The Week That Was – 10/22/2012

Welcome back, sports fans!  We’ve got a decent sized list of links this week.  One of the threads I picked up on was some lingering commentary on the Huawei and ZTE revelation last week.  And when I say revelation, I mean that the mainstream media recently picked up on it.  First, China rounded up 9,000 cyber criminals and the timing was pretty blatant, but maybe that was the point.  [4]  Thomas Claburn discusses how Huawei and ZTE might rebuild some of the trust they’ve lost.  [23-24], [27]  I’ve got to ask myself does it matter?  Could the edge devices have already served their purpose?  Discuss amongst yourselves.

ThreatPost had an interesting article on gathering threat intelligence with open tools. [11]  Dennis Fisher listed some interesting resources there.  Most interesting to me was the Silobreaker tool.  [20]  I’ve not used it but it seems like it has a lot of potential applications.  I’d love to get some time to experiment with it.

Lastly, I need to talk about risk.  There is a new Risk Hose episode out and I’m ashamed to say I’ve not yet listened to it.  [7]  There have also been some interesting articles over on the SIRA blog.  Jeff Lowder has been ranting on ordinal abuse.  [13], [22], [26]  Apparently, you’ll go blind if you do it too much.  Seriously though, it’s good stuff.  On the surface it might seem like trivial semantic hair-splitting, but I don’t think it is.  You can’t effectively describe the advantages of one approach while lacking the ability to describe the deficiencies of the alternatives.  Understanding measurement types gives you the insight necessary.

Link Dump

[1]
B. Prince, “Adobe Bolsters Security In Reader, Acrobat XI,” Dark Reading, 17-Oct-2012. [Online]. Available: http://www.darkreading.com/vulnerability-management/167901026/security/application-security/240009265/adobe-bolsters-security-in-reader-acrobat-xi.html. [Accessed: 18-Oct-2012].
[2]
S. Sharwood, “Apple banishes Java from Mac browsers,” The Register, 19-Oct-2012. [Online]. Available: http://www.theregister.co.uk/2012/10/19/apple_banishes_java_from_macos_browsers/. [Accessed: 19-Oct-2012].
[3]
P. Roberts, “BYOD: Filling The Holes In Your Security Policy,” Dark Re, 15-Oct-2012. [Online]. Available: http://www.darkreading.com/taxonomy/index/printarticle/id/240008838. [Accessed: 16-Oct-2012].
[4]
P. Muncaster, “Chinese arrest 9,000 cyber-crims,” The Register, 16-Oct-2012. [Online]. Available: http://www.theregister.co.uk/2012/10/16/china_police_arrest_thousands_online_crime/. [Accessed: 16-Oct-2012].
[5]
B. Krebs, “Critical Java Patch Plugs 30 Security Holes,” Krebs on Security, 17-Oct-2012. [Online]. Available: https://krebsonsecurity.com/2012/10/critical-java-patch-plugs-30-security-holes/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29. [Accessed: 18-Oct-2012].
[6]
C. Osborne, “Cyberthieves steal $400,000 from Bank of America,” CNet News, 16-Oct-2012. [Online]. Available: http://news.cnet.com/8301-1009_3-57533007-83/cyberthieves-steal-$400000-from-bank-of-america/. [Accessed: 18-Oct-2012].
[7]
A. Hutton and J. Lowder, “Episode 28: Deep Thoughts with Risk Hose – The Risk Hose Podcast,” Risk Hose Podcast, 18-Oct-2012. [Online]. Available: http://riskhose.com/episode-28-deep-thoughts-with-risk-hose?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+posterous%2FjhtP+%28The+Risk+Hose+Podcast%29. [Accessed: 19-Oct-2012].
[8]
D. Fisher, “Eugene Kaspersky Unveils Plans for New Secure SCADA OS,” ThreatPost, 16-Oct-2012. [Online]. Available: https://threatpost.com/en_us/blogs/eugene-kaspersky-unveils-plans-new-secure-scada-os-101612. [Accessed: 16-Oct-2012].
[9]
C. Farivar, “FCC says Big Cable can now encrypt TV signals to halt ‘service theft’,” Ars Technica, 17-Oct-2012. [Online]. Available: http://arstechnica.com/tech-policy/2012/10/fcc-says-big-cable-can-now-encrypt-tv-signals-to-halt-service-theft/. [Accessed: 18-Oct-2012].
[10]
J. Leyden, “‘Four horsemen’ posse: This here security town needs a new sheriff,” The Register, 18-Oct-2012. [Online]. Available: http://www.theregister.co.uk/2012/10/18/isc2_election/. [Accessed: 18-Oct-2012].
[11]
D. Fisher, “Gathering Threat Intelligence With Open Tools,” ThreatPost, 15-Oct-2012. [Online]. Available: https://threatpost.com/en_us/blogs/gathering-threat-intelligence-open-tools-101612. [Accessed: 16-Oct-2012].
[12]
I. Thompson, “IBM claims first with Hadoop data security suite,” The Register, 18-Oct-2012. [Online]. Available: http://www.theregister.co.uk/2012/10/18/ibm_hadoop_security/. [Accessed: 18-Oct-2012].
[13]
J. Lowder, “Is Probability Even Compatible with an Ordinal Scale? Probably Not,” Society of Information Risk Analysts, 15-Oct-2012. [Online]. Available: https://www.societyinforisk.org/content/probability-even-compatible-ordinal-scale-probably-not. [Accessed: 16-Oct-2012].
[14]
R. Lemos, “Keeping Data Out Of The Insecure Cloud,” Dark Reading, 15-Oct-2012. [Online]. Available: http://www.darkreading.com/security-services/167801101/security/security-management/240009089/keeping-data-out-of-the-insecure-cloud.html. [Accessed: 16-Oct-2012].
[15]
“Kosovo group claims hack of US weather service.” [Online]. Available: http://phys.org/news/2012-10-kosovo-group-hack-weather.html. [Accessed: 19-Oct-2012].
[16]
“Level of measurement,” Wikipedia, the free encyclopedia, 15-Oct-2012. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Level_of_measurement&oldid=518017406. [Accessed: 17-Oct-2012].
[17]
“New NIST software checks performance of biometrics applications against 2011 standard.” [Online]. Available: http://phys.org/news/2012-10-nist-software-biometrics-applications-standard.html. [Accessed: 18-Oct-2012].
[18]
“Nissan steer-by-wire cars set for showrooms by 2013,” BBC News, 17-Oct-2012. [Online]. Available: http://www.bbc.co.uk/news/technology-19979380. [Accessed: 18-Oct-2012].
[19]
“Security experts sound medical device malware alarm.” [Online]. Available: http://phys.org/news/2012-10-experts-medical-device-malware-alarm.html. [Accessed: 19-Oct-2012].
[20]
“Silobreaker,” Silobreaker, 15-Oct-2012. [Online]. Available: http://www.silobreaker.com/. [Accessed: 16-Oct-2012].
[21]
C. Brook, “Survey: SMBs Remain Blissfully Unfazed by Cyberthreats,” ThreatPost, 18-Oct-2012. [Online]. Available: https://threatpost.com/en_us/blogs/survey-smbs-remain-blissfully-unfazed-cyberthreats-101812. [Accessed: 19-Oct-2012].
[22]
J. Lowder, “Three Good Sources about Levels of Measurement,” Society of Information Risk Analysts, 16-Oct-2012. [Online]. Available: https://www.societyinforisk.org/content/three-good-sources-about-levels-measurement. [Accessed: 17-Oct-2012].
[23]
T. Claburn, “What Huawei, ZTE Must Do To Regain Trust,” Dark Reading, 17-Oct-2012. [Online]. Available: http://www.darkreading.com/quickview/1743?wc=4. [Accessed: 18-Oct-2012].
[24]
T. Claburn, “What Huawei, ZTE Must Do To Regain Trust,” InformationWeek, 17-Oct-2012. [Online]. Available: https://www.informationweek.com/security/vulnerabilities/what-huawei-zte-must-do-to-regain-trust/240009190. [Accessed: 22-Oct-2012].
[25]
R. Stiennon, “Why risk management fails in IT,” Network World, 16-Oct-2012. [Online]. Available: https://www.networkworld.com/news/tech/2012/101512-risk-management-263379.html?page=1. [Accessed: 19-Oct-2012].
[26]
J. Lowder, “Why Risk Management Is Unavoidable in IT and How It Can Succeed–Part 1,” Society of Information Risk Analysts, 18-Oct-2012. [Online]. Available: https://www.societyinforisk.org/content/why-risk-management-unavoidable-it-and-how-it-can-succeed-part-1. [Accessed: 19-Oct-2012].
[27]
P. Muncaster, “ZTE drops spy tech subsidiary,” The Register, 17-Oct-2012. [Online]. Available: http://www.theregister.co.uk/2012/10/17/zte_sells_security_surveillance_subsidiary/. [Accessed: 18-Oct-2012].

Leave a Reply

%d bloggers like this: