Schools use Social Media to Watch for Threats of Violence

Schools use Social Media to Watch for Threats of Violence
Colleges in Philadelphia were on high alert after an anonymous social media post on a message board warned of an attack on an unspecified campus in the area. In metro … Most of the increase in threats came via electronic devices and on social media.
Read more on Emergency Management

Bozeman police receive portable message display trailer
Last week, on the corner of Mendenhall Street and Bozeman Avenue, drivers saw an electronic display board flashing “pedestrians crossing ahead” and “congested roadway.” The board is the latest addition to the Bozeman Police Department, purchased with …
Read more on The Bozeman Daily Chronicle

Doctor failed bowel cancer victim
This referral resulted in a message to the man's GP saying the referral was declined for being below the DHB's access criteria for the surgery. The GP mistakenly thought this communication concerned the referral for a specialist gastronterologist …
Read more on Radio New Zealand

5 Years Later and 5 Billion Malware Threats Removed: Malwarebytes Anti-Malware Celebrates Its Fifth Anniversary

San Jose, CA (PRWEB) January 21, 2013

Seven years ago, Marcin Kleczynski discovered a stubborn piece of malware on his home computer. It appeared he was just to be another data point in the estimated 40% of U.S. households who have been affected by a computer virus. Ah, not quite.

None of the major antiviruses could touch the malware, a member of the virulent species of malicious software called “ransomware.” Not Symantec, not McAfee. “I was stumped—and I worked as a computer technician at the time, so I knew what I was doing,” Kleczynski said. “It took me three days of consulting with security experts on a message board before I could remove it.”

Inspired by the experience, the following year Kleczynski built an anti-malware program from scratch in his college dorm room to accomplish what his antivirus could not. It became Malwarebytes Anti-Malware, one of the most popular anti-malware tools on CNET. Originally popularized by word of mouth among computer technicians, it has been downloaded more than 200 million times worldwide since its official launch on January 21, 2008.

Malwarebytes Anti-Malware intercepts and eliminates malware the major antiviruses miss. It employs a unique blend of heuristic and behavioral scanning technologies to defeat viruses, worms, Trojans, rootkits, rogues, ransomware, and other malware. Malwarebytes Anti-Malware leads an emerging category of Internet security tools designed to run alongside and complement antivirus software.

“Traditional antivirus does a good job with the known threats but typically isn’t as effective against the growing threat of new and emerging malware,” said Kleczynski, now CEO of Malwarebytes. “That’s where we come in.”

“With our unique blend of protection and detection technologies and agility as an organization, we adapt to new threats faster than traditional antivirus.”

To commemorate the fifth anniversary of the first public release of Malwarebytes Anti-Malware, Malwarebytes is making a substantial monetary donation to the Electronic Frontier Foundation (EFF). The EFF is an international non-profit digital rights group devoted to preserving online privacy and related issues.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company’s flagship product, employs a highly advanced behavior-based detection engine that has removed over five billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at http://www.malwarebytes.org.

###

Copyright © 2013 Malwarebytes and Malwarebytes Anti-Malware is a trademark or registered trademark of Malwarebytes Corp., or its affiliates in the U.S. and other countries. All other trademarks are the property of their respective owners. For more information, visit http://www.malwarebytes.org







Before Focusing on Advanced Cyber Threats, US Businesses Better Have Their Cyber Security Basics Well Covered

New York, NY (PRWEB) May 02, 2013

There is no shortage of headline making stories that involve advanced cyber threats, from now famous attacks like Stuxnet and the Flame virus, to sophisticated and organized players like Anonymous, or state-sponsored cyber warfare units with deep pockets like China’s Unit 61398 out of Shanghai, which are just a few among many. But Verizon’s 2013 Data Breach Investigations Report (DBIR), which just came out last week, clearly shows the success of even simple attacks, and the staggering longevity of these compromises before they are ever even detected, is an area that needs serious improvement across the board if US organizations want to survive the assault that comes with doing business in our digital world. Joe Caruso, founder and CEO/CTO of Global Digital Forensics (GDF), took some time to weigh in on the report and the importance of focusing on the basics first.

First step, judging the cyber threat landscape.

“One-size-fits-all solutions may be great for many things, but cyber security is absolutely not one of them. Because like the report pointed out, different industries typically face different threats. A manufacturing company, for instance, is probably a lot more worried about keeping designs, secret manufacturing techniques and other intellectual property (IP) safe and secure. A restaurant should probably be a lot more concerned about securing their POS (Point of Sale) systems to make sure they are keeping their customers’ credit card information from falling into the wrong hands. Financial institutions, on the other hand, have the entire gauntlet of threats to face, from brute-force cyber smash-and-grabs and spear phishing campaigns, to distributed denial of service (DoS) attacks which are launched to incapacitate their websites and make accounts unavailable to their clients, and everything in between. Hospitals, universities and retailers have their own ghosts to face as well. But one thing you can be sure of, if you have cyber “gold” of any kind to mine, there are always attackers with their noses pressed up against the glass just licking their chops for an opportunity to capitalize on any exploitable hole they can find. Our cyber threat assessments are designed to look at the big cyber security picture, from understanding and mapping the entire digital infrastructure and how the data flow interacts with business functions, to determining which threat vectors are likely to be the most problematic and prioritize them accordingly. We also thoroughly review cyber security policies and procedures already in place to identify weaknesses and help clients remediate them, or we help create them if none exist.”

Step two, penetration testing.

“The importance of comprehensive penetration testing cannot be overstated. You can talk to clients until you’re blue in the face, you can show mountains of statistics and you can pull out countless headline stories about successful cyber attacks and the long term financial ramifications victimized organizations have endured, but it still won’t sink in. But run a successful penetration test and eyes will open. It’s the cyber equivalent of a live-fire exercise and just like in the military version, it stresses every system with attacks that simulate real-world incidents to identify weaknesses. When we launch one of our realistic phishing or spear phishing campaigns, for instance, and get seventy, eighty or ninety percent of the company’s employees to divulge their credentials, everyone from the employees and managers, to executives and owners get the message loud and clear. Because if it was a real attacker, they would have had complete access to the entire network to do, well, anything they want. And we pull out all the stops with tradecraft honed by two decades of experience. We’ll set up dummy websites which look like the real thing to entice our targets, we’ll employ a variety of social engineering techniques to bypass air gaps on segmented systems and deliver payloads using things like USB sticks, we’ll leverage WiFi and Bluetooth connections from smartphones and tablets which have exploded onto the scene, and a whole host of other proven methods and techniques we have in our arsenal to infiltrate the client’s unique digital architecture. And when you can show someone how they were just victimized and how to avoid it in the future, the lessons stay with them for a very long time. That alone is a huge step towards the ultimate goal of effective cyber security.”

Getting hacked – you may have an app for that.

“Applications can certainly make life a lot easier in the digital world, so it’s no wonder they keep coming out at a breakneck pace. Whether they are Internet or cloud-based applications, phone apps or simply internal applications to make things run more smoothly, they are also a preferred gateway for cyber intruders. The reasoning is simple. Application designers are typically not cyber security experts. Their focus is generally on functionality, and once they get that down the product gets rushed to market. Needless to say, it is not at all uncommon for many of these applications to have security holes right out of the box which can easily be exploited, and that can be like having an unlocked revolving door which leads right into your network, giving intruders complete access to your most sensitive electronically stored information (ESI). Our application security testing exposes those kinds of vulnerabilities so you, your customers, vendors and employees can use them with confidence and enjoy their benefits instead of suffering catastrophic consequences.”

Surviving a cyber emergency is all in the response.

“There is a harsh dose of reality that must be faced when it comes to cyber security; there is no such thing as perfect protection, and any cyber security “expert” that tells you different is simply lying. The reality is that playing offense on the cyber battleground is a lot easier than playing defense. Internal IT security personnel have a million holes to plug, but an attacker only needs to find one to exploit. That’s why GDF has a network of experienced cyber emergency incident responders available 24/7 that are strategically positioned across the country, and the globe. Our responders can be onsite in hours, not days, to identify, isolate, secure and investigate security breaches. We have also developed specialized tools to immediately begin the process remotely in many cases as soon as we receive your call. Not only will taking the right approach to handling a cyber emergency help you contain the actual damage from the attack and the inevitable aftermath, but it will also go a long way towards calming nervous clients, vendors and investors, as well as satisfying many regulatory compliance headaches.”

The dangerous sink or swim world of cyber intrusions, data breaches and other cyber attacks is fluid and constantly evolving. Trusted cyber security professionals like Global Digital Forensics can go a long way towards keeping you afloat. So don’t wait to take control, or you may just become another grim statistic.

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.