Archive | Editorial Articles RSS feed for this section

Jamie Oliver Hacked Again – Daily Security Byte EP.44

There’s a lot of InfoSec news today, but I’m most fascinated with that fact that Jamie Olivier’s web site has been hijacked yet again. It may provide a perfect example of how not to secure your web site. Check out today’s short video for details, and I threw a few extras in the References below.

 

(Episode Runtime: 1:48)

Direct YouTube Link: https://www.youtube.com/watch?v=Gq8GL3wsrVo

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Gamer Ransomware – Daily Security Byte EP.43

The latest Cryptolocker look-alike is going after gamers. If you want to avoid losing your latest game saves, or your homemade, one-of-a-kind, custom maps, be sure to watch today’s video to see what to do.

 

(Episode Runtime: 2:56)

Direct YouTube Link: https://www.youtube.com/watch?v=4ur_nQ0tIHk

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Rowhammer Pwns DRAM – Daily Security Byte EP.42

The new Rowhammer attack exploits the physics of electricity on DRAM chips to gain root control of computers. Want to learn more? Watch the video or check out the references below.

 

(Episode Runtime: 2:31)

Direct YouTube Link: https://www.youtube.com/watch?v=SKycd-eE8Js

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Microsoft March Patch Madness – Daily Security Byte EP.41

Today’s Microsoft Patch Day is huge, with 14 bulletins fixing tens of vulnerabilities (many Critical). If you want to protect your encrypted web connections, and plug a five year old, zero day hole, you should update. See the video for details, or check out our blog post from earlier.

 

(Episode Runtime: 2:28)

Direct YouTube Link: https://www.youtube.com/watch?v=8DR4S6OlxBI

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Apple Patches FREAK – Daily Security Byte EP.40

Apple released four security updates on Monday, fixing flaws in OS X, iOS, Apple TV, and Xcode. Learn about them in today’s short video.

(Episode Runtime: 1:04)

Direct YouTube Link: https://www.youtube.com/watch?v=ak-ZRFKrjwo

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

SSL FREAK Out – WSWiR Episode 142

Did you catch all the important information security news this week? Do you know what you might learn from it? If not, watch our weekly security recap video to catch up.

Today’s episode covers yet another SSL vulnerability, explores a new Android worm, and mentions a controversy around Turbo Tax-related fraud. Watch the video for the details and check out the Reference section for more.

(Episode Runtime: 8:37 for main video with an extra at the end)

Direct YouTube Link: https://www.youtube.com/watch?v=y5dryp9wFhE

EPISODE REFERENCES:

EXTRAS:

— Corey Nachreiner, CISSP (@SecAdept)

Should WatchGuard Customer’s FREAK Out About SSL?

Last Tuesday, my Daily Security Byte video covered a new vulnerability that affected certain implementations of SSL; specifically ones that still use RSA’s export cipher suite (RSA_EXPORT).

Back in the day (1992 – 2000), the United States of America restricted the export of strong encryption to certain countries for political reasons. That meant encryption products, such as OpenSSL, had to ship with weaker “export” cipher suites, which were presumably easier for the US government to crack. With modern increases in processing power and the discovery of new cryptographic flaws, this export cipher suite is especially weak today, and easily cracked

This week, a French research team disclosed that many SSL implementations still ship with this weak RSA_EXPORT cipher suite. They warned that man-in-the-middle attackers can force vulnerable SSL clients and server into using this cipher, making it much easier for attackers to crack your encryption and read your decrypted SSL communications. At the original release time, the researcher stated this issue primarily affected Apple iOS and OS X, Google Android, and products that used older versions of OpenSSL. However, later in the week Microsoft warned that Windows was also vulnerability to this SSL flaw (I covered that in today’s video).

Though this flaw sounds bad, it only poses a medium to low risk. In order to exploit it, an attacker needs to be able to intercept your network traffic. While this might be relatively easy to do on public wireless networks, its more difficult to pull off on wired networks. Nonetheless, you still want to fix the flaw as soon as you can. If you use OpenSSL, make sure you’re running the latest versions (which don’t ship with the bad cipher). Apple, Google, and Microsoft all plan on releasing updates soon, but in some cases you can disable the vulnerable cipher suite in your SSL implementation. For instance, Microsoft describes how to use Group Policy to disable this cipher suite in the Workaround section of their advisory.

What about my WatchGuard products?

You may be wondering if your WatchGuard products are affected. The good news is most of our products are not vulnerable to this issue, with the exception on our SSL VPN appliances. Here’s the run down:

  • XTM appliances: Not Vulnerable (even E-Series products are not affected)
  • XCS appliances: Not Vulnerable
  • Wireless Access Points: Not Vulnerable
  • WatchGuard Dimension: Not Vulnerable
  • SSL VPN Appliances: Vulnerable

We will release an update for SSL VPN appliances in the future, and I’ll update this post when we do. In the meantime, the only way you expose this flaw is through its administrative user interface (UI). If you don’t expose the admin UI externally, Internet-based attackers cannot exploit this flaw against you. — Corey Nachreiner, CISSP (@SecAdept)

 

FREAK affects Windows – Daily Security Byte EP.39

I warned you about the FREAK SSL vulnerability on Tuesday. It turns out it affects Windows too. Learn how to mitigate the issue, and get an update on how WatchGuard’s products are affected in the video below.

(Episode Runtime: 1:56)

Direct YouTube Link: https://www.youtube.com/watch?v=JZNdJfMZnik

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

CSI: Cyber? NOPE! – Daily Security Byte EP.38

CSI: Cyber, a new TV series focused on information and network security, premiered in the US last night. Is it worth watching? I weigh in during today’s episode.

(Episode Runtime: 5:21)

Direct YouTube Link: https://www.youtube.com/watch?v=I0v9bgw9Ymk

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Gazon Android Worm – Daily Security Byte EP.37

Are you an Android user? If so you’ll probably want to know about the new worm that spreads via texts, and has infected over 4000 US users. Press play to learn more.

(Episode Runtime: 1:43)

Direct YouTube Link: https://www.youtube.com/watch?v=KV-E7EojS3M

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Follow

Get every new post delivered to your Inbox.

Join 7,863 other followers

%d bloggers like this: