Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How One Companys Cybersecurity Problem Becomes Another's Fraud Problem
Oldest First  |  Newest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
8/29/2018 | 11:04:13 PM
Honan example
An even more insidious example can be seen in the case of Wired's Mat Honan -- whose entire online/computer life was compromised in 2012 via a compromise of his Apple ID, which in turn was able to be compromised via information gained by compromising Honan's Amazon account!
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/30/2018 | 9:27:21 AM
Fraud
But the larger end result is that my cyber problem has just become everybody else's fraud problem because my infected system is now set up to attack other systems. This makes sense. Best approach against this is segregation of the systems so one is compromised but the rest can still be protected.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/30/2018 | 9:28:52 AM
Re: Honan example
compromise of his Apple ID, which in turn was able to be compromised via information gained by compromising Honan's Amazon account! Yes. Most liley the same account names and passwords are used. A common problem..
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/30/2018 | 9:30:25 AM
Say something
It's taking the concept of "when you see something, say something" into cyberspace. This would be a way to go. It requires a good security awareness programs to achieve it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/30/2018 | 9:32:49 AM
Cloud A and B
f Cloud A and Cloud B are willing to work together and exchange threat intelligence information, ... This is the major problem in the industry, they do not share security related information with each other.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/30/2018 | 9:35:34 AM
Reputation
"cyber-enabled fraud," which we define as fraud that is facilitated though the use of malware exploits, social engineering, and/or lateral movement through a compromised website, network, or account. This would be problematic for companies reputation, it is still their lack of security that enabled attackers to cause the damage.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
8/30/2018 | 11:30:40 PM
Re: Honan example
@Dr.T: Actually, nope, that's not what happened; this was not a case of PEBKAC. The problem lay with security issues at Amazon and Apple respectively.

Here's Honan's account of his digital nightmare: wired.com/2012/08/apple-amazon-mat-honan-hacking/
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
8/30/2018 | 11:32:29 PM
Re: Fraud
@Dr.T: Sure, virtualization and gapping measures can be great for security and tenant isolation...but more to the point, certain systems have to interact with each other -- and the security issues flow just as readily as does the communication itself.


Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1842
PUBLISHED: 2020-02-18
Huawei HEGE-560 version 1.0.1.20(SP2); OSCA-550 and OSCA-550A version 1.0.0.71(SP1); and OSCA-550AX and OSCA-550X version 1.0.0.71(SP2) have an insufficient authentication vulnerability. An attacker can access the device physically and perform specific operations to exploit this vulnerability. Succe...
CVE-2020-8010
PUBLISHED: 2020-02-18
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
CVE-2020-8011
PUBLISHED: 2020-02-18
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a null pointer dereference vulnerability in the robot (controller) component. A remote attacker can crash the Controller service.
CVE-2020-8012
PUBLISHED: 2020-02-18
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
CVE-2020-1791
PUBLISHED: 2020-02-18
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.185(C00E74R3P8) have an improper authorization vulnerability. The system has a logic judging error under certain scenario, successful exploit could allow the attacker to switch to third desktop after a series of operation in ADB mode.