Security News

Tarsus SecureData


Leave a comment

IBM Billions of Records of PII Info Leaked in 2014

2014 has been nicknamed as ‘Year of the Data Breach’ as it has earned the distinction on the basis of quantity. A quarterly report released recently by security firm IBM X-Force Threat Intelligence reveals that no less than 1 billion records of personally identifiable information (PII) were disclosed during the year.

The report reveals that the entire number of records breached in 2014 was almost 20% more than the number in 2013 (when 800 million records were revealed) and the number breached in the United States is 74.5%, which is much more than in any other country.

Infosecurity-magazine.com published news on 16th March, 2015 quoting Leslie Hornacek, IBM X-Force Threat Response Manager, as saying “If you think year 2014 is similar to a never-ending roller coaster ride of thrills within the world of Internet security, you will not be the only person. We have witnessed the attacks applying creative novel approaches to fundamental attack types like SQLi, DDoS and malware.”

She added that while every breached record does not essentially indicate an individual user, it is still an important percentage of the Internet-connected populace that experienced some kind of loss as a result of security occurrences in 2014.

Regarding vulnerabilities, X-Force has categorized more than 9,200 flaws affecting in excess of 2,600 unique vendors. This is a new record which represents a 9.8 % increase as compared to the previous year. It is important to note that the database of X-Force includes bugs which don’t have a CVE identifier.

Many security holes which were disclosed last year affected foundational systems like content management systems (CMS), operating systems and widely-used open source libraries. Flaws have been identified in Windows, Linux, WordPress, OS X, Drupal, Joomla, OpenSSL (Heartbleed), UNIX bash shell (ShellShock) and SSL (POODLE).

The report has also pointed out that 2014 was a year in which several so-called “designer vulnerabilities” were disclosed. These flaws are not only dangerous but also have a cleverly branded logo and name.

Securityweek.com published news on 16th March, 2015 quoting Horacek as saying “These designer flaws appeared within long-held foundational frameworks used by most websites and they continued all through 2014 gathering appealing names like Heartbleed, POODLE and, Shellshock, into 2015, FREAK and Ghost.”

Source: http://www.mailshark.com.au/global-spam-news/ibm-billions-of-records-of-pii-info-leaked-in-2014-5295?pk_campaign=feed&pk_kwd=ibm-billions-of-records-of-pii-info-leaked-in-2014


Leave a comment

Protecting against FREAK

If you missed our article on FREAK, you can view it by clicking here.

We have been working with our various vendors in order to ensure our clients are protected and can avoid becoming a victim of FREAK. Here are lists of products you can currently use to mitigate the threat posed by FREAK:

  • HP TippingPoint Intrusion Prevention Solution:  Customer’s please ensure you are up to date with DV8677 and you configure Filter 19558 to Block+Notify, although this is enabled automatically with the more aggressive deployment types, it is disabled on the default deployment type.
  • Trend Micro customers who are using Trend Micro Security, OfficeScan, Worry-Free Business Security and Deep Discovery are protected through the latest Product version using pattern files 11.531; all products are automatically protected without any intervention required aside for Deep Security where the “Openssl RSA Downgrade Vulnerability (CVE-2015-0204)” DPI rule must be activated.
  • BlueCoat clients can check for updates here, although they still appear to be working on a fix.

We have also gathered information regarding other vendors, and the latest feedback from them is as follows:

  • OpenSSL has a patch available.
  • Apple has released an update, please ensure you are on the latest version, more information available here.
  • Google Chrome browsers on the latest version are not vulnerable to the attack.
  • Firefox browsers on the latest version are not vulnerable to the attack.
  • Android Default Browsers are to be avoided as no patch is currently available.
  • If you are hosting sites and want to ensure they are secure, you should disable support for any export suites on your web server, do not simply exclude RSA export cipher suites, administrators should disable support for all known insecure ciphers and enable forward secrecy.
  • Microsoft have released a patch: https://technet.microsoft.com/library/security/ms15-mar
  • You can visit https://freakattack.com/ which will inform you if your browser is at risk

If you would like to enquire about our products, be put in touch with one of our partners, or require technical assistance, please feel free to pop us an email at support@securedata.co.za or call us on (+27)11 790 2500.