Inside | Real news, curated by real humans
Inside Security

Inside Security (Aug 3rd, 2016)

David’s Take
This week with three big security conferences in Las Vegas we are running a special Wednesday tools edition of this newsletter, with a few other tidbits thrown in. At Black Hat et al. there are always a great selection of new and improved security products that can help find and fix vulnerabilities. We’ll be back on Friday with our regular selection of features.
 
We’d love to hear from you if you saw other useful tools at the shows this week.

-- David Strom, editor of Inside Security

Shinosec  is a malware/target attack simulator suite for pentesters and other  researchers. The new version includes new features and components, such as a RAT simulator, a malware delivery server, and a dropper. You can now test your security performance against a fairly sophisticated but benign ransomware. ShinoLocker behaves just like a real ransomware but does not ask for any money to get any decrypt keys. And it has a simple web user interface too.-- SHINOSEC

Contrary to popular belief, frequently changing your passwords isn’t the best opsec idea, and now there’s evidence from chief FTC technologist Lorrie Cranor [pictured], formerly of Carnegie Mellon University. She recommends focusing on passwords that are long, strong and unique." Changing them frequently just means that users find a repeatable pattern that can be cracked. The story is worth reading and shows some research backing her position. – ARS TECHNICA
Here are four sure signs that your cloud security has been compromised, according to an executive with Call One. There is some self-serving advice here, given their focus, but still worth reviewing. Suggestions include keep up with software patches, examine unusual outbound traffic patterns and all your admin access activities, and look for spoofed packets. – HUFFINGTON POST 
The Defense Information Systems Agency has received $9.7 million in funding from the Defense Department’s Office of Small Business Programs since fiscal 2013 for a Rapid Innovation Fund to pursue promising innovative technologies in cybersecurity. The agency’s asking for more funding to fast track new innovations, especially if they can focus on cross-service solutions. This is in addition to each military service branch’s own tech innovation funds. --  NEXTGOV
You probably know more than one story about a disgruntled employee who had access to wipe out a large portion of his or her corporate infrastructure. Here is how IT organizations can cope with this potential problem, and use network change monitoring products to help protect things before they go awry. While somewhat self-serving (the vendor sells such a solution), this post is a handy reference card to the steps you need to take to put a solid program in place. – SOLARWINDS BLOG
 
A new tool called CANSpy to help understand the telematics and on-board communications systems that are linked together in most modern cars was announced this week. Developed by French researchers Jonathan-Christofer Demay and Arnaud Lebrun, the tool is freely available on GitHub here. One note of importance: you will need physical access to the vehicle under test, since it sits on the special Controller Area Network bus of a car.  -- DARK READING
 
Looking for a better way to install Kali Tools (above), execute MITM attacks, and run nmap scans? Then check out this new collection called NETSEC-Framework. It is designed to run on any Debian-based system using Python's built in libraries. -- GITHUB
Given the folklore surrounding unsuspecting ‘noobs’ attending Vegas this week being hacked, it is perhaps too late to heed this timely travel advice from Violet Blue about practicing safe computing. The popular blogger has some great suggestions on how to protect your identity, your devices, and your sanity when you leave town. Even if you are going someplace less hazardous than a hacking conference, it is worth reading. – PEERLYST BLOG
 
Here are some of the newer security testing tools that have come out at the shows this week.  They include Infection Monkey (props to Netflix’ Chaos Monkey) to test for VM blind spots in your infrastructure, Project Delta to examine SDN issues, and open source assembler framework Keystone Engine, which is already being used in more than a dozen projects as shown above. (Caution: slideshow ahead)– DARK READING
 
Just for fun
 
This could be somewhat self-serving, but the folks at BlueCoat have put together a short quiz to test your knowledge about encrypted traffic management, something that know a fair bit about given their product portfolio. -- BLUECOAT
 
How likely are you to recommend Inside Security to a friend or colleague?

          
Inside Security is supported by Varonis, a leading provider of software solutions that protect data from insider threats and cyberattacks. Learn more about Varonis.
Copyright © 2016 Inside, All rights reserved.


You're receiving this email because you are subscribed to Inside Security. If you don't want to receive it anymore, go ahead and unsubscribe – or just hit reply and tell us how to make it better.

Subscribe to Inside Security