Page 2,865«..1020..2,8642,8652,8662,867..2,8702,880..»

Protecting a New Vulnerable Population on the Internet – Security Boulevard

On a Mission of Protecting

Abraham Lincoln is credited with saying that A lawyers time and advice are his stock and trade. Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are knowledge workers. To state it as bluntly as one attorney once explained to an executive where I worked, My knowledge will keep you out of jail. As a cybersecurity professional, you too are a knowledge worker.Many times, your job is probably occupied with advising rather than creating.This specialized knowledge and the sharing of it is what makes you the subject matter expert. Protecting others from the perils of the internet has always been the primary responsibility of cybersecurity professionals.

Whether working for a large corporation, a government agency, or in an individual capacity, helping others to become better educated about online threats has always been a core part of the job.

Of course, many non-security people (often our friends and family) think that a cybersecurity professional is someone who can fix their computer, and while that is true in many cases, recent newsworthy security events have raised awareness about the differences between the skills of a computer technician and that of a cybersecurity professional.Now, when a news organization interviews a computer security expert to explain a breach event, the exclamation, Oh, so thats what you do! is heard more often.

Do you recall just 10 years ago when the task of protecting the most vulnerable people on the internet meant going into schools to teach children about cyber-bullying prevention?At the time, young people who were newly joining the Internet community needed to be educated about the correct way (Read more...)

Read the original:
Protecting a New Vulnerable Population on the Internet - Security Boulevard

Read More..

CIS Awards Cimcor With First-Ever Benchmarks Configuration Certification – pdclarion.com

MERRILLVILLE, Ind. and EAST GREENBUSH, N.Y., June 8, 2021 /PRNewswire-PRWeb/ -- Cimcor is pleased to announce that it is the recipient of the first-ever Center for Internet Security (CIS) Benchmarks Configuration Certification. The Center for Internet Security has provided this certification for the CimTrak Integrity Suite running on CIS CenOS Linux 7 Benchmark Level 1 and Level 2.

Providing a comprehensive set of security, auditing, and compliance tools to ensure the integrity of an IT infrastructure, the CimTrak Integrity Suite provides a streamlined way to bring Benchmark security to customers without impacting product, service, or system performance. The CIS Configuration Certified program certifies a product or service's configuration is in conformance with or can run in an environment configured to the CIS Benchmarks, which are consensus-based, vendor-agnostic, secure configuration guidelines for the most commonly used systems and technologies.

"We believe that systems that have been hardened in accordance to CIS Benchmarks, are the foundation of a secure infrastructure. We are proud to be the first security company to receive CIS Benchmarks Configuration Certification," said Robert E. Johnson, III, President and CEO of Cimcor, Inc. "This certification validates our commitment to CIS best practices and our commitment to creating world-class security software to deliver integrity, security, and compliance throughout the enterprise."

The new CIS Benchmarks Configuration Certification enables vendors to develop new products with the CIS Benchmarks built-in, tested, and certified at outset. Building this confidence into the products takes the guesswork out of knowing whether or not a CIS Benchmarks-hardened environment will work without impact.

"Cimcor has demonstrated a strong commitment in providing customers with the ability to ensure their assets are secured according to consensus-based best practice standards," said Curtis Dukes, CIS Executive Vice President and General Manager, Security Best Practices. "Their customers won't have to reconfigure anything because the certification has demonstrated it will work straight out of the box."

The new Configuration Certification pilot is open to a number of environments and use cases, including:

Cimcor develops innovative, next-generation, compliance, and system integrity monitoring software. The CimTrak Integrity Suite monitors and protects a wide range of physical, network, cloud, and virtual IT assets in real-time while providing detailed forensic information about all changes. CimTrak helps reduce configuration drift and ensure that systems are in a secure and hardened state. Securing your infrastructure with CimTrak helps you get compliant and stay that way. For more information, visit http://www.cimcor.com/cimtrak.

The Center for Internet Security, Inc. (CIS) makes the connected world a safer place for people, businesses, and governments. We are a community-driven nonprofit, responsible for the CIS Controls and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously refine these standards to proactively safeguard against emerging threats. Our CIS Hardened Images provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities, and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), which supports the cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.

Read the original:
CIS Awards Cimcor With First-Ever Benchmarks Configuration Certification - pdclarion.com

Read More..

Trio of gifts, $75 million, accelerates transformation of computing and data science at Berkeley – UC Berkeley

Three gifts totaling $75 million will support construction of the Gateway, the future home for Berkeleys Division of Computing, Data Science, and Society (CDSS), and the creation of two new faculty positions in computer science. (Weiss/Manfredi rendering of Level 1 of the Gateway. Note: design is provisional and in development)

The University of California, Berkeley, today (Monday, June 7) announced three gifts of $25 million each that will reinforce Berkeleys position as a leader in computing and data science research and education, and help create a visionary new home for the Division of Computing, Data Science, and Society (CDSS).

Notably, two of the gifts are from current Berkeley faculty: professors Scott Shenker and Ion Stoica of the Division of Computing, Data Science, and Society, and the College of Engineering.

We are deeply grateful for these three gifts. said Jennifer Chayes, associate provost of the Division of Computing, Data Science, and Society. I cannot imagine a stronger endorsement of CDSS and of Berkeley than the unprecedented generosity of our two current faculty, Scott and Ion.

Shenkers portion provides $25 million for the Gateway, a planned nexus for collaborative, integrated data science and computing education and research to solve societal problems. Stoicas gift of $25 million will support construction of the Gateway and two new full-time faculty positions in computer science. The third $25 million gift, from an anonymous donor, will also help facilitate development of the Gateway.

Anticipated to open in 2025, the Gateway will provide 380,000 square feet of space for research, teaching and co-creation for more than 1,600 faculty, students and staff of CDSS and other units. Equipped to connect the power of computing and data science to disciplines across the campus, the Gateway will attract researchers ready to confront complex challenges in areas such as climate and sustainability, human health and social justice.

We want to build an idea factory, an ecosystem where students, faculty and staff can come together to tackle complex societal problems and pioneer new approaches in computing and data science, said Stoica. We dont know what those future innovations will look like, but we want to create an environment that will attract the best people and where great ideas will flourish.

Realizing this vision for the Gateway is a top priority of Light the Way: the Campaign for Berkeley, which has set a goal of raising $6 billion. In February 2020, an anonymous donors lead gift of $252 million, the largest single contribution in Berkeleys history, provided a firm foundation for the Gateway. Including the three new gifts, the Gateway is now halfway funded. The balance needs to be raised before groundbreaking proceeds.

These generous gifts are so inspiring and represent great momentum for the Gateway, said Chancellor Carol T. Christ. The gifts from faculty speak not only to the power of Berkeleys vision of data science and computing but also to the unique impact of our faculty in driving innovation and change from the ground up. The Gateway will accelerate this culture of transformation and collaboration and direct it to improving human health, social justice and environmental sustainability.

The Gateway will provide 380,000 square feet of space for research, teaching and co-creation for faculty, students and staff of CDSS and other units. (Weiss/Manfredi rendering of the Gateway from above. Note: design is provisional and in development)

Berkeley launched CDSS less than three years ago as part of an ambitious plan to expand teaching and research in data science, recognizing the profound impact of data and computing in a rapidly evolving digital world. The division emerged in response to efforts by faculty, students and staff to build a new data science curriculum from the ground up. As an indication of the explosive growth in this field, student enrollment in the introductory Foundations of Data Science course started at fewer than 100 when it was first offered in 2015 and has increased to 3,000 students a year today. Nearly one in every five of Berkeleys 30,0000 undergraduates now takes a data science course each year.

Its by far the best data science program in the world, and that was made possible by the faculty and students acting out of passion, said Shenker. We are a faculty-driven, mission-oriented university, and that allows people to do incredible things.

The mission to educate the next generation of students on both the technical know-how and the ethical and societal dimensions of data science sparked a transformation in campus organization connecting people, departments and research units across the College of Engineering, the College of Letters and Science and the School of Information. In January 2020, Jennifer Chayes came to Berkeley from Microsoft Research to lead CDSS as the associate provost of CDSS and dean of the School of Information. Chayes is working closely with Tsu-Jae King Liu, dean of the College of Engineering, and a diverse range of other campus leaders to support the transformative mission of the Gateway.

Shenker and Stoica have been inspired to step forward philanthropically and help Berkeley build upon what faculty and students started.

At Berkeley, faculty are more likely to take risks and be pioneering, Stoica said. New fields of study are created and explored here.

Berkeley has been the birthplace of a long line of technological innovations from RISC to BSD UNIX to Apache Spark. For instance, Apache Spark, a big-data processing system, enabled the founding in 2013 by Berkeley faculty and graduate students of Databricks, now an industry-leading, cloud-based data analytics and AI company.

Besides Stoica and Shenker, the co-founders of Databricks include Ali Ghodsi, Matei Zaharia, Patrick Wendell, Reynold Xin, Andy Konwinski and Arsalan Tavakoli-Shiraji.

Shenker noted that further advances will come from transcending disciplinary boundaries and integrating human implications and considerations of societal impact into the core of computing and data science.

This interdisciplinary approach and collaborative spirit is woven into the foundations of CDSS at Berkeley, Shenker said.

Read more:

Trio of gifts, $75 million, accelerates transformation of computing and data science at Berkeley - UC Berkeley

Read More..

Securing Industrial Automation and Control Systems Starts in Software Development – Security Boulevard

Following the IEC 62443 standard for security software development ensures quality, safety and security

The importance of industrial automation and control systems (IACS) to the critical operations we rely on cannot be overstated. From manufacturing of consumer and commercial products to power generation and water supply to HVAC for the offices where we once worked in before COVID-19 (well be back) to smart utility metering for our homes and so much more, these systems are essential to our lives and our economy. It goes without question that keeping these systems secure is a must.

A cybersecurity event targeting ICAS has the potential to have a devastating impact. And, as these devices and systems become smarter, more interconnected and exposed to the Internet, security challenges continue to rise and risk becomes exponentially greater. In fact as highlighted by its Year in Review 2020 report, industrial cybersecurity company, Dragos, saw a threefold increase of cyber threats to ICAS last year.

As stated earlier, these ICAS devices are becoming smarter. This is a result of more complex embedded software enabling remote functionality, automation and analytics. With more complex software, there are now more lines of code which can introduce N-day and 0-day vulnerabilities if not diligently tested throughout the software development life cycle (SDLC).

Thankfully, there are standards for developing secure software, such as IEC 62443, designed to help ensure software code embedded in ICAS devices is free of vulnerabilities. The IEC 62443-4-1 standard (Security for industrial automation and control systemsPart 4-1: Secure product development lifecycle requirements) defines specific requirements for using a secure development lifecycle in the design, implementation, maintenance and testing of products used in industrial automation and control systems.

GrammaTech together with Exida, a leading certification company specializing in ICAS functional safety and cybersecurity, recently issued a joint whitepaper, Using GrammaTech CodeSentry and CodeSonar to Improve Software Security and Comply with IEC 62443.

In this whitepaper, Exida details how GrammaTechs CodeSentry (Binary Software Composition Analysis SCA) and CodeSonar (Static Application Security Testing SAST) tools can be integrated into an ICAS suppliers SDLC and DevSecOps processes to help comply with the IEC 62443 standard.

Exida describes two major contributors to security vulnerabilities found in products today, which are implementation weaknesses in programs created in languages such as C and C++ and the use of Third-Party Software (TPS). The CodeSentry and CodeSonar tools can address both of these issues.

CodeSonar can be seamlessly integrated into the SDLC to continually find and remediate errors and vulnerabilities in code. With CodeSentry, you can perform a binary analysis to identify the open-source and third-party software components of the software to generate a software bill of materials (SBOM) and vulnerability report.

This whitepaper introduces common causes of security vulnerabilities including implementation programming weaknesses in programing languages and TPS. In addition, it describes TPS types, specific TPS security challenges and provides guidance on how to use the GrammaTech CodeSentry and CodeSonar tools in a workflow to select and manage TPS and overall product security.

If developing secure and vulnerability free code is your priority, we encourage you to the download and read our whitepaper.

To see CodeSentry and CodeSonar in action and how our solutions can solve your specific requirements, book an evaluation today.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Christian Simko. Read the original post at: https://blogs.grammatech.com/iec-62443-securing-industrial-automation-and-control-systems-starts-in-software-development

Link:
Securing Industrial Automation and Control Systems Starts in Software Development - Security Boulevard

Read More..

Working from home blamed for rise in cyber hits on organisations – The Straits Times

While working from home has become the norm for many people amid the Covid-19 pandemic, it might have also caused many organisations in Singapore to fall victim to cyber attacks.

About eight in 10 public-and private-sector organisations here attributed such a working arrangement to a rise in cyber attacks across the board, said a report by software company VMware last week.

This is comparable to the global figure across 14 markets.

Nearly seven in 10 here said the attacks were serious enough to report to regulators or to call in an incident response team. Globally, this is higher - at eight in 10.

"Digital transformation programmes advanced rapidly as the cyber-attack surface expanded to include living rooms, kitchens, home networks and personal devices," explained principal cyber-security strategist Rick McElroy of VMware's security business unit.

Mr McElroy added that while remote employees' work laptops are usually well secured, home Wi-Fi networks used to go online can pose serious security risks.

"Updates to home router software are often overlooked, and many home networks do not have a firewall installed. These unsecured and unpatched networks can result in network security gaps," he said, pointing also to issues with the use of other Internet-connected devices on home networks for work.

The remote workforce behaves very differently from the office workforce - its members access the organisation's network at unpredictable hours as they strive to stay productive while caring for their families and following government restrictions.

This means network traffic has "changed beyond recognition", and organisations must adapt monitoring systems or risk leaving an opportunity for hackers to use atypical patterns to mask their infiltration attempts, Mr McElroy said.

What is key is that companies need to understand how people interact with technology, he said. This can include when an employee usually works, the applications he normally uses and the websites he commonly visits.

So for example, when an employee who usually works in California logs in 10 minutes later from Singapore, which is humanly impossible, the company knows something is amiss.

"Knowing this baseline helps better detect a malicious login," said Mr McElroy.

The VMware-commissioned study polled about 250 chief information officers, chief technology officers and chief information security officers here last December.

They came from the financial, healthcare, government, retail, manufacturing and engineering, food and beverage, utilities, professional services, and media and entertainment sectors.

The study found that organisations here reported more cyber attacks in the previous 12 months, with 64 per cent saying so.

About a year ago, the figure was 43 per cent.

More organisations globally saw more cyber attacks than those in Singapore in this year's report, with 76 per cent reporting this.

However, the Republic had more breaches on average per organisation - 3.3 versus 2.35 globally.

The leading cause of breaches reported here was a weakness in processes, with 22 per cent of respondents citing this. One example is companies not deploying patches on a regular basis.

The next top causes of breaches were using out-of-date security (20 per cent) and third-party apps (13 per cent).

Outdated security includes operating systems that are no longer supported by their developers, such as those found in manufacturing systems.

Some cases involved an old critical application that is not updated because doing so might mean taking vital systems offline.

These legacy systems and old apps could remain unpatched for vulnerabilities, and using modern security solutions to protect them is difficult at times.

Third-party apps that can lead to breaches include externally developed ones used for sharing files, which can allow crooks to access sensitive data if hacked.

These top causes of attacks generally boil down to how organisations' information technology and security operations teams interact and work in silos when solving issues, said Mr McElroy.

To address some of these issues, he advised organisations to have security in place "wherever and whenever humans interact with systems", including online programs and applications.

Kenny Chee

Follow this link:
Working from home blamed for rise in cyber hits on organisations - The Straits Times

Read More..

Takeaways from the Senate report on January 6 security failures – WTOP

This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. It's by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.

Two Senate committees on Tuesday released the most comprehensive government report on the security failures leading up to the US Capitol insurrection on January 6, revealing new details about unheeded warnings, critical miscommunications and intelligence shortcomings.

Congressional investigators pored through thousands of documents, received written statements from 50 police officers who defended the Capitol and received testimony from a wide array of current and former officials who played a role in the security preparations and response.

READ: Bipartisan Senate report investigating January 6 Capitol attack

Here are six takeaways from the report and its recommendations, which were released on a bipartisan basis by the Senate Rules Committee and the Senate Homeland Security Committee.

The report concluded that the US Capitol Polices main intelligence unit was aware of the potential for violence in the days and weeks ahead of January 6. Period. Full stop. They were warned.

But not everyone was aware. The inquiry determined that USCPs decentralized intelligence operation meant some people saw these warnings while other officials were left in the dark.

RELATED: Injured Capitol Police officer in emotional statement to court: You have stolen moments away from me that I cant get back

The Metropolitan Police Department in Washington, DC, told Capitol Police that hotel bookings roughly doubled in comparison to pro-Trump rallies in November and December, the Senate report said.

It was becoming clear to security officials and ordinary citizens alike that January 6 would be different. A private citizen emailed USCPs general mailbox on December 28 saying there were tweets from people organizing to storm the Capitol on January 6th, according to the report.

Still, USCP maintained its assessment that January 6 would likely resemble the minor pro-Trump rallies in November and December.

The report said, The USCP Chief has no unilateral authority to request assistance from the National Guard. This is a simple statement, but it explains a lot about the failures that day.

Then-Capitol Police Chief Steven Sund wanted to call in the troops for backup but needed to coordinate with other Hill security officials. When the officials tried to deal with the request, they were unfamiliar with the laws and regulations that needed to be followed, the inquiry found.

The red tape hindered the much-needed National Guard response, according to the report. And thats why one of the first recommendations from the Senate report is to empower the Capitol Police chief to have unilateral authority to request military support in emergency situations.

It seems like a no-brainer, but for this to happen, Congress will need to pass a new law.

The Senate inquiry uncovered some embarrassing failures within the civil disturbance unit of the Capitol Police, which is essentially the forces riot police or emergency response squad.

The Capitol Police activated seven of these special units in advance of January 6, but only four of those platoons were outfitted special protective equipment like helmets and shields, the report said. And when one of the platoons tried to get its equipment, it was on a locked bus.

The senators recommended that the special unit receive better training and more funding.

Plenty of Trump supporters posted plenty of violent threats and dangerous assertions on the internet in the run-up to January 6. The report said these were found on message boards, social media, memes, or hashtags. But intelligence officials struggled with how aggressively to police political speech, and how to differentiate the real threats from typical internet nonsense.

FBI and (Department of Homeland Security) officials stressed the difficulty in discerning constitutionally protected free speech versus actionable, credible threats of violence, the report said, noting that officials have said they need to make improvements and do better in the future.

Weve already heard from many of the brave police officers who risked their lives defending the Capitol, including some who were injured and others who engaged in hand-to-hand combat.

But the report fleshed this out, providing new accounts from the frontlines of the battle.

We did what we could against impossible odds and a volatile crowd which many times threatened us with phrases like Were gonna kill you!' one officer told the committees. I felt at this time a tangible fear that maybe I or some of my colleagues might not make it home alive.

Another officer described how they were called a Nazi. Black officers have spoken out about the racial abuse at the hands of the mob, including being called the N-word. In a previously unreported incident, one officer said they saw someone give a Nazi salute to the Capitol.

This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. Its by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.

But as comprehensive as it is, it only examined one piece of the bigger puzzle. It looked at the security, planning and response failures by law enforcement. But what about efforts by extremist groups to plan for violence in DC? What about former President Donald Trump and the Republican officials who fanned the flames? Congress isnt equipped to probe these issues.

Senate aides said investigators intentionally avoided the most politicized topics like Trumps culpability because they wanted to keep the probe bipartisan. Sources told CNN that to keep Republicans in the fold, the report avoided using the word insurrection to describe the attack.

Apparently, the Senate investigation was significantly watered down before it even started.

This is one the many reasons why so many Democrats, Republicans, former US officials, national security experts, and US Capitol Police officers agree that there should be an independent commission to investigate January 6. Not just to look at narrow questions but to examine the big picture extremism, disinformation, radicalization, incitement, and much more.

Senate Republicans blocked a bill to establish a commission, which now appears to be dead.

Read the original here:
Takeaways from the Senate report on January 6 security failures - WTOP

Read More..

[PDF] Internet Security Industry Growth Analysis, Segmentation, Share, Trend, Future Demand and Leading Players Updates The Courier – The Courier

Recent Updates of Internet Security Market 2021

The Internet Security Market throws light on business drivers, restraints, opportunities, challenges, and key statistics factors. The report has been designed and presented in the form of tables and figures and other statistical to generate higher reader perception. The research report study on important details about key players, current trends, future scope, development expansion strategies. The report also covers the future timelines, accurate growth predictions, and forecast estimations, and fast-changing market forces.

Increasing usage of Internet globally is a major factor driving growth of the internet security market. This is due to rapid expansion in wireless communication technology across numerous verticals. For instance, according to report by Coherent Market Insights, the number of internet users across the world were around 3.38 billion and 3.25 billion in 2016 and 2015, respectively. Internet security solutions are widely used in industries such as BFSI (Banking, Financial Services and Insurance), telecommunication, and healthcare to protect large volume of data from increasing cyber-attacks, which fuels growth of the market of internet security. Growing cyber-attacks that causes damage to organizations data and can result in loss of revenue is a primary driver boosting adoption of internet security solutions across aforementioned verticals.

Major Key players In this Industry: IBM Corporation, Hewlett Packard Enterprise, McAfee LLC, Trend Micro, Inc., Symantec Corporation, Cisco Systems, Inc., Palo Alto Networks, Inc., Dell EMC, Fortinet, Inc., Sophos Ltd., Rapid7, Inc., CyberArk Software Ltd., Splunk, Inc., and Imperva, Inc.

The report offers a detailed assessment of Internet Security industry research profiles that understand trending data and covers production, consumption, status & forecast, and market growth. The study analyzes the leading companies and several other prominent companies operating in the market. The report features detailed information including market size, growth rate, market value, price, share by (regions, type, application), production and market share by major countries, market consumption, and market share by (regions, type, application), export and import data.

Get the Sample Report PDF with Detail TOC & List of Figures @

https://www.coherentmarketinsights.com/insight/request-pdf/1930

Key Features of Internet Security Report Are:-

Get Discount Before Buying

https://www.coherentmarketinsights.com/insight/buy-now/1930

Market Scenario:-

The report covers historical and forecasts market data, demand, application details, price trends, and company shares of the leading by geography. It supplies detailed information on the established market with a clear perceptive of global Internet Security market players and emerging market associations. The report content includes technology, industry drivers, geographic trends, market statistics, market forecasts, producers, and equipment suppliers.

Go Through Our Trusted Clients List:-

https://www.coherentmarketinsights.com/trusted-by

About Coherent Market Insights:-

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunities.

Contact Us:-

If you need more customization, reach us. You can get a point by point of the whole research here. If you have any special requirements, dont mind, let us know and we will offer you the report as you need.

Contact Here: sales@coherentmarketinsights.com || +1-206-701-6702 (US-UK Toll Free).

Excerpt from:
[PDF] Internet Security Industry Growth Analysis, Segmentation, Share, Trend, Future Demand and Leading Players Updates The Courier - The Courier

Read More..

Oakland University ‘s IGVC fuels the inspiration behind autonomous robotics teams – The Oakland Press

Its competitions like the Intelligent Ground Vehicle Competitionat Oakland University that drive college and university autonomous robotics teams to excel.

We have seven different competitions, said Andrew Strazdsa, a senior from Embry-Riddle Aeronautical University in Daytona, Florida, during Mondays finals taking place in a parking lot at the south end of the campus.

This is the only one that wasnt cancelled because of COVID-19. he added, after doing a demonstration with the robot he and his team had built.

Dark clouds had moved in and the rain sent most of the other teams scrambling for cover. Being from Florida, where rain is common Strazdsas team went the extra mile to ensure that their robot could withstand the wind and rain.

In fact, they named their robot, Rain for that reason.

This addition alone earned them points in the competition.They are one of the few schools that did a good job of weatherproofing, said Bernie Theisen, who was among the judges at the annual event that challenges engineering students to design autonomous vehicles and compete in a variety of unmanned mobility competitions including Auto-Nav, in which vehicles complete an outdoor course in full autonomous mode while negotiating obstacles.

It demonstrates what weve learned, said Strazdsa said. Its really nice to see everything working, or not.

Im tweaking ours for a better performance, said Lloyd Brombach, a computer science student at Wayne State University who was joined by his teams mentor, Abhilash Pandya. Vernoica, as the robot was named needed to go faster, so Brombach had to make adjustments to the computer program.

Jerry Lane who was instrumental in creating the event for students said the teams work all year on the vehicles before attending the competitions.

They design it. They develop it, build it, test it, fix it, and then compete, he said.

Since its start more than 15-years-ago, IGVC has been highly praised by participating faculty advisors as an excellent multidisciplinary design experience for student teams. Not only do they get to see their vehicles in action, but also get the opportunity to meet other students with similar interests. Some schools also extend senior design course credits for student participation.

Among the guests in attendance for the competition was Michael Cadieux, director of the U.S. Army Combat Capabilities Development Command (DEVCOM) Ground Vehicle Systems Center (formerly U.S. Army TARDEC) at the Detroit Arsenal in Warren. Cadieux brought his children out to see robotics in action. Robotics is a lot cooler when you see it in person, said Cadieuxs 12-year-old son.

To view the list of winners or find out more about the competition visit igvc.org/teams.htm

View original post here:

Oakland University 's IGVC fuels the inspiration behind autonomous robotics teams - The Oakland Press

Read More..

Microsoft buys ReFirm Labs to boost IoT security with firmware analysis – VentureBeat

Elevate your enterprise data technology and strategy at Transform 2021.

Microsoft has acquired firmware security startup ReFirm Labs to boost its security capabilities for protecting internet of things and intelligent edge devices.

The intelligent edge made up of cloud-connected devices capable of specialized tasks have opened up a new attack surface, David Weston, Microsofts director of enterprise and operating system security, told VentureBeat. Attacks targeting sensitive information such as credentials and encryption keys stored in memory are on the rise, and Microsoft has spent the past few years securing the operating system below the operating system, he said.

Microsoft believes that firmware is not a future threat, but an imperative to secure now as more devices flood the market and expand the available attack surface. We are committed to helping customers protect from these sophisticated threats now and in the future, which is why were announcing that we have acquired ReFirm Labs, Weston wrote in a blog post on Tuesday. Microsoft declined to disclose the terms of the acquisition.

Microsoft has been focused on IoT security on multiple fronts, including Azure Defender for IoT, Azure Sentinel, and devices such as Edge Secured-core and Azure Sphere. The company has pledged to invest $5 billion in IoT by 2022. The acquisition of ReFirm Labs, with its expertise in firmware security and the Centrifuge firmware platform to analyze and detect security issues, is a culmination of that [IoT] strategy, Weston said, and will enhance the companys chip-to-cloud protection capabilities.

ReFirm allows us to assess all the code running on the device and provide a security rating before you connect the device, Weston said. The tool is a a key piece of the missing puzzle to make it easier for organizations to feel comfortable about deploying IoT. Today, you plug [the device] into the Internet and you say YOLO, I hope everythings cool.'

ReFirm Labs develops the open source Binwalk firmware security analysis tool, which has been used by more than 50,000 organizations around the world to analyze thousands of IoT and embedded devices to identify firmware security issues. System builders and device owners use the tool to assess device risk by looking for known vulnerabilities that have not yet been patched, uncovering exposed secrets (security keys, tokens, and passwords), flagging default passwords, and detecting other security problems.

ReFirms tool gives the end users an easy way to determine the basic security posture of the device. The analyzer Weston called it essentially a drag and drop tool unpacks the device firmware and performs nested scans looking for security issues. The tool is capable of scanning all kinds of IoT and edge devices, regardless of who built it, such as smart light bulbs, cars, printers, smart refrigerators, or servers running edge applications. The tool returns an assessment report as well as a software bill of materials explaining what components were used.

Enterprises can use the assessment to understand whether the devices meet security and compliance requirements before deploying them in the environment. Once the devices are connected, IT teams can monitor them with Azure Defender for IoT. And Azure Device Update, IoTs version of Windows Update introduced six months ago, lets users apply patches.

Now the customers have pretty much everything they need: They can assess the device, they can monitor it, and they can update it on Patch Tuesday, just as if it was a Windows device, Weston said.

In the Windows world, IT teams rely on Qualys Cloud Platform or Tenables Nessus vulnerability scanner to assess the security of the network before applying all the Patch Tuesday updates. Now you can do the same thing with IoT devices, Weston said.

System builders people building devices to sell will be able to use the analyzer to show their devices are secure, which would boost buyer confidence in these devices.

Microsoft has a vision of getting 50 billion intelligent edge devices connected to Azure, empowering digital transformation and running AI applications on the edge. The security issues are just getting worse. A recent Microsoft survey of 1,000 security decision makers found that 83% had experienced some level of firmware security incident. The Department of Homeland Securitys Cybersecurity and Infrastructure Agency (CISA) called out an increase in the number of attacks against difficult-to-patch firmware at the RSA Conference just last month.

Integrating ReFirms technology into Azure Defender for IoT is just the first step, Weston said. It was important to give customers all the various capabilities but to keep complexity low. He envisioned a future where firmware scanning was available across the Microsoft portfolio. Were going to stitch it through everywhere it makes sense. Were going to integrate it into all the products that we can where we think we can help the user, Weston said.

Originally posted here:
Microsoft buys ReFirm Labs to boost IoT security with firmware analysis - VentureBeat

Read More..

Adventures in Contacting the Russian FSB Krebs on Security – Krebs on Security

KrebsOnSecurity recently had occasion to contact the Russian Federal Security Service (FSB), the Russian equivalent of the U.S. Federal Bureau of Investigation (FBI). In the process of doing so, I encountered a small snag: The FSBs website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware.

The FSB headquarters at Lubyanka Square, Moscow. Image: Wikipedia.

The reason I contacted the FSB one of the successor agencies to the Russian KGB ironically enough had to do with security concerns raised by an infamous Russian hacker about the FSBs own preferred method of being contacted.

KrebsOnSecurity was seeking comment from the FSB about a blog post published by Vladislav BadB Horohorin, a former international stolen credit card trafficker who served seven years in U.S. federal prison for his role in the theft of $9 million from RBS WorldPay in 2009. Horohorin, a citizen of Russia, Israel and Ukraine, is now back where he grew up in Ukraine, running a cybersecurity consulting business.

Horohorins BadB carding store, badb[.]biz, circa 2007. Image: Archive.org.

Visit the FSBs website and you might notice its web address starts with http:// instead of https://, meaning the site is not using an encryption certificate. In practical terms, any information shared between the visitor and the website is sent in plain text and will be visible to anyone who has access to that traffic.

This appears to be the case regardless of which Russian government site you visit. According to Russian search giant Yandex, the laws of the Russian Federation demand that encrypted connections be installed according to the Russian GOST cryptographic algorithm.

That means those who have a reason to send encrypted communications to a Russian government organization including ordinary things like making a payment for a government license or fine, or filing legal documents need to first install CryptoPro, a Windows-only application that loads the GOST encryption libraries on a users computer.

But if you want to talk directly to the FSB over an encrypted connection, you can just install their own client, which bundles the CryptoPro code. Visit the FSBs site and select the option to transfer meaningful information to operational units, and youll see a prompt to install a random number generation application that is needed before a specific contact form on the FSBs website will load properly.

Mind you, Im not suggesting anyone go do that: Horohorin pointed out that this random number generator was flagged by 20 different antivirus and security products as malicious.

Think well before contacting the FSB for any questions or dealing with them, and if you nevertheless decide to do this, it is better to use a virtual machine, Horohorin wrote. And a spacesuit. And, preferably, while in another country.

Antivirus product detections on the FSBs VPN software. Image: VirusTotal.

Its probably worth mentioning that the FSB is the same agency thats been sanctioned for malicious cyber activity by the U.S. government on multiple occasions over the past five years. According to the most recent sanctions by the U.S. Treasury Department, the FSB is known for recruiting criminal hackers from underground forums and offering them legal cover for their actions.

To bolster its malicious cyber operations, the FSB cultivates and co-opts criminal hackers, including the previously designated Evil Corp., enabling them to engage in disruptive ransomware attacks and phishing campaigns, reads a Treasury assessment from April 2021.

While Horohorin seems convinced the FSB is disseminating malware, it is not unusual for a large number of security tools used by VirusTotal or other similar malware sandbox services to incorrectly flag safe files as bad or suspicious an all-too-common condition known as a false positive.

Late last year I warned my followers on Twitter to put off installing updates for their Dell products until the company could explain why a bunch of its software drivers were being detected as malware by two dozen antivirus tools. Those all turned out to be false positives.

To really figure out what this FSB software was doing, I turned to Lance James, the founder of Unit221B, a New York City based cybersecurity firm. James said each download request generates a new executable program. That is because the uniqueness of the file itself is part of what makes the one-to-one encrypted connection possible.

Essentially it is like a temporary, one-time-use VPN, using a separate key for each download James said. The executable is the handshake with you to exchange keys, as it stores the key for that session in the exe. Its a terrible approach. But its what it is.

James said the FSBs program does not appear to be malware, at least in terms of the actions it takes on a users computer.

Theres no sign of actual trojan activity here except the fact it self deletes, James said. It uses GOST encryption, and [the antivirus products] may be thinking that those properties look like ransomware.

James says he suspects the antivirus false-positives were triggered by certain behaviors which could be construed as malware-like. The screenshot below from VirusTotal says some of the files contents align with detection rules made to find instances of ransomware.

Some of the malware detection rules triggered by the FSBs software. Source: VirusTotal.

Other detection rules tripped by this file include program routines that erase event logs from the users system a behavior often seen in malware that is trying to hide its tracks.

On a hunch that just including the GOST encryption routine in a test program might be enough to trigger false positives in VirusTotal, James wrote and compiled a short program in C++ that invoked the GOST cipher but otherwise had no networking components. He then uploaded the file for scanning at VirusTotal.

Even though James test program did nothing untoward or malicious, it was flagged by six antivirus engines as potentially hostile. Symantecs machine learning engine seemed particularly certain that James file might be bad, awarding it the threat name ML.Attribute.HighConfidence the same designation it assigned to the FSBs program.

KrebsOnSecurity installed the FSBs software on a test computer using a separate VPN, and straight away it connected to an Internet address currently assigned to the FSB (213.24.76.xxx).

The program prompted me to click on various parts of the screen to generate randomness for an encryption key, and when that was done it left a small window which explained in Russian that the connection was established and that I should visit a specific link on the FSBs site.

The FSBs random number generator in action.

Doing so opened up a page where I could leave a message for the FSB. I asked them if they had any response to their program being broadly flagged as malware.

The contact form that ultimately appeared after installing the FSBs software and clicking a specific link at fsb[.]ru.

After all the effort, Im disappointed to report that I have not yet received a reply. Nor did I hear back from S-Terra CSP, the company that makes the VPN software offered by the FSB.

James said that given their position, he could see why many antivirus products might think its malware.

Since they wont use our crypto and we wont use theirs, James said. Its a great explanation on political weirdness with crypto.

Still, James said, a number of things just dont make sense about the way the FSB has chosen to deploy its one-time VPN software.

The way they have set this up to suddenly trust a dynamically changing exe is still very concerning. Also, why would you send me a 256 random number generator seed in an exe when the computer has a perfectly valid and tested random number generator built in? Youre sending an exe to me with a key you decide over a non-secure environment. Why the fuck if youre a top intelligence agency would you do that?

Why indeed. I wonder how many people would share information about federal crimes with the FBI if the agency required everyone to install an executable file first to say nothing of one that looks a lot like ransomware to antivirus firms?

After doing this research, I learned the FSB recently launched a website that is only reachable via Tor, software that protects users anonymity by bouncing their traffic between different servers and encrypting the traffic at every step of the way. Unlike the FSBs clear web site, the agencys Tor site does not ask visitors to download some dodgy software before contacting them.

The application is running for a limited time to ensure your safety, the instructions for the FSBs random number generator assure, with just a gentle nudge of urgency. Do not forget to close the application when finished.

Yes, dont forget that. Also, do not forget to incinerate your computer when finished.

Excerpt from:
Adventures in Contacting the Russian FSB Krebs on Security - Krebs on Security

Read More..