Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “Cain & Abel Update Two Years in the Making”, 2) “WTOP & FedNewsRadio Websites Hacked & Punting Fake AV”, and 1) “Starbucks Wifi Risk Infographic”. If you missed anything or happened to be offline, we hope you find this summary post useful as a quick reference.
A la Schneier … you can also use this rewind post to talk about the security stories in the news that we haven’t covered.
Starbucks Wifi Risk Infographic: I just love Starbucks (yep, I’m in one right now as I write this) as we’ve written about before so I just had to repost this infographic from ThreatMetrix. Thanks to Bill Brenner for bringing it to our attention. (continued here)
NIST Announces Buzzword-Compliant SP 800-53 Rev 4 Update: New version … time for everyone to update their paperwork… In the first major update since 2005, NIST has released the official version of SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Packed with new goodies covering supply chains, web apps, cloud, insider threats and privacy, the 457 page document represents the goto bible for government agencies either directly or indirectly. Any thoughts on the new version? Let us know in the comments below. (continued here)
Last Call for One Day $75 Intro to Exploit Development Class: This is just a final reminder that good friend and former NoVA Blogger Georgia Weidman of Bulb Security LLC will be giving a one day online class covering exploit development starting this Thursday for only $100. And if you can’t make it then, she’ll also be instructing the same class on Saturday the 11th. Or just feel free to attend both to make sure you get the material down pat. (continued here)
Cain & Abel Update Two Years in the Making: In it’s first update in over two years the creators of the free Windows-based Cain & Abel password cracking tool released version 4.9.44 yesterday. As you can see in the change list below most of the updates were to include Windows 8 support. You can download the latest version over on it’s project page. (continued here)
Ron Ross Discusses New NIST SP 800-53 Rev 4 Release: Ok … maybe we were a little hard on NIST yesterday. In this 8-minute interview with Ron Ross, the point-man for SP 800-53 Rev 4, Security and Privacy Controls for Federal Information Systems and Organizations, GovInfosecurity.com covers some of the core changes of the first major update since 2005. What do you think of the new 800-53? Let us know in the comments below. (continued here)
WTOP & FedNewsRadio Websites Hacked & Punting Fake AV: Well this hits pretty close to home… According to technology firm Invincea, the websites for DC-based WTOP and FederalNewsRadio were compromised and have been exploiting Java and Adobe browser add-ons to distribute fake antivirus software. The website for tech pundit John Dvorak was affected as well. Thanks to @thomashoffecker for pointing this out to us. (continued here)
NIP Tip – DNS Zone Transfers: As part of reconnaissance Domain Name Service (DNS) servers can provide the bad guys with pertinent data to further their attack. One of the key methods for extracting this information are zone transfers. With just a few quick commands a DNS server will gladly cough up a sensitive list of sub-domains if it isn’t configured correctly. If you’d like to see a specific NIP Tip just let us know. (continued here)
Free Tor Bridges Available in Amazon EC2: Bruce Schneier posted an interesting comment the other day pointing to an ArsTechnica article that emphasized the need for more Tor bridges to keep the anonymity service from being blocked. Supporters can create bridges manually using pluggable transports, the most common of which is obfs2. Due to detection issues the Tor Project created a new plugin called obfs3. Have you tried running the Amazon EC2 Tor bridge instance? How did it work out? Let us know in the comments below. (continued here)
Hosted Virtual Desktops Can Increase Security: I’ve been saying hosted virtual hosted desktops (HVD) can increase security to peers for a while now. About the only thing I would add is that there needs to be some automatic “snap-back” to a known good state at the end of the day. That way at least any workstation infestations would only last at most one day. This snap-back would also force employees to use file servers rather than their desktop making it easier for companies to ensure backups of critical data. Do you think hosted virtual desktops can increase security? What about the “snap-back” option? Let us know in the comments below. (continued here)
NIP Tip – iOS Kid Mode: Someone on the twitters posted about this feature the other day and I just think it’s one of the coolest hacks to emulate a “guest” mode for iOS 6 devices. I can see this coming in very handy when your kids ask to use your iPhone or iPad and although you usually trust them, you’d rather play it safe than sorry. Out of the box there is no documented support for a guest mode but by enabling a hidden feature called Guided Access you can quickly and easily limit the little guys and gals to just the current app. (continued here)
Hope everyone had a wonderful week. Have a great weekend!