6.5.16

10-year-old Finnish boy uncovers Instagram comments vulnerability



A 10-year old boy has found a security flaw in Instagram and, for his efforts, been rewarded $10,000 by Facebook.
Jani, from Helsinki, Finland, sent an email to the image and video sharing social network explaining that he had uncovered a vulnerability back in February.
He claimed that he could delete user comments – intrigued, security engineers decided to test whether this was true or not.
They set up a dummy account and, unsurprisingly, found that the youngster could easily wipe out comments left by anyone on Instagram.
The reward was given as part of Facebook’s Bug Bounty program. Payment is discretionary, but over the last five years, $4.3 million has been paid out by the social network.
News of this was first revealed by the Finnish paper Iltalehti, which reported that Jani and his twin have demonstrated a flair for computing and coding from a young age.
“I tested whether the comments section of Instagram can handle harmful code,” he was quoted as saying.
“Turns out it can’t. I noticed that I can delete other people’s comments from there … I could have deleted anyone’s – like Justin Bieber’s for example – comments.”
A similar story made the headlines last year, when a nine-year old boy from the US demonstrated his ability to hack an Android smartphone.
Reuben Paul showed that he could access a supposedly secure device and steal information in just under 15 minutes.
“If a child can do it then a regular hacker can do it … so I just want everybody to be aware [and to] be more careful when you download games and stuff like that,” he was quoted as saying last year.


5.5.16

Jigsaw and how ransomware is becoming more aggressive with new capabilities



There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort. And the information stored by computers is much more important than we think, although many users only realize this when they lose access.
“Jigsaw is an example of the tests that the creators of ransomware are carrying out.”
For this reason, it comes as no surprise that for several months now, we have been witnessing continuous waves of ransomware variants. Some of these variants have been known for a long time, such as Cryptolocker, TeslaCrypt, and TorrentLocker, but we are continually seeing the appearance of new variants that want their slice of the pie.
Encryption and deletion of files
This new batch of ransomware programs includes Jigsaw, a variant detected by ESET as MSIL/Filecoder.Jigsaw, which has several peculiar features that make it stand out. To start with, the typical screen background or image informing you that files have been encrypted has been replaced by an image of the puppet Billy, one of the hallmarks of the Saw film series.
On this image is an explanation to the user of what has happened to their files, as if it were one of the tests in the well-known horror saga. There are also the necessary instructions for paying the ransom, which is 150 dollars in bitcoins.
“The real threat is that every hour some of the encrypted files are deleted.”
In addition to this graphic, the real threat from this ransomware variant is that every hour some of the encrypted files are deleted. This makes time a key factor if you want to recover the files. In fact, if you try to stop the process or restart the system, Jigsaw will delete 1,000 files, thus limiting the actions that the user can take to try to recover their data without paying the ransom.
A curious fact is that, unlike other variants that give full details of how to pay the ransom in bitcoins, Jigsaw merely provides a link where you can obtain this cryptocurrency. This could lead us to believe that the author of the ransomware is less professional that those of other variants.
Luckily, for those users who have been affected by Jigsaw, a tool and instructions for restoring the encrypted files are already available. We recommend following the steps set out in these links to prevent criminals from making any money at the cost of the information stored on the users’ systems.
A continuing development
Jigsaw is only one example of the numerous tests that the creators of malware are carrying out in relation to ransomware. In this case, we encountered the novelty of file deletion in order to cause yet more alarm to their victims – looking for their threatening methods keeps producing results.
Right now, this is one of the most profitable threats for them and, owing to its aggressive nature, many companies and researchers, like us, are analyzing new variants every day to find out how to decrypt the files.
We should expect them to keep employing new strategies and even greater sophistication in certain concrete cases in the near future. Not only that, but we have seen how ransomware is spreading out of its natural habitat of Windows and Android system devices to other systems like Linux and Mac OS X, and there has even been evidence on the Internet of Things.
With the passage of time, users are becoming more conscientious and, as a result, criminals are using different techniques (other than the well-known harmful email attachment). These include the use of exploit kits on legitimate websites and even on websites visited by millions of users every day, enabling them to expand their criminal activities and find new victims.
We therefore need to be alert and look beyond the traditional means of attack so that we are prepared when faced with more ingenious techniques. Users cannot continue being the weakest link in the IT security chain, and we must anticipate the movements of criminals.
We must take steps to mitigate against threats of this kind, starting with making a backup of our most important files, having a security solution capable of detecting new ransomware variants as they appear, and implementing company security policies to prevent infected equipment from affecting shared resources on the company network.

If we apply these measures – many of them simply common sense – we will have won a large part of the battle against ransomware. But to do this, we need to start right away and keep up to date with new threats as they appear so we can successfully tackle them.

3.5.16

Authentication 101


By Lysa Myers posted 3 May 2016
Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are. In the offline world this process is simple and universal. Most countries have well-documented procedures by which you can get a passport that demonstrates your identity wherever you go in the world. In the world of computers, there is no single document you can use to prove your identity wherever you go. As a result, most websites and services use slightly different techniques.
In my previous post about the four “A”s of Account Management, we discussed Authentication as it relates to Authorization, Access Control and Audit Logging. Establishing good authentication is an essential first step before you can perform the other three functions of account management; if you don’t know who someone is, you cannot know what resources or services they are entitled to access, or identify what actions they have taken.
Proving yourself online
When you want to show that someone is the person they claim to be, you need to find something unique and unchanging about them. In order to accomplish that, there are a few things you can do. In movies or in television shows, if there is some question about a person’s identity, the usual trope goes something like this:
1.     Ask the person to verify a piece of information that only that one person would know, or
2.     Ask him or her to display some trinket that only that one person would carry, or
3.     Check the person for the presence of some notable feature that is unique to him or her
Similar options are available for verifying users, online. Those three basic methods are collectively called “authentication factors”. Individually, these factors are known as:
·         Knowledge factor – What you know
This is a piece of information that is (ideally) known only by the person whose identity is being verified and the person or process that is verifying it.
·         Possession or Ownership factor – What you have
This is something that you have been given by a person or organization who has vetted you, which can be used to verify your identity.
·         Inherence or Existence factor – What you are
These are things that are part of who you are, and typically things that will never change.
The first three factors
There are a few things that are commonly used as “knowledge factors”, such as passwords, passphrases, passcodes or PINs (which is an acronym for Personal Identification Numbers). Many people may not realize that “secret questions”, which some websites have you set up in addition to your password, are also knowledge factors.
Most of us have at least one “ownership factor” in our wallets, possibly several. While your driver’s license or government ID is certainly one such item, your payment card is another, which is why you are sometimes allowed to use it as a very basic form of identification.
That credit or debit card in your wallet is not just a sign that you have been deemed able to repay your debts; it is also meant to indicate that your bank has verified your identity.
But ID and payment cards are not the only form of “ownership factor”. Anything that can be tied uniquely to you can be useful; for example, an email address, mobile device, or phone number. Temporary key-codes can be generated by online sites and sent to you via SMS, voice call or email, to enter as a login credential.
And lastly, there’s the “inherence factor”. Once the stuff of spy capers, nowadays many of you may have this factor of authentication available on your smartphone or laptop. Fingerprint scanners, which are the most common example, are meant to verify the unique pattern on the tips of your fingers. Some smartphones now come with iris scanners, which look for the unique flecks and colorations of your eyes. The US Customs and Border Patrol is now testing facial recognition scanners, as a way to automate verification of photo IDs.
When one is not enough
“Using more than one factor to verify account owners is an increasingly popular option.”
At this point, most of us know someone whose online account has been hacked. Authentication that uses only username and password is a security headache for so many people that researchers are always looking for new ways to authenticate users quickly and securely. Using more than one factor to verify account owners is an increasingly popular option.
Logging in with two factors of authentication is called “two-factor authentication” or “two-step verification”; 2FA or TFA, for short. If a login process has 2FA enabled, even if users give out their credentials (either accidentally or intentionally), their accounts may still be protected if the attacker does not also have access to the second factor.
Further factors for the future
Another method for improving authentication security is to find new factors. There are a couple of others that you may already be using without knowing it:
·         Location factor – Where you are
·         Behavior factor – What you do
These might seem a little odd, because people travel and their behavior changes over time. And you may also wonder how these things can be unique. But as it turns out, they can be pretty helpful, especially in conjunction with other factors.
How the “location factor” works is that most of the time, you can be expected to be in certain locations (i.e. at home or at work) or using certain, specific machines. Obviously that will not always be the case, so it’s only marginally useful information by itself. If you are in a known locale or using a known IP or MAC address, it can be used as your second factor of authentication in addition to entering a username and password. But if you’re not in that known place or on that known machine, you will be prompted to use a different factor of authentication such as a key-code.
For the “behavior factor”, it turns out that certain behaviors can be as unique as fingerprints; for example, our web surfing habits, our voices, our mouse or touchscreen movements, or our handwriting. Some smartphones may already use this factor. If you set up a numerical or gestural passcode, they may record not just the passcode itself, but also the way that you typed or swiped that code.
Next steps: Setting limits

Once a person’s identity has been authenticated, many administrators simply throw open the metaphorical gates to users, allowing them unfettered access to their networks. In our next article, we’ll talk about the next steps in account management: Authorization and Access Control. These techniques allow you to put appropriate controls in place that allow users to access resources or services that they need, and blocking availability of those things that they don’t, in ways that allows you to limit accidental or intentional damage and theft.

Talend opgenomen in CRN Big Data 100



Leider in big data integratie software genoemd als één van de bedrijven die de lat van datamanagement hoger leggen

 Talend, toonaangevende leverancier van big data integratie software, kondigt vandaag aan dat CRN®, een merk van The Channel Company, Talend heeft opgenomen in de Big Data 100 lijst van 2016. Deze jaarlijkse lijst erkent de vindingrijkheid van technologieleveranciers die de lat voor datamanagement hoger leggen met innovatieve oplossingen voor het omgaan met de snel toenemende hoeveelheid data. Talend, de maker van het eerste en enige data-integratieplatform dat native ondersteuning biedt voor Apache Spark en Spark Streaming, ziet de benoeming als een beloning voor zijn inzet in het leveren van baanbrekende producten die organisaties helpen om ruwe data om te zetten in bruikbare informatie.

Bedrijven worstelen voortdurend met het snel groeiende volume, de snelheid en de verscheidenheid van de informatie die ze dagelijks produceren en gebruiken. Gartner voorspelt dat in 2025 elke branche is veranderd door de digitalisering. 52 procent van de CEO’s en bestuursleden erkent dit onvermijdelijke gegeven en zegt een digitale businessstrategie voor hun organisatie te hebben[1]. Solution providers zijn bezig met een oneindige zoektocht naar innovatieve oplossingen, technologieën en diensten die bedrijven kunnen helpen om big data om te zetten in zinvolle en bruikbare informatie.

Als een reactie op deze ontwikkeling heeft de redactie van CRN IT-leveranciers in de voorhoede van data management, business analytics en infrastructuur op een rij gezet. Het resultaat is de Big Data 100, een waardevolle leidraad voor solution providers die op zoek zijn naar toonaangevende bigdata-technologie om klanten te helpen om hun bedrijfsvoering te veranderen.

"Big data wordt steeds belangrijker voor veel bedrijven”, zegt Robert Faletra, CEO van The Channel Company. “Organisaties worden geconfronteerd met het beheren van informatiestromen van ongekende omvang en complexiteit. Ze hebben continu behoefte aan krachtigere en efficiëntere hulpmiddelen voor het vastleggen, opslaan, ordenen, beveiligen en analyseren van data om daar belangrijke bedrijfskundige inzichten uit te halen. We zijn trots op de Big Data 100, een lijst van leveranciers die de vindingrijkheid en het oplossend vermogen hebben om ervoor te zorgen dat ze nieuwe doeltreffende manieren vinden om solution providers te helpen met deze gigantische taak. De leveranciers zorgen voor een status quo omdat ze gelijke tred kunnen houden met de snel veranderende eisen op het gebied van data management."

Talend helpt bedrijven om te gaan met de toenemende hoeveelheid data die wordt gegenereerd door transactieverwerkende systemen, sales- en marketing applicaties, social media en externe databronnen. Talend Big Data Integration software voor Hadoop en Spark, Master Data Management (MDM) en Data Quality management tools, cloud en applicatie-integratie technologieën en Talend Data Fabric, dat meerdere producten combineert in één enkel platform, zorgen ervoor dat digitale en door data gestuurde organisaties meer waarde halen uit big data.

"We zijn vereerd om ??deel uit te maken van CRN's Big Data 100. Het versterkt onze missie om oplossingen te leveren die door data gestuurde bedrijven vooruit helpen", zei Ashley Stirrup, de CMO van Talend. "Organisaties zijn op zoek naar manieren om waardevolle informatie te halen uit de toenemende hoeveelheid data die wordt gegenereerd door verschillende bronnen. Ze hebben technologieën zoals Talend nodig om de integratie van ongelijksoortige informatie makkelijk te maken en zo écht gebruik te kunnen maken van de waarde van big data.”

De CRN 2016 Big Data 100 lijst is online beschikbaar op www.crn.com/bigdata100.

Over The Channel Company
The Channel Company helpt het IT-kanaal met het verleggen van grenzen met haar toonaangevende media, interessante evenementen, advies en trainingen en innovatieve marketingdiensten en -platformen. Als kanaal-katalysator verbindt en versterkt het technologieleveranciers, solution providers en eindgebruikers. Gesteund door meer dan dertig jaar van ongeëvenaarde kanaalervaring put het uit haar diepe kennis om innovatieve nieuwe oplossingen te creëren voor de steeds verder evoluerende uitdagingen in de technologiemarkt. Meer informatie op: www.thechannelco.com

Over Talend
Talends integratie-oplossingen geven data-gedreven organisaties de mogelijkheid om meer waarde uit al hun data te halen. Door native ondersteuning van moderne bigdata-platformen maakt Talend integratieprojecten makkelijker en helpt het IT-afdelingen beter en sneller te reageren op de eisen van hun organisatie, met voorspelbare kosten. De schaalbare en toekomstgerichte opensource-oplossingen van Talend bieden een oplossing voor bestaande en toekomstige eisen op het gebied van integratie. Talend is niet-beursgenoteerd. Het hoofdkantoor is gevestigd in Redwood City, California. Meer informatie op www.talend.com en op twitter: @Talend.

CRN is een geregistreerd handelsmerk van The Channel Company, LLC. Het logo van The Channel Company is een handelsmerk van The Channel Company, LLC (registratie aangevraagd). Alle rechten voorbehouden.
[1] “Gartner's Top Technology Trends - What It Means for Service Opportunities Now and in the Future”. April 2015.