Computer Security Updates Week 5 of May 2013

Refer to Computer Security Updates Week 4 of May 2013; in which the biggest news was US NSA Director warns that Cyber attacks will get worse.

For this week / last week, here are / were the biggest news.
  • McAfee introduces Endpoint Security Suites with hardware-assisted capability.
  • Sophos RED wins Protector at Annual Information Security Awards.
  • Advanced U.S. weapons system designs could have been compromised.
  • Kaspersky Lab to Host First Annual Government Cybersecurity Forum in Washington D.C.
  • Sophos blog: Cybercrooks siphon $800,000 from US fuel distribution firm.
  • Eset blog: Twitter beefs up security with two-factor security system.
  • CA: Study finds security not a problem for cloud.
Hence, for this week, it is interesting to learn a few new technological ideas and security trend.

SourceFire's Firepower:

First of all, we learned that SourceFire's Firepower power technology is based on the ideology of intrusion prevention at the network layer, it aspires to perform the balancing act between checking every bit of data in and out of the network and to do that really fast to achieve the highest throughput rates in the industry.

McAfee's DeepSAFE:

Secondly, we learned  that McAfee Deep Defender is a hardware-assisted endpoint security solution jointly developed by Intel and McAfee with the intention of realizing deeper security footprint.

Basically, having deeper security footprint means it is able to protect against lower level security threats which reside not in the application layer hosted by operating system such as rootkit threats.

McAfee Deep Defender is powered by McAfee DeepSAFE technology which sits in betweeen the operating system layer and the CPU layer. In other words, DeepSAFE operates like firmware in the lower level (based on Intel architecture) but not embedded.

Unlike traditional security solutions, McAfee DeepSAFE technology operates beyond the operating system to provide real-time kernel monitoring to detect and block advanced, hidden threats, such as stealth rootkits and APTs.

Continuous Malware Analysis for proactive approach:

With SourceFire updates on its Retrospective AMP Solution which leverages on the power of cloud, big data and analytics to perform malware detection in a proactive manner.

While SourceFire prides that they are the first in the industry to create such solution, Bit9 on the other hand, had earlier collaborated with FireEye and/or Palo Alto Networks to create similar feat, resulted in the product known as Bit9 Connector.

Apparently, Bit9 Connector is a result of integration between Bit9's endpoint security solution, FireEye's Malware Analysis solution and Palo Alto's Malware alerts solution - best of breed.



SANTA CLARA, Calif. / SINGAPORE — May 30, 2013 –McAfee introduces Endpoint Security Suites with hardware-assisted capability

McAfee today introduced the McAfee Complete Endpoint Protection suites, adding defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, protecting Windows, Macs, and Linux systems, as well as mobile devices such as iPhone, iPad, and Android smartphones and tablets.

McAfee also announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee® ePolicy Orchestrator® (McAfee ePO™) platform, enabling enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single, unified infrastructure and console.

These suites integrate with McAfee Deep Defender, hardware-assisted endpoint security solution jointly developed by Intel and McAfee with the intention of realizing deeper security footprint.

Basically, having deeper security footprint means it is able to protect against lower level security threats which reside not in the application layer hosted by operating system such as rootkit threats.

McAfee Deep Defender is powered by McAfee DeepSAFE technology which sits in betweeen the operating system layer and the CPU layer. In other words, DeepSAFE operates like firmware in the lower level (based on Intel architecture) but not embedded.

Unlike traditional security solutions, McAfee DeepSAFE technology operates beyond the operating system to provide real-time kernel monitoring to detect and block advanced, hidden threats, such as stealth rootkits and APTs.

Kuala Lumpur, Malaysia, May 30, 2013 – Sophos RED Wins Protector at Annual Information Security Awards

Sophos is pleased to announce that its Sophos RED product has won the "Protector Award" at the 2013 Australian Information Security Awards. The awards, which recognize outstanding work in the computer security industry, are run jointly by AusCERT and Secure Computing Magazine.

The Sophos RED (Remote Ethernet Device) protects remote sites such as branch offices, providing secure remote access over an encrypted VPN (Virtual Private Network), quickly and easily.

Get more details.

Eset Blog, May 28, 2013 - Advanced U.S. weapons system designs could have been compromised

Eset blog reported that according to reports published, certain advanced U.S defense system could have been compromised, these include Resilient Military Systems and the Advanced Cyber Threat.

The reports cited such cyber-attacks were originated from China. Spokesperson mentioned that those responsible could have benefited 25 years of research and development in terms of defense system design.

Get more details.

Woburn, MA – May, 28, 2013 – Kaspersky Lab to Host First Annual Government Cybersecurity Forum in Washington D.C.

Kaspersky Lab will host its first annual Government Cybersecurity Forum at the Ronald Regan Building in Washington, D.C. on Tuesday, June 4, 2013. This year’s inaugural event will focus on today’s most pressing cybersecurity challenges facing the government and private sectors, including critical infrastructure protection, mitigating sophisticated cyberthreats and increasing collaboration between cybersecurity experts, international policy officers and leaders in the Federal, Technology, Defense and Financial Services industries.

The Kaspersky Government Cybersecurity Forum will feature a highly distinguished group of speakers including General Michael Hayden (Ret.), Former Director of the CIA and NSA, Ronald K. Noble, Secretary General of INTERPOL, Howard A. Schmidt, (Ret.), Former Cybersecurity Coordinator of the Obama Administration and Eugene Kaspersky, Founder and CEO, Kaspersky Lab.

Get more details.

Sophos Blog, May 25, 2013 - Cybercrooks siphon $800,000 from US fuel distribution firm

Earlier this month, a fuel distribution company in the US state of North Carolina reported lost of $800,000 to cyber-theft.

On the morning of May 1, the cyber thieves started carving out sub-$5,000 and sub $10,000 chunks of cash from J.T. Alexander's bank, Peoples Bancorp of North Carolina Inc.

The stolen money was then laundered.

Get more details.

Eset Blog, May 23, 2013 - Twitter beefs up security after wave of attacks on media sites

Twitter has introduced a new two-factor security system – an optional “extra layer” of security which should help to prevent unauthorised access to accounts. The move comes in the wake of a series of high-profile attacks on Twitter accounts owned by media organisations including Associated Press and the Financial Times.

The two-factor system will now combine notification and authorization via SMS (short message service).

How about using Whatsapp, Wechat, Viber, Line, Skype and other IMs ?

Get more details.

CA Blog, May 23, 2013 - CA: Study Finds Security Not a Problem for Cloud

Not too long ago, Symantec published a report on hidden costs of cloud computing where it was found that as many as 95% of adoptions have witnessed rogue cloud issues over a period of 12 months.

CA recently published another report/white paper acknowledging that cloud computing succeeded where it learned that close to 100 percent of the respondents reported that cloud met or exceeded their expectations for key business and IT objective.

The next step, according to CA, is really about management in terms of usage and security - identity and access management.

Get more details.

Comments