************************ SPONSORED BY Bit9 ******************************* LIVE WEBCAST- Application Control: An Essential Endpoint Security Component. Learn why traditional antivirus techniques are fighting a losing battle against today's increasingly sophisticated malware threat landscape, and how application control is now an essential tool to combat malicious software. Register Today http://www.sans.org/info/122227 **************************************************************************** TRAINING UPDATE - - --SANS 2013 Orlando, FL March 8-March 15, 2013 46 courses. Bonus evening presentations include Why Our Defenses Are Failing Us: One Click Is All It Takes ...; Human Nature and Information Security: Irrational and Extraneous Factors That Matter; and Over-Zealous Social Media Investigations: Beware the Privacy Monster. http://www.sans.org/event/sans-2013
- - --North American Industrial Controls Systems and SCADA Summit 2013 Lake Buena Vista, FL February 6-13, 2013 The only technical security and training program in ICS security - for program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset owning and operating organizations along with control systems and security vendors who have innovative solutions for improving security. Every attendee leaves with new tools and techniques they can put to work immediately. 8 courses. Bonus evening presentation: The SANS SCADA Dinner Theater Players Present: From Exposure to Closure - Act III. http://www.sans.org/event/north-american-scada-2013
- - -- SANS Monterey 2013 Monterey, CA March 22-March 27, 2013 7 courses. Bonus evening presentations include Base64 Can Get You Pwned!; and The 13 Absolute Truths of Security. http://www.sans.org/event/monterey-2013
- - --Secure Canberra 2013 Canberra, Australia March 18 - March 23, 2013 Featuring Network Penetration Testing and Ethical Hacking and Computer Forensic Investigations - Windows In-Depth. https://www.sans.org/event/secure-canberra-2013
- - --SANS Northern Virginia 2013 Reston, VA April 8-April 13, 2013 7 courses. Bonus evening presentations include Infosec Rock Star: How to be a More Effective Security Professional; Pentesting Web Apps with Python; and Practical, Efficient Unix Auditing: With Scripts. http://www.sans.org/event/northern-virginia-2013
- - --SANS Cyber Guardian 2013 Baltimore, MD April 15-April 20, 2013 9 courses. Bonus evening presentations include Windows Exploratory Surgery with Process Hacker; Offensive Countermeasures, Active Defenses, and Internet Tough Guys; and Tactical SecOps: A Guide to Precision Security Operations. http://www.sans.org/event/cyber-guardian-2013
Plus New Delhi, Scottsdale, Brussels, Johannesburg, Abu Dhabi, and Seoul all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org/index.php ***************************************************************************
TOP OF THE NEWS
UK's ICO Fines Sony Over 2011 Data Breach (January 23 & 24, 2013)
Google's Response to Requests for Data is Dropping (January 23, 2013)
According to Google's semi-annual Transparency Report, governments' requests for information are on the rise. Since 2009, such requests have increased 70 percent worldwide. In the most recent six-month period, July-December 2012, Google received 21,389 requests for data from 33,634 user accounts. The report also shows that Google is responding to fewer requests. In the most recent period, Google responded to 88 percent of requests from the US government. In the previous period, that figure was 90 percent, down from 93 percent in the period prior to that. Worldwide, Google's response to requests globally has fallen over the past two years from 76 percent to 66 percent. In some countries, Google's response rates to governmental requests is approaching zero. The report also describes the different legal processes the governments use when making the requests. -http://www.wired.com/threatlevel/2013/01/google-says-get-a-warrant/ -http://news.cnet.com/8301-1009_3-57565385-83/u.s-leads-the-world-in-requests-for -users-google-data/ -http://www.informationweek.com/government/policy/google-sees-growing-government- demand-fo/240146808 Google Transparency Report: -https://www.google.com/transparencyreport/userdatarequests/US/ [Editor's Note (Murray): 33000 requests does not even include "national security letters," in part because these routine tools forbid the recipient to disclose them. That the government has not hauled Google into court when it pushes back suggests that, not only does it fear an adverse ruling, it fears the light of day. Use and abuse of the Internet by government will clearly get much worse before it gets better. There are now so many exceptions to the Fourth Amendment that it operates only by accident. ]
Judge Says Unprotected Wireless Network Still Affords Some Expectation of Privacy (January 23, 2013)
A federal judge in Oregon has granted a defendant's motion to suppress evidence gathered by police as well as his subsequent testimony because the evidence was obtained illegally. A neighbor who was inadvertently connected to the John Henry Ahrndt's unprotected wireless home network discovered that Ahrndt had inadvertently made available for sharing a user library that appeared to contain incriminating evidence. The neighbor contacted law enforcement authorities. When a deputy saw the list of files, he asked the neighbor to open one of them, which revealed the offending content. Ahrndt was initially sentenced to 10 years in prison for possession of child pornography, but the US Court of Appeals for the Ninth Circuit reversed that ruling. The judge said that Ahrndt still had a reasonable expectation of privacy, albeit somewhat diminished by his failure to protect his wireless network. The judge said that simply viewing the list of filenames did not violate Ahrndt's rights, but added that it was unlikely that the list of filenames would have been sufficient to issue a probable cause warrant. -http://www.computerworld.com/s/article/9236036/Exposure_of_files_on_unsecured_wi reless_no_excuse_to_search_judge_rules?taxonomyId=17 [Editor's Note (Pescatore): A long legal history behind this one. Just because someone doesn't pull the shades all the way down on a window does *not* mean Peeping Toms have open license. (Northcutt): I am setting a Google alert because this might set be an important precedent in case law. Why do the big ones seem to involve kiddie porn so often; sad? In any case here is the guilty plea and an article that raises some of the issues of the case: -http://www.docstoc.com/docs/101576658/pleaded-guilty---Wiredcom -http://www.privatewifi.com/using-unsecured-wifi-networks-could-jeopardize-your-c onstitutional-right-to-privacy/]
************************ Sponsored Links: ******************************* 1) SANS Survey on SCADA Security results revealed by SCADA expert, Matt Luallen, Wed, Feb. 20. 1PM EDT. http://www.sans.org/info/122232 2) Take the SANS Survey on Help Desk Security! Enter to win an iPad 4! http://www.sans.org/info/122237 3) Are You Ready for the Cyber Readiness Challenge? Join the competition to win prizes! Register: http://www.sans.org/info/122425 *****************************************************************************
THE REST OF THE WEEK'S NEWS
Hardcoded Backdoors in Barracuda Gear (January 24, 2013)
HP's JetDirect Software Makes Networked Printers Vulnerable (January 23, 2103)
Vulnerabilities in Hewlett-Packard's (HP's) JetDirect software could allow attackers to circumvent biometric and other security protections to access partially printed documents and crash all machines running the vulnerable software that are connected to the network. The software is used in internal, external, and embedded print servers from many manufacturers, not just HP. It is designed to manage print requests made through networks. -http://www.informationweek.com/security/vulnerabilities/security-flaws-leave-net worked-printers/240146805
Stanford Medical Facility Suffers Another Data Security Breach (January 23, 2013)
The Lucile Packard Children's Hospital at Stanford University has notified 57,000 patients that their personal information was compromised after an unencrypted laptop containing the data was stolen from a doctor's car. The theft occurred on January 9, 2013, and was reported to the hospital the following day. The incident is the fourth data security breach involving a Stanford medical facility since January 2010. -http://www.healthcareitnews.com/news/fourth-hipaa-breach-involving-stanford-u
US Legislator Promises Net Neutrality Bill if Court Overturns FCC Rules (January 22 & 23, 2013)
US Representative Anna Eshoo (D-California) said earlier this week that if a federal court overturns the Federal Communications Commission's (FCC's) net neutrality rules, she will introduce a bill to 'ensure a free and open Internet.' Eshoo is the ranking member of the House Energy and Commerce Committee's Communications and Technology Subcommittee. Verizon Communications is challenging the FCC's rules. The US Court of Appeals for the District of Columbia Circuit is considering that lawsuit and will likely issue a decision later this year. -http://www.bna.com/eshoo-offer-net-n17179871971/ -http://thehill.com/blogs/hillicon-valley/technology/278493-democrat-vows-to-push -net-neutrality-bill-if-fcc-rules-overturned [Editor's Note (Murray): Even the FCC caved to AT&T and Verizon on the wireless side, where "net neutrality" is really important. It is ludicrous to think that this broken Congress can legislate against them. Even on the wired side, any legislation is likely to look like the tax code or Obama Care. Good public policy is now bad politics. ]
Putin Orders Federal Security Service to Take Steps to Protect Systems (January 21, 2013)
After learning that the Red October cyberespionage campaign had infiltrated Russian government and embassy computer systems, Russia's president, Vladimir Putin, ordered the country's Federal Security Service (FSB) to "create a state system for the detection, prevention, and liquidation of the effects of computer attacks on the information resources of the Russian Federation." -http://www.reuters.com/article/2013/01/21/russia-cyber-security-putin-idINDEE90K 0AZ20130121
John Pescatore was Vice President at Gartner Inc. for fourteen years. He became a director of the SANS Institute in 2013. He has worked in computer and network security since 1978 including time at the NSA and the U.S. Secret Service.
Shawn Henry recently retired as FBI Executive Assistant Director responsible for all criminal and cyber programs and investigations worldwide, as well as international operations and the FBI's critical incident response. He is now president of CrowdStrike Services.
Stephen Northcutt founded the GIAC certification and is President of STI, the premier skills-based cyber security graduate school, www.sans.edu.
Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.
Ed Skoudis is co-founder of CounterHack, the nation's top producer of cyber ranges, simulations, and competitive challenges, now used from high schools to the Air Force. He is also author and lead instructor of the SANS Hacker Exploits and Incident Handling course, and Penetration Testing course..
William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.
Michael Assante was Vice President and Chief Security Officer at NERC, led a key control systems group at Idaho National Labs, and was Vice President and Chief Security Officer for American Electric Power.
Sean McBride is Director of Analysis and co-founder of Critical Intelligence, and, while at Idaho National Laboratory, he initiated the situational awareness effort that became the ICS-CERT.
Rob Lee is the curriculum lead instructor for the SANS Institute's computer forensic courses (computer-forensics.sans.org) and a Director at the incident response company Mandiant.
Tom Liston is a Senior Security Consultant and Malware Analyst for Inguardians, a handler for the SANS Institute's Internet Storm Center, and co-author of the book Counter Hack Reloaded.
Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.
Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He is leading SANS' global initiative to improve application security.
David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.
Gal Shpantzer is a trusted advisor to CSOs of large corporations, technology startups, Ivy League universities and non-profits specializing in critical infrastructure protection. Gal created the Security Outliers project in 2009, focusing on the role of culture in risk management outcomes and contributes to the Infosec Burnout project.
Alan Paller is director of research at the SANS Institute.
Brian Honan is an independent security consultant based in Dublin, Ireland.
David Turley is SANS infrastructure manager and serves as production manager and final editor on SANS NewsBites.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account/
SANS is the ultimate security training program, bar none. It is the most intensive and informative security conference available. It's a must have for infosec professionals. -Aaron Despain, TriWest Healthcare Alliance