendor Intego. The bigger the user base, the more attractive the target, he says. Web analytics firm NetMarketShare.com estimates that the Mac installed base has jumped to 13 percent in the United States, and research firm Gartner says that Apple has become the fastest-growing U.S. computer maker–overtaking Acer and Toshiba–over the past year.

Apple’s Image of Invulnerability–Gone

Perhaps surprisingly, James and other security experts say that Apple needs to look to Microsoft when it comes to handling OS security breaches. For years Apple has mocked Microsoft for its track record in dealing with Windows malware, viruses, and weekly patches. Now the tables have turned, says Larry Ponemon of the Ponemon Institute.

Ponemon and others say the Flashback Trojan horse is the final nail in the coffin for Apple’s stellar security image. He says that although Microsoft juggles a much larger number of threats, it does a better job of warning customers and delivering fixes.

We have heard dire “Macpocalypse” warnings before. Last year Apple’s sterling security image was tarnished with the advent of the Mac Defender malware program. Before that, in 2006, the focus was on the Leap.A virus, the first ever virus for Mac OS X. (For a great short history of Apple Mac malware, check out NakedSecurity.com’s timeline from 1982 to 2010.) But this time, security experts insist, Apple’s security bragging rights are gone for good.

Mac Security Experts: Full Disclosure

It’s worth noting that Mac security software sales jumped as Flashback infections began to dominate tech headlines. That fact has prompted many vocal critics to point out that it’s in the self-interest of Mac antivirus companies to be critical of Apple’s security measures.

But a brief timeline of Flashback, security experts say, illustrates their point. The underlying Java vulnerability that Flashback exploited was publicly known, and patched by Oracle, in February. On April 3, Apple released a Java security bulletin pointing to the Oracle patch, and declined to disclose, discuss, or confirm the infections. On Tuesday, Apple acknowledged the existence of Flashback and said that it was developing software to detect and remove the malware. On Thursday, it released the Flashback malware removal tool.

What Apple Can Learn From Microsoft Security

First off, there is no disputing that Microsoft, having the dominant OS, faces far more security threats than Apple does. You can argue all day about how secure Apple’s flavor of BSD Unix is versus Microsoft’s Windows, but the difference is Microsoft’s transparency. As PCWorld’s sibling publication Macworld puts it: Apple has a good security record, but “it still has some work to do in terms of its reputation for security.”

Mac OS users unfamiliar with Windows may be surprised to learn that Microsoft regularly schedules the rollout of security fixes on Patch Tuesday, the second Tuesday of each month. But for IT managers and consumers, knowing what’s at risk and when a fix will be available is vital for minimizing exposure to threats. Microsoft also issues critical patches as they become available for exploits.

The system is not perfect; coupled with Windows Update, however, it offers a first line of defense against malware, exploits, and viruses.

Mac OS also automatically checks for software updates every week, and you can change that setting for more-frequent updates. But it’s Apple’s legendary wall of silence and foot-dragging on deploying fixes that have placed it in security experts’ crosshairs.

“When problems and vulnerabilities exist, Microsoft provides information quickly,” Ponemon says. Microsoft, he notes, has been good at communicating, sometimes to the point of being annoying. “Apple hasn’t done as much to communicate with its users,” he says.

Apple’s iron grip on information and the release of fixes has been a nagging issue for years. In 2008, for example, Apple took over four months to patch a DNS vulnerability.

“Why Apple did not deploy these fixes before Mac users were victimized by criminals is unclear,” wrote Chester Wisniewski, a security researcher for UK-based vendor Sophos, in a blog post about Flashback.

Brian Krebs, of Krebs on Security, says that more threats are on the way. “We can expect an evolution of threats against Mac users that will largely mirror those that Windows users face: that is, via the exploitation of vulnerable browser plug-ins, such as Adobe Reader, Flash, and most definitely Java.”

Apple’s Flashback fix, deployed Thursday, mitigates Java flaws. “As a security hardening measure, the Java browser plug-in and Java Web Start are deactivated if they are unused for 35 days,” Apple says.

Ignorance Is Not Bliss

The bigger problem, say some observers, is correcting the perception that the Mac platform is invulnerable. That notion has fostered a laissez-faire attitude toward security among Apple customers, says Intego’s Peter James.

For years Apple has promoted the idea that Macs are far less vulnerable to malware and viruses than PCs are. As part of the “Get a Mac” television ad campaign in 2006, actor John Hodgman (as the PC) says, “Last year, there were 114,000 known viruses for PCs.” And Justin Long (as the Mac) replies, “PCs, but not Macs.”

Mac users are faced with new threats that require new security precautions, James says. “They’re faced with threats they’ve never seen before.”

System administrator Steve Mallard says that many of the student Mac users for whom he provides help-desk services live in denial. Mallard, an IT manager for several state universities at the Tennessee Technology Center in Shelbyville, Tennessee, says students come to his staff with Mac problems and don’t believe that their computers have been infected until shown the evidence.

Over the past few years, Mallard says, he has seen the percentage of infected Macs brought in by students jump from 1 to 15 percent.

“Even though the Mac OS is more secure, its users don’t have the awareness,” Intego’s James says. “Educating users to the risks that they face is one of the most important things Apple can do, the same way you teach your kid to cross at the green light.”

Article source: http://www.pcworld.com/article/253656/flashback_malware_puts_apple_in_security_spotlight_experts_weigh_in.html

View full post on National Cyber Security » Virus/Malware/Worms

Page 1 of 212»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!