Entries by Bob Appleby (1525)

Thursday
May072015

Report: Healthcare industry unable to protect patient records

The Ponemon Institute reported that even though the healthcare industry is actively embracing technology, it isn’t properly prepared to keep employee and patient data secure from hackers. Ninety-one percent of the healthcare companies that participated in the survey reported at least one data breach in the pas two years. This is according to their "2015 Study on Privacy and Security of Healthcare Data" report.

The healthcare industry is paying more than $6 billion per year related to data breaches and associated cyber security incidents. Don’t be one of the statistics. Let us help you get to the next level a security support using products from the leader in cyber security, Sophos.

It is hard to get it all right and that is why you call on a security expert. PAconnect is working with industry leaders in the security area to ensure that we stay knowledgably and are able to provide you with the in class security products available at pricing that you can afford. Take advantage of our free consultation services today!

Tuesday
May052015

New Program to Provide 10,000 free eBooks through your library

imagePresident Obama announced a new program aimed at delivering access fro more than 10,000 eBooks to financially strapped schoolchildren across the U.S.. $250 million has been earmarked for this program that will feature titles from many different publishers including: Macmillan, Simon & Schuster, Penguin Random House, HarperCollins and Hachette, selected by volunteers from Digital Public Library of America.

The New York Library has signed on to develop the fee app. The program hopes to work with local libraries to boost enrollment of the children and to provide the hardware necessary to access the eBooks. Details are still being worked out on how the kids will gain access but at least there is some positive movement in this direction.

Saturday
May022015

Rep Ted Lieu (D-CA)–I like his take on privacy rights

imageTake a look at Cory Doctorow’s post discussing his take on putting backdoors into cryptography programs. We do live in a world where we need to acquire as much information about those who would like to harm our country, however, we can’t allow that to overstep our basic rights. This is worth a read….

http://boingboing.net/2015/05/01/computer-scientistcongressman.html

Friday
May012015

Microsoft Word Intruder - the malware that writes new malware for you

Thanks to Gabor Szappanos of SophosLabs for the technical work
that forms the basis of this article.

Malware construction kits aren't new.

Back in the early 1990s, for example, DOS-based tools such as VCL (Virus Creation Laboratory) and PS-MPC (Phalcon-Skism Mass Produced Code Generator) lowered the barrier of entry to virus "writing".

In those early days, the main purpose of malware creation tools was to give non-techies entry into the virus writing counterculture.

Nowadays, the main purpose is business, plain and simple: to generate income by selling malware generation services in the underground cyberthreat marketplace.

The early malware generators produced executable files (programs), but today, you can buy generators to produce booby-trapped MS Office files.

A contemporary example is MWI, short for Microsoft Word Intruder, most likely developed somewhere in Russia.

Because MWI isn't widely known or circulated, we had assumed until recently that many malware samples we now consider to have been generated with it had been produced by hand, using the old-fashioned but effective approach of copy-and-paste.

But following a recent article by FireEye, it became obvious that this "copy-and-paste" was, in fact, an automated process.

MWI essentials

The kit was probably developed in Russia, where it has been advertised on the underground by an individual who goes by the handle Objekt.

MWI generates Rich Text Format (RTF) documents that are booby-trapped to exploit vulnerabilities in Microsoft Word.

In fact, the latest versions of MWI can deliver multiple vulnerabilities in the same document, stacked one after another.

Because we don't have access to the MWI creation kit itself, we can't be completely certain which samples in our malware collection really were created with it, but we can make some educated guesses.

Notably, as reported by FireEye, samples produced since December 2014 have included a special tracking feature called MWISTAT, which embeds a distinctive URL in the generated RTFs:

While these URLs help the crooks keep track of their malware campaigns, they also let us keep track of the malware samples involved.

Running a similarity analysis on our malware collection suggests that we already have about 160 MWI-created attack documents.

Droppers and downloaders

Malware delivered in booby-trapped Office files tends to fall into two categories:

  • Droppers include one or more encoded malware programs (EXE files) as data that are unscrambled and written directly to disk during the infection process. This means that once you have received the booby-trapped file, in an email perhaps, you already have all components of the final malware available locally, so the infection can proceed even if you are offline.
  • Downloaders contain a URL from which the final infectious malware payload is downloaded and installed. This means that you can't predict exactly what malware the booby-trapped files might deliver, because the attackers can vary the download at will. But it does mean that if you can block the "callhome" URL, the original RTF attack file becomes effectively harmless.

We've seen MWI-created malware of both types, with slightly more droppers than downloaders.

Decoy documents

Booby-trapped documents and spreadsheets usually carry some sort of decoy document along with their malicious code.

Because Office exploits often cause Word or Excel to crash or exit unexpectedly, opening an infected file often arouses suspicion, because the promised document never appears.

Decoys are secondary documents, often exact copies of perfectly legitimate files (such as articles and news items) ripped off from the internet, that are deliberately popped up by the original booby-trapped file as a cover-up for the unexpected termination of Word or Excel.

But none of the 160 MWI samples in our collection include a decoy document feature, which is surprising.

After all, it is somewhat suspicious that after opening a document received in email, Word  crashes or exits and nothing visible happens.

Reliability

Fortunately, quite a few of the MWI samples we analysed were buggy.

This is because recent versions of the creation kit try four different Office exploits in turn.

From oldest to newest, these are: CVE-2010-3333, CVE-2012-0158, CVE-2013-3906 and CVE-2014-1761.

If your computer is patched against CVE-2012-0158 and CVE-2013-3906, the exploit code used in the booby-trapped RTF file doesn't trigger on those vulnerabilities, but falls through to the CVE-2014-1761 exploit code instead.

This fails about two-thirds of the time, due to the complicated structure of the juxtaposed exploits.

Of course, this doesn't protect you from CVE-2014-1761 in general, so it doesn't exonerate you from getting up to date with your Office patches – something that would protect you from all current MWI-generated samples, given the exploits that the MWI kit knows about so far.

Conclusions

We went back to a SophosLabs report on Advanced Persistent Threats (APTs) written at the beginning of 2014.

Interestingly, our "top attack" charts showed that a combination of CVE-2010-3333 and CVE-2012-0158 was the most prevalent attack vector:

And these attacks were predominantly used to distribute variants of the Zbot (also known as Zeus) malware:

Revisiting the samples from this period, it is now obvious that these dual-exploit samples were generated by MWI.

The Zbot/Zeus malware is commonly used for stealing online banking credentials and we've often seen it used to install ransomware like CryptoLocker.

As we said at the time:

Exploited documents, once used almost exclusively from players in the APT scene, are now used routinely in the sort of malware that is distributed widely by money-seeking cybercriminals.

Clearly, MWI has been an integral part of that money-motivated crimeware scene.

Friday
Mar202015

Look how official this looks. What A SCAM!

imageThis is a continuation of the scam that we have been warning you about! The problem is that once you are infected it is too late to do anything about it.

You have two choices. Pay up or revert to your backups. What! No Backups! Well this is something that you need to think about. The encryption locks away your data so that you need to access some kind of clean separate backup that is incremental so that you can roll back to a clean drive.

If you are not already setup to do this, then you need to talk to us to give you a solution to provide this kind of protection.

http://arstechnica.com/security/2015/03/cryptolocker-look-alike-searches-for-and-encrypts-pc-game-files/

Thursday
Mar192015

Beware the PUP (potentially unwanted programs)

Top download portals to avoid

imageMichael sent this out to us internally but it is something that has bothered me for quite awhile so I thought I would get it out there so you would be able to be aware. I use downloads.com all of the time for some of the programs that I want to use but you have to watch what else is being asked of you. They are making money from your clicks and installs of products that you never really wanted. Beware!

Interesting read about how commonly used download portals (ex: download.com, tucows, etc...) bundle crap that you don't need. I think this is a really nice read and we should post it to the Facebook site. Not only does it tell you which sites bundle stuff, it also gives instruction on how to carefully read what you're clicking on and avoiding getting the bundled stuff in the first place as well.

http://blog.emsisoft.com/2015/03/11/mind-the-pup-top-download-portals-to-avoid/

Wednesday
Mar182015

Tech Republic reported on the next release of Office (2016)

Office 2016 IT Pro and Developer Preview has a number of valuable new features  By Tony Bradley March 18, 2015

imageTony discusses that many of the new features revolve around security and data loss protection (DLP). Installation and feature updates are going to be more fluid and more frequent. Activation of the product is also supposed to be simplified. There will be an Office 365 admin portal to manage device activations for your users.

Outlook should have its stability improved over unreliable networks to help improve performance. Hopefully this will help to speed up delivery of messages. Other than these under the hood changes the UI is going to remain essentially the same so that should be a good thing for your users. There are always some cries of anguish when then UI is changed substantially. I don’t think many of us like change that much.

Thursday
Mar052015

Video Conferencing made easy by Logitech

imageLogitech has three great solutions for adding Video Conferencing to your Conference Room. Gone are the days for most of needing a $50,000 specially designed room to be able to communication both visually and verbally between two locations. It has really become easy and affordable using one of these three solutions from Logitech.

Starting under $300 for the BCC950 these units can bring Video Conferencing into most any situation using your notebook and either a projector or fixed large screen display. They have built high quality microphones that work great in small groups with noise cancellation and high quality audio clarity. They include High Definition 1080p cameras and work with  Microsoft® Lync™ 2013, Cisco Jabber™, WebEx® compatible* and Skype™ certified. See www.logitech.com/ciscocompatibility for the latest version.

All cameras use ZEISS Optics with Autofocus to give you sharp resolution. Whether the camera is showing your smiling face or held up articles or paperwork all can be shared between sites. The camera has a 78 degree field of view and can be controlled with zoom and rotation up to 180 degrees. The sound is crystal-clear. The built-in, full duplex speakerphone and noise-cancelling microphone allow meeting members to hear and be heard clearly up to 8 feet away from the base. The speakerphone can also be used as a standalone during audio calls.

Download the ConferenceCam data sheet

The ConferenceCam is extremely portable, has a 90 degree field of view with digital pan and tilt and a 4x digital zoom. Logitech states that this unit is optimized for small groups of 4-6 people. They have included Mult-Device connectivity that provides simple setup with either PC’s or Mac’s and provides screen mirroring and audio pairing with mobile devices. The acoustics are tuned for a 12 foot radius. Plug in the USB cable and your PC or Mac will begin it’s plug and play connection. There is no software to load or device drives to load everything works in minutes. The unit has a built in rechargeable battery and can run a video call for up to 3 hours of use or 15 hours if you are just using audio. The battery can be recharged using either the AC adapter or USB connection.

Download the ConferenceCam Connect Data Sheet

If you need a system that will allow a slightly larger coverage area the ConferenceCam CC3000e might fit the bill. This system also uses the ZEISS lens with autofocus and 1080p resolution and sports a 10x lossless zoom. It also has a 90 degree field of view with remote controlled mechanical 260 degree pan and 130 degree tilt. It also includes USB Plug and Play connectivity. Optimized for Microsoft® Lync™ 2013, Cisco Jabber™, WebEx® compatible1, and Skype™ certified ensures an integrated experience with most business-grade UC platforms. The audio microphone allows a 20-foot  diameter around the base without mic pods. The system also support NFC pairing to enable mobile devices connectivity to the base unit. Set up the conference room with up to a 32-foot range between the camera and the speaker. Use the camera on the table or mount it on the wall with included hardware. The bottom of the camera is designed with a standard tripod thread for added versatility. Download the CC3000e Data Sheet

We have had very good results using Logitech’s video conferencing products and if you find yourself wanting to add this capability into your conference room call us to help your pick and design the perfect setup for you.

Friday
Feb132015

Update: Video Creation

imageI have been putting together a couple quick videos this month and demonstrate certain types of functions in different applications. These come typically to me from clients who run up against the wall when trying to accomplish a task in the program that they are using. This is typically done by using a program that we sell called Camtasia that is manufactured by TechSmith. This program has been around for quite a few years, and is very useful in creating quick documentaries on how to use your computer. It works by capturing both of voiceover and a screen capture of your computer. So basically what you do, is a quick demo of of the program, feature or function of the program that you want to demonstrate and describe it as though the person was right there beside you. You can then go back in and edit the video to exclude long pauses, retakes and other sections that you don't want to be part of your video presentation.

Another great feature of this program is its integration with Microsoft's PowerPoint program to be able to go through a PowerPoint presentation and record that presentation with both your narration and the speed that you go through the slides. This makes it very easy for you to put together a presentation for client that you can deliver to them when you can't physically get in front of them.

The program works on both Apple and Windows-based computers and has been widely used in educational situations for years. It is a great enhancement to their getting your point across and keeping everybody on the same page. The price is quite reasonable at only $299. If you need more than one copy the first break is at five licenses. Discounts are also available for education and government pricing.

Thursday
Feb122015

Should you be worried about crooks jamming your wireless security system?

imageI have listed a great article by CNET writer Ry Crist  discussing this issue. But the bottom line of this issue is do you really think you have a burglar that is so sophisticated that they are able to use this kind of equipment? Personally I don’t think that this is a real worry. Statistics show that most break-ins are of the nature where the intruder is literally breaking something to gain access. They typically are breaking in through a window or taking advantage of open doors or windows. Take a look at this article and form your own opinions but I believe you will be feel better after reading it.

http://www.cnet.com/news/can-burglars-jam-your-wireless-security-system/?tag=nl.e219&s_cid=e219&ttag=e219&ftag=CAD6b2b181

Tuesday
Feb102015

Outlook 2013–Export Contact List to .csv format

Had a customer ask how to export their contacts to a .csv format. Here is a video I whipped up to show them how.

 

Thursday
Feb052015

How to add a Group List to your Contacts in Outlook

Friday
Jan302015

The GHOST vulnerability – what you need to know

If you have trouble reading this email, view the web version / whitelist us.

Sophos

Security made simple.

Orange header bar

 

The GHOST vulnerability – what you need to know

In the last couple of days, a widespread Linux vulnerability known as GHOST has been receiving a lot of attention in the security community. In theory, this vulnerability can allow an attacker to remotely execute code on a Linux computer. There is already proof of concept code that puts this theory into practice, and it is expected that real world attacks are just around the corner.

The Sophos product teams have been thoroughly investigating to determine which of our products are affected and what is necessary to address those that are.

Many Sophos products do not use Linux, or the glibc software at the heart of the vulnerability, and are therefore unaffected. This includes Sophos Endpoint Protection (Antivirus) for Windows, Mac and Unix; Secure Email Gateway; PureMessage for Microsoft Exchange; Mobile Control and likely others that we are still verifying.

However, Sophos UTM, Sophos UTM Manager (SUM), Secure Web Gateway, Sophos Secure OS for AWS, the Sophos Cloud management infrastructure, and the SAV for vShield virtual appliance are all built on the Linux platform and include the glibc software that is responsible for the vulnerability. The extent to which this vulnerability can be exploited varies from product to product. In all cases, the product teams are working quickly to update vulnerable software. For information about update availability, see this knowledgebase article »

Our products that customers install and run on their own installations of Linux (e.g., SAV for Linux, PureMessage for Unix) are not believed to introduce a vulnerability. However, the customer’s underlying Linux system may be vulnerable. Customers are encouraged to test and install vendor-supplied security patches for their Linux distributions to protect against GHOST and other vulnerabilities.

SophosLabs is monitoring for methods and attacks targeting this vulnerability and will use the full capabilities of our product line to deliver protection for customers.

Please see this knowledgebase article for the latest information on which products and versions are affected and what, if any, actions are required for customers to remain secure.

To learn more about the GHOST vulnerability, read the excellent write-up on Naked Security »

 

www.sophos.com
Getting too many emails? You can visit the Preference Center and receive the content you want or unsubscribe.
© 2014 Sophos Inc. All rights reserved | Privacy Policy
3 Van de Graaff Drive, Burlington, MA 01803.

Wednesday
Jan142015

New Shopping Cart

imageI have added a new website to the ones I am managing. This one has been a work in progress because I needed to create the product before I had something to put on it.

I have been an avid photographer for many years and I have finally gotten around to making some of my favorite pictures available to people for purchase in the form of note cards. I am very impressed with how well they turned out and I am able to make them available at a very reasonable $19.95 apiece. Take a look at what I have made available and if you have a favorite picture that you would like to turn into note cards I would be more than happy to put that together for you as well. There are 22 different sets being offered now and I am planning on adding another twenty or so soon. Take a look at www.applebyartstudios.com.

Monday
Oct132014

Use SmugMug’s tutorial library to get the most out of your subscription

If you have been reading my blogs for a while you know that I use SmugMug as my preferred method of sharing photographs with my family and friends. This is something that I have done for a number of years and have probably not taken advantage of all of the features and benefits that this service offers.

This morning I ran across a post from SmugMug listing a few of the free tutorials that they offer subscribers to learn how to take advantage of their services. If you haven’t gone through them then you will want to spend a little time doing so. Most of us take the shortest route to using products, hoping that our intuition and intelligence is enough to muddle our way though their use. So here is a simple and enjoyable way to make your experience better with this service. Make the most of it!

Here is a list of some of the tutorial subjects that are available:

  • How to Add a Contact Form (1:59)
  • How to Edit the Navigation Menu (2:09)
  • How to Add Content Blocks (2:08)
  • Advanced Photo Editing with PicMonkey (2:26)
  • Organizing for a Family Photo Website (3:57)
  • Organizing for a Pro Photog Website (3:59)
  • How to Set a Custom Right-Click Protection Message (1:21)
  • 5 Settings to Protect Your Photos (3:11)
  • Friday
    Oct102014

    Simplivity’s response to the Shellshock issue

    SimpliVity

    Shellshock Advisory

    SimpliVity is issuing this message as part of our Product Security Incident Response process to help protect our customers from a software vulnerability publicly disclosed yesterday (September 24, 2014) known as "Shellshock".  

    The vulnerability is in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems. Details of the vulnerability can be found at the Common Vulnerabilities and Exposures website - http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271.

    The SimpliVity OmniCube software uses a version of Linux that is impacted by this vulnerability. This vulnerability is not specific to the SimpliVity product. It affects a large number of software products that leverage Linux/Unix operating systems.

    SimpliVity takes product security seriously.  We are in the process of developing a software update that remediates this vulnerability and will make it available to all customers via SimpliVity’s Global Services Customer Support team.  

    While this vulnerability represents a large risk to the general marketplace, its potential impact on SimpliVity OmniCube deployments is significantly lower because this vulnerability cannot be exploited on the OmniCube Software by an unauthenticated user.

    Should you have any further questions, please contact SimpliVity Customer Support at 1-855-SVT-SERVICE (USA) or 1-508-536-4151 (International), or email support@simplivity.com

    Best Regards,

    Randy Boutin

    VP, Customer Support

    SimpliVity Corporation

    Tuesday
    Oct072014

    Press Release: Sophos on ShellShock

    SophosSecurity made simple.
     
     
    Shellshock: What you can do to stay safe

    Bash Shellshock – What Is It?

    Shellshock is a serious security bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands across the Internet on remote computers, notably web servers.

    The Threat

    Cybercriminals are trying to exploit Shellshock to steal data and compromise servers with malware. SophosLabs has seen malware in the wild that seeks to exploit Shellshock to gain access to a server and call home for instructions.

    This kind of malware could infect servers to create a botnet, which cybercriminals use to distribute zombie malware, or for turning the botnet into a weapon for launching distributed denial-of-service (DDoS) attacks on web servers.

    Sophos Can Help

    Sophos products protect against Shellshock attacks in several ways:

    Sophos Antivirus blocks malware-related payloads exploiting Shellshock in Linux, UNIX and OS X

       

    Web Application Firewall (WAF) and Intrusion Prevention System (IPS) rules in Sophos UTM stop Shellshock requests before they reach the server

       

    Advanced Threat Protection (ATP) in Sophos UTM blocks malware call-home attempts, and creates a threat alert for malicious traffic

    Visit Sophos.com/shellshock for the latest news and security advice from the experts at Sophos.

    image
    Monday
    Oct062014

    Square has a new update in both hardware and software available for free!

    Check out what we’ve been working on and then sign in to your Square account to request your new free card reader.

    • Send Invoices for free
    • Receive next business day deposits directly to your bank account
    • Accept payments without an internet connection
    • Manage inventory and keep stock of items
    • Integrate with your favorite third-party services like QuickBooks and Xero

    If you haven’t taken a look at Square recently you might be in for quite a surprise. I know that I was. I have had a test account with them for quite awhile and was set back with all of the new capabilities and functions available from Square.Take a few minutes and see what the new Square has to offer.

    Tuesday
    Sep302014

    Simplivity and Shellshock Advisory

    imageShellshock Advisory

    SimpliVity is issuing this message as part of our Product Security Incident Response process to help protect our customers from a software vulnerability publicly disclosed yesterday (September 24, 2014) known as "Shellshock". 

    The vulnerability is in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems. Details of the vulnerability can be found at the Common Vulnerabilities and Exposures website - http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271.

    The SimpliVity OmniCube software uses a version of Linux that is impacted by this vulnerability. This vulnerability is not specific to the SimpliVity product. It affects a large number of software products that leverage Linux/Unix operating systems.

    SimpliVity takes product security seriously.  We are in the process of developing a software update that remediates this vulnerability and will make it available to all customers via SimpliVity’s Global Services Customer Support team. 

    While this vulnerability represents a large risk to the general marketplace, its potential impact on SimpliVity OmniCube deployments is significantly lower because this vulnerability cannot be exploited on the OmniCube Software by an unauthenticated user.

    Should you have any further questions, please contact SimpliVity Customer Support at 1-855-SVT-SERVICE (USA) or 1-508-536-4151 (International), or email support@simplivity.com.

    Best Regards,

    Randy Boutin

    VP, Customer Support

    SimpliVity Corporation

    Friday
    Sep262014

    Sophos products and the Bash vulnerability (Shellshock)

    • Article ID: 121444
    • Updated: 26 Sep 2014

    In the light of the recent Bash vulnerability known as "Shellshock" (CVE-2014-6271 and CVE-2014-7169), we have reviewed its products to understand if any are at risk.

    As far as we are aware, none of our products can be exploited by means of this bug.

    image

    As a matter of good security practice, we will be updating the various Sophos-supplied versions of Bash as soon as a stable and effective patch is available from the Bash maintainers.

    For more information, see our Naked Security post: http://nakedsecurity.sophos.com/2014/09/25/bash-shellshock-vulnerability-what-you-need-to-know/

    If you need more information or guidance, then please contact technical support.