How many times have you been approached by your employees asking for permission to work from home instead of coming into the office? Your immediate reaction probably includes head nodding, quickly followed by questions surrounding the resourcing that is required to make this desire a reality. In a recent Cisco study, “The Cisco Connected World Report,” respondents indicated companies that afford their employees the flexibility to work remotely are more attractive employers.
Should companies allow remote worker access? Read More »
Tags: remote worker, security
Over September 15-17 at the 1st Interpol Information Security Conference (iisc2010.org), more than 300 delegates from 188 countries came to Hong Kong, and under the care of Interpol and the Hong Kong Police Department, spoke candidly and collaboratively about Information Security and the common challenges we all face. In his welcoming address, Interpol’s Secretary-General Ron Noble mentioned how a Facebook page was created in his name in an attempt to confuse others and socially engineer colleagues. The Hong Kong Commissioner of Police opened his address by comparing technology to the moon: it has a bright side and a dark side. Both speeches hold in common that technology is ubiquitous, we must continue to keep criminal activity at bay, and that the Internet’s global reach means we all share in its continued success and must remain vigilant to protect it from the threats against it. Read More »
Tags: Interpol, security
Will PCI 2.0 Bring Virtual Relief to Real Questions?
PCI Data Security Standard (PCI DSS) 1.2.1, which is a set of standards for retail and other verticals that defines the requirements for security compliance, is relatively simple and straightforward. 12 requirements define the spirit and intent of the standard. These are good, common sense guidelines and best practices that are derived from decades of experience keeping customer data secure. However, there are areas where PCI DSS could do a better job of handling what has become common, well accepted practices; virtualization is one of those areas. Read More »
Tags: compliance, pci, pci-dss, security, virtualization
This week brought us a wide variety of news about the ZeuS malware platform and its criminal users. While the platform has been very successful at stealing banking credentials and money from its victims, it may be showing some promising signs of weakness to the security community. While it has long been recognized as a modular and adaptable platform, the rising complexity in the system may be exposing it to security concerns found in traditional enterprise software. Identifying and exploiting these weaknesses may be an essential factor in disrupting its botnets and tracking down its controllers.
One of those features, highlighted in this week’s Cyber Risk Report, was a jump into mobile malware. One particular ZeuS adaptation has appeared as a combined threat between desktops and smartphones, with the ultimate goal of intercepting not only keyboard-entered user credentials, but also SMS messages from banks used for out-of-band user authentication.
Read More »
Tags: malware, security
On Monday morning, I woke up and started my weekly routine by looking through the spam captured by our traps over the weekend. It feels as though I am still dreaming, because the most notorious pharmacy affiliate program, Spamit, seems to have made good on its threat of closing its doors. Brian Krebs blogged about this last week, citing that “Spamit administrators blamed the impending closure on increased public attention to its program.” So far, we have seen no sign of spam advertising “Canadian Pharmacy” and our SenderBase and SpamCop services are both showing a significant decrease in global spam volumes.
Sun Tzu famously said, “Keep your friends close, and your enemies closer.” Spamit, along with the rest of the fake online pharmacy community, has been very near and dear to us at Cisco Security Intelligence Operations (SIO) for several years. We visited the Subway restaurant in Toronto, Canada supposedly occupied by “My Canadian Pharmacy,” an affiliate program run by bulker.biz, Spamit’s main competitor. Read More »
Tags: security, spamit