Expoilts & Vulnerabilities

Get a New Center of Information Systems Security in Mexico

Posted on Updated on

Information Security requires the combination of people, process, and technology. Each of the people, process, and technology should be managed considering the capabilities & limitations of the other. When the components should be considered in total and they should provide a adequate overall risk mitigation for any organization. Information security strategies encompass prevention, detection, and response, and all three are needed for a comprehensive and robust Information security framework. Most information security strategies focus on prevention. Prevention addresses the possibility of harm. Detection and response are generally used to limit damage once a security breech has occurred. Weaknesses in the prevention parameter may be counterbalance by strengths in detection and response. Information system security Mexico strategies should establish limitations on the access and limitations on the ability to perform unauthorized actions. All hese limitations are derived from concepts known as security domains, least privileges and least permissions.
information systems security mexico
The formation of security domains involves designing a network solution so that users and network resources are grouped in a logical/physical manner & control are established to mitigate the risks related to every individual domain. At the network level, the connectivity among network areas may be disabled, or tightly restricted through perimeters. The tools used are firewalls, virtual local area networks (VLANs), access control lists (ACLs) in routers, and directories. The tools allow for limitations on access and authorizations at the network layer and application layers. The concepts of least permissions and least privileges are used to provide functionality while limiting the potentially harmful actions. It involves restricting authorizations at the network, server, and client level. For example, a user is allowed to access certain network resources and the same user is denied access to access the other network resource.
Another example could be that A user is allowed access to some file and is not allowed access to others. A program could also be allowed access to some of a network’s resources and disallowed access to others. Authorization for users is managed by assigning a user to a group, and granting permissions to the group. Financial organizations should design multiple layers of security controls to establish several layers of defense between the attacker and the asset being attacked. The layers should be at multiple control points throughout the communication and transactional flow and should include both systems and manual processes. At Webimprints, an Information security services company Delhi we take care of the above mentioned concepts while offering information security services.

Iicybersecurity – Having an Expert Trainer for Information Security Classes Mexico

Posted on

What is a 2AV technique? It is ANTI ANTI-VIRUS TECHNIQUES; whenever we talk about information security we start thinking about viruses, worm and other threats. Let us talk about information security basic concepts on -ANIT-ANTI-VIRUS TECHNIQUES. Anti-virus software does up to three major jobs:

Detection: Detecting whether or not some code is a virus or not which, in the purest form of detection, results in a Boolean value: yes, this code is infected, or no, this code is not infected. Ultimately, detection is a losing game.
Identification: Once a virus is detected, which virus is it? The identification process may be distinct from detection, or identification may occur as a side effect of the detection method being used.
Disinfection: Disinfection is the process of removing detected viruses; this is sometimes called cleaning. Normally a virus would need to be precisely identified in order to perform disinfection.

All viruses self-replicate, but not all viruses act in an openly hostile way towards anti-virus software. Anti anti-virus techniques are techniques used by viruses which do one of three things:
• 1 Aggressively attack anti-virus software.
• 2 Try to make analysis difficult for anti-virus researchers.
• 3 Try to avoid being detected by anti-virus software, using knowledge of how anti-virus software works.
The lack of clear definitions in this field comes into play again: arguably, any of the encryption methods is an attempt to achieve the latter two goals.

International Institute Cyber Security in Mexico is international brand institute for all type of data security information and it also provided global information security services inside the world. It is working for many sector such as consulting & outsourcing security, aviation, defense and other government department in many country. This company provided 100% placement assistance through its dedicated placement cell and dedicated student service.

To further confuse matters, “anti-anti-virus” is different from “anti-virus virus.” Anti-virus virus has been used variously to describe: a virus that attacks other viruses; anti-virus software that propagates itself through viral means; software which drops viruses on a machine, then offers to sell “anti-virus” software to remove the viruses it put there. Back to the relatively well-defined anti-anti-virus, this includes seven techniques:
Retroviruses, entry point obfuscation, anti-emulation, armoring, tunneling, integrity checker attacks, and avoidance. To understand more on the above techniques easily. Information Security Classes Mexico is working to help people understand Information security concepts. For any query just fill up enquiry form and our expert very happy to reply your query.

For more info please visit: http://www.iicybersecurity.com

Backdoor in RSA algorithm

Posted on Updated on

EMC-owned RSA Security has denied reports that the company had entered into secret contracts with the NSA worth $10 million to use the flaws Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) as the default pseudorandom number generator for the company’s encryptions products.

Over the weekend, sources told Reuters that as part of the US National Security Agency’s (NSA) efforts to promote Dual_EC_DRBG, the use of the algorithm by RSA allowed the agency to point to its usage within government to help push for its inclusion in the National Institute of Standards and Technology’s Recommendation for Random Number Generation Using Deterministic Random Bit Generators (PDF).

“Recent press coverage has asserted that RSA entered into a ‘secret contract’ with the NSA to incorporate a known flawed random number generator into its BSAFE encryption libraries. We categorically deny this allegation,” RSA responded today in a blog post.

RSA said it made the decision to use Dual_EC_DRBG as the default in 2004, and that the algorithm was only one of a number of algorithms available to its users.



International Institute of Cyber Security

“RSA, as a security company, never divulges details of customer engagements, but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA’s products, or introducing potential ‘backdoors’ into our products for anyone’s use,” the company said.

Dual_EC_DRBG has been under fire as a questionable cryptographic algorithm for much of its existence. In November 2007, security expert Bruce Schneier detailed the flaws in the algorithm’s use of secret constants.

“If you know the secret numbers, you can predict the output of the random number generator after collecting just 32 bytes of its output,” Schneier wrote.

“To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.”

In September, the National Institute of Standards and Technology (NIST) recommended against the use (PDF) of Dual_EC_DRBG. Following that recommendation, RSA did the same. Memos from the documents released by Edward Snowden, and seen by The New York Times, said that Dual_EC_DRBG contained a backdoor for the NSA.

Target hacked: 40 million card accounts breached

Posted on Updated on

Target is grappling with a data security nightmare that threatens to drive off holiday shoppers during the company’s busiest time of year.

The nation’s second largest discounter said Thursday that data connected to about 40 million credit and debit card accounts was stolen as part of a breach that began over the Thanksgiving weekend.

The data theft marks the second largest credit card breach in the U.S. after retailer TJX announced in 2007 that at least 45.7 million credit and debit card users were exposed to credit card fraud.

Target’s acknowledgement came a day after news reports surfaced that the discounter was investigating a breach.

The chain said customers who made purchases by swiping their cards at terminals in its U.S. stores between Nov. 27 and Dec. 15 may have had their accounts exposed. The stolen data includes customer names, credit and debit card numbers, card expiration dates and the three-digit security codes located on the backs of cards.

The data breach did not affect online purchases, the company said.

The stolen information included Target store brand cards and major card brands such as Visa and MasterCard.

The Minneapolis company, which has 1,797 stores in the U.S. and 124 in Canada, said it immediately told authorities and financial institutions once it became aware of the breach on Dec. 15. The company is teaming with a third-party forensics firm to investigate and prevent future breaches.

The breach is the latest in a series of technology crises for Target. The company faced tough criticism in late 2011 after it drummed up hype around its offerings from Italian designer Missoni only to see its website crash. The site was down most of the day the designer’s collection launched. The company angered customers further with numerous online delays for products and even order cancellations.

But the credit card breach poses an even more serious problem for Target and threatens to scare away shoppers who worry about the safety of their personal data.

“A data breach is of itself a huge reputational issue,” said Jeremy Robinson-Leon, a principal at Group Gordon, a corporate and crisis public relations firm. He noted that Target needs to send the message that it’s rectifying the problem and working with customers to answer questions. He believes Target should have acknowledged the problem on Wednesday rather than waiting until early Thursday.

“This is close to the worst time to have it happen,” Robinson-Leon said. “If I am a Target customer, I think I would be much more likely to go to a competitor over the next few days, rather than risk the potential to have my information be compromised.”
Target advised customers on Thursday to check their statements carefully. Those who see suspicious charges on the cards should report it to their credit card companies and call Target at 866-852-8680. Cases of identity theft can also be reported to law enforcement or the Federal Trade Commission.

“Target’s first priority is preserving the trust of our guests and we have moved swiftly to address this issue, so guests can shop with confidence. We regret any inconvenience this may cause,” Chairman, President and CEO Gregg Steinhafel said in a statement Thursday.

Many displeased Target customers left angry comments on the company’s Facebook page. Some threatened to stop shopping at the store. Many customers complained they couldn’t get through to the call center and couldn’t get on Target’s branded credit card website. Target apologized on its Facebook page and said it is “working hard” to resolve the issue and is adding more workers to field the calls and help solve website issues.

Christopher Browning, 23 of Chesterfield, Va., said was the victim of credit card fraud earlier this week and he believes it was tied to a purchase he made at Target with his Visa card on Black Friday. However, he called Visa Thursday and the card issuer couldn’t confirm. He says he hasn’t been able to get through Target’s call center.

On Monday, Browning received a call from his bank’s anti-fraud unit saying that there were two attempts to use his credit card in California — one at a casino in Tracey, Calif. for $8,000 and the other at a casino in Pacheco, for $3,000. Both occurred on Sunday and both were denied. He canceled his credit card and plans to use cash. Although Browning has no proof, he says he believes the fraud was tied to his Black Friday purchase at Target.

“I won’t shop at Target again until the people behind this theft are caught or the reasons for the breach are identified and fixed,” said Browning.

Brianna Byrnes, 22, of Kansas City, Mo., a student at the University of Missouri-Kansas City and a call center worker, said she made a Target purchase during the affected period.

She said the situation made her “a little bit” nervous but was still planning to shop for toys at the retailer.

“I’ve never had anyone steal my identity. I guess it’s taking a risk.”

In Wednesday morning’s trading, Target’s stock dipped $1.15, or 1.8 percent, to $62.40.

The incident is particularly troublesome for Target because it has used its branded credit and debit cards as a marketing tool to lure shoppers with a 5 percent discount.

The company said during its earnings call in November that as of October some 20 percent of store customers have the Target branded cards. In fact, households that activate a Target-branded card have increased their spending at the store by about 50 percent on average, the company said.

“This is how Target is getting more customers in the stores,” said Brian Sozzi, CEO and Chief Equities Strategist. “It’s telling people to use the card. It’s been a big win. If they lose that trust, that person goes to Wal-Mart.”


International Institute of Cyber Security

Hackers rusos robaron datos de identificación de los 54 millones de ciudadanos turcos:

Posted on Updated on


Hackers rusos han incautado ‘datos de identificación porque los partidos políticos de Turquía y de la Comisión Suprema Electoral (YSK) comparten los votantes del país “54 millones de ciudadanos turcos información personal, un gerente prominente compañía de investigación ha dicho.

“He oído hablar de él. Los hackers en Rusia tienen números de ID de 54 millones de ciudadanos turcos, direcciones, nombres de padre “, el gerente general de la empresa de investigación de KONDA, Bekir Ağırdır, dijo la semana pasada en Ankara en una reunión para evaluar las próximas elecciones locales en el país, según un informe el portal de noticias en línea T24.

Ağırdır también dijo que algunas partes no tienen un sistema anti-virus, pero cargado de información todos los electores en línea y “en dos horas hackers descargado toda la información.”

Ana Bella
Instituto Internacional de Seguridad Cibernética
International Institute of Cyber Security


Posted on


Microsoft has confirmed they will be issuing a patch for a TIFF zero-day flaw in its GDI+ graphics component that is known to have been actively exploited in targeted attacks using tainted Word documents sent by to victims via email since early November.

“This is yet another TIFF exploit. The TIFF format seems all but irrelevant to end users but, hardly a month which passes without a CVE stemming from TIFF parsing,” said Craig Young, a vulnerability researcher for Tripwire.

The zero-day flaw is present in many older versions of Microsoft products, such as Windows Vista, Windows Server and Office 2003 through 2010, and security experts believe some of those older versions should be retired.

“Microsoft needs to become more aggressive with their end of life policies. Users should not still be running Office 2003, Office 2007, Windows XP, and Windows Server 2003,” Reguly said. If you removed that software, this zero-day would not exist. If it’s more than 5 years old, it’s probably time to end support.”

Microsoft had released a temporary Fix it workaround that would block the attack by changing the configuration on the computer to prevent the rendering of the vulnerable graphic format, but it does not mitigate the vulnerability itself.

Not on the patch list for this week is a zero-day vulnerability in Windows XP and Windows Server 2003 is being actively exploited in the wild in order to bypass the sandbox in unpatched versions of Adobe Reader 9.5.4, 10.1.6, 11.0.02 and prior on Windows XP SP3.

Microsoft stated that they plan to mitigate the vulnerability either with a Patch Tuesday release or by way of an an out-of-cycle security update, depending on the results of their investigation, and it now appears that the fix will pushed off until next year.

Users are encouraged to upgrade from the archaic Windows XP operating system in favor of Windows 7 or 8, and should ensure they are running the latest versions of Adobe Reader.