Has Android Malware Tripled in Recent Months? Not So Fast

There never seems to be any shortage of Android malware reports circulating in the news, and today one came out that sounds alarming indeed.

android malware
“Android Under Attack: Malware Levels for Google’s OS Rise Threefold in Q2 2012” was the title of the press release from antivirus vendor Kaspersky announcing it, in fact, and right on cue headlines are popping up across the tech media echoing that dire warning.

But is it really as bad as all that? Probably not. In fact, as pointed out by security-focused publication The H on Thursday, data from competing firm F-Secure paint a very different picture for the very same time period. In fact, rather than a tripling of Android malware in the second quarter, F-Secure found only a modest rise.

Read more »

2

Microsoft and Adobe Keep IT Busy with Critical Security Patches

It’s Patch Tuesday again. This month is busier than most because on top of Microsoft’s security bulletins, Adobe is also releasing updates for Reader and Acrobat.

Let’s start with Microsoft. There are nine new security bulletins for August, which resolve 26 different vulnerabilities. There are five rated as Critical—including a patch for Internet Explorer for the third consecutive month--and four Important.

Microsoft and Adobe released a barrage of new patches and updates.
Tyler Reguly, director of security research and development for nCircle, says, “The most interesting thing this month is the release of patches for two wormable issues, MS12-053 and MS12-054. These only affect the oldest-supported Windows platforms and really speaks well of the improvements Microsoft has made to their security efforts over the years.”

Read more »

1

Gauss Cyber Espionage Threat Targets Banking Info

Gauss joins the ranks of Stuxnet, Duqu, and Flame as an apparently state-sponsored tool of cyber espionage. This latest threat appears to be built from the same code foundation as Flame, and specifically targets bank credentials and financial data.

Kaspersky Lab--the largest privately held vendor of antimalware and endpoint security products--announced the new threat. A Kaspersky FAQ about Gauss boils the description of Gauss down to a 140-character tweet: “Gauss is a nation state sponsored banking Trojan which carries a warhead of unknown designation”.

Gauss seems to come from the same code foundation as Flame.
Gauss has been flying under the radar and evading detection since the fall of 2011. Ironically, it was discovered during operations initiated by the International Telecommunications Union (ITU) in the wake of Flame in an effort to detect and mitigate any other stealthy cyber threats. Mission accomplished.

Read more »

2

Mat Honan Hack Pokes Holes in Apple iCloud

The hackers that hijacked Mat Honan’s online life, took over his Twitter account(s), and wiped out his iPhone, iPad, MacBook, and Google accounts in one fell swoop showed some perseverance in achieving that goal. Not all attackers are quite that determined, but the hack still demonstrates some serious flaws in Apple’s iCloud and the iCloud security model.

My iPhone, iPad, and MacBook Air are all synced through Apple’s iCloud--just like Mat Honan. I appreciate the convenience and simplicity of the fact that I can add a contact on my iPad, and it will automatically sync to the other two devices. I can take a picture with my iPhone, and the photo will be available from the iPhone and MacBook as well. It just works.

With one username and password I can pinpoint or remotely wipe all of my Apple devices.
The Mat Honan hack is a poignant illustration of how “it just works” can be a double-edged sword. If it “just works” for you, it also “just works” for an attacker who manages to gain access to your iCloud account.

Read more »

11

How Did Apple Allow Hackers to Access iCloud Account?

The Internet is abuzz this weekend as a result of the Gizmodo Twitter account getting hijacked. That incident was traced back to the hack of an Apple iCloud account--allegedly accomplished through social engineering.

A Forbes.com story from Adrian Kingsley-Hughes explains that a former contributor for Gizmodo, Mat Honan, was the original victim of the attack. Hackers were able to access Honan’s iCloud account, and remotely wipe his iPhone, iPad, and MacBook. The original theory was that the hackers used a brute force attack to crack Honan’s iCloud password, but further investigation revealed that social engineering was used to convince Apple the attackers were Honan, and Apple gave them the keys to walk right in.

It took me months to "social engineer" my way into my own Apple ID account.
Color me incredulous!

Every time I’d contact Apple Support I would get the same default answers, and “solutions” that wouldn’t work. Apple Support would explain that my email address was already in use on another Apple ID account, and that until it was removed from that account I’d be unable to use it.

Exasperated, I’d explain again that I can’t remove the email address from the Apple ID account because I had no idea what the Apple ID account was, or how to access it. Eventually, I’d become frustrated and quit. After a month or two, I’d contact Apple support and try again.

After many conversations and attempts, I finally had a breakthrough…sort of. An Apple Support person “cracked” and gave me an email address of the Apple ID associated with my email address. It was my wife’s. However, we logged in to her Apple ID account to remove my email address and found no sign whatsoever of it being there.

Read more »

22

Can Congress Protect the Nation's Critical Infrastructure?

The nation’s critical infrastructure is at risk--a well-executed cyber attack could have a potentially devastating effect. Congress is trying to patch some of the holes with legislation, but a recent survey found that most security experts have little faith that government regulation can do the trick.

Sensational attacks against the critical infrastructure make for great stories in books like Zero Day: A Novel by respected security expert Mark Russinovich, or perhaps something from Dan Brown. But, many security experts believe that we are in very real danger of such attacks moving from fiction to reality, and that we are woefully unprepared to defend against, or respond to them.

Most of our elected officials are simply not qualified to craft information security legislation.
What is the “critical infrastructure”? Executive Order 13010, signed by President Clinton on July 15, 1996 established the President’s Commission on Critical Infrastructure Protection. It explains, “Certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States.”

Read more »

2

How to choose an office security system

Protect Your Assets: A Buying Guide to Office Security Systems
We talk frequently about cybersecurity, discussing how to protect your business’s data by using strong passwords, deploying antimalware utilities, and keeping your computers safe with the latest patches and updates. This time, the focus is on premises security, or protecting your business’s physical assets from burglary and vandalism.

The best cybersecurity measures in the world are useless if a thief breaks into your office and makes off with your computers.

You won’t lose any digital data if you’ve followed our advice to back up your computers to secure, offsite locations; but if your business is like most operations, it isn't entirely digital. You have paper records, including sensitive personal information about your employees.

ADT Pulse

These systems are professionally installed, but they're pricey.

An ADT keypad lets you arm and disarm the alarm system.
ADT maintains a large presence in both the residential and commercial security markets. The company rolled out its residential Pulse system in late 2011, and is now marketing the same devices and services to small businesses.

RedCloud Express

This system provides site security via sophisticated access control.

RedCloud boasts that its RedCloud Express system "is as easy [to set up] as a wireless router."
RedCloud provides a different type of premises security system, one that revolves around access control. As such, RedCloud Express wouldn’t be appropriate for a retail operation open to the public, but it is ideally suited for small-office buildings, warehouses, and manufacturing facilities where you need to restrict access to authorized personnel and you wish to keep track of who’s coming and going.

Read more »

2