Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.securityweek.com/we-cant-give-preventing-breaches
Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.securityweek.com/we-cant-give-preventing-breaches
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Advice from Bob; SEC asks public companies to disclose more breaches; 230k IPMI devices found in Internet scan; PF Changs may have been hacked; Building network security to fail; 5 lessons from companies that get security right; Advice in responding to Anonymous threats; Bank of England announces assessment framework; Target shoppers don’t seem to be fazed by breach; Target board is under fire; Truecrypt may be coming back.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://www.reuters.com/article/2014/06/10/sec-cybersecurity-aguilar-idUSL2N0OR13U20140610
https://securityledger.com/2014/06/ipmi-insecurity-affects-200k-systems/
http://krebsonsecurity.com/2014/06/banks-credit-card-breach-at-p-f-changs/
http://www.forbes.com/sites/davelewis/2014/06/03/network-security-build-to-fail/
http://www.infoworld.com/d/security/5-lessons-companies-get-computer-security-right-243407
http://cyberwarzone.com/hackers-behind-oppetrol-will-attack-june-20-2014/
http://www.dailyfinance.com/2014/06/05/target-data-breach-shoppers-dont-care/
http://www.startribune.com/business/261527581.html
http://www.wired.com/2014/06/bleed/
http://www.forbes.com/sites/jameslyne/2014/06/02/truecrypt-is-back-but-should-it-be/
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Coke loses 55 laptops and 56000 records over 7 years; Private cyber espionage network in India; Review of the Shell_Crew hack using Adobe Cold Fusion exploit; Should we punish employees who fall for phishing emails?; Assuming your network has been hacked; more details on the Target breach are emerging.
Here is an interesting article on changing the social contract of vulnerability disclosures from the current, though recent, seven day cycle, to one that follows patch Tuesday, or whatever equivalent date the particular software vendor has for patches.
It’s a good idea, but I think the author missed an important nuance: the short 7 day notice is for situations where the discovering researcher has found evidence that the vulnerability is being actively exploited. In other cases where the vulnerability is not being actively exploited, the time frame is 6o days, which is compatible with the author’s idea. Note that the 7 day recommendation comes from Google and is available to read here.
I do not think that it makes sense to wait until after the next patch Tuesday in cases of active exploitation. The point is that users of the vulnerable technology need to know that there is a vulnerability being actively exploited, whether or not a patch is available, so that the user can take steps to mitigate the problem.