The security community has been buzzing over Lenovo's gaff of including Superfish Adware with their Lenovo laptops. Superfish comes pre-installed with a compromised root CA, which is by default installed into the trusted certificate store of system web browsers.
Welcome to the Network Security website at the IAS
This website is intended to bring you the latest news, how to's, tools and resources in Information Security. Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.
The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute. For a description of these principles, please see our About section.
In keeping with the spirit of the Institute, I encourage questions and open discussions about security. And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.
Brian Epstein <email@example.com>
Why is Google Chrome complaining about my certificate?
A recent update to Google Chrome is now warning users that certificates do not have public audit records. They put a yellow triangle over the normal lock display in the location bar and give a somewhat confusing explanation.
Although November is here, let's not forget the many lessons we learned this year from CyberSecurity Awareness Month (CSAM). The majority of issues I spoke about related to technologies that are dead, or should be dying in the 2014 Tech Obituaries section of my talk. Here are the highlights of what technology died (or should have) over the last year.
Shellshock, a Bash Code Injection Vulnerability
In late September, 2014, a bug was released to the public in the popular Linux/Mac shell called bash. For those that aren't familiar, the shell is the black box that some computer folks seem to spend a lot of time in typing archane commands to magically fix the computer.
A flurry of information is coming out about the Heartbleed vulnerability that is affecting Internet websites everywhere. As the Information Security Officer at the Institute for Advanced Study (IAS), I worked closely with the Computing Groups across our campus to secure our services.
As you may have heard from news reports (such as http://www.washingtonpost.com/news/morning-mix/wp/2014/04/09/heartbleed-...), a major Internet security vulnerability, known as Heartbleed, was disclosed earlier this week.
If you are confused as to what will happen when Microsoft stops supporting XP, now's the time look into it. wsj.com put together a very good video explaining the implications of hiding from this issue.
This is a story right out of the privacy tome of nightmares. It reminds me of a recent talk by Mikko Hyppönen where he states that "George Orwell was an optimist" (Living in a surveillance state).
A blogger by the name of DoctorBeet posted a story of his LG Smart TV taking note of his watching habits and attempting to send them over the Internet for targeted ads or other nefarious reasons. What's worse, is it was sending information about the USB stick that he put into the TV.
Martin Lee, the Threat Intelligence Technical Lead over at Cisco, posted a fascinating article about the dangers of clicking on links when tired. There has recently been a campaign telling people that driving tired is as bad or worse than driving drunk, and now it seems that clicking tired is also on the track of bad things to do.