Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all 12749 articles
Browse latest View live

Apache Security File Permissions

$
0
0

I'm trying to figure out what is the best file permissions/user/groups for files under my document root?

I have the following file structure

/home/user/public_html/

under public_html are all of my php files and directories.

I have one directory /home/user/public_html/files/ where people upload images to that directory.

What is the most secure way to distribute file permissions/groups/user so that apache can properly display the php files and directories?

Should I make public_html owned by apache? What group should I use for public_html ?

thanks!

My Favourite mix of permissions for apache is to give it ownership of apache:apache, all folders chmod to 550 or 555, and all files chmod to 440/444. I suggest the following:

/home/user/public_html/ owned by apache:apache with permissions 555 (read/x by everyone) /home/user/public_html/files/ owned by apache:apache with 775 (read/write/x by root/apache, read/x by all)


私募股权公司Thoma Bravo拟42亿美元收购安全软件创企McAfee

$
0
0
【猎云网(微信号:)】12月16日报道(编译:福尔摩望)

据知情人士透露,私募股权公司Thoma Bravo早前正在与TPG和英特尔就收购安全软件公司McAfee进行谈判,出价高于McAfee 2016年42亿美元的估值。

该知情人士表示,谈判可能仍然会破裂,并且不会很快宣布达成协议。

McAfee由John McAfee于1987年创立,一直以来致力于为个人计算机和服务器开发网络安全软件,保护用户免受恶意软件和其他病毒的侵害。这一类型的计算机安全防止了对个人设备的攻击。最近,随着黑客攻击范围的变化,该公司已经将计算机安全业务扩展到了移动设备和云计算领域。

2010年,英特尔以76亿美元的价格收购了该公司。这家芯片制造商希望将其芯片与McAfee的安全技术紧密结合。对于英特尔而言,这一愿景并未实现。于是,该公司在2016年宣布的一项交易中,以42亿美元的估值,将其51%的股份出售给TPG,收回了超过30亿美元的资金。几个月后,TPG又邀请Thoma Bravo进行了少数股权投资。

通过附加收购,TPG利用其多数股权,在不到两年的时间内帮助McAfee实现业务转型。今年1月,McAfee完成了对Skyhigh Networks的收购,Skyhigh Networks帮助企业监控员工正在使用的云服务。今年3月,该公司还收购了Tunnelbear,后者通过提供虚拟专用网络,可在使用共享WiFi帐户时保护数据。

据一位知情人士透露,英特尔现在认为自己纯粹只是McAfee的财务投资者。尽管如此,英特尔还是通过持有的少数股权,参与了McAfee近期的收购活动。而且,如果Thoma Bravo的交易未能达成,它还可以弥补部分失去的价值。两位知情人士都表示,这笔交易将统一McAfee的所有权,并可能使其再次上市。

路透社曾于11月报道称,Thoma Bravo已经接触了Symantec,并提出了收购要约。一位知情人士表示,McAfee交易将排除Symantec收购的可能性。

TPG和英特尔的发言人拒绝发表评论。Thoma Bravo发言人尚未回复置评请求。

网络安全和物联网:生物识别技术的时代到了

$
0
0

物联网(IoT)正在快速发展,连网设备和白色家电正以前所未有的速度进入我们的家庭和工作场所。

现在,由于Wi-F的出现,我们曾经认为是白色家电的东西正变得越来越互联和“聪明”。现在可以订购比萨、给冰箱填充食物,并下载电影观看,所有这些都可以在十分钟内完成,而且还不用离开舒适慵懒的沙发――利用物联网技术,幸福吧!

毫无疑问,物联网让生活变得更简单,无需再去商店或与他人争夺仅有的停车位,或者拎着满满的购物袋在大街上蹒跚。

物联网让我们每天都可以将重要又普通的事务委托给连网设备,让我们可以自由地专注生活中更复杂和更有趣的事情。如果您的冰箱可以自动购牛奶(如果它还没有,您很有可能需要在适当的时候拥有一台智能冰箱),那么在忙碌的现代生活中,或下班回家路上您就可以少考虑家庭琐事。

然而,就像大多数好消息一样,物联网也有一些注意事项,其中最主要的是网络安全问题。


网络安全和物联网:生物识别技术的时代到了
谁向您的账户收费?

要让连网设备代表您采取行动,无论是当您的智能冰箱重新订购牛奶时付款,还是允许或拒绝孩子下载或观看特定节目的智能电视,都必须有一个认证过程。换句话说,设备或提供商必须确保提出请求的人是正确的,就像传统上使用银行卡时一样。

您的智能冰箱必须确保是您刚刚订购了香槟和鱼子酱,并要求将费用记在您的账户/卡上,而不是您家的小孩、清洁工,或者侵入您冰箱进行欺诈交易的人。

我们也不要忘记,您的制造商或服务提供商必须确保这是一台真正的冰箱,并且它属于您,这样它才能知道它正在和正确的电器通信。毕竟,制造商需要能够认证它是正确的冰箱,接收来自正确的人的请求,以及认证付款。

作为一个习惯于认证交易的社会,它每天都在发生。通常,这个过程涉及一个PIN码或者密码――例如,当我们在商店中使用信用卡或查看我们银行卡余额时。问题是,我们知道这些身份验证方法已不再适用,例如,犯罪分子可能很容易猜测到或发现PIN码,而密码也经常被泄露。

事实上,不断重复的建议是,密码必须是独特的、复杂的。举一个例子,说明了为什么这种身份验证方法已经过时:如果预测正确,到2020年,将有超过200亿台设备连接到物联网,并且很大一部分设备将与支付直接相关。这将为网络罪犯分子提供了多达200亿的机会,尤其是当这些设备依赖于过时的身份验证协议时。

答案就在您的指尖

为了保护我们珍惜的东西,我们需要更高级别的认证,这对我们来说完全是跟个人有关的,不可能复制的。生物识别技术就是物联网的答案。

智能产品制造商必须将指纹传感器嵌入连网设备中,这样认证就可以在现场进行,而不用将信息发送到网络空间。

用于身份验证的本地存储的生物识别数据实际上不可能被犯罪分子入侵或拦截,并且任何人都无法亲自复制。唯一能够认证涉及生物识别的行为、许可或交易的人,一定是其指纹作为记录保存在设备上的人。

生物识别身份验证将消除人们目前对设备丢失或被盗,甚至被出售的担忧。使用生物识别技术进行身份验证,将为用户提供真正个性化且安全的物联网体验。

毕竟,如果有人要从家里的智能冰箱订购几瓶香槟和一公斤鱼子酱,难道您不想确定那个人就是您吗?

Alexa can control your home security system

$
0
0

It's now decidedly easier to control yourhome security system if you have anEcho speaker or another Alexa-powered gadget. Amazon has enabled a Security Panel Controller framework that lets you control security systems with your voice. You can arm or disarm them, specify certain modes (home, away and night) and simply check in. And yes, Amazon is well aware of the security implications. You have to manually enable disarming by voice, and you can specify an Alexa-specific voice code instead of shouting your PIN code to everyone within earshot.

2018年最烂密码榜单公布:第一名还是123456

$
0
0

密码服务公司 SplashData 本周公布了 2018 年度最烂密码排行榜,这些密码来自今年在互联网上泄露的 500 多万个密码。与前几年一样,2018 年也发生了一些备受瞩目的数据泄露事件,但许多人仍继续在自己的在线账户上使用容易猜测的密码。


2018年最烂密码榜单公布:第一名还是123456

“123456”和“password(密码)”连续第 5 年成为网上最常见的两个密码。今年上榜的新词包括“111111”、“sunshine(阳光)”、“princess(公主)”、“666666”和“654321”。另外,美国现任总统te lang pu 的名字“donald(唐纳德)”也出现在榜单中,排在第 23 位。

SplashData 首席执行官摩根斯兰(Morgan smash)在谈到这一排行榜时表示:“黑客们在使用名人名字、流行文化和体育词汇、以及简单的键盘模式入侵网络账户方面取得了巨大成功,因为他们知道很多人都在使用这些容易记住的组合。”

以下是 SplashData 列出的 2018 年十大最烂密码:

1) 123456

2) password

3) 123456789

4) 12345678

5) 12345

6) 111111

7) 1234567

8) sunshine

9) qwerty

10) iloveyou

正如斯兰解释的那样,对任何在线账户使用这些超级简单的短语都不是一个好主意,因为黑客很容易就能猜到。“我们希望通过每年发布这份清单来说服人们采取措施保护自己,”斯兰说,“所有的风险都是已知的,人们年复一年地把自己置于这样的风险之下,这真是令人头疼。”

SplashData 估计,今年共有近 10% 的人至少使用过 25 个最烂密码中的一个,近 3% 的人曾经使用过“123456”。泄露的 500 万个密码中,大部分来自北美和西欧的用户。

为了帮助用户保持安全,SplashData 表示,他们的密码不应少于 12 个字符,而且使用混合字符。每次登录都应该有一个不同的密码,人们应该使用一个密码管理应用程序来存储所有密码,并生成随机的新密码,自动登录是一个不错的主意,比如 iOS 12 引入的密码自动填充功能。 返回搜狐,查看更多

责任编辑:

UK smart device rules 'need more bite'

$
0
0

UK smart device rules 'need more bite'
Image copyright AFP Image caption UK homes have an average of 10 smart devices, including toys such as internet-connected My Friend Cayla

The UK government has announced guidelines to make internet-connected devices safer to use following a spate of security breaches.

It includes moves to make sure passwords are unique and not resettable to a factory default and that sensitive data transmitted via apps is encrypted.

But the guidelines are not binding, leading some to question how effective they will be.

One expert said they would not stop "irresponsible" manufacturers.

As well as the stricter guidance on passwords and recommended encryption, the government's Security by Design review suggested:

Device manufacturers have a point of contact so that security researchers can report issues immediately Software should be updated automatically with clear guidance for customers It should be easy for consumers to delete personal data Installation and maintenance should be easy for consumers

The government estimates that every household in the UK owns at least 10 internet-connected devices - a figure that is expected to rise to 15 by 2020.

In Germany there is a ban on the sale of smartwatches aimed at children, and the internet-connected doll My Friend Cayla over fears that both could act as spying devices.

'Fast and loose'

Ken Munro, an analyst at security firm Pen Test Partners, said of the review: "It's a good start but misses too much to be of great use."

He said: "Responsible IoT (internet of things) manufacturers are already addressing security. It's the irresponsible manufacturers who aren't interested, don't care about our security or who refuse security on grounds of cost that we need to worry about.

"Without 'teeth', this standard is meaningless. Manufacturers who already play fast and loose with our security to make a quick buck from us won't change anything."

Mr Munro also revealed that the measures suggested would not have prevented many of the recently reported security breaches of smart devices, such as the Mirai botnet that used internet-connected devices - such as CCTV cameras and printers - to attack popular websites.

In response, a spokesperson for the National Cyber Security Centre, which worked on the code of practice, said: "The Mirai botnet malware is one of many attacks that would be better defended against by following our new guidance, such as automatic updates and setting unique default passwords.

"By implementing vulnerability disclosure policies, manufacturers will also improve identification and resolution of issues, allowing consumers to receive timely updates that protect their privacy and security against new threats."

Germany bans children's smartwatches Smart home devices used as weapons in website attack How hackers could use doll to open your front door

Margot James, minister for digital and the creative industries, said: "We want everyone to benefit from the huge potential of internet-connected devices, and it is important they are safe and have a positive impact on people's lives.

"We have worked alongside industry to develop a tough new set of rules so strong security measures are built into everyday technology from the moment it is developed."

Analysis: By Rory Cellan-Jones, technology correspondent

From internet-connected dolls that can be taught to swear to webcams that can be hacked and enlisted in a botnet, the dangers of this new world where everything is online are becoming evident.

What is not so clear is whether this new voluntary code of practice will make any difference.

The key word is voluntary. The kind of manufacturers who will sign up to a code are probably pretty responsible already but there are plenty of others whose only aim is to pile their insecure products high and sell them cheap.

The new policy will work only if online retailers refuse to stock products that do not comply with the code - yet DCMS (Department for Digital, Culture, Media and Sport) cannot even say whether Amazon is involved in this initiative.

Still, the consumer group Which? has backed the code as a good first step, pleased that there is at least an effort to define what makes a good secure product.

Now there will be pressure to give it some teeth by amending consumer protection laws to deal with this new threat to our security.

Problem deleting VPC and network interface

$
0
0

I am trying to delete aws vpc (a non default one). I am getting error that "We could not delete the following VPC (vpc-xxxxxxx (xx.xx.xx.x/16)) Network interface 'eni-xxxxxx' is currently in use. (Service: AmazonEC2; Status Code: 400; Error Code: InvalidParameterValue; Request ID: xxxxxx-dd86-47c8-98cd-xxxxxxxxxxx)".

When I tried deleting the related Network Interface, I got error "eni-xxxxxxx: You do not have permission to access the specified resource."

There are security groups associated with the NI (network interface). There are subnets associated with the NI. There are no EC2 instances - all are terminated. There are no VPC endpoints. There are no RDS db, db security group or subnets.

For EC2 SG (security groups), I am getting permission denied error message while trying to delete (even the non default SG against the non-default VPC. This SG has description of "AWS created security group for d-xxxxxxxxxx directory controllers".

For subnets, I am not able to delete them because they are associated with the above mentioned NI.

Can someone help? I have a free tier account and hence even dont have technical support or neither able to post new thread in aws forums (getting error message - Your account is not ready for posting messages yet. Please try again later). I fear this is because I have a free tier account.

Thanks

Sujoy

Check 2 things.

If you have a VPC Elastic IP Address you created in the VPC you are trying to delete. Check if you created a AWS ELB in the VPC.

Delete above two resources if present then you will be able to delete the VPC.

Canada gets access to detainee in China 6 days after arrest

$
0
0

Canada gets access to detainee in China 6 days after arrest
Canada gets access to detainee in China 6 days after arrest
Canada gets access to detainee in China 6 days after arrest

1 / 5

FILE - In this Sept. 26, 2018, file photo, visitors look at a display for 5G wireless technology from Chinese technology firm Huawei at the PT Expo in Beijing. While a Huawei executive faces possible U.S. charges over trade with Iran, the Chinese tech giant's ambition to be a leader in next-generation telecoms is colliding with security worries abroad. (AP Photo/Mark Schiefelbein, File)

FILE - In this Sept. 26, 2018, file photo, visitors look at a display for 5G wireless technology from Chinese technology firm Huawei at the PT Expo in Beijing. While a Huawei executive faces possible U.S. charges over trade with Iran, the Chinese tech giant's ambition to be a leader in next-generation telecoms is colliding with security worries abroad. (AP Photo/Mark Schiefelbein, File)

TORONTO (AP) ― Canada's ambassador to China was given access Sunday to detained Canadian entrepreneur Michael Spavor six days after he was arrested, the country's Global Affairs department said.

Ambassador John McCallum also met with ex-diplomat Michael Kovrig on Friday. Both were detained in China last Monday in apparent retaliation for the arrest of a top Chinese tech executive on behalf of the United States.

Canada arrested Huawei executive Meng Wanzhou on Dec. 1 on U.S. charges that she misled banks about the company's business dealings in Iran. Canada gave Huawei chief financial officer Meng ― daughter of the telecom giant's founder ― access to Chinese consular staff on the day she was arrested and three days of public hearings before releasing her on bail. Members of Vancouver's large Chinese community who came to court to show their support cheered her release.

By contrast, the Chinese secretly detained the two Canadians on suspicions of "engaging in activities that endanger the national security of China."

U.S. Secretary of State Mike Pompeo has called the detention of the Canadian citizens unlawful and said they should be released.

Entrepreneur Spavor is known for his contacts in China with high-ranking North Korean officials, including leader Kim Jong Un, with whom he has been photographed shaking hands and laughing. He was instrumental in bringing NBA player Dennis Rodman to Pyongyang in 2013 and has organized a number of tours and projects with the reclusive country since then.

In 2015, Spavor founded Paektu Cultural Exchange, a nongovernmental organization that works to facilitate sports, cultural, tourism and business exchanges with North Korea. Its mission statement says it aims to "promote greater peace, friendship and understanding."


Ransomware Attack Victim: Once Bitten, Twice Shy

$
0
0

One day in 2006, Percy Syddall arrived at his business, sat down, turned on the computer, and discovered that he couldn’t access the system . He couldn’t get onto the company’s network, couldn’t access files or applications, and couldn’t reach any of the corporate data. He was completely locked out--a ransomware attack victim.

Syddall, the CEO of A1care , a home healthcare company in the San Francisco Bay area, was a victim of ransomware almost a dozen years before the threat of ransomware reached the national conscience through such high-profile attacks asWannaCry, NotPetya and SamSam. A1care’s computer system, network and applications were being held hostage by unknown attackers who demanded hundreds of thousands of dollars before they would enable Syddall to regain access to the system.

The CEO spoke with other companies about the situation--ransomware was still a relatively unknown form of attack, even though it had been around for at least a decade before it reared its head with A1care--and after weeks of negotiations that included changes in conditions and demand for more money, Syddall eventually paid the ransom and got its system, applications and data back.

At the time of the attack, the situation was chaotic. As Syddall told ITPro Today, he had no idea what was going on, had never heard of ransomware, and “didn’t even know what it was or how these people were able to do the things they were doing.” There also was a scramble to raise the money--banks back then had rarely heard of ransomware and were reluctant to loan money to a small-business CEO who said his computer systems were being held hostage, Syddall said--and to alert customers about the situation.

“One of the things that was so disheartening was that I had to contact every one of our clients and let them know that we had something wrong with our systems,” he said. “That was heartbreaking. Once we had settled it and we retrieved the information, we had to verify everything. The most disheartening thing was we had to call out clients and ask them who was working there--who were my caregivers who were working there--and that was shocking to them. I had to explain to them we couldn’t get in our system.”

Longer term, the ripple effects from the attack continued for more than a decade. At the time of the attack, Syddall said, he felt he had all the security he needed in place--including the use of cybersecurity software from the likes of McAfee and Symantec, and having his workers defrag their systems at the end of every week. He soon learned that wasn’t enough, and, during the past dozen years he has run through numerous security solutions to keep a step ahead of bad actors who have become more sophisticated and malware that has become more complex. The threats keep evolving, so the defenses that A1care employs must also evolve quickly, he said.

“I’ve come to the point where you cannot have enough security,” Syddall said. “That is the bottom line since 2006. You can never have enough.”

The latest example is his embrace this year of Mirror Shielding technology from NeuShield that is designed to essentially create a layer of protection that--should an attacker get through other defenses--enables the harmful code to simply attack a mirror image of the data on the network. Meanwhile, workers can see that the attack has happened and with one click restore the file to its pre-attack condition and continue to work, according to Marcus Chung, CEO of BoldCloud, which helped set up A1care with NeuShield’s Data Sentinel mirror-shielding technology. The product is designed to work in conjunction with traditional security solutions like anti-virus and backup-and-recovery software.

“It’s very important for businesses and individuals to know that, as much as we’d like to have that one magic silver bullet--have this one security product and it solves all my problems-- unfortunately, it doesn’t work that way,” Chung told ITPro Today. “The best way is to marry your security and overlap those capabilities.”

For A1care’s Syddall, bringing in NeuShield falls in line with what he’s been doing since 2006. The company has run through at least three to four security solutions during that time, to ensure it has the best protection possible. Right after the ransomware attack, Syddall hired an IT manager but learned quickly that most IT professionals don’t have deep security backgrounds. He brought on 24hourtek to help with security. The service provider scans A1Care’s systems at night at midnight to find threats and detect anomalies. (A1care recently fired an employee after 24hourtek discovered he was viewing pornography on company computers.)

At the same time, Syddall over the years has learned as much about security as he could. When new security products came out, he would have vendor representatives come to his office, talk about the technology and get a demonstration.

“Here’s the funny thing: I would ask a lot of people who come to my office to sell me on their security, ‘If I put this into my system, is it hackable?’” the CEO said. “And they would say, ‘No, once you put this into your system, you won’t be hackable,’ which I know is not true. There’s just no way to stop a hacker if he wants to get in. But my main thing was I wanted to make sure my system wasn’t compromised, that my data wasn’t used for any purpose except by people in my office.”

A1care isn’t a large company, but it has its share of security challenges. It has about 600 clients, but it’s a highly mobile computing environment, with the bulk of its caregivers work from home or the road over laptops and iPads. The company is in the process of expanding its business into Utah, creating an even wider distributed environment. At the same time, Syddall continues to try to make A1care a completely paperless company, with everything online.

Ransomware, fueled by WannaCry and similar campaigns, was the top cybersecurity threat last year, but security researchers from companies like Kaspersky Lab, Trend Micro and Check Point Software have found that the incidence of ransomware has slowed since late last year as protections against it have improved andstealthier malwarevariants, like those that steal compute power to mine cryptocurrencies , have grown in popularity.

Still, ransomware is still out there and thehealthcare industry--with its wealth of personal data-- continues to be a target . According to cybersecurity vendor Cylance, the healthcare industry was the target of 34 percent of the ransomware attacks in 2017, twice that of the second largest target, manufacturing.

Syddall first spoke with BoldCloud’s Chung in January, and i

BUF早餐铺 | Twitter 公布今年上半年透明度报告;伊朗相关黑客利用网络钓鱼攻击活动人 ...

$
0
0

各位 Buffer 早上好,今天是 2018 年 12 月 17日星期一。今天的早餐铺内容有:Twitter 公布今年上半年透明度报告;伊朗相关黑客利用网络钓鱼攻击活动人士和美国官员;这些严重漏洞让4亿微软账户险遭暴露;自由职业精英黑客赚得多,帮人找漏洞或年入50万美元;Google 将域名 duck.com 转让给 DuckDuckGo。


BUF早餐铺 | Twitter 公布今年上半年透明度报告;伊朗相关黑客利用网络钓鱼攻击活动人 ...
伊朗相关黑客利用网络钓鱼攻击活动人士和美国官员

据外媒报道,根据伦敦网络安全竞购Certfa最新公布的一份报告显示,与伊朗政府相关的黑客将实施了制裁的他国官员、活动人士和记者作为其网络钓鱼黑客攻击目标。获悉,目标包括了原子科学家、美国财政部官员以及今年被美国总统特朗普撤销的伊朗核协议的支持者和批评者。报道称,该黑客行动在很大程序上主要依赖于诱骗邮箱用户交出他们电子邮件的用户名和密码。不过像Yubikey等这样的物理令牌有助于防止此类黑客攻击,因为当登录重要邮箱账号时设备必须在场才行。

目前还不清楚究竟有多少受害人落入了这个网络钓鱼的全套,而这些黑客之所以被发现看来是因为他们犯了一个基础错误。据称,他们在网上留下了一个不安全的信息,研究人员正是通过这个找到了他们并从中获取了钓鱼活动的细节信息。[来源: cnBeta ] 这些严重漏洞让4亿微软账户险遭暴露 在 SafetyDetective 公司工作的印度赏金猎人 Sahad Nk 发现并向微软报告了微软账户中的一系列严重漏洞并获得一笔数额不明的奖金。这些漏洞出现在用户的 MS Office 文件、Outlook 邮件等的微软账户中。也就是说所有类型的账户(超4亿)和所有类型的数据均易遭攻击。如果结合使用这些漏洞,将成为获取用户微软账户访问权限的完美攻击向量。攻击者需要的不过是强制用户点击某链接。[来源: CodeSafe ] Google 将域名 duck.com 转让给 DuckDuckGo Google 将域名 duck.com 转让给了竞争对手 DuckDuckGo。DuckDuckGo 创始人 Gabriel Weinberg 确认了这一消息。他表示,“我们很高兴 Google 选择将 duck.com 的所有权转让给 DuckDuckGo。获得 duck.com 域名将帮助用户更方便地使用 DuckDuckGo。”Google 在一份声明中表示它与 DuckDuckGo 公司达成协议,将 duck.com 的所有权和相关权利转让给 DuckDuckGo。今年 7 月,DuckDuckGo 公开抱怨 Google 混淆其用户,给出的一个理由就是将 duck.com 域名重定向到 Google 搜索。但前 duck.com 资深雇员发表声明,否认 duck.com 重定向到 Google 是搜索巨人有意的行为,称是他在 2010 年 Google 收购 On2 Technologies/The Duck Corporation (on2.com 和 duck.com) 之后决定重定向 duck.com。[来源: Solidot ] 自由职业精英黑客赚得多,帮人找漏洞或年入50万美元 据美国媒体报道,安全漏洞悬赏平台Bugcrowd发布的最新数据显示,通过为特斯拉等公司和美国国防部等组织查找安全漏洞并报告所查找出的问题,自由职业型的精英黑客每年能够获得超过50万美元的收入。于2012年在旧金山成立的Bugcrowd,是为客户查找和报告软件安全漏洞的少数几家所谓的“漏洞悬赏”公司之一。[来源: cnBeta ] Twitter 公布今年上半年透明度报告 Twitter 公布了今年上半年的透明度报告,称它从政府收到的信息披露请求增长了 10%,这是 2015 年以来最高的增长比例。Twitter 收到了 6904 次政府要求,涉及 16882 个账户。在 56% 的案例中,Twitter 至少提供了一些数据。美国以 2231 次涉及 9226 个账户的请求居首,约占 Twitter 上半年收到政府请求的三分之一。日本和英国分别排在第二和第三位。总体上,包括要求删除数据的请求在内,全球政府请求增加了 80%。大多数数据删除请求来自俄罗斯和土耳其。香港也递交了两次请求涉及 4 个账号,但 Twitter 没有满足其要求。[来源: Solidot ]

安华金和成功入选“2018金融网络安全解决方案”十佳

$
0
0

摘要: 近日,安华金和提报的《结构化数据资产(个人信息)安全保护系统建设方案》成功入选“2018金融网络安全十佳优秀解决方案”。该方案评选活动由安在新媒体组织,CSO100(稀锁首席安全官联盟)、诸子云(企业网络安全专家联盟)参与,并获得上海市信息安全行业协会、上海...

近日,安华金和提报的《结构化数据资产(个人信息)安全保护系统建设方案》成功入选“2018金融网络安全十佳优秀解决方案”。该方案评选活动由安在新媒体组织,CSO100(稀锁首席安全官联盟)、诸子云(企业网络安全专家联盟)参与,并获得上海市信息安全行业协会、上海赛博网络安全产业创新研究院等机构的支持。最终入选方案经由50位来自各大金融单位的客户专家评委认真、专业、审慎的选出。


安华金和成功入选“2018金融网络安全解决方案”十佳

此次方案评选紧密连接安全厂商和金融组织,让双方在长期以来合作又“对抗”的供需关系中,通过一次关于“何谓解决方案以及什么才是好的解决方案”的直接对话中互通共识,活动为安全企业搭建了优秀方案的施展空间,也为银行、保险、证券、基金、互金等金融组织带来问题解决的思路和出口。

安华金和《结构化数据资产(个人信息)安全保护系统建设方案》是一套基于个人隐私信息安全保护的、针对银行类金融行业的信息安全建设体系化解决方案,可以实现全向、多维的数据资产保护能力,让数据使用更安全。


安华金和成功入选“2018金融网络安全解决方案”十佳

该方案融合了安华金和多项产品技术能力,与银行 数据安全 建设的技术应对需求高度契合,释放了高价值需求匹配能力:①数据资产梳理技术中的SQL语句精确解析原理实现数据资产的管理、敏感数据的发现、数据的分级分类和权限梳理,以及数据资产的动态发现、访问分析、资产使用热度分析和静默资产梳理;②利用脱敏技术实现敏感信息的脱敏;③利用数据安全防护模块实现细粒度访问控制、危险操作过滤;通过应用关联技术实现业务、用户、功能模块三级策略动态脱敏,UEBA;④大数据处理技术实现数据采集、存储、分析;利用动态感知实现数据可视化展示,数据统计、告警信息、数据流向一“屏”打尽。

此次活动是一次高度聚焦金融行业,针对安全建设高专业性评选,因此,邀请到的是50位来自甲方的专家评委,他们保持了极高的专业态度,认真负责,积极参与,对每一个参选解决方案都能给出中肯的建议和意见。

安华金和的《结构化数据资产(个人信息)安全保护系统建设方案》就得到了专家评委的高度评价。具体如下:

非常聚焦,完全针对数据库进行全方位的检测、防护、审计

切中热点和痛点,如果有成效,将非常有市场需求

安华从个人敏感信息保护方面入手,将存储信息的载体作为对象,进行了多层次多角度的覆盖。结合数据库特点完成对敏感信息的识别,分析,脱敏,日常监控等一系列管理活动。此方案直击金融机构的真实需求和痛点,兼容性较好,结合数据可视化等手段,可为金融机构提供高效的敏感数据监控解决方案。

数据是金融企业的核心资产,其价值的重要性不言而喻。本方案直面企业痛点从方面提供了解决方案,如基础性的数据资产统计与发现功能就是企业数据保护的基础性工作,但往往也是无从下手的难点,该解决方案从静态与动态两个角度提供了很好的思路。敏感信息的定位、分析以及防护模块在实际中也有价值。故这个方案在国家、监管、企业、公民对数据保护越来越重视的情况下,应该有广阔的市场空间。

随着网络安全法以及相关个人信息保护法律法规的陆续出台,个人信息保护已经上升为国家安全的重要组成部份,做为12个案例里唯一的个人信息保护相关的建设方案,安华金和从个人信息的清单化梳理、个人信息使用的动态监控(访问路径分析、访问热度分析、危险行为分析)、个人信息在使用时的防护手段(数据脱敏及数据库防火墙技术)等几个方面构建了较为完整的个人信息保护系统建设方案。对于企业构建自己的数据库资产安全保护系统很有针对性和可落实地性。

此外,作为行业里具备深厚业务实战经验的专家,也会结合看到的行业趋势提出方案的改进意见,比如,专家评委指出:近年,不少金融企业都构建了大数据平台,针对大数据平台里的个人数据保护,厂商的商品化产品如何与大数据平台之间有良好的兼容性,希望能在建设方案里看到此类介绍。

对此,安华金和也会不断完善方案本身,将自身在大数据安全领域的产品与技术积累嵌入到大数据平台的数据安全建设模块,全面覆盖金融行业整体的 数据安全 建设技术需求。

本年度,安华金和助力金融行业 数据安全 建设实现了多个突破,从荣获第一届浦发银行国际金融科技创新大赛提名奖,到助力阳光保险集团在“2018年度中国保险行业信息化建设典型案例优选示范活动”中凭借“数据库大数据审计日志平台”获得优秀奖,再到获得“2018金融网络安全十佳优秀解决方案”,这是今年安华金和在金融行业 数据安全 建设领域,深度结合客户业务场景需求,充分释放深厚积累,高频率价值输出,收获的来自客户和行业的认可。

相关文章 安华金和CEO出席亿欧年会漫谈数据库创新发展 广西数据安全治理用户研讨会顺利召开 安华金和推出数据安全治理方案,亮相第十届全国城商行信息发展创新座谈会 从“万豪泄露事件”看数据安全整个大环境 数据库“裸奔”!个人信息屡遭暗网贩卖,我们该如何保护个人隐私?


安华金和成功入选“2018金融网络安全解决方案”十佳

年度最差密码:123456连续五年第一 特朗普名字上榜

$
0
0

新酷产品第一时间免费试玩,还有众多优质达人分享独到生活经验,快来新浪众测,体验各领域最前沿、最有趣、最好玩的产品吧~!下载客户端还能获得专享福利哦!

新浪数码讯 12月17日上午消息,密码管理安全公司SplashData发布了2018年度密码报告,“123456”和“password”连续第5年成为最差密码。

“年度最差密码排行榜(也称年度最流行密码)”是他们每年都会总结的一个榜单。与前几年一样,2018年也发生了许多备受瞩目的数据泄露事件,但许多人仍在继续为自己账户使用容易猜测的密码。

“123456”和“password(即英文单词‘密码’)”连续第5年成为网上最受欢迎的两个密码,这大概说明了懒惰战胜了安全,人们宁可冒着风险也会用一个更简单的密码。

今年上榜的新词还包括“111111”、“sunshine(阳光)”、“princess(公主)”、“666666”、“654321”。还有个有趣的是,总统唐纳德-特朗普的名字出现在榜单里,“donald”排在第23位。

虽然总结最差密码有趣,但SplashData的CEO摩根-斯兰(Morgan smash)谈到了这一排行榜时候称:“黑客利用名人名字、流行文化和体育词汇入侵账户非常成功,因为他们知道,很多人都在使用这些容易记住的组合。”――显然,经常出现在电视里的总统名字就符合这一趋势。

来看一下,2018最差密码(也是最流行)前十名:

1) 123456

2) password (即英文单词密码)

3) 123456789

4) 12345678

5) 12345

6) 111111

7) 1234567

8) sunshine(阳光)

9) qwerty (键盘最上哪一行)

10) iloveyou (我爱你)

除了这前十,排名靠前的密码还包括“daniel”, “hannah”, 和“thomas”等人的名字;流行文化如 “solo”, “tigger”, and “lakers”;随机的项目,如 “cookie” 和 “banana”;出生年份如“1990”和“1991”;还有一些简单的短语,比如“whatever”和“test”。正如斯兰解释的那样,任何账户使用这些超级简单的短语都不是好主意,因为很容易猜到。

“我们希望通过每年发布这份清单来说服人们采取措施保护自己,”斯兰说。“所有的风险都是已知的,而且万豪等事件都被曝光了。人们依旧年复一年地把自己置于这样的风险之下,真是让人头疼。”

SplashData估计,今年共有近10%的人使用过至少前25个最差密码中的一个,近3%的人曾经使用过最差密码“123456”。

他们认为,一般密码不应少于12个字符,而且字符的类型需要是混合的。每个账号都应该设置不同的密码,或者用个密码管理器,生成随机的新密码自动登录网站也可以。

此前,国内外多次发生“撞库”事件,一些大型网站或机构数据泄露,但因为人们习惯于同样的用户名+密码组合,导致不法分子很容易获取一个密码就得到用户的所有账号信息,加剧用户损失。

(晓光)

PewDiePie printer hackers strike again

$
0
0

PewDiePie printer hackers strike again
Image caption This text and image form part of a longer document sent to the printers

Hackers have taken control of printers around the world.

It is the latest in a series of such attacks, but this time they say they have the power to destroy the machines.

The stunt was first carried out last month, when one member claimed to have forced about 50,000 printers to create posters supporting his favourite vlogger PewDiePie.

The latest incident again urges support for the YouTuber, but also calls on victims to improve their security.

"I've been trying to show that 'hacking' isn't a game or toy, it can have serious real-life consequences," the original hacker told the BBC, speaking anonymously online.

"We really want people to pay attention to this because causing physical damage is very much a possibility."

He explained that flaws in the printers' firmware meant that he could continuously force data to be written to their chips.

"These chips have a limited lifetime of 'writes'," he explained.

"If you keep the loop on enough, the chip will fry and the printer will no longer function."

Hijacked files

The potential financial costs to this are obvious but the hacker also pointed to another danger that his stunt has thrown up.

"The fallout goes beyond print-outs, we could also capturing sensitive documents as they get printed or even modify documents as they get printed."

Although the hacker can geo-locate the countries that he is affecting, it's not clear whether or not a targeted attack on an individual company or household is possible.

Image Copyright @Thrillka @Thrillka

Report

The hackers claim to have printed out their latest message on more than 100,000 machines.

The BBC has not been able to verify the claim, but people from countries including the US, Argentina, Spain, Australia and Chile have posted pictures on social media of the latest print-outs.

More people are expected to notice their printers have created copies of the poster when they return to work on Monday.

It reads: "PewDiePie is in trouble and he needs your help to defeat T-Series!"

The message then instructs readers to subscribe the YouTuber before adding: "Seriously. Fix your printer. It can be abused!"

PewDiePie has been YouTube's most subscribed to creator since 2013. He currently has about 77 million followers on the platform.

Over recent months, the Indian music label and movie studio T-Series has come close to overtaking his lead, which has led some PewDiePie fans to mount stunts to attract new subscribers.

Image copyright Getty Images

Image caption Felix Kjellberg - who is known as PewDiePie -is currently YouTube's most subscribed to creator

'Act now'

Security vendors say that the stunt shows just how vulnerable some organisations can be to attack through the plethora of connected devices that fill modern office spaces.

Their advice is to:

carry out regular audits of connected devices install the latest security patches question whether or not everything connected to the internet really needs to be

"The risk of causing financial damage in this case is as real as it gets," commented Bob Reny from the security firm ForeScout.

"And all of this because organisations or individuals installed a connected device without really taking the time to audit the implications this has on their existing network security infrastructure."

The hackers provided contact details on the latest print-outs as a way to allow people to get in touch if they needed further help fix the exploited flaw.

One told the BBC that they believed they were breaking the law, but still thought their act was justified.

"While authorities might not see eye to eye with us, what we're doing is much better than someone destroying printers and offices around the world in an attempt to hold printers ransom or something."

Vulnerabilities in network printers have been known about for years but many people are unaware of the risks.

One security researcher who has studied the problem confirmed it was possible to destroy the machines by sending them commands from afar.

"These devices should never be directly reachable over the internet," said Jens Mueller from Ruhr-University in Germany.

"Who is to blame? [In offices] definitely the network administrators allowing direct access to their devices over the internet."

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the ...

$
0
0

Here’s an overview of some of last week’s most interesting news and articles:

Deception technology: Authenticity and why it matters

An overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure.

Mitigating the risk of Office 365 account hijacking

Once an actor has obtained credentials for an O365 account, not only can the account access be used to access documents across a user’s O365 surface (SharePoint, OneNote etc.) but it can also be used as a launchpad to carry out further compromises within an organisation.

Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits

Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based post fabrication analysis?

Android Trojan steals money from victims’ PayPal account

ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s PayPal address.

How can businesses get the most out of pentesting?

For organizations not knowing where to start when it comes to selecting a pentester, let’s take a look at a few guidelines to follow when starting a project.

CISO challenges and the path to cutting edge security

Zane Lackey is the co-founder and CSO at Signal Sciences. He serves on multiple Advisory Boards including the National Technology Security Coalition, the Internet Bug Bounty Program, and the US State Department-backed Open Technology Fund. Prior to co-founding Signal Sciences, Zane lead a security team at the forefront of the DevOps/Cloud shift as CISO of Etsy. In this interview with Help Net Security he discusses CISO challenges, cloud security strategies, next-gen security, and much more.

Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets

Attackers looking to add IoT devices to their botnets are increasingly adding vulnerability exploitation to their attack arsenal, Netscout researchers warn. Instead on just relying on a list of common or default passwords or brute-forcing attacks, they are taking advantage of the fact that IoT devices are rarely updated and manufacturers take a lot of time to push out fixes for known flaws.

Most concerning security controls for cyberattackers? Deception and IDS

Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish list.

Worst password offenders of 2018 exposed

Kanye West is the worst password offender of 2018, according to Dashlane. When visiting the White House, the famous rapper was sprotted unlocking his iPhone with the passcode “000000”.

Not all data collection is evil: Don’t let privacy scandals stall cybersecurity

The privacy violations, deception and cybercrime taking place are creating new challenges that public and private sector organizations face. They are now operating in a world where all data collection and analysis practices are increasingly portrayed as evil. Despite this, business and government leaders can’t lose sight of the fact that it is absolutely necessary to continue to collect and analyze information in order to remain secure and to mitigate risk.

December 2018 Patch Tuesday: Microsoft patches windows zero-day exploited in the wild

Microsoft’s December 2018 Patch Tuesday release is pretty lightweight: the company has plugged 38 CVE-numbered security holes, nine of which are considered to be Critical.

Securing and managing the enterprise Internet of Things

Paul Calatayud, Palo Alto Networks’ CSO for the Americas, sees the IoT evolving into a new form of distributed computing powered by 5G and ever-increasing bandwidth speeds. The result will be intelligent, programmable devices that operate without human interaction or input.

6.8% of the top 100,000 websites still accept old, insecure SSL versions

Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet security report. Researchers also found that 6.8 percent of the world’s top 100,000 websites still accept old, insecure versions of the SSL encryption protocol.

Will sophisticated attacks dominate in 2019?

Trend Micro released its 2019 predictions report, warning that attackers will increase the effectiveness of proven attack methods by adding more sophisticated elements to take advantage of the changing technology landscape.

November 2018: Most wanted malware exposed

Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it spread through several campaigns, including a Thanksgiving-themed campaign.

Product showcase: iStorage diskAshur PRO SSD

The diskAshur PRO SSD is an ultra-secure, PIN authenticated, portable USB 3.1 hard drive with real-time AES-XTS 256-bit hardware encryption. It doesn’t require any software the keypad enables you to securely access the drive by entering a PIN code.

XSS in Ghost

$
0
0

Ghost is a publishing-focused platform. It powers many writing-focused websites such as the cloudflare blog , troyhunt.com and the Mozilla VR blog .

As the code is fully open source on github , I performed a security audit of the application and found an unauthenticated reflected XSS in the Subscribe feature.

The patched versions are 2.4.0 , and 1.25.6 and 0.11.14 . If you are running a version previous to the above patched versions and have the Subscriber feature enabled, I strongly recommend you to update as soon as possible!

This post will be a technical walk through of the vulnerable code which caused this XSS.

Unauthenticated XSS in Subscriber page

The subscribe page of Ghost is a feature which needs to be manually applied via the labs tab in the blog settings.

More information about the feature is available here .

The subscribe page was vulnerable to a reflected XSS as two of the POSTed variables can be reflected:

subscribed_url subscribed_referrer

Here is a POC form which used to alert the domain, on demo.ghost.io:

<form method="post" action="https://demo.ghost.io/subscribe/" > <input type="text" name="confirm" value="x" /> <input type="text" name="subscribed_url" value="x><img src=x onerror='alert(document.domain)' />" /> <input type="email" name="email" autofocus="autofocus" value="random@email.invalid"/> <button type="submit">POC</button> </form> Vulnerability information

The vulnerable code is under /core/server/apps/subscribers/lib/helpers/subscribe_form.js:46

hidden: new SafeString( makeHidden('confirm') + makeHidden('location', root.subscribed_url ? 'value=' + root.subscribed_url : '') + makeHidden('referrer', root.subscribed_referrer ? 'value=' + root.subscribed_referrer : '') )

And rendered under the subscribe_form template, available at /core/server/helpers/tpl/subscribe_form.hbs

The SafeString function is from HandleBars , and enable the user to write raw (unsafe) HTML to the document.

HTML escaping - Handlebars

Handlebars will not escape a Handlebars.SafeString. [...] In such a circumstance, you will want to manually escape parameters.

In our case, we are passing the result of the makeHidden function:

function makeHidden(name, extras) { return templates.input({ type: 'hidden', name: name, className: name, extras: extras }); }

Where template.input is a Lodash template, and no parameters are sanitized.

templates.input = _.template('<input class="<%= className %>" type="<%= type %>" name="<%= name %>" <%= extras %> />');

For this vulnerability, the extras parameters is tainted with 'value=' + root.subscribed_url , which lets us close the input tag and inject our own HTML code.

Technical information

The reason why Ghost is treating subsribed_url and subscribed_referrer as safe variables is the interesting part of this attack.

To perform the required trick, we need to understand how Ghost and its web server, Express, handles a request.

Before rendering a page, ghost will give a route a list of method to execute, each one sending its result to the next one.

Here is the pertinent code, from /core/server/apps/subscribers/lib/router.js:98 :

// subscribe frontend route subscribeRouter .route('/') .get( _renderer ) .post( bodyParser.urlencoded({extended: true}), honeyPot, handleSource, storeSubscriber, _renderer ); // configure an error handler just for subscribe problems subscribeRouter.use(errorHandler);

The arguments given to each methods are the result, or callback arguments, of the previous method.

If the argument is of type Error , instead of continuing with the next method, it will use the errorHandler method, which will then display an error page.

Here is the errorHandler function:

function errorHandler(error, req, res, next) { req.body.email = ''; if (error.statusCode !== 404) { res.locals.error = error; return _renderer(req, res); } next(error); }

As you can see, the get , post and error routes end up with the same _renderer method, which does render the same template.

The subscriber form, which is the template used by all states, has two states:

An empty state, with the "Enter your email" form. It can contain errors, such as "Invalid Email", and other analytics content, such as the referrer. The filled state once you post an email, with a "Successfully subscribed" message.

It is available under /core/server/apps/subscribers/lib/views/subscribe.hbs:47-68 :

{{^if success}} <header> <h1>Subscribe to {{@blog.title}}</h1> </header> {{subscribe_form // arguments }} {{else}} <header> <h1>Subscribed!</h1> </header> <!-- ... --> {{/if}}

Here is the workflow visualized:


XSS in Ghost

As our tainted parameters are rendered as hidden inputs in the form, we need to trick the server into rendering the input form while using our POST values.

The condition for rendering the vulnerable parameters is the success variable, which checks if any errors occurred when saving the new subscriber.

When sending a post, the first method called is bodyParsed.urlencoded , which converts our body to a javascript object.

The second method is honeyPot , and is essential to this attack.

function honeyPot(req, res, next) { if (!req.body.hasOwnProperty('confirm') || req.body.confirm !== '') { return next(new Error('Oops, something went wrong!')); } // we don't need this anymore delete req.body.confirm; next(); }

As the form has a hidden confirm parameters, it will ensure the parameter is present and that its value is empty. I presume this is to prevent automated bots to fill the form with junk too frequently.

If those conditions are not met, it will call next with an error message, Oops, something went wrong! .

As this is an error object, express will stop calling the next methods and instead use an errorHandler.

If we didn't trigger this error and used the normal workflow, the handleSource function would be called, and perform the following logic:

function handleSource(req, res, next) { req.body.subscribed_url = santizeUrl(req.body.location); req.body.subscribed_referrer = santizeUrl(req.body.referrer); delete req.body.location; delete req.body.referrer; // ... next(); }

As you can see, it would overwrite the subscribed_url and subscribed_referrer with a sanitized version of the posted values.

As we did not call this method, and instead took the honeypot bait, our values for subscribed_url are not sanitized.

We can therefore render the correct part of the form when giving a value to the 'confirm' input, as an error will be sent, which sets success variable to false .

As the same _renderer method is used for all three scenarios, which are get , post and errors , it does provide the request body to the template, even if we're in an error scenario.

Once we get in the rendering code of our form, subscribe_form.js , our context now has the previously thrown error, but also all of our unsanitized posted variables.

Combining this with the vulnerable template and we now have all the required steps for a reflected XSS!

Vulnerability Summary

Causing an error by taking the honeypot bait does not strip or sanitize our variables, unlike the regular route.

This leads the tainted variables being printed in the page, and causes a reflected XSS!

Timeline 2018/07/12: Original disclosure 2018/07/17: Acknowledged the issues: They mentioned a 6-8 weeks timeline for a fix. 2018/09/01: Asking for an update 2018/09/05: They mentioned the ticket got lost in their bug tracking platform. 2018/09/29: Partial fix committed 2018/09/30: Fix released on version 2.4.0 2018/10/07: Fix released on versions 1.25.6 and 0.11.14 2018/11/19: Notified them of a partial, very low risk, bypass. Sent them my recommendations for a permanent fix.

Note here that I never received an update since they acknowledged the ticket got lost, and still didn't hear from them to this day.

Also note that Ghost does not have a bug bounty program, so I did not receive a reward for this vulnerability.

Patch and partial bypass

The patch for the vulnerability is the following :

function errorHandler(error, req, res, next) { req.body.email = ''; req.body.subscribed_url = santizeUrl(req.body.subscribed_url); req.body.subscribed_referrer = santizeUrl(req.body.subscribed_referrer); // ...

Ghost added the sanitizeURL validation on the errorHandler .

function santizeUrl(url) { return validator.isEmptyOrURL(url || '') ? url : ''; }

Where isEmptyOrUrl checks if the URL is valid via the validator npm package, where ghost checks the isEmpty part, and then call the isUrl method of validator if it's not empty.

You might tell yourself:

Hey! A url can still contain a XSS, http://test.com/#><script> is a valid URL!

And you would be right!

Pretty much everything after the hash is technically a valid url, and can contain spaces and other symbols.

This does not work in this case as the validator package does not allow the <> characters.

The relevant part of the check is here :

export default function isURL(url, options) { assertString(url); if (!url || url.length >= 2083 || /[\s<>]/.test(url)) { return false; } if (url.indexOf('mailto:') === 0) { return false; } // ... The /[\s<>]/ regex ensures that we don't send a less than or greater than symbol in the url, wherever it may be.

What we can do however it add spaces, quotes and other characters in the value, to add attributes to the tag.

If we have a look at the HTML in which our content is injected:

<input class="location" type="hidden" name="location" value=OUR_URL />

It is trivial to escape the value attribue. As there are no quotes around the value, adding a space works.

If there were quotes, as our content isn't sanitized for attribute position, we could add a quote and keep on going.

The reason why it is not a complete XSS like it previously was is because of the input type.

With a regular input, we could modify it to have this form:

<input class="location" type="text" name="location" value=x onfocus="alert(document.domain)" autofocus />

Which would trigger the alert. But on a hidden input, as it's hidden we can't focus on it.

This makes it a lot harder to have an XSS, and the resulting XSS will require user actions unlike the previous versions.

Garet Hayes made a great blog post on the PortSwigger blog: XSS in hidden input fields , where setting an accesskey attribute and triggering it does launch the onclick event, even though the event is hidden.

Here is a proof of concept:

<input type="hidden" accesskey="X" onclick="alert(1)">

With this input, when the user presses ALT+SHIFT+X or CMD+ALT+X on OSX, the alert will launch.

This does make it almost worthless as an input since there is no chance a user will manually press those keys, but it's still a reflected XSS.

I have notified ghost of this bypass as well as the recommended solution on November 19th, but never received an answer.

Conclusion

Unlike other big CMS such as WordPress and Joomla, as Ghost is publisher-focused, most visitors on the website won't have an account.

On the other CMS, there are plugins to create new features such as making an e-commerce website, allow comments or write your own p osts, which allows the users to create accounts.

This limits the attack scope to public content, which makes it a lot more secure by default, as you can't access most of the internal API as a guest.

Overall, while the security team did take a very long time to fix this and using a weak solution, the security of the application from an external attacker is pretty good as the scope is very limited.

Follow me on Twitter if you want to learn more about security and keep up to date regarding my publications!

The next post will be about multiple stored XSS on Dev.to , which was caused by a logic bug in the publication platform.

If you can provide invitation for private programs on any platform, feel free to send me an invite! You can contact me via twitter, DM's are open.


2019年的网络安全圈将会发生什么?

$
0
0

还有十多天,整个2018年就要过去了,然而我们却过得并不太平。在这一年里,几乎每个月都有安全事件发生。例如前阵子闹得沸沸扬扬的万豪酒店集团,又或是更早些的英特尔“Meltdown”和“Spectre”两大新型漏洞,Facebook用户数据泄露以及苹果iOS iboot源码泄露等等。那么到了2019年,网络安全局势又会怎样发展呢?

想必各位还记得“微信支付”勒索病毒事件,要知道2017年刚曝出WannaCry时,还只支持比特币支付赎金,而现在,不仅有汉化版的勒索说明,更出现了微信支付赎金的方式。到了2019年,勒索软件活跃度相对将有所下降,但破坏性仍持续上升,呈现集中且更具针对性的发展趋势。

根据卡巴斯基的统计,2017至2018年遭遇勒索软件攻击的用户数量相比2016至2017年下降了近三成。赛门铁克也曾表示,拥有复杂勒索软件攻击能力的网络犯罪集团,现更关注那些与市政、医疗机构有关的美国公司。

此外,相比勒索软件这种正大光明的攻击方式,不法分子更青睐利用恶意挖矿脚本和软件直接获取收益。显然,各类软/硬件所暴露出来的漏洞,已然成为玩恶意插件的乐员,植入恶意挖矿插件的成本越来越低。实际上,在过去一年间受到挖矿脚本困扰的用户数量增加了44.5%,并将在2019年继续扩大,对于各类业务的破坏也会进一步加强,只要加密货币还有价值,不法分子就会一直盯着这块“蛋糕”。


2019年的网络安全圈将会发生什么?

从美国废弃网络中立原则,到欧盟出台GDPR(通用数据保护规范),以及近日澳大利亚新设立的反加密网络法等等系列措施,不难看出各国对于网络与数据安全的政策正在一步步收紧,从侧面也反映出各国政府对网络安全问题的不安。但与此同时,多国政策也加速了网络的巴尔干化,由于数据不互通,缺少全球性的联动,使得网络安全正在被孤立起来。未来,这一形势恐怕还将继续加深,像多米诺一样带来可怕的连锁反应。

针对数据安全,2019年开始,不法分子将从窃取数据向操纵数据转变。换言之,就是从纯粹的数据窃取、网站入侵,向攻击数据完整性转变。比起简单的数据窃取,后者的攻击通过让人们质疑相关数据的完整性而对个人或群体造成长期的声誉损害。

频频发生的个人账号被盗,已经向我们发出预警,单一的身份验证已不能很好的保护我们得账号安全。因此,未来多重身份验证将成为所有在线交易的标准。尽管多因素身份验证并非最完美的解决方案,但大多数的网站和在线服务将在2019年放弃只使用密码的访问机制,同时增加其他必需或可选的身份验证方法,已越来越多的供应商都在部署不同的身份验证体系,但在统一标准化的流程全面普及之前,情况不会太乐观。


2019年的网络安全圈将会发生什么?

另外,账号被盗也使攻击者所掌握的个人信息维度更多,因此他们将能发起更具针对性的网络钓鱼攻击,且成功率更高。其中,鱼叉式网络钓鱼手段正在变成从入侵电子邮件系统开始,进而潜伏并研究用户,丰富攻击者的信息,之后利用经常沟通的社交圈人际关系和信任发动攻击。

当中,抵押贷款诈骗又是鱼叉式网络钓鱼攻击的重灾区,尤以购房者会骗居多,款项巨大且很难被追回。通常,攻击者会先入侵抵押贷款人(或代理人)的电脑,记录所有即将执行或待定的交易及其截止日期。然后,代理人通常会发送电子邮件告知客户将资金发往哪里,这个时候欺诈就发生了。

鉴于此,未来对CSO和CISO的要求也将越来越高,网络安全教育行业也会变得愈发成熟,单凭一纸证书证将不再能够支持专业人员在其职业生涯中轻松前进,现阶段大杂烩一样的培训市场和体系也将被整治,取而代之的是更多科班出身的从业人员担任首席信息安全官,比如网络安全硕士。

随着联网设备数量的剧增,以及人工智能进一步应用,很难说未来有人工智能不会助力网络攻击,而有人工智能的加入将能够帮助攻击者模仿特定用户的行为,甚至欺骗熟练的安全人员。其攻击行为可能包括实施复杂的、定制化的网络钓鱼活动,这些活动将成功欺骗我们。

最后我们想说,如今数字边界正在遭受来自各方的安全考验,而2019年的网络安全局势也并不乐观。

NZ consumers misled over purchases of mobiles, laptops

$
0
0

New Zealand retailer Noel Leeming Group has been fined $200,000 for misleading consumers about their rights under the Consumer Guarantees Act (CGA) in relation to the purchasing of consumer goods such as mobile phones, laptops and household appliances.

Noel Leeming was convicted on eight charges under the Fair Trading Act, for making false or misleading representations to consumers about their rights under the CGA, following a prosecution by New Zealand's competition enforcement agency, The Commerce Commission.

Each charge relates to a different complainant and the conduct occurred between September 2015 and January 2017 at seven Noel Leeming stores across New Zealand, with the complainants purchasing consumer goods including mobile phones and laptops.

“This prosecution related to multiple consumers in multiple locations. It was not isolated or ‘one off’ conduct. Consumers complained to Noel Leeming about products and were entitled to have their complaints treated seriously, investigated properly and remedied where appropriate. Instead they were misled sometimes repeatedly about their rights under the law, at a moment when it really mattered to consumers that their legal rights were honoured,” said Commissioner Anna Rawlings.

Consumers were misled about:

the right to seek remedies for faulty goods from Noel Leeming rather than the manufacturer the right to a refund for a faulty product the right to a replacement for a faulty product.

In sentencing in the Auckland District Court on Monday, Judge Nicola Mathers said there were “direct and significant departures from the truth in every case … consumers were denied their rights and had real difficulty dealing with Noel Leeming.”

One complainant told the court that he got “disruptions, anxiety, stress, [and] the feeling that I was the bad guy because I was inconveniencing them, making their life harder.”

Noel Leeming made misrepresentations such as that:

Claims under the CGA about an iPhone had to be negotiated with Apple directly The CGA “is not effective for” Noel Leeming, and a consumer was not entitled to a refund despite false representations made about the suitability of a mobile phone A consumer had to contact Microsoft about a faulty product Noel Leeming could repair a fridge as many times as it liked; the consumer was also told he could only get a store credit to purchase another fridge Mobile phones are only replaced within 14 days, and a new phone could only be obtained if a fault occurs three times

“These statements are simply wrong. The CGA entitles consumers to receive a remedy from Noel Leeming, as the supplier. A supplier cannot refuse to deal with its customers and refer them to the manufacturer. The CGA is also clear about the circumstances in which a refund or replacement is available. These statements should not have been made to consumers,” Rawlings said.

Since 2007 the Commission has three times warned or issued compliance advice to Noel Leeming about potentially misleading consumers of their CGA rights.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!

中国信息安全测评中心专家黄殿中:物联网系统安全新思维

$
0
0

作者:中国信息安全测评中心专家委员会副主任 黄殿中

当今,物联网是世界信息产业创新的第三股浪潮,它不仅为社会的繁荣进步创造了崭新的“生态系统”、开创了全新的“时代标志”,更对我们未来的网络安全治理工作提出更高层次、更加严苛的“使命要求”。因此,面对物联网新时代的安全新特征,我们需准确把握时代的发展脉搏、认清物联网安全的治理大势,这是未来落实“两个百年”奋斗目标和建设世界网络强国的客观需求。具体来说:

第一,物联网应用的新变化勾勒未来社会的“新愿景”

物联网作为“大智物移云”时代的革命性力量,正以前所未有的步伐加速向我们走来,并融入人们的生产生活、社会发展及网络治理的方方面面。它联结着虚拟空间与现实世界,正为经济繁荣打造“新引擎”,不断释放网络空间“新潜能”,同时也为我们的社会与生活带来诸多新变化,其中有三项变化最值得关注。 变化1: 从业态发展现状看,物联网的智能应用已从“默默无闻”向“万众瞩目”质变转型。随着物联网与智慧城市、智能产业、智能生活等领域融合,它所蕴藏的“万亿市场”效应,正在悄然开启社会潜藏的“钻石矿”,将为智能社会的“繁荣变革”,共享经济的“智慧创新”,以及新兴业态的“星火燎原”提供不竭动力。 变化2 :从网络互联模式看,物联网的融合应用已使“物物互联”向“人物互联”跨越转型。它掀起社会治理的大变革,带来生产与生活方式的大融合,为构建“人类命运共同体”开启万物互联的新时代,开创经济繁荣的新未来,更为全球科技的发展进步奠定潜能无限的“聚宝盆”。 变化3: 从体系创新趋势看,物联网与新技术新应用的融合交织将使网络安全工作由“有边界防护”向“无边界安全”治理转型。未来的物联网势必与大数据、人工智能、区块链等前沿科技深度融合,物联网安全将是互联网安全的拓展与延伸,万物互联将开拓安全治理的“新疆土”、凸显“无边界安全”问题,使得安全防护由静态向动态、有边向无边迅速延展。

第二,物联网时代的新特质伴生着安全层面的“新挑战”

古语有云,“天下之患,最不可为者,名为治平无事,而其实有不测之忧”。国内物联网发展欣欣向荣,同时也呈现复杂多变、动态未知的规律和特征,其发展与应用伴随着新的风险与挑战,需要我们认真思考、沉着应对。具体来说主要有以下四类风险:

风险1:技术层面,物联网技术的现实窘境使得网络安全的旧疾顽症“老病未愈、新病又生”

当前,我国物联网发展面临着战略前沿技术部署及研发工作滞后,给技术发展的弯道超车埋下隐患;物联网的核心技术以及关键技术装备受制于人,又使“卡脖子”风险陡然提升。今年的“中兴事件”集中暴露出,我国网络核心技术的软肋与短板,即“洋芯”掌控着大量包括物联网设备在内的信息技术产业的核心命门,致使我们的发展心中无底、缺芯少魂。

风险2:个人层面,物联智能化管控不当,将为隐私泄露埋下“导火索”、给人身安全植入“定时弹”

随着智慧生活方式的不断扩展与升级,物联网越来越多地将传感器、智能设备、数据信息和云端存储等有机串联,一旦某一点遭黑客入侵,其放大、连锁效应将助推网络黑客肆意窃取个人隐私数据,多维度掌握公民海量敏感信息;在人身安全上,物联网的智能化进一步放大了网络攻击的严重后果。近年来,世界某款知名品牌汽车多次被曝光由于存在安全漏洞,可致攻击者远程控制车辆,进而直接威胁驾驶人员安全;而今年8月,委内瑞拉所发生的无人机暗杀总统马杜罗的未遂事件则进一步反映出,以物联网为代表的数据武器、车联网、智慧医疗等智慧应用,正在成为网络风险的巨大隐患,人身威胁的潜在引爆点。

风险3:社会层面,物联网攻击的“四两拨千斤”效应,可能动摇社会稳定的安全根基

今年8月,全球先后召开了三场顶级网络安全大会,通过大会的研究成果和网络黑客的现场演示,我们看到,物联网基础设施已成为网络恶意活动的重要攻击目标。比如,网络黑客通过入侵生产生活的物联设备形成僵尸网络,可导致严重事件;通过对工业传感器的网络攻击,可肆意扰乱城市供水系统。2016年美国多个城市出现大面积断网事件,则是黑客利用了大量摄像头、DVR(数字视频录像机)以及互联网路由器等物联网设备中的弱口令漏洞,从而植入恶意代码,成功实施网络攻击。这一系列真实案例告诫我们,物联网的隐患再小,一旦发生现实危害,也能以小博大,对整个社会经济运行大局的破坏力不可低估。

风险4:国家层面,物联网安全若治理缺位,可能引发“骨牌效应”,其破坏力难以预料

去年,维基解密发布的文件显示,美国中情局可将智能电视、手机等物联网设备变成监听监控器材,凭借物联网破解“任何事情”、攻击“任何地方”。同年,美军发布名为《塑造陆军网络》的战略文件,将物联网定位为“最重要的技术情报手段之一”,认为它能实现数字传感、计算和通信能力等的高度集成,从而提高网络作战的实施效能。美军利用物联网制造“智能武器”,实现情报搜集、作战协同和威胁他国国家安全的能力可见一斑。同时,随着物联网与其他新技术新应用的结合,当中任何一个环节的安全隐患或风险若被放大,其所造成的连锁反应将指数级爆发。因此,物联网被国际社会公认为“能对国家安全带来深刻变化的颠覆性技术”,如管控不当,将动摇国家的长治久安、社会的和谐稳定。

第三,物联网治理的新使命疾呼安全发展的“新思维”

西方发达国家在物联网安全治理上,不断推进理念创新、优化顶层战略、完善政策法规、引领标准制定、寻求技术突破,更为人才的培育打造沃土。这些举措为我们今后的安全工作提供了宝贵的经验启示。面对物联网发展的新特点和新挑战,我们要在总体国家安全观和网络强国战略思想的指引下,培育智能、动态、科学的“系统安全新思维”,与时俱进、积极稳妥地处理好四对关系的转型问题:

一是处理好发展和安全的辩证关系,重视国家统筹和顶层设计,实现由“发展先行”向“安全并行”战略转型。国家应充分发挥好政府的牵头引领作用,抓好物联网安全体系建设的顶层设计和战略规划,尽快出台“物联网安全发展战略”;通过战略引领、政府引导,推动各地方、各部门牢固树立安全与发展并重的理念,切实将物联网安全摆上重要议事日程,制定方案措施、完善政策保障、健全激励机制、强化督促落实;同时,在治理上,要站在战略高度对物联网安全进行系统管控、全局统筹,使得发展和安全并行。

二是处理好绝对安全和相对安全的辩证关系,实现由片面追求“绝对安全”向“动态防御”系统思维观念转型。物联网安全比互联网安全更复杂、更多变,它对实时性、安全可信性和资源保证等都有很高的要求。面对物联网安全的新特征,我们不能不计成本地追求绝对安全,应重视培育“智能、可信、科学、动态的安全防御观念”,通过研究大数据、区块链等创新科技在物联网安全场景中的应用,利用人工智能、机器学习等技术优势,发现、检测、预警、防范物联网安全问题,为物联网安全构建“智能生态圈”和“动态防御体系”。

三是处理好自主创新和消化吸收再创新的辩证关系,要高度重视核心技术攻关突破,实现由“卡脖子风险”向“自主可控”发展转型。物联网核心技术的自主可控与科研攻关事关未来安全治理成败。在把好核心技术这个最大“命门”、化解关键技术长期受制于人的安全“窘境”上,我们必须高度重视物联网安全力量的队伍建设和政策扶持。物联网核心技术攻关,唯在创新、贵在得人。未来,在物联网安全人才和国家专控力量的建设上,我们需把优秀的人才真正凝聚到核心部门、技术部门和科研攻关部门中来,利用人才培养、创新攻关,实现关键技术、前沿技术和颠覆性技术的自主研发和安全可控,奋起直追,破除受制于人的安全魔咒。

四是处理好优势继承和机制创新的辩证关系,推动物联网安全测评工作由过去的“单一、零散”向“网络化、平台化、系统化”升级转型。我国物联网安全治理不但需要机制创新,更需要把现有国家互联网安全治理的有效管控措施,科学辩证地应用到万物互联时代中。在安全测评方面,国内科研机构、测评机构等应进一步加大对物联网安全基础理论、关键技术、漏洞隐患分析及新型网络攻击防范技术的专项投入和研发力度,建立起适合物联网时代特点的新型安全测评体系,使测评工作由单一、零散、抽样的静态测评向网络化、平台化、规模化、系统化的动态安全测评升级转型。在漏洞管控方面,我们要积极培育高人一筹、早人一步、多人一招的分析研判手段;面对风险预警和漏洞消控,做到手段更多、措施更好、效果更强,进而为物联网安全治理工作开阔眼界、拓展思路、开创新局。

(本文刊登于《中国信息安全》杂志2018年第10期)

声明:本文来自中国信息安全,版权归作者所有。文章内容仅代表作者独立观点,不代表安全内参立场,转载目的在于传递更多信息。如需转载,请联系原作者获取授权。

东软网络安全张泉:安全赋能,驱动业务价值

$
0
0

【51CTO.com原创稿件】张泉恐怕没有想到,当他能够清晰地回答“网络安全是什么?”、“东软为什么要做网络安全?”这两个问题的时候,距离他从东软集团内部就职为网络安全事业部副总经理,时间已经过去了5年之久。在一个多月前2018东软解决方案论坛上,张泉就“安全赋能,驱动业务价值”这个演讲主题侃侃而谈,他对于“业务驱动安全”的诠释也赢得听众席上掌声不断。

记者犹记得2017年RSA大会上,当时RSA公司抛出一个趋势预测――“安全将由IT驱动安全转变为业务驱动安全”,与张泉的理念有异曲同工之处。记者不禁疑问,为何张泉对于“业务驱动安全”这条发展之路如此笃定信心十足?东软网络安全又是如何践行“业务驱动安全”路线的呢?在这过程中收获几何?在张泉的逐一解答中,这一切还要从2013年说起。


东软网络安全张泉:安全赋能,驱动业务价值
寻找安全核心价值,最终回归业务本源

对于2013年,安全业内人士都认为那是中国网络安全发展的一道分水岭。斯诺登“棱镜门”事件为国人敲响了信息安全的警钟,也让人们更进一步认识到网络安全所面临的严峻形势。当时在东软集团服务行业客户多年的张泉被调到网络安全事业部,他对自己提问了两个问题,就是文章开篇的“网络安全是什么?”、“东软为什么要做网络安全?”他认为,如果不能在网络安全里面挖掘到让客户离不开的核心业务,网络安全的未来根本无从谈起。

一时没有答案,张泉并不着急,他慢慢梳理着东软集团可利用的资源,对东软网络安全业务进行了内部整合,把东软在网络安全技术和各行业的业务积累相结合,探索在给客户的安全能力赋能的同时,利用安全技术为客户创造业务价值。当时针指到2017年,张泉慢慢有了自己的答案。当时他去现场参加了RSA大会,听到“安全将由IT驱动安全转变为业务驱动安全”这句话,如同打通困扰他多时的任督二脉,他逐渐意识到,只有当客户业务运营中形成攻防对抗的时候,才是网络安全发挥核心业务的时候。这正是“安全赋能,驱动业务价值”的核心,即一切回归到业务本源。

张泉告诉记者,“安全赋能,驱动业务价值”这句话包含两层意思:第一层含义,它解答了“网络空间安全(以下简称“安全”)是什么?”这道问题。在张泉看来,安全不仅仅是合规性,亦或是安全产品的堆叠,而应该是一种能力,这种能力与企业系统结合之后可以解决系统面临的问题和风险,这就是对“安全赋能”的诠释。

第二层含义,是对“安全和业务价值的关系是什么?”的回答。张泉认为,首先安全要能够降低业务系统运行的风险,从而提升业务系统的运行价值;其次,安全是一个攻防双方持续的博弈过程,为了保障业务系统的正常运行,就需要持续的投入,结合业务才能持续投入的资源聚焦价值最大的事情上;最后,安全厂商不能只聚焦在帮助客户建立和改善安全能力,而应该同时关注这种能力能够帮助客户创造什么价值。他告诉记者,从“车联网安全”和“东软慧眼(ElvaEye)系列业务安全网关”等领域的实践来看,安全这项能力完全可以为客户创造价值。“按照项目管理的相关理论,项目生命周期中越早导入风险管理,降低风险发生率所花费的资源也就越少。所以,越早的给业务赋能安全,也就越节约安全投入。省钱也是一种价值的创造。”

拥有“背靠大树好乘凉”的天然优势

方向想清楚了,接下来要做的就是不断在实践中完善和提升。张泉意识到,“背靠大树好乘凉”这句话简直太适合东软网络安全了,换而言之,东软NetEye在践行“业务驱动安全”这个理念时,具有天然优势。

他解释道,截止目前,东软集团拥有200余个业务方向,近800种解决方案及产品,业务遍及日本、美国、欧洲、中东等多个国家和地区,拥有上万家客户。“东软集团接触的就是各种类型的客户,在对他们输出解决方案或服务时,安全正在作为一个必选项帮助他们打开局面,更好地服务客户。”

张泉举了两个非常有代表性的例子:

第一个例子发生在车联网领域。当时东软集团的汽车电子事业部在为汽车制造商服务的过程中,获得了车厂需要在车联网中加入安全模块的业务需求。于是网络安全事业部从车厂的角度来进行网络安全需求分析,结合东软在汽车电子领域多年积累的经验,很快给出了特别符合客户需求的方案,在车联网安全领域打开了市场;

第二个例子发生在航空领域,同样也是东软集团航空事业部为客户提供解决方案时,客户表示在电子售票系统中的关键业务指标-“航线查订比”出现了极大异常,但是却找不出原因。当东软网络安全开始介入后,经过和业务系统开发商的详细交流和网络业务数据分析,发现原来是售票系统被“黄牛党”通过程序代码操纵,明明十分充足的票源被掌握在黄牛手中,普通消费者需要花高价才能买到票。由于东软对航空业务非常了解,东软NetEye对HTTP全流量中的用户行为进行了详细分析,引入用户指纹的概念,通过人机对话等多种安全技术与航空业务系统结合,很快就拦截了大量的非法访问,确保了售票系统的正常运营。

张泉透露,2018年车联网安全和慧眼系列业务安全网关都取得了比较好的客户反馈。他认为主要原因在于:一,东软NetEye从客户的视角出发谈安全,分析攻击收益和防护成本的博弈工程,选择最优的解决方案;二,他们帮助客户提升安全能力的同时,聚焦价值创造。

安全没有“一蹴而就”,转换思维更重要

对于正在积极进行数字化转型的客户,张泉建议,客户最好能在规划阶段就重视安全能力的建设,越早越好;而且可以尝试从攻方的角度去分析IT资产价值,规划安全防御的产品和服务。除此之外,最好能放弃“葵花宝典”思维,不要寄希望与“用一招制敌”的方式解决所有安全问题,而是要看菜吃饭。从组织的实际情况出发,调整资源投入的优先级,把资源聚焦在重要的事情上。

“行业客户对于安全的需求大概有80%都是有共性的,但是剩下的20%就需要安全厂商根据业务不断细分。可惜的是,往往安全厂商只是在细分产业,思维并没有转变到业务上去。”张泉表示,东软NetEye根据多年来累积的8000多家行业客户案例,并深入分析各个行业业务,将业务与安全紧密融合,抽象出一套业务安全通用框架。同时还在不断探索从业务视角驱动客户的安全能力建设,并驱动安全能力去为客户创造业务价值。

他还强调,未来网络安全厂商的应该尝试“退居二三线”,不必冲在最前端,更多的是与系统集成商、服务商打交道,不仅仅直面最终客户,行业系统集成商们更能描述清楚客户的业务,通过能力与业务的结合为最终用户创造了价值,安全厂商的价值也就体现出来了。

东软网络安全的2019:关注三个趋势和四个重点投入

在采访最后,他分享自己对于2019年网络发展趋势的三个判断:一是合规性需求只增不减。等保2.0、关键信息基础设施保护条例、GPDR等合规性法规的实施,将更加细化合规性要求市场,对组织的安全能力建设的要求将越来越细。二是工控、物联网安全领域的行业将进一步细分。他指出,没有行业业务需求支撑,只有合规性要求驱动的安全建设往往缺乏持续的动力。三是以自动化工具为主的数据“窃取”将越演越烈。游走在法律和法规边缘的数据自动化收集手段正在被大量的商业应用,政府、企业等数据运营组织需要加强这方面的风险防范。

“2019年东软网络安全还将重点加大四个领域的投入。”张泉总结道,在物联网安全领域,东软将继续在车联网、医疗物联网、摄像头物联网等业务领域深入;在行业安全解决方案中,东软将持续关注社保、医院、大政府等这几大个行业;在安全可信跨平台的网关产品中,东软将继续完善基于国外和国内的芯片的跨平台产品研发;而对于2018年“爆款”的人工智能、自主可控和安全可靠等方面,东软也非常重视,将加大机器学习及大数据技术在安全领域的应用。

【51CTO原创稿件,合作站点转载请注明原文作者和出处为51CTO.com】

【责任编辑:周雪 TEL:(010)68476606】

jeesuite-libs 1.3.1 发布,新增轻量级安全模块 jeesuite-security

$
0
0
简介

jeesuite-libs分布式架构开发套件。包括缓存(一二级缓存、自动缓存管理)、队列、分布式定时任务、文件服务(七牛、阿里云OSS)、日志、搜索、代码生成、配置中心、安全认证、分布式锁、分布式事务、集成dubbo、spring boot支持等。所有release版都经过严格测试并在生产环境稳定运行4年+。

更新内容 jeesuite-security

jeesuite-security 是新增模块:可替代shiro或spring-security等安全框架,可以理解是shiro的轻量级版本,配置更简单,更加贴近我们业务场景。

配置简单(初始化一个类即可)

满足认证授权基本需求

更加贴近日常使用业务场景

可选本地session和共享session

可选是否支持多端同时登录

dubbo、springboot跨服务登录状态传递支持

集成demo: https://gitee.com/vakinge/oneplatform

jeesuite-mybaits

重构mybaits增强插件注册逻辑简化配置

开放自定义mybatis插件hander接口

增加敏感操作拦截mybatis插件hander

支持无缝集成CRUD增强框架mapper

升级mybatis版本去掉自动CRUD过期代码

jeesuite-kafka

修复json消息反序列化漏处理header字段

jeesuite-scheduler

新增单机模式任务监控支持

jeesuite-springboot-starter

重构mybaits模块注册逻辑

scheduler模块注册兼容springboot2.x

jeesuite-springweb

日志拦截器请求内容过长截取输出

文档地址: http://www.jeesuite.com/docs/index.html

Viewing all 12749 articles
Browse latest View live