now browsing by tag


More #CEOs to come from the #cyber security #space in #2018

Source: National Cyber Security – Produced By Gregory Evans

Oracle expects to see more chief executive officers to come from the cyber security space in 2018 as part of an effort to boost security.

Arun Khehar, senior vice-president of applications at Oracle Eastern Central Europe, Middle East, Africa, told Gulf News that enterprise security will be company’s top priority for 2018 and much of it will be automated.

With today’s ‘borderless enterprise as a result of cloud, mobile and edge technologies like IoT, he said that there is general consensus that there is no such thing as ‘total security’. As a result, business information can no longer be protected by the IT team trying to create digital castles and restrict access.

“We’ll see an increasing focus on security among companies, especially with new regulations such as General Data Protection Regulation (GDPR) [coming into effect from May 25, 2018] coming in with their associated penalties for failure,” he said.

He added that more companies are expected to turn to the cloud for security as researches show that more mature users recognise that cloud provides better security than on premises environments.

According to research firm Gartner’s latest forecast, worldwide security spending is expected to total $96.3 billion in 2018, an increase of eight per cent from 2017.

With skills continuing to be scarce, Khehar said that security will increasingly feature artificial intelligence/machine learning capabilities. By 2025, autonomous operations will become the catalyst to accelerate enterprise cloud adoption.

By 2025, he said that 80 per cent of cloud operations risk will vanish entirely — a higher degree of intelligent automation will permeate the cloud platform.

“Using machine learning and AI techniques, autonomous operations will anticipate outcomes, take remedial action, and be aware of real-time risks. The top concerns are infrastructure downtime, security threats and vulnerabilities and data protection,” he said.

It’s not just in security that humans can’t keep up, he said, right across the business and across industries; organisations are struggling to make sense of the rapid proliferation of data whether that is in finance, HR, sales or marketing systems or in operations around systems management and security.

Due to the growth in AI, he said that most of us will be chatting with chatbots by the end of 2018.

“We are going to see a new wave of more sophisticated conversational platforms that will be developed; creating chatbots that will feel completely natural to talk to replacing the currently, relatively unsophisticated interfaces,” he said.

Emirates NBD, Mashreqbank, DED, Aramex and Dewa are using chatbots to initiate and carry on conversations with their consumers in the UAE.

“Chatbots will be one of the key technologies that will be found on every organisation’s strategic customer experience road map. Those that get in and adopt them successfully early on will steal a march on the competition,” he said.

There will be a growing number of specialised ‘intelligent bots’ that will interact and learn from each other, he said.

For example, he said that CEOs, CFOs, or employees will be able to inquire about company data. Professionals such as doctors, pharmacists, lawyers, teachers, engineers, and service personnel can retrieve technical information. Citizens and consumers can interact with service organisations.

Oracle expects 2018 to be the year that hordes of smart devices begin to be tamed, as the focus moves away from the ‘things’ themselves to the integrated platforms that will turn IoT data into actionable insights and data-rich business models.

When it comes to IoT, he said that there are three core challenges — integration, analytics and security. “As smart devices share increases volumes of distributed data among themselves, and back into the enterprise, the challenges around these areas will become exponentially more complex,” he said.

The post More #CEOs to come from the #cyber security #space in #2018 appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How to #Protect #Child #Identity from being #Stolen

Source: National Cyber Security – Produced By Gregory Evans

Many of us have heard news about identity theft, along with the warnings on how to avoid it.  But, do you know that children, including yours, can fall prey to identity predators, too?  According to an FTC report, 6 percent of identity theft victims are people 20 years old and below, and these statistics include young children and infants.  When ID thieves effectively obtain an identity, they can take out credit cards, rent a house and even get a mortgage using the child’s name.

As a parent, do you have a good understanding of child identity theft as well as to protect your child from identity theft? Keep in mind that whenever you give out your child’s social security number and other personal identifying information, you should take extra precautionary measures, because the last thing you may want to happen to your child is to become a victim of identity theft.

Why do thieves have to target children?

Basically, a child has a clean credit record, and this is what thieves are aiming for.  Since creditors and lenders will favor someone with a clean record rather than someone with bad credit, they will be more likely to accept the thief’s application using the child’s good name. Plus, children are not yet taking fail-safe methods to secure their identity, unlike adults who are more aware of the depth of the crime. They see kids as more lucrative targets, because the only time the problem may come to light is when they reach legal age and started checking their own credit or applying for a line of credit themselves, giving criminals ample time to hide their crime while continuously devastating the child’s identity. Therefore, the earlier the thieves started misusing a child’s identity, the longer they can exploit that victim’s credit.

What signs should warn you that your child is being victimized by id theft?

In order to know if your child’s identity is stolen, you should be vigilant in spotting any of these red flags:

• Pre-approved credit card offers – If your child receives unsolicited offers from credit card companies at a very young age, it may be a sign of identity theft.

• Collection agencies looking for your child – Are there collection agencies calling you for an unpaid bill in your child’s name? Don’t take this simply as a case of mistaken identity, there’s a chance that thieves have actually opened up a line of credit with your child’s identity and left it unpaid.

• Account statements from Social Security – SS account statements are records of annual contributions or benefit claims and these are usually sent to people who have a job. So, unless your kid has a job, receiving a social security account statement in the name of your child is indicative of identity fraud or theft.

Child identity theft protection: four important things to remember

Keep personal identifying information private – never share your child’s identifying information, especially his/her social security number and full name, to someone who has no legal business with you. A child’s social security number, along with the full name and date of birth, are what a thief needs to hijack your child’s identity.

Keep every one of your child’s documents at home safe and locked in a secure place. Ask questions if you must – if you are asked by the school, pediatrician or other organizations for your child’s social security number, don’t hesitate to ask why they need it and how they are going to protect it. Also, try asking if it’s okay if you give them another form of identification apart from your child’s social security information.

Finally, ask who will have access to your child’s information and how they are going to dispose of your child’s information afterwards. Watch out for the red flags – the warning signs mentioned above, such as phone calls or emails, concerning your child’s credit should not be taken lightly. Always watch out for these suspicious activities, because they indicate fraud. Educate children about online safety.

In the modern day we live in, children have become more inclined to use the power of the Internet. But, it’s also a place where identity thieves usually thrive. Emphasize to your kids not to give out their personal information and the passwords and usernames to their online accounts to strangers they met online. They should also avoid visiting unfamiliar sites or clicking strange links to prevent viruses and malware from invading their computer, because this method can be used by criminals to access their private information.

The post How to #Protect #Child #Identity from being #Stolen appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers #steal $64 #million from #cryptocurrency firm #NiceHash

A Slovenian cryptocurrency mining marketplace, NiceHash, said it lost about $64 million worth of bitcoin in a hack of its payment system, the latest incident to highlight risks that uneven oversight and security pose to booming digital currencies.

NiceHash matches people looking to sell processing time on computers in exchange for bitcoin.

There have been at least three dozen heists on exchanges that buy and sell digital currencies since 2011, including one that led to the 2014 collapse of Mt. Gox, once the world’s largest bitcoin market.

More than 980,000 bitcoins have been stolen from exchanges, which would be worth more than $15 billion at current exchange rates. Few have been recovered, leaving some investors without any compensation.

The hacks have not kept demand for digital currencies from soaring. Bitcoin’s value has climbed more than 15-fold so far this year, closing at a record $16,000 on the Luxembourg-based Bitstamp exchange on Thursday, ahead of this weekend’s launch of bitcoin futures by CBOE.

Security experts said they expect the cyber-crime spree to pick up as the rising valuations attract interest from cyber criminals looking for victims that lack experience defending against hacks.

“These exchanges are not in my opinion secure,” said Gartner security analyst Avivah Litan. “You don’t know what their security is like behind the scenes.”

NiceHash executive Andrej P. Škraba told Reuters that his firm was the victim of “a highly professional” heist that yielded about 4,700 bitcoin, worth around $64 million.

Sophisticated criminal groups are increasingly targeting the cryptocurrency industry, focusing on exchanges and other types of firms in the sector, said Noam Jolles, a senior intelligence specialist with Israeli cyber-security company Diskin Advanced Technologies.

“The most sophisticated groups are going into this area,” she said.

NiceHash, which advised users to change online passwords after it halted operations on Wednesday, has provided few other details about the attack on its payment system.

“We ask for patience and understanding while we investigate the causes and find the appropriate solutions for the future of the service,” it said on its website.

It was unclear whether customers faced any losses from the hack.

Slovenian police said they were looking into the hack, but declined to elaborate.

View full post on National Cyber Security Ventures

Rethinking #Cybersecurity: #Shifting From #Awareness to #Behavior #Training

In recent years, many good things have happened in the cybersecurity world. In particular, organizations in all industries and all parts of the world have come to realize that getting serious about cybersecurity is no longer optional.

Despite this, the number of serious breaches reported each year has not fallen. In fact, quite the opposite is true.

Why? I could give you dozens of answers.

I could talk about the constant evolution of malware and other attack vectors. I could write about the difficulties faced by law enforcement agencies when attempting to apprehend known criminal groups across international borders.

I could explain why, no matter how technically sound your network, you’ll never be prepared for the latest zero-day threats.

In reality, though, none of these adequately explain the real issue.

Why Common Wisdom Will Hurt Your Organization

Before we continue, it’s important to keep one thing firmly in mind: nearly all cyber-attacks are motivated by profit. Equally, if there is money to be made from attacking your organization, you can be sure someone will.

Common wisdom suggests that the best way to defend your organization against these attacks is to implement a series of technical controls designed to prevent unauthorized access, block malicious activity and identify incoming attacks.

But there’s a problem.

If you look closely at every reported breach in the past decade, you’ll notice something interesting. Almost every single one made use of phishing or another social engineering technique at some point during the attack.

Why? Because, on the whole, fooling people is much easier than fooling machines.

If an attacker can trick a human into compromising your network, it won’t matter how good your technical controls are. Once an attacker is inside your network using legitimate credentials, the hard part is already done.

Now, you might be thinking that there are plenty of technical controls designed to mitigate the impact of a malicious email. And that’s true, but no matter how good your spam filters and content scanners might be, they will never prevent 100% of malicious emails from reaching your users’ inboxes.

The only way forward, then, is to accept one simple truth – technology isn’t enough.

The End of “Awareness” Training

I’m going to hazard a guess and say that the last time you attended a security awareness training session, it was less than helpful.

Let’s be honest, the general standard of security awareness training across all industries is pretty poor.

But here’s the thing. The problem isn’t just with the standard of training, it’s with the whole concept. Improving security awareness among an organization’s users might seem like a sensible target, but it consistently fails to reduce real-world cyber risk.

Think about it like this.

We all know we should eat more vegetables and stop frequenting McDonald’s drive-throughs. But how often does that knowledge cause us to make the right dietary choices?

Judging by the obesity epidemic, not very often.

Now, if we want to see a marked reduction in cyber risk as a result of our security training, we’ll need to choose an entirely different focus: Not security awareness but security behaviors.

And since it turns out phishing is the single greatest threat facing organizations of the world, one security behavior, in particular stands out.

Changing Email Behaviors

In basic terms, phishing emails are designed to do one thing: trick unsuspecting users into taking an action that will in some way benefits the attacker.

To combat phishing, we’ll need to change the way users interact with their email inbox.

Now, you have to realize the average business user receives dozens of emails every day. As a result, most people aim to process their unread emails in the most efficient manner possible and naturally assume that any email finding its way into their inbox is legitimate. Each individual user will have their own set of unconscious processes for managing their email inbox, which over the course of tens of thousands of repetitions have become enshrined as unconscious habits.

Naturally, conditioning your users to change these habits is not going to be possible using the standard annual security awareness training format. Instead, you’ll need to incorporate your training into your users’ standard working day.

Operation: Phish

How, then, should you go about reconditioning your users’ email habits? Simple: Develop your own realistic phishing simulations, and send them to your users on a regular basis.

Yes, to be clear, I recommend phishing your own users.

Now before you start wantonly flooding your users’ inboxes with complex phishing lures, there are a few important considerations. For starters, this is not something you can rush into and expect to see results.

If you want to see genuine, long-term improvements in your users’ email security behaviors, you’re going to need to adhere to a few core principles.

1) Executive Sign-Off Isn’t A “Nice to Have”

Realizing dramatic improvements to employee security behaviors isn’t going to happen overnight. Quite the opposite, in fact, to be consistent and maintain your efforts over the long-term. Yes, of course, you can expect to see substantial improvements within the first few months, but they will quickly disappear if you fail to stay consistent.

And how do you stay consistent? You make sure you have support from above, specifically in the form of agreed long-term funding. To be sure of this, you’ll need to develop a strong business case, accurately track ROI of the program and routinely provide senior management with clear performance reports.

2) Success Must Be Easy

If you think the goal here is simply to persuade users to delete suspicious emails, you are seriously missing a trick. In reality what you really want is for your users to report suspicious emails whenever they arise, enabling you to identify and quarantine similar emails, tighten your technical security controls to catch similar phishing lures in the future nand build up a pool of real-world source material to aid in the production of future phishing simulations.

But here’s the thing. In order to achieve this, you’re going to need to make the reporting process as easy as it can possibly be. To that end, it would be wise to add a simple “report phishing email” button to your users’ email client.

3) Point-Of-Failure Training

When you initially launch your program, you’ll notice that your users improve very rapidly. At the same time, though, they’ll fail a lot in the beginning.

But failure isn’t a bad thing. All the time your users are correctly identifying phishing simulations, they aren’t really learning anything, they’re just showing you what they can do.

Each time one of your users fails a phishing simulation, they should immediately be sent to a relevant, multimedia training web page, which will educate them about the type of phishing email they have just been tricked by and help them to identify similar lures in future.

To really embed these lessons, you should also retest users within a week or so of their failed simulation. If certain users consistently fail both simulations, it may be worth following up with them personally.

Persistence: The Number One Factor in Success

As you have no doubt already surmised, the phishing awareness training program I just described is about as far from the standard annual security awareness training program that you can possibly get. Instead of pulling users into a stuffy classroom once per year, you’ll be providing a much higher standard of training, regular real-world testing, and an opportunity for users to take an active role in the security of your organization.

At the same time though, this process never really ends. If you suddenly decide to shelve the program, you’ll find that within a few months your users are back to their old wicked ways.

And here’s another thing to consider. No matter how good your users get at identifying phishing emails, mistakes will always happen. People are not machines, and while you can certainly expect to reach a 98 or 99% success rate, you can never assume that 100% of phishing emails will be correctly identified and reported.

Naturally, then, I would never dream of suggesting that the program like this could replace the need for high-quality technical security controls and a professional, well-trained incident response team.

No, this has never been a case of “either-or”. Quite the opposite, if you are genuinely committed to securing your organization against the threat of phishing, you will need to combine a well-trained workforce with a powerful, well-provisioned security resource.

View full post on National Cyber Security Ventures

From #denial to #opportunity – The five #stage #cyber security #journey

From #denial to #opportunity – The five #stage #cyber security #journey

The digital economy is brimming with commercial opportunity for those that embrace new technologies and innovative business models.

Regrettably, one sector which has been quick off the mark to grasp the opportunity is the criminal community.

Cybercrime is already more common than traditional criminal offences. The global outbreaks of WannaCry and Petya earlier this year showed the astonishing speed and scale at which even unsophisticated attacks can spread and underlined how ill-prepared even some big organisations are to protect themselves from criminal cyber activity.

Progress lies in accepting that cyber security is not a single destination but a complex journey. Broadly speaking, there are five stages along the way.

Stage One: Denial – ‘there is no threat’. The hard truth is that all organisations face low-level cyber threats every day, even if they don’t realise it. Criminals don’t only target big business but increasingly go after SMEs and individuals, soft targets that can provide a pathway into more valuable hunting ground.

Every business is a target and must put in place the basics – after all, standard software updates would have defeated WannaCry at first contact.

Stage Two: Worry – ‘let’s spend on the latest security systems and solutions’. The immediate reaction from the board is to throw money at the problem, along with the appointment of a Chief Information Security Officer (CISO).

However, technology isn’t necessarily the priority. Because the weakest link is often human, education is a priority. Once people understand how they fit into the big picture, they can protect themselves and the company, and become a major line of defence.

Stage three: False confidence – ‘we’re sorted, bring it on’ There is no 100 per cent protection against cybercrime. For example, criminals are now turning their attention to the supply chain, where contractors could unwittingly unlock access to their client organisations. Then there is ‘whaling’, a highly targeted form of phishing aimed at impersonating senior people and use their identity to undertake fraudulent financial transactions.

The way to combat false confidence is to relook at policies, question assumptions and investments, and identify emerging risks and issues. Consider all possible scenarios – ransomware (would you pay a ransom, and how?), data breaches, distributed denial of service attacks, sabotage and fraud. Now is the time to plan and prepare for incidents and practise your responses.

Stage Four: Hard lessons – ‘there’s no such thing as absolute security’. Even the best prepared and protected will still experience a security breach. Perhaps new security solutions are a poor fit with the existing IT infrastructure, leaving vulnerable gaps. On balance, it’s better to go with a security product that’s only 80 per cent right, but works with what you already have and employees can use easily.

This is a good point to consider cyber security insurance. The act of choosing/buying a policy will prompt you to think through potential weaknesses and, if the worst happens, you’ll have access to expert help and the resources you need to get the business back on track.

Stage Five: True leadership – ‘we can’t do this alone’. True leaders will accept that this is how the digital world is, and set out to share information and collaborate with their peers to make it ever harder for criminals to succeed.

The cold reality is that every organisation is a target. The best defence is not what you buy but how you behave. And businesses which treat cyber security not a destination but as a journey will be strongly positioned to protect themselves in the evolving digital economy.

View full post on National Cyber Security Ventures

Data is the new #currency: How to #protect yourself from #hackers

Source: National Cyber Security – Produced By Gregory Evans

As the world gets more digitised, we are falling prey to those who seek to use these digital vulnerabilities against us. Yes, we are talking about hackers. While there are a few white-hat hackers who ‘hack for a good cause’ or do everything in their power to prevent the bad guys from getting in, there are a multitude of people who have no qualms about using your private information against you.

Here are a few ways you can protect yourselves:

1. Always update your software if its already not done automatically. Outdated software is full of vulnerabilities that hackers can use to get in and snoop around.

2. Cover your webcam with some medical tape or tape of equal thickness. There have been disturbing reports of hackers using your webcams to spy on you.

3. Always ensure that your laptop or computer are working alongside antivirus and anti-malware programs. These programs prevent the bad boys from getting in, or at the very least, give them a tough fight.

4. Destroy all traces of your personal info on hardware you plan on selling. Consider using d-ban to erase your hard drive, advises Malwarebytes.

5. Open wifi might be tempting but use caution while accessing it – hackers are always on the lookout and an open wifi is one doorway open too many.

6. The iCloud may be a helpful tool but please ensure you don’t upload sensitive data to the cloud. Better safe than sorry.

The post Data is the new #currency: How to #protect yourself from #hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Three #Steps To #Protect Your #Network From #Hackers

Three #Steps To #Protect Your #Network From #HackersSource: National Cyber Security – Produced By Gregory Evans According to a recent Technology, Media and Telecom Risk Index, c-level executives voted cyberattacks/hijacks as the fourth most pressing risk to their business. A perfect storm of legacy systems, complex hybrid networks, and the influx of data traffic is exposing vulnerabilities for hackers to not only […] View full post on | Can You Be Hacked?

Web #security #guidelines from #FS-ISAC

Source: National Cyber Security – Produced By Gregory Evans

What are the main web security challenges for organisations and how are they best addressed?

Today’s CISO is juggling a lot – new attacks are emerging every day across a variety of channels and keeping up is no easy task, even if you are blessed with a large security team.

Whether your team is large or small, here is a quick cheat sheet of main web security challenges and how they could be best addressed:

Challenge 1: Protection vs functionality

The conflict between usability and security is nothing new. It is easy for the eager IT security person to block certain functionality across the board to keep all the bad stuff out, but a thoughtful IT security person will know not everything can be blocked because you run the risk of blocking critical functionality for your business – like access to corporate email, business applications, or even Google!

While there won’t be a one-size-fits-all solution to web security, each organisation has different access and security needs – network segmentation may help.

Think about cutting off the data, not the employee, from the web. If you have critical, valuable data, it should not be on a device that connects to the open internet.

Talk to your employees to understand what they need to access for their work and find out how that can be done in the most secure way. In short, balancing security and functionality is a security DO.

Challenge 2: Static controls, dynamic web content

More traditional measures for web security just don’t cut it with today’s internet. Static standards like black/whitelisting and URL filtering are not sufficient with the speed of content creation on the web today. Unfortunately, this speedy growth means that these new tailored websites can be vulnerable.

Hastily developed websites are not designed with security in mind and are open to many exploits like SQL injection (SQLi) and cross-site scripting(XSS) just to name a few. The data you do not want to be exposed could be sucked right out of your organisation if left unpatched.

Vulnerabilities left in exposed applications can also create additional hazard like several recent breaches have exposed.

These vulnerabilities are not just a problem for website owners but anyone who visits these compromised sites – or their company’s security team – can become a victim with watering hole or drive-by attacks where users get infected with malware just for visiting the site.

How does your organisation determine if a site is safe and do your controls reflect the explosive pace of content creation online? Dynamic security controls to address dynamic threats is a security DO.

Challenge 3: Human habits

People have been programmed to click on links and open attachments, especially if they think it is from a trusted source, and many organisations rely on links and attachments to function. Because of this, phishing attacks are a major threat to organisations. According to research this year by Cylance, malicious attachments and links are the most common attack vectors in organisations.

As much as you might like to, you cannot block all attachments or links without bringing work to a stop. Train employees about risks and empower them to avoid malicious links or attachments. On the other side, plan as if your employees will open every attachment and visit every site that you wish they wouldn’t with anti-malware protection and multi-factor authentication.

If they accidentally enter their password into a phishing site, multi-factor authentication acts as another layer of defence. Plan for the worst, train for the best. Creating security programs that acknowledge human habits is a security DO.

Web security is a complex and critical component of any enterprise security program. Organisations’ reliance on the web for daily operations is not going anywhere, and the threats aren’t either.

Phishing and ransomware attacks are on the rise. Defending against these threats requires keen knowledge of your organisation’s risks and needs. You need the right solutions, the best security professionals and wide-spread buy-in in the organisation. Aligning your security controls with the reality of the web security issue in your organisation is a security DO.

The post Web #security #guidelines from #FS-ISAC appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The #Wall of #Lava #Lamps That #Protects the #Internet From #Hackers

Source: National Cyber Security – Produced By Gregory Evans

With hackers hitting everyone from Equifax to HBO, you’d imagine something more advanced than lava lamps is protecting your information—but you’d be wrong.

With high-profile hackers stealing headlines, credit card numbers, and Game of Thrones scripts in the last six months, there’s no doubt been very important meetings called across the world to figure out how to keep hackers at bay.

So, what ingenious, impenetrable systems are keeping the world safe? 

The folks at Cloudflare, which handles encryption for around 10 percent of the internet’s total traffic, have to say “lava lamps” with a straight face.

Well, to be fair, that’s actually 100 lava lamps, a swinging pendulum in London, and a chunk of radioactive material in Singapore. 

It might sound like little more than a slightly more complex version of Mouse Trap, but together this weird assortment of junk keeps Cloudflare’s traffic encrypted through the magical, mathematical concepts of randomness and unpredictability. Also, Linux is involved. 

It’s interesting to see how encryption and chaos theory overlap—the pendulum mentioned in the video is probably similar to a double pendulum, which is a classic example of chaos theory (you probably learned about that in Jurassic Park).

A double pendulum is very sensitive to “initial conditions,” or what position it starts in, to the point that a small fraction in difference in two starting points can yield incredibly different swing patterns. This seeming unpredictability to outside observers makes it a great way to simulate randomness, and therefore create the basis for an extremely difficult encryption.

Still, lava lamps give Cloudflare way more style points.

We like to imagine the Chinese scientists who launched the world’s first quantum encryption satellite covertly including a lava lamp in their next satellite, just for that extra layer of security. Groovy, man.

The post The #Wall of #Lava #Lamps That #Protects the #Internet From #Hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

NSA #hacking #code lifted from a #personal #computer in #U.S

Source: National Cyber Security – Produced By Gregory Evans

NSA #hacking #code lifted from a #personal #computer in #U.S

Moscow-based multinational cybersecurity firm Kaspersky Lab on October 25 said that it obtained suspected National Security Agency (NSA) hacking code from a personal computer in the U.S. During the review of file’s contents, a Kaspersky analyst discovered it contained the source code for a hacking tool later attributed to what it calls the Equation Group.

Kaspersky said it assumed the 2014 source code episode was connected to the NSA’s loss of files. The antivirus software-maker spokeswoman Sarah Kitsos was quoted saying as “we deleted the archive because we don’t need the source code to improve our protection technologies and because of concerns regarding the handling of classified materials”.

Another spokeswoman Yuliya Shlychkova told Reuters that removals of such uninfected material happen “extremely rarely.”

Meanwhile, Democratic Senator Jeanne Shaheen sent a letter to the Department of Homeland Security (DHS) acting Secretary Elaine Duke and Director of National Intelligence Dan Coats, urging the U.S. government to declassify information about Kaspersky products.

In October this year, the U.S. NSA contractor came under scanner, whose personal computer was equipped with Kaspersky anti-virus software and confidential details were shared with the Russian company. The unidentified NSA contractor had reportedly downloaded a cache of classified information from his workplace, even though he was aware of the consequences that moving such a classified and confidential data without approval is not only against NSA policy, but it also falls under criminal offence.

Kaspersky Lab repeatedly denied that it has any unethical ties to any government and said it would not help a government with cyber espionage or offensive cyber efforts. It also highlighted that more than 85% of its revenue comes from outside Russia. It maintains that it has no connection with Russian intelligence but it is registered with the Federal Security Service.

To restore people’s and government’s trust again, Kaspersky on October 23 allowed to have his company’s source code audited independently by internationally recognized independent authorities in the first quarter of 2018. As part of comprehensive transparency initiative, the firm plans to open three transparency centers across the U.S., Europe and Asia by 2020.

According to Wall Street Journal, it was reported earlier this month that hackers working for the Russian government appeared to have targeted an NSA worker by using Kaspersky software to identify classified files in 2015.

The New York Times reported on October 10 that Israeli officials reported the operation to the United States after they hacked into Kaspersky’s network.

Following allegations Russian hackers interfered in 2016 U.S. elections, the DHS had banned the Kaspersky Lab software in September 2017, citing concerns the company may be linked to the Kremlin and Russian spy agencies.

The post NSA #hacking #code lifted from a #personal #computer in #U.S appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures