Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

So called Heartbleed virus offers hackers access to sensitive data

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.

April 9, 2014

Click here to order the best dedicated server and at a great price.

A new security flaw has exposed millions of internet passwords, credit card numbers and other sensitive data to potential theft by computer hackers who may have been secretly exploiting the issue before its discovery this morning.

The security breach affects the encryption technology that is supposed to protect online accounts for emails, instant messaging and a wide range of electronic commerce services.

Internet security researchers who uncovered the threat, known as "Heartbleed," are particularly concerned about the issue because it went undetected for more than two years, giving hackers plenty of time to do some very nasty things.

Although there is now a method to close that security flaw, there are still plenty of reasons to be concerned, said David Chartier, CEO of Codenomicon, a security company based in Finland.

A team at Codenomicon diagnosed Heartbleed while working independently with a Google researcher who also discovered the threat.

"I don't think anyone that had been using this technology is in a position to definitively say they weren't compromised," Chartier said.

Chartier, and other computer security experts, are advising people to consider changing all their online passwords. "I would change every password everywhere because it's possible that something was sniffed out," said Wolfgang Kandek, chief technology officer for Qualys, a maker of security-analysis software.

"You simply don't know since an attack wouldn't have left a distinct footprint anywhere," he added. But changing the passwords won't do any good, these experts said, until the affected services install the software released Monday to repair the issue.

That places the onus on the Internet services affected by Heartbleed to alert their users to the potential risks and let them know when the Heartbleed repair patch has been installed so they can change their passwords.

"This is going to be difficult for the average person to understand, because it's difficult to know who has done what and what is safe or not," Chartier added.

Yahoo, which boasts more than 800 million users globally, is among the Internet services firm that could be potentially hurt by Heartbleed. The company said most of its popular services including sports, finance and Tumblr had been fixed, but work was still being done on other services that it didn't identify in a statement late yesterday.

"We're focused on providing the most secure experience possible for all our users and are continuously working to protect our customers' data," Yahoo said.

To be sure, Heartbleed creates an opening in SSL/TLS, an encryption technology marked by the small, closed padlock and "https:" on Web browsers to signify that internet traffic is secure. The security hole makes it possible to snoop on Internet traffic even if the padlock had been closed.

Potential attackers could also take the keys for deciphering encrypted data without the website owners knowing the theft had occurred, according to security researchers.

The security vulnerability affects only the variant of SSL/TLS known as OpenSSL, but that happens to be one of the most common on the Internet used today.

About 68.4 percent of all Web servers rely on OpenSSL, Chartier said. That means the data passing through hundreds of thousands of websites could be compromised, despite the protection offered by SSL encryption technology.

Beside emails and chats, OpenSSL is also used to secure virtual private networks, which are used by employees to connect with corporate networks seeking to shield confidential information from prying eyes.

Heartbleed exposed a weakness in encryption at the same time that major Internet services such as Yahoo, Google, Microsoft and Facebook are expanding their usage of technology to reassure the users about the security of their personal data.

The additional measures are being adopted in response to mounting concerns about the U.S. government's surveillance of online activities and other communications.

The snooping has been revealed during the past ten months through a series of leaked documents from former NSA contractor Edward Snowden.

Despite several worries raised by Heartbleed, Codenomicon said that many large consumer sites aren't likely to be affected because of their conservative choice of equipment and software.

"Ironically, smaller and more progressive services or those who have upgraded to the latest and best encryption will be affected most," the security company added.

Although it may take several months for smaller websites to install the Heartbleed fix, Chartier predicted all the major Internet service providers will act quickly to protect their reputations.

In a Tuesday post announcing it had installed the Heartbleed fix, Tumblr offered its users some blunt advice. "This still means that the little lock icon (HTTPS) we all trusted to keep our passwords, personal emails, and credit cards safe, was actually making all that private information accessible to anyone who knew about the exploit," Tumblr said.

"This might be a good day to change your passwords everywhere, especially your high-security services like email, file storage, and banking, which may have been compromised by this security vulnerability," he added.

In other internet security news

The numbers were compiled Thursday and confirm what many system admins already had suspected.

DDoS (distributed denial of service) attacks have more than tripled since the start of 2014, according to a new study released on Thursday that underscore zombie networks as the primary source of junk traffic that can be used to flood websites and other internet properties.

Overall, about 29 percent of all botnets are located in either India, China and Iran, while some are located in the U.S.

The study, by DDoS mitigation firm Incapsula, ranks the United States as number five in the list of “Top 10” attacking countries.

Several zombie networks have been deployed in multiple attacks. More than a quarter of botnet attacks happen more than 50 targets a month, according to Incapsula. And the trend appears to be increasing.

Traffic volumes are growing and 20 Gbps attacks are rapidly becoming normal. About 32.4 percent of all DDoSs is above 20 Gbps and 81.7 percent of assaults feature multiple strands of attack.

A normal SYN flood and large SYN flood combo is the most popular multi-vector attack-- a one-two punch technique that crops up in 75 percent of all attacks. NTP reflection was the most common large-scale attack method in January and February 2014.

The Incapsula study is based on hundreds of attacks on websites and other internet properties that use the company’s DDoS Mitigation service.

In other internet security news

Oracle is warning its Australian customers in the enterprise segment to get ready for extra security patches in the next coming months.

Recent changes at Australia's federal laws mean that Oracle has warned its customers that one security patch will be needed to handle a new gender equity reporting requirement, while changes to superannuation (tr. retirement pension) will mean another two.

Then there's a fourth patch that can be expected to handle general other changes expected in the Federal budget, which is delivered in the first week of May and comes into effect as of July 1st.

Australia's financial management software vendors are briefed in advanced of the Budget, so that vendors generally know what they need to start working on.

Their software is also tuned to cope with the need for rapid adjustment. We understand that financial management packages have modular designs to make it easy for vendors' outposts in different nations to encode local regulations into their wares.

We're aware that at least one top tier ERP vendor outsources the creation of these hyper-local patches, in part because the local office is more concerned with – and competent at - sales and marketing than actual coding.

Even if outposts of multinational vendors have to scramble to get the job done, the work is probably welcome if Oracle's missive is anything to go on-- only users of version 12.0 or higher of Oracle Payroll can put the patches to work.

Government therefore keeps users on the upgrade treadmill, along the way creating just the kind of red tape Australia's rulers will this week decry with a “repeal day” dedicated to “cutting administrative overhead.”

In other internet security news

Farid Essebar, aka Diablo, has finally been arrested by Bangkok police after more than 3 years on the run, on suspicion of causing no less than $4 billion worth of damage to Swiss banking systems and various other institutions in Europe.

The 27-year-old Moroccan, who has a Russian passport, was caught by police from the the Department of Special Investigation (DSI), as well as officials from the Immigration Bureau, and the Office of the Attorney-General.

"We arrested the suspect at a condominium on Rama Road. Thailand will then send him to Switzerland within 90 days in accordance with the extradition agreement," police chief Songsak Raksaksakul said.

Swiss authorities are said to have alerted the Thai police through their embassy in Bangkok that the hacker and three associates had come to the south-east Asian country.

Why did it took so long to track him down is still a mystery, although the report claims that law enforcers wanted to make sure they got a positive identification of the criminal before swooping in for an arrest.

Over the past three years, Essebar and the three other men apparently spent their time moving between various Thai tourist destinations and also made stints to other nearby countries including Hong Kong, among others.

It’s still unclear exactly how long the Moroccan is facing in a Swiss jail, but if the prosecution is successful it won’t be the first time he’s gone behind bars.

Essebar was arrested back in August 2005 and jailed by a Moroccan court a year later for spreading the infamous Zotob worm which infected systems across the globe including those of CNN, ABC, the Financial Times and the New York Times.

It even managed to crash the Department of Homeland Security's (DHS) US-VISIT border screening system, much to the embarrassment of the George Bush administration.

In other internet security news

European police agency Europol warns internet users again that using free Wi-Fi hotspots poses a data risk and that sensitive information can be lost or stolen by potential hackers that are located in the same hotspot.

Troels Oerting, head of Europol's cybercrime centre, told BBC News that a growing number of attacks are being carried out via public Wi-Fi service and that people should send personal data only across trusted networks.

"We have seen a growing increase in the misuse of Wi-Fi hotspots and the issue is getting worse, in order to steal information, identity or passwords and money from the users who use public or insecure Wi-Fi connections," he added.

The problems posed by using insecure Wi-Fi have been known for many years, and underscore the important need to use a VPN connection when accessing the internet from insecure public places such as cafes, transport hubs and conference venues.

But consumers often ignore these best practices, putting them at increased risk of getting hacked as a result. Sean Sullivan, security advisor at anti-virus firm F-Secure, commented-- "This has been a concern for many years, and that's why sensible companies force employees to use VPN connections. A Firefox plugin called 'Firesheep' definitively demonstrated just how utterly insecure Wi-Fi hotspots can be back in 2010."

Sullivan added that he used open hotspots all the time but always took care to take basic security precautions when he did. "If you want to use an open Wi-Fi hotspot to search for the latest sports scores, then go for it. But if you want to check your bank balance, read your email, have a private chat with your friends, then get yourself a VPN service,” he concluded.

According to a recent Kaspersky Lab survey, 34 percent of people using a PC admitted to taking no special measures to protect their online activity when using a Wi-Fi hotspot.

Only about 12.6 percent of internet users take the time to actively check the encryption standards of any access point before they use it, and that number is extremely low, considering all the risks that are involved.

The Kaspersky Lab survey does offer some comfort to those concerned about consumer attitudes to internet security. Only one in seven of those quizzed were comfortable banking or shopping online while connected to an untrusted Wi-Fi hotspot.

And in a related development, privacy groups such as the EFF (Electronic Frontier Foundation) have teamed up with technology firms such as Twitter and privacy-focused search service DuckDuckGo to create a new campaign to improve data security for consumers in a post-Snowden world of dragnet surveillance.

The 'Encrypt all Things' campaign has drawn up a seven point Data Security Action Plan for 2014 specifically designed to promote better data protection practices by websites and the technology industry, as well as promoting greater security awareness about privacy-enhancing technologies among consumers.

In other internet security news

Internet security consultants are suggesting that Canadian businesses and the federal government should adopt a just-released U.S. government framework for tightening IT security of critical infrastructure, and by adding additional layers of security to improve the confidentiality of all saved data.

“I honestly don’t think that we should re-invent the wheel,” said Kevvie Fowler, a partner in the forensic advisory services at KMPG Canada.“

Fowler said that the guidelines were released February 12 by the federal National Information Technology Laboratory (NIST). “If you look at what has been done, it already leverages several concepts from internationally-adopted standards like ISO 27001/2 and a few others,” he added.

In 2010, the Harper government announced a national strategy to better protect critical infrastructure calling for the public and private sectors to work on addressing risks. But two years later, the Auditor General released a report complaining the strategy still didn’t have an action plan. That plan has since been completed.

Public Safety Canada has released a guideline of best practices for incident response. But Fowler said the NIST document goes further. Meanwhile, as part of its effort to work on an infrastructure security plan, the Canadian government is holding an invitation-only conference in New York next week.

Called a ``Framework for Improving Critical Infrastructure`` it’s aimed at organizations, regulators and consumers to create or improve cybersecurity programs.

The document provides a common language to address and manage cyber risk in a cost-effective way based on business needs, without placing additional regulatory requirements on businesses, NIST says.

“The framework provides a consensus description of what’s needed for a comprehensive cybersecurity program,” said under secretary of commerce for Standards and Technology and NIST director Patrick Gallagher.

“Additionally, it reflects the efforts of a broad range of industries that see the value and need for improving cybersecurity and lowering overall risk. It will help companies prove to themselves and their stakeholders that good cybersecurity is good business.”

In short, it’s a series of best practices. The Harper government has been criticized for not providing leadership on cyberthreats to Canadian enterprises and citizens by an academic who specializes in international security.

A group of Canadian IT security professionals hopes to officially set up a national computer emergency response team (CERT) network next month that will run round the clock.

NIST says that several organizations can use the framework to determine their current level of IT security, set goals and establish a plan for improving or maintaining their cybersecurity.

It also offers a methodology to protect privacy and civil liberties (according to current U.S. law) to help organizations incorporate those protections into a comprehensive cybersecurity program.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.

Source: Codenomicon Internet Security.

Click here to order the best dedicated server and at a great price.

Save Internet's URL to the list of your favorite web sites in your Web browser by clicking here.

You can link to the Internet Security web site as much as you like.

Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact
Copyright © Internet    Terms of use    Privacy agreement    Legal disclaimer

Click here to order our special clearance dedicated servers.

Get your Linux or Windows dedicated server today.

Click here to order our special clearance dedicated servers.