Comments
Why Security Awareness Alone Wont Stop Hackers
Newest First  |  Oldest First  |  Threaded View
SSERGIO123
50%
50%
SSERGIO123,
User Rank: Apprentice
3/6/2015 | 10:16:04 AM
Re: Weak link
But that´s exactly my point, it is NOT easy. It´s hard work. That´s why almost nobody does it.
xmarksthespot
100%
0%
xmarksthespot,
User Rank: Strategist
3/6/2015 | 9:00:33 AM
Re: Security culture
The article brings up important details about the basics of information security. 

Unpatched Microsoft Office was necessary for this ploy to work.  The attack highlights the importance of applying all security patches in a timely manner.  Most banks were not susceptible to the attack due to proper patching.

The Open Web Application Security Project (OWASP), non-profit organization focusing on improving software security, places Security Misconfiguration as number 5 in it's top ten list of security concerns.

Exploitability is specified as Easy, but detectability of misconfiguration is specified as Easy.  Prevalance is specified as Common but I would assume that the banking industry as a whole is well protected compared to all other industries.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/5/2015 | 11:51:40 PM
Re: Security culture
@Preeti: I had the pleasure to attend a cybersecurity conference some time ago where a representative from the Israeli consulate spoke, and he told the audience that in Israel, cybersecurity is indeed something that is focused on at an early age -- and that students are given the opportunity to focus their studies on cybersecurity as early as high school.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/5/2015 | 11:49:56 PM
Re: Weak link
@SSERGIO123: Good point.  But then, if it was easy, everyone would do it.  ;)
jefawcet
50%
50%
jefawcet,
User Rank: Apprentice
3/3/2015 | 6:44:12 PM
Reduce the attack surface by taking out the user (somewhat)
Even with the best end user training you are doing well to get 50% effectiveness.  Supplement the end user training with removing the chance that they user will click on the spam link with a secure email gateway.   Remove the chance that a user is going to a compromised site (poison well) using a secure web gateway, secure cloud gateway.   I find doing the above is quite effective.
PreetiS347
50%
50%
PreetiS347,
User Rank: Apprentice
3/3/2015 | 11:28:15 AM
Re: Security culture
 I believe the concept of security should start right from the elementary school. The kids in school use computers. They should be given security classes as well. This process in the long run will inculcate the security culture. Just like we teach our kids to be aware of strangers, not be over friendly with people you don't know well and to let your parents know of everything that's happening with you, We can teach them how to be safe in the cyberworld. What are the signs that you are being hacked, not to release your PII to random forms and surveys etc. All this will develop the approach of being alert and logging all important security rules in the back of your  mind just like a well developed IDS.

 For the corporate world, the periodic emails showing the unusual activity is a good option but I guess there should be a team that re-screens these emails and then give  the employees an alert when an action is required. Like it is mentioned that people from bank have so many emails in a day that it is quite possible for them to miss out on the important one from security. Training I guess has no substitute. The more you know , the more you do.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/3/2015 | 10:09:08 AM
Re: Security culture > self audit
I think a  self audit could work for me, if the emails/reports were concise and showed me my activity in a manner that was easy to scan and spot anomalies. I get a spam filter report every day. And while I don't religiously open it, I do read it often enough so that I can tag emails that are mistakenly quaranteened. 
SSERGIO123
50%
50%
SSERGIO123,
User Rank: Apprentice
3/3/2015 | 7:46:49 AM
Weak link
The weak link is the hacker´s command and control server. If we analize all outbound IPs, we will detect those which are not kosher and will be able to block them. Hard work? Yes. So?
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
3/3/2015 | 5:40:15 AM
Security culture
This is the difference between security awareness in certain offices (the C-suite, the compliance/audit department, the general counsel's office, etc.) and security culture.  It comes down to convincing everyone, from the top down, that security is important.

Of course, in the particular example given, I'm not convinced a "self-audit" would be particularly helpful.  People in banking deal with thousands of emails a day; in numerous organizations they are even routinely encouraged -- if they do not take the initiative themselves -- to fudge the seeming "minutiae" a bit simply to satisfy the audit department because they feel they wouldn't ever get anything done otherwise.

So it's nice to have the policy in place...but you have to convince your staff that the policy is worth following.  That can often be easier said than done.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.