Blog

Blog

3 Ways to Implement Your Security Needs in Collaboration With Business Stakeholders

You have done your homework and have identified the security needs to protect your business. You put together the business case and presented it to your executives, who approved the spending. Now, it is time to plan the implementation and you have to communicate with your business stakeholders. How can you convince them that the additional protection you are adding to the ecosystem outweighs the...
Blog

Air-Gapped Computers Can Be Compromised Using EM Side-Channel Attacks, Say Researchers

Researchers at the Georgia Institute of Technology have developed a methodology that uses electromagnetic (EM) side-channel signals to attack a computer, regardless of whether or not it’s been air-gapped. In their research paper , Robert Callan, Alenka Zajic, and Milos Prvulovic discuss that their metric, which they call Signal Available to Attacker (SAVAT), exploits a natural yet not readily...
Blog

Clearing the Air with Gogo Inflight Internet

Gogo has become a household name by keeping consumers connected at 10,000 feet with the popular Gogo Inflight Internet service. Recently, however, Gogo has been receiving attention and, more specifically, criticism, in the wake of a tweet from Google security engineer Adrienne Porter Felt (@__apf__) to Gogo (@Gogo). The tweet referenced a screenshot of an untrusted certificate being served with...
Blog

Habits Are Formed By Repetition, Not Reminders

There are five words today that, when coming from any adult relative with minimal technical chops, are the most terrifying you'll ever hear: I clicked on this link... I doubt any one of us at some point in our lives has managed to escape the inevitable cry for help from a technically challenged relative after they've managed to turn their computing device into a festering pit of malware, Trojans...
Blog

Ransomware: Refusing to Negotiate with Attackers

Last week, the information security community was saddened to learn of Joseph Edwards, a 17-year-old secondary school student who committed suicide after his computer became infected with ransomware . Edwards’ computer was corrupted by Reveton (or Police Ransomware), a common type of malware that locks a victim’s computer, claims that the victim is in trouble with law enforcement authorities for...
Blog

How to Detect the GHOST glibc Vulnerability

The GHOST vulnerability (CVE-2015-0235), which was discovered by researchers in the GNU C Library (glibc), allows local and remote access to the gethostbyname*() functions in certain cases. Although the vulnerability was just recently disclosed, the vulnerability was introduced in glibx-2.2 on November 10, 2000. Fortunately, this was fixed on May 21, 2013 in glibc version 2.18, but as of now, it...
Blog

Don’t be Shellshocked by GHOST

If you’re following threat feeds, you’ve probably heard about GHOST (CVE 2015-0235), the new critical vulnerability that Qualys disclosed yesterday. This vulnerability has been found in glibc, the GNU C library, and it affects all Linux systems dating back to 2000. Redhat listed it on their CVE database as ‘critical’ with a CVSS v2 score of 6.8 . GHOST is a serious vulnerability and Tripwire’s...
Blog

GHOST Vulnerability and Its Patch History

There’s a lot of chatter going on right now related to the GHOST vulnerability that was announced yesterday . Lots of folks are talking about the vulnerability, particularly focused on the threat advisory published by Qualys . However, I thought I would spend a little time looking at the history of this vulnerability and how its underlying bug was originally discovered. HISTORY The flaw underlying...
Blog

GHOST in the Linux Machine – CVE-2015-0235

Researchers have discovered a critical vulnerability (CVE-2015-0235) in the Linux GNU C Library (glibc) that could potentially allow attackers to execute code on servers and gain remote control of Linux machines, without the necessary system credentials. This flaw is found in most versions of Linux, in which a buffer overflow can be exploited by calling the gethostbyname*() function. However...
Blog

Targeted Scam Cost Businesses $215 Million Using Fraudulent Wire Transfers

Last year, a scam using fraudulent wire transfers caused businesses $215 million in losses. According to a public service announcement by the Internet Crime Computer Center (IC3), the scam, which is known as the “Business E-mail Compromise” (BEC), claimed 1,198 unique victims in every U.S. state and 45 other countries between October 2013 and December 2014. Approximately $180 million (around 84%)...
Blog

VERT Alert: GHOST - glibc overflow

Vulnerability Description A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. Exposure & Impact This...
Blog

Thought Experiment: Mandatory Online Banking Security Standards

Banks are required by law to follow government regulations; these subject the banks to specific requirements, restrictions and guidelines. The end goal being, among other things, transparency. What about setting specific requirements for banking website security? Pew Research Center statistics reveal that 51% of U.S. adults bank online and 35% of cell phone owners bank using their mobile phones...
Blog

Data Privacy Day Raises Awareness on Consumer Privacy, Cybersecurity Best Practice

On Wednesday, January 28, the National Cyber Security Alliance ( NCSA ) will launch its eighth annual Data Privacy Day in the United States in an effort to emphasize the importance of “respecting privacy, safeguarding data and enabling trust.” The annual day of awareness aims to encourage consumers to become educated on how to strengthen the privacy of their personal information, as well as urging...
Blog

Marriott Customers' Personal Details Exposed by Simple Web Flaw

Here's a piece of advice for anyone responsible for securing a corporation's data: If you discover security researcher Randy Westergren is using your app, you had best take a long hard look at whether you are protecting your users' information properly. Because, if you're not, there's a good chance that he might be about to tell you what you're doing wrong. Westergren, who has recently uncovered...
Blog

10 Notorious Cyber Criminals Brought to Justice – No. 5

Five cyber criminals down; five to go. Last week, we learned about Lin Mun Poo , a Malaysian hacker who at one time infiltrated a prominent U.S. financial institution as well as a contractor for the Department of Defense. Tripwire now continues its series on some of the most notorious cyber criminals brought to justice with Vladislav Anatolievich Horohorin, a Ukrainian hacker who used online...
Blog

Vulnerability Scoring 103

We’ve looked at the Tripwire IP360 Scoring System and how risk is commonly used in two different scenarios, so I figured it was worthwhile to dive into the other complex element of Tripwire’s scoring: skill . Skill is a term that, even within the IP360 Scoring System, has evolved over the years and it’s worth looking at the evolution of the word in terms of IP360 and vulnerabilities. To really...
Blog

‘Blackhat’ – A Tale of Cyber Security Buffoonery and ‘Human Error’

The movie ‘ Blackhat ’ succeeds in highlighting the prevalence of security breaches caused by human error. Even so, it fantasizes many aspects of our digital world to help depict an international cyber crisis and flubs as a film more generally. ‘Blackhat,’ starring Chris Hemsworth and Viola Davis, is an American action thriller about a former blackhat hacker who is summoned by the FBI to aid in an...
Blog

Thousands of U.S. Gas Stations Found Vulnerable to Dangerous Internet Attacks

More than 5,000 devices used to operate gas stations across the United States were found vulnerable to dangerous Internet attacks, revealed a security researcher this week. The flaw was found in the gas stations’ automated tank gauges, or ATGs, which raise alarms indicating an issue with the tank or gauge, such as a fuel spill. The devices also serve to monitor fuel tank inventory levels, track...
Blog

Seven-Year-Old Hacks Public WiFi in Under 11 Minutes

As part of a security awareness campaign, a seven-year-old girl was able to successfully hack a public WiFi hotspot in 10 minutes and 54 seconds. Seven-year-old Betsy Davis entered into the ethical hacking demo , meaning that a security expert supervised the entirety of the experiment, with only her laptop. She was then able to find out how to hack the controlled environment’s public WiFi using...
Blog

Kim Dotcom Reveals His End-to-End Encrypted Video Chat Service, MegaChat

The ever-controversial hacker-turned-millionaire-entrepreneur Kim Dotcom has announced the public beta launch of an end-to-end encrypted audio and video chat service, which he calls MegaChat. Anyone with an account on Mega's file-sharing file-syncing service can now access what is claimed to be a more secure alternative to Skype, boasting end-to-end encryption. If it does what it claims, MegaChat...