fbpx

(NIST) issues major revision of core computer security guide: SP 800-53

The National Institute of Standards and Technology (NIST) issues major revision of core computer security guide: SP 800-53

The National Institute of Standards and Technology (NIST) have published the fourth revision of the government's foundational computer security guide, Security and Privacy Controls for Federal information Systems and Organizations. Better known to the federal computer security and contractor community as "SP (Special Publication) 800-53," this fourth revision is the most comprehensive update to the security controls catalog since the document's inception in 2005.

 

The Fourth Draft Included SP 800-53 Rev. 4 identification and authentication controls are met when employees use their government-issued personal identity verification cards to use their computers. Credit: Kelly Talbott, NIST

As part of the ongoing cyber security partnership among the United States Department of Defense, the intelligence community, and the federal civil agencies, NIST has launched its biennial update to Special Publication 800‐53, with an initial public draft released on February 28, 2012. The 2011-12 initiative will include an update of current security controls, control enhancements, supplemental guidance and an update on tailoring and supplementation guidance that form key elements of the control selection process. Key focus areas include, but are not limited to:

  • Insider threats
  • Software application security (including web applications)
  • Social networking, mobiles devices, and cloud computing;
  • Cross domain solutions
  • Advanced persistent threats
  • Supply chain security
  • Industrial/process control systems
  • Privacy

KELIHOS Worm Emerges, Takes Advantage of Boston Marathon Blast

 Within a short time period of less than 24 hours, cybercriminals have already taken advantage of Monday’s explosion at the Boston Marathon as a newsworthy item. My colleague Mary Ermitano-Aquino noted a spam outbreak of more than 9,000 Blackhole Exploit Kit spammed messages, all related to the said tragedy that killed at least three people and injured many more. Some of the spammed messages used the subjects “2 Explosions at Boston Marathon,” “Aftermath to explosion at Boston Marathon,” “Boston Explosion Caught on Video,” and “Video of Explosion at the Boston Marathon 2013″ to name a few. Below is a spam sample she found:

Figure 1. Sample spam email related to the Boston Marathon blast

The spammed message only contains the URL http://{BLOCKED}/boston.html , but once you click it, it displays a web page with an embedded video, supposedly from YouTube. At this point, users who click the link may have already downloaded malware unknowingly, aka drive-by-download attacks. Here’s a screenshot of the web page with the embedded video:

Avast has been named the best anti-virus app for Windows by LifeHacker!

The Best Antivirus App for Windows [UPDATED]

By Whitson Gordon @ lifehacker

Windows has more antivirus programs than we can count, and none of them are quite perfect. Right now, we recommend Avast Free Antivirus for the best balance between protection, ease of use, and cost.

Update: Our former favorite, Microsoft Security Essentials (also known as Windows Defender in Windows 8), has been tanking in antivirus tests left and right over the past few months, so we've decided it's time to change our official recommendation to something a little more reliable. For more information, see the "Competition" section below.

The Best Antivirus App for Windows [UPDATED]

Avast! Free Antivirus

Platform: Windows
Price: Free
Download Page

 

 

 

 

 

The Best Antivirus App for Windows [UPDATED]

  • A fairly simple interface from which you can scan your computer, see statistics, update definitions, and more

Tracking Through Social Networks, Big Brother is keeping watch.

Lately I've been researching methods of tracking that can be implemented by not only the government but civilians as well. It seems that not long ago we acquired the ability to check in, post photos and tagging people virtually anywhere you go. Some individuals lately have been using these to track people or "stalk" but have we asked how far does this go?

(Credit: Screenshot by Eric Mack/CNET) I wonder what qualifies a screenshot to be creditable?


"Well thanks to defense contractor Raytheon we have a general idea of how scary and real this can get. If you're thinking this is crazy, watch the video below to kill the skepticism " 

Ten things Hackers Expliot

Article date 17 September 2012


People too often leave themselves open to security breaches through a combination of laziness and stupidity, a number of hackers have claimed.

Hackers know what mistakes people make and how to exploit them better than most and two have spilled the beans on what to look out for in an article published by Yahoo News.

 

One:

is an ethical hacker, meaning that he attempts to break into computer systems so he can work out how to better improve them in the future, while the other is an ex-criminal hacker who is now employed in security

 

“People are too trusting," said Tom Beale, the ethical hacker, who for the past decade has been employed to find weaknesses in corporate and government computer systems.
“The human element is always the weak link in the chain. People are very easily distracted - and particular attackers prey on that.”

Cal Leeming, an ex-convicted hacker, said that people are getting more and more stupid when it comes to data security and this is leaving the door open to breaches.
He added: “They want their stuff to be protected, but they expect someone else to do it for them. People don’t want to know.
“Even for companies, computer security isn’t a priority, because it’s not a primary source of income. It’s only once the company’s been hit that they realise, ‘Oh we should have paid more attention than that’.”
To help people avoid the risks the hackers have produced a ten point list of mistakes to avoid at all costs.
The first one is not using the same username for the accounts you use. Mr Leeming points out that hackers can use Google to link all of a target’s accounts together and then “work a way in”.

Australia joins US, Canada to foil major online scam

By Amy McNeilage @ The Sydney Morning Herald

Australian, American and Canadian authorities have joined forces to foil a major international phone scam, known as the Microsoft Imposter scam.

The scam, which involves people pretending to be Microsoft employees offering to fix computer viruses, is thought to have ripped off tens of thousands of people in six countries.

US authorities this week won court orders to close down and freeze funds of alleged US-based parties involved in the scheme.

Details of the action were to be revealed this morning in a joint media conference in Washington DC with the Australian Communications and Media Authority (ACMA), the US Federal Trade Commission (FTC) and the Canadian Radio-television and Telecommunications Commission (CRTC).

Computer Virus, Web Attacks are Growing at Fastest Pace in Last 4 Years

(MENAFN Press) CNN Money released a startling story on the growing prevalence of computer viruses, Trojans and web attacks that has many concerned for the safety of their computer and their personal information.

According to the CNN report, McAfee released a quarterly threat report that showed more than 8 million types of new malware had been found in the second quarter, which was a 23% increase from the first quarter. The company says there are more than 90 million unique types of malware floating aroundSC Network the internet world.

While Microsoft PCs are the most vulnerable to cyber-attacks, hackers are also targeting Apple computers and mobile phones.

In the CNN Money article, Vincent Weafer, head of McAfee labs said Attacks that we've traditionally seen on PCs are now making their way to other devices. This report highlights the need for protection on all devices that may be used to access the Internet.

According to the report, as Mac has grown to become the third-largest computer platform in the United States, hackers are increasingly setting their sights on these computers.

About Us

Daedalus teks has a motto "If its connected to a computer, database or server we can fix IT!"

Our team can provide support for a multitude of IT areas including but not limited too; Computer Repair, Help Desk Support, Managed Services, Server Administration, Web Design and so Much More!

Let’s Connect

Newsletter

Don’t miss any updates on our new templates and all the astonishing offers we bring for you.