Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/15/2011
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

McAfee’s 2011 Security Journal Examines Cutting-Edge Security Topics

Journal examines the future of information security in relation to the increasing ubiquity of devices and the data that resides within

SANTA CLARA, Calif.—Nov. 15, 2011— McAfee today announced the 2011 edition of McAfee Security Journal, a publication designed to inform security executives and technical personnel on cutting-edge topics to help them make better-informed security decisions. The Journal, now in its seventh edition, comprises in-depth articles from McAfee Labs researchers and security thought leaders. It examines the future of information security as it pertains to interconnected technologies, recent acts of cyberespionage, the rise in hacktivism, and increasingly sophisticated malware such as Stuxnet and Duqu.

“As security experts, we need to be leaders in understanding what the next-generation threats are,” said Vincent Weafer, senior vice president of McAfee Labs. “Technologies are more interconnected than ever before, and that has led to new types of security threats and data and privacy concerns. As new platforms gain traction and visibility at the attacker level, now is the time to examine these threats and inform organizations and individuals on how they can protect themselves.”

This edition of the Journal, “Security beyond the Desktop,” is based on articles compiled by international experts who issue an urgent “call to arms” to the security industry. No longer is a defensive posture sufficient to protect the ubiquitous devices and data of today’s digital world. Instead of defensive methods being installed on computers, in networks, and in the cloud, there is an urgent need to “step back,” to take a broader look at security, and to take preemptive measures. The report’s authors say now is the time to avoid enemy attacks altogether by taking a more inclusive stance, looking both inside and outside the network.

The report details the following highlights on the evolution of cyberthreats and the need for a more inclusive security strategy:

The human link: There is an ever-widening disparity between the sophistication of a network and the people who use them. Cybercriminals often use social engineering toolkits to exploit unsuspecting employees when direct attacks on an organization’s defenses fail. Educating employees on secure practices is not enough; organizations need to install the proper framework to empower and encourage employees to use these secure practices. Mobile is everywhere: Mobile attacks are becoming increasingly sophisticated every year. Instead of rendering the device unusable, hackers are now finding ways to steal sensitive personal data to exploit. Additionally, hackers are broadening their target range to include other, more uncommon mobile systems, such as the GPS system in a car. Cloud-based apps are on the rise: The popularity of cloud-based applications has made them an attractive target for hackers and other cybercriminals. However, the cloud is also a highly efficient way to scale security and protection for a business. Leveraged correctly, the cloud both helps reduce your security costs and can actually increase your overall security posture and protection. Data is king: Whether stored on a smartphone, in the cloud, or on a network, data is what cybercriminals seek. Taking the proper precautions to secure this often ubiquitous data is a crucial step for many organizations. Learn from previous mistakes: History is a great teacher for those who take the time to study it. Analytics help identify patterns, vulnerabilities, and even motives. Understanding any of these concepts can help prevent attacks in the future.

Experts in the report are McAfee Labs researchers, as well as Chris Roberts, founder and Chief Geek of One World Labs, Jayson Street, author of Dissecting the Hack, and David Kennedy, creator of The Social Engineering Toolkit. All these experts agree that the recommendations laid out in the report are preliminary, and these are just the first steps that need to be taken industry wide.

For a full copy of the McAfee Security Journal: Security Beyond the Desktop, please visit http://www.mcafee.com/us/resources/reports/rp-security-journal-summer-2011.pdf.

About McAfee, Inc.

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world's largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse, and shop the Web more securely. Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. http://www.mcafee.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
CVE-2021-3420
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.