<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Security Articles</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/tools-tips-reviews/security-articles.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:46:53 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/tools-tips-reviews/security-articles.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Continued: Protecting Enterprise &amp; SMB Networks From Exploits, Hacking &amp; Attacks - Automate System Patching Process - Part 2</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/protecting-enterprise-smb-by-patching-systems-part-2-1.png" alt="protecting-enterprise-smb-by-patching-systems-part-2-1" style="margin: 7px; float: left;" title="System Patching" />In our previous article <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems.html" target="_blank" title="Protecting Enterprise &amp; SMB Networks From Exploits, Hacking &amp; Attacks By Correctly Patching Systems">Protecting Enterprise &amp; SMB Networks From Exploits, Hacking &amp; Attacks By Correctly Patching Systems - Part 1</a>, we analysed the <strong>implications of unpatched systems</strong> and <strong>how hackers</strong> use these weaknesses to <strong>gain access to data and sensitive financial information</strong>. Included in the analysis were two major companies, eBay and a number of famous P.F. Chang's chain of restaurants. We then provided some rules IT Departments, Managers and Administrators should follow in order to <strong>secure their systems at the best possible level</strong>.</p>
<p style="text-align: justify;">This article continues with a number of important tips to <strong>further enhance the security</strong> of your company systems and how tools can be used to <strong>scan</strong>, <strong>identify</strong>, <strong>patch and automate</strong> the whole process of <strong>protecting your systems</strong>.</p>
<h3 style="text-align: justify;">Tips To Enhance The System Security Patching Process (Continued)</h3>
<h2 style="text-align: justify;">Set Your Priorities</h2>
<p style="text-align: justify;">Not all computers in the organization need to be patched at the same time. Some computers are more likely to be attacked because they are interface facing. Systems handling e-commerce such as point-of-sales machines and servers holding the customer database are usually <strong>more vulnerable to attack</strong>. Therefore, <strong>prioritize the patching process</strong> so that the most critical systems are serviced before others are.</p>
<h2 style="text-align: justify;">Standardize Your Configurations</h2>
<p style="text-align: justify;">If you use many tools and software programs, you will need to track and install several patches. <strong>Standardizing your configuration</strong> allows all systems to use the same operating system and tools. That results in easier maintenance and tracking of patches and service pack levels. If possible, <strong>lock down the configuration</strong> - this can easily be achieved in a Windows environment with the usage of <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html" target="_blank" title="Configuring Active Directory Group Policies">Active Directory Group Policies</a>. <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policy-enforcement.html" target="_blank" title="Enforcing Group Policies Active Directory Group Policies">Enforcing Group Policies</a> ensures users are not able to make any system configuration changes and all <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policy-enforcement.html" target="_blank" title="Enforcing Active Directory Group Policies">security polices are enforced</a> correctly.</p>
<h2 style="text-align: justify;">Plan Your Patches</h2>
<p style="text-align: justify;"><strong>Not all patches</strong> that the vendors release <strong>need to be installed</strong>. Actually, this depends on the criticality of the vulnerability that the patch fixes. If the patch fixes a <strong>critical vulnerability</strong> in a system that faces the <strong>maximum threat</strong>, <strong>install it immediately</strong>. For minor patches, the decision whether to install can be taken after an analysis of a what-if scenario in case the hole is left unpatched.</p>
<p style="text-align: justify;">Using an <strong>automated multi-platform patching tool is highly recommended</strong> - it installs all the important patches after testing them.</p>
<h2 style="text-align: justify;">Report Your Actions &amp; Analyze</h2>
<p style="text-align: justify;">Once you have installed the patches, the <strong>post-patch</strong> work begins. It starts with a report of what was installed and how many vulnerable systems were fixed. <strong>Acceptance testing comes next</strong>, to determine if the patch installation was done the right way and there are <strong>no conflicts</strong>.</p>
<p style="text-align: justify;">You must also test your system to see if the vulnerability has really been addressed. If the system still remains vulnerable, you may have to reinstall the patch or roll it back. A <strong>patch management tool</strong> makes the task simpler.</p>
<h2 style="text-align: justify;">Test Your Systems Seriously</h2>
<p style="text-align: justify;">Testing a patch for <strong>effectiveness and conflicts</strong> is <strong>very important</strong> in maintaining a running business process. A patch that trashes a stable system because of conflicts can do a lot of harm. You can use third parties for testing the patches before you install them. However, even if successfully tested by others, it is advisable to test the patch in-house before installation, especially if system uptime is important to your business.</p>
<p style="text-align: justify;">For in-house testing, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Virtualization">virtualization</a> helps as it provides a contained arena isolated from your actual production systems. In case of a virtualized environment a <a href="https://clixtrac.com/goto/?180621" target="_blank" rel="nofollow noopener" title="reliable VM backup tool">reliable backup tool</a> is very important to ensure the <a href="https://clixtrac.com/goto/?180621" target="_blank" rel="nofollow noopener" title="Preventing Data Loss in Virtualization Environment">prevention of data loss</a>. You could also try out a controlled rollout on less critical systems to see how the patch functions before installing on the entire network.</p>
<h2 style="text-align: justify;">Patch Your Systems Continually</h2>
<p style="text-align: justify;">Your IT team cannot rest if it has once patched the systems successfully. New vulnerabilities are discovered and the vendor releases further patches. Moreover, you may have deployed new tools. Therefore, the entire process of inventorying your assets, looking for patches and installing them is a continuous process along with conducting a vulnerability assessment of your network.</p>
<h2 style="text-align: justify;">How An Automated Patch Management System Helps</h2>
<p style="text-align: justify;">In an organization, the IT team needs to manage and monitor all assets effectively, efficiently and with complete transparency. They must ensure that <strong>all assets of the company perform at their peak efficiency</strong> while remaining <strong>safeguarded from attacks on their vulnerabilities</strong>. When examining the internal security of a network, the IT team looks at the overall scenario for:</p>
<ul class="checkbox">
<li style="text-align: justify;">Any unauthorized machine on the network</li>
<li style="text-align: justify;">Any machine that does not have the required security patches installed</li>
<li style="text-align: justify;">Any machine that does not have the necessary security set</li>
</ul>
<p style="text-align: justify;">An automated patch management system provides a consolidated platform for the IT team from where they can remotely manage the performance of the network and the software deployed while controlling the security of all the assets of the company.</p>
<h2 style="text-align: justify;">Scanning Your Network Internally</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/protecting-enterprise-smb-by-patching-systems-part-2-2.png" alt="protecting-enterprise-smb-by-patching-systems-part-2-2" style="margin: 7px; float: left;" title="GFI LanGuard Network Scanner" />LanGuard Network Security Scanner begins by scanning the entire network defined by a range of IP addresses. It is also possible to scan a list of computers or those under a specific domain. When scanned with null credentials, it generates a baseline scan giving you an idea of what any normal user would have access to. Apart from null credentials, you can set scanning credentials as a specific user or as the currently logged on user. Scanning with the full administrative access will provide complete details about any missing security patches and other vulnerabilities such as weak passwords used on shares.</p>
<p style="text-align: justify;">While scanning, LanGuard Network Security Scanner displays its results in two panes. On the left are the nodes it has discovered and on the right is the real-time log of its activities. Each node on the left can be expanded to show the information LanGuard Network Security Scanner has gathered. The easy-to-read display shows the sorted results of SNMP queries, NetBIOS queries, ping sweeps and port scans, with which LanGuard has probed each IP in the range. If the number of IPs to be scanned is high, LanGuard indicates the progress in the lower-right corner of the screen.</p>
<h2 style="text-align: justify;">Analyzing Your Results</h2>
<p style="text-align: justify;">After LanGuard has completed its scanning, you can analyze the results displayed. For a large list of IP addresses, the results are easier to read when you display them in a convenient report format. Choose from the several reporting options – you can also customize the report layout and content. You may also use the separate report generator tool.</p>
<p style="text-align: justify;">The LanGuard report highlights all the known vulnerabilities and provides links to resources related to each problem. It lists all open ports and mentions problems with the service that the port provides. By default, LanGuard scans only a few ports notorious for their vulnerabilities. However, you can manually add more ports that you want LanGuard to scan.</p>
<h2 style="text-align: justify;">Scanning Your Network Externally</h2>
<p style="text-align: justify;">You can also use LanGuard to access your network externally from a PC connected to the Internet. Select your public IP range and scan your network with null credentials. LanGuard will scan the ports of any IP addresses that do not respond to other queries and will expose any open ports that the firewalls and routers in the path have not blocked. You can set up different scanning configurations for LanGuard and save them for later recall.</p>
<h2 style="text-align: justify;">Set Your Scanning Options</h2>
<p style="text-align: justify;">You need to adjust different settings when scanning LAN, WAN or MAN. The time to complete the scan depends on these settings. For example, with the <strong>Debug settings</strong>, you can control how much information LanGuard displays on its right pane; adjusting the settings in the SNMP section, you can control how LanGuard probes using SNMP.</p>
<p style="text-align: justify;">There may be computers on the network that essentially block NetBIOS, ICMP and SNMP packets. LanGuard tackles such non-responsive machines by scanning their ports, provided you have enabled this option. However, this increases the scan time greatly.</p>
<h2 style="text-align: justify;">Detect Missing Fixes &amp; Security Patches</h2>
<p style="text-align: justify;">To keep itself current on the missing patches, LanGuard uses an XML file, which you can automatically download from Microsoft's Web Site. If you are using the registered version of LanGuard, you can deploy the missing patches remotely.</p>
<h2 style="text-align: justify;">Document Your Activity</h2>
<p style="text-align: justify;">The registered version of LanGuard has a great tool for documenting your network. Configure it for a standard report output and list specific information about your network. Next time you scan, you can compare the reports to document the difference.</p>
<p style="text-align: justify;">The report generator is a separate tool within LanGuard. You can use it to query the XML report files and create a custom report, which is a combination of multiple queries.</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">For any organization, the process of managing the inventory of assets, gathering information about vulnerabilities and then systematically patching them to protect from attacks, is a formidable task. Fortunately, automated tools for patch management make life easier for corporate IT teams. By automating much of the repetitive work, these tools allow IT to focus their expertise and knowledge where it benefits the company most – strengthening its cyber security.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sun, 24 Aug 2014 06:25:03 +1000</pubDate>
		</item>
		<item>
			<title>7 Security Tips to Protect Your Websites &amp; Web Server From Hackers</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/security-tips-how-to-protect-your-websites-and-webservers-from-hackers.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/security-tips-how-to-protect-your-websites-and-webservers-from-hackers.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/digital-eye.jpg" alt="digital eye" style="margin: 7px; float: left;" title="digital eye" />Recent and <strong>continuous website security breaches</strong> on <strong>large organizations</strong>, <strong>federal government agencies</strong>, <strong>banks</strong> and thousands of <strong>companies world-wide</strong>, has once again verified the importance of website and web application security to <strong>prevent hackers</strong> from <strong>gaining access to sensitive data</strong> while <strong>keeping corporate websites as safe as possible</strong>. Though many encounter a lot of problems when it comes to <strong>web application security</strong>; it is a pretty heavy filed to dig into.</p>
<p style="text-align: justify;">Some security professionals would not be able to provide all the necessary steps and precautions to deter malicious users from abusing your web application. Many web developers will encounter some form of difficulty while attempting to secure their website, which is understandable since web application security is a multi-faceted concept, where an attacker could make use of <strong>thousands of different exploits</strong> that could be present on your website.</p>
<p style="text-align: justify;">Although no single list of web security tips and tricks can be considered as complete (in fact, one of the tips is that the amount of knowledge, information and precautions that you can implement is never enough), the following is as close as you can get. We have listed six concepts or practices to aid you in securing your website which, as we already mentioned, is anything but straightforward. These points will get you started and nudge you in the right direction, where some factors in web application security are considered to be higher priority to be secured than others.</p>
<h2 style="text-align: justify;">1. Hosting Options</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/web-hosting.jpg" alt="web hosting" style="margin: 7px; float: left;" title="web hosting" />Without web hosting services most websites would not exist. The most popular methods to host web applications are:<strong>regular hosting</strong>, where your web application is hosted on a dedicated server that is intended for your website only, and <strong>shared hosting</strong>, where you share a web server with other users who will in turn run their own web application on the same server.</p>
<p style="text-align: justify;">There are multiple benefits to using shared hosting. Mainly this option is cheaper than having your own dedicated server which, therefore, generally attracts smaller companies preferring to share hosting space. The difference between shared and dedicated hosting will seem irrelevant when looking at this from a functionality point of view, since the website will still run, however, when discussing security we will need to look at it from a completely different perspective.</p>
<p style="text-align: justify;">The downside of shared hosting trumps any advantages that it may offer. Since the web server is being shared between multiple web applications, any attacks will also be shared between them. For example, if you share your web server with an organisation that has been targeted by attackers who have launched <strong>Denial of Service attacks</strong> on its website, your web application will also be affected since it is being hosted on the same server while using resources from the same resource pool. Meanwhile, the absence of complete control over the web server itself will allow the provider to take certain decisions that may place your web application at risk of being exploited. If one of the websites being hosted on the shared server is vulnerable, there is a chance that all the other websites and the web server itself could be exploited. Read more about web server security.</p>
<h2 style="text-align: justify;">2. Performing Code Reviews</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/code-review-check.png" alt="code review check" style="margin: 7px; float: left;" title="code review check" />Most successful attacks against web applications are due to insecure code and not the underlying platform itself. Case in point, <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/how-sql-injection-attacks-work-examples.html" target="_blank" title="SQL Injection attacks"><span style="color: #1155cc;">SQL Injection attacks</span></a> are still the most common type of attack even though the vulnerability itself has been around for over 20 years. This vulnerability does not occur due to incorrect input handling by the database system itself, it is entirely related to the fact that input sanitization is not implemented by the developer, which leads to untrusted input being processed without any filtering.</p>
<p style="text-align: justify;">This approach only applies for injection attacks and, normally, inspecting code would not be this straightforward. If you are making use of a pre-built application, updating to the latest version would ensure that your web application does not contain insecure code, although if you are using custom built apps, an in depth code review by your development team will be required. Whichever application type you are using, securing your code is a critical step or else the very base of the web application will be flawed and therefore vulnerable.</p>
<h2 style="text-align: justify;">3. Keeping Software Up To Date</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/software-update.png" alt="software update" style="margin: 7px; float: left;" title="software update" />When using software that has been developed by a third party, the best way to ensure that the code is secure would be to apply the latest updates. A simple web application will make use of numerous components that can lead to successful attacks if left unpatched. For example, both PHP and MySQL were vulnerable to exploits at a point in time but were later patched, and a default Linux webserver installation will include multiple services all of which need to be updated regularly to avoid vulnerable builds of software being exploited.</p>
<p style="text-align: justify;">The importance of updating can be seen from the <span style="color: #1155cc;">HEARTBLEED</span><strong> exploit</strong> discovered in OpenSSL, which is used by most web applications that serve their content via HTTPS. That being said, patching these vulnerabilities is an easy task once the appropriate patch has been released, you will simply need to update your software. This process will be different for every operating system or service although, just as an example to see how easy it is, updating services in Debian based servers will only require you to run a couple of commands.</p>
<h2 style="text-align: justify;">4. Defending From Unauthorised Intrusions</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/defending-against-intrusions.png" alt="defending against intrusions" style="margin: 7px; float: left;" title="defending against intrusions" />While updating software will ensure that no known vulnerabilities are present on your system, there may still be entry points where an attacker can access your system that have been missed in our previous tips. This is where firewalls come into play. A firewall is necessary as it will limit traffic depending on your configuration and can also be found on most operating systems by default.</p>
<p style="text-align: justify;">That being said, a firewall will only be able to analyse network traffic, which is why implementing a Web Application Firewall is a must if you are hosting a web application. WAFs are best suited to identifying malicious requests that are being sent to a web server. If the WAF identifies an SQL Injection payload in a request it will drop that request before it reaches the web server. Meanwhile if a WAF is not able to intercept these requests, you may also set up custom rules depending on the requests that need to be blocked. If you are wondering which requests you can block even before your WAF can, take a look at our next tip.</p>
<h2 style="text-align: justify;">5. Performing Web Vulnerability Scans</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/web-vulnerability-scans.png" alt="web vulnerability scans" style="margin: 7px; float: left;" title="web vulnerability scans" />No amount of code reviews and updates can ensure that the end product is not vulnerable and cannot be exploited. Code reviews are limited since the executed code is not being analysed, which is why web vulnerability scanning is essential. Web scanners will view the web application as a black box, where they will be analysing the finished product, which is not possible with white box scanning or code reviews. Meanwhile, some scanners will also provide you with the option to perform grey box scanning, by combining website scans and a backend agent that can analyse code.</p>
<p style="text-align: justify;">As complex and large as web applications are nowadays, it would be easy to miss certain vulnerabilities while performing a manual penetration test. Web vulnerability scanners will automate this process for you, thereby being able to cover a larger website in less time, while being able to detect most known <strong>vulnerabilities</strong>. One notorious vulnerability that is difficult to identify is <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/protecting-user-cookies-from-xss-vulnerabilities-attacks.html" target="_blank" title="DOM-based XSS"><span style="color: #1155cc;">DOM-based XSS</span></a>, although web scanners are still able to identify such vulnerabilities. Web vulnerability scanners will also provide you with requests that you need to block on your <strong>Web Application Firewall</strong> (<strong>WAF</strong>), while you are working to fix these vulnerabilities.</p>
<h2 style="text-align: justify;">6. Importance Of Monitoring</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/web-application-security/best-practices-secure-web-apps/application-monitoring-alerts.png" alt="application monitoring alerts" style="margin: 7px; float: left;" title="application monitoring alerts" />It is imperative to know if your web application has been subjected to an attack. <strong>Monitoring the web application</strong>, and the <strong>server hosting it</strong>, would be the best way to ensure that even if an attacker gets past your defence systems, at least you will know how, when and from where it happened. There may be cases when a website is brought offline due to an attack and the owner would not even know about the incident but will find out after precious time has passed.</p>
<p style="text-align: justify;">To avoid this you can <strong>monitor server logs</strong>, for example <strong>enabling notifications</strong> to be triggered when a file is deleted or modified. This way, if you had not modified that particular file, you will know that someone else has unauthorised access to your server. You can also monitor uptime which comes in handy when the attack is not as stealthy as modifying files, such as when your web server is subject to a <strong>Denial of Service attack</strong>. Such utilities will notify you as soon as your website is down, without having to discover the incident from users of your website.</p>
<p style="text-align: justify;">The worst thing you can do when implementing monitoring services would be to base them on the same web server that is to be monitored. If this server was knocked down, the monitoring service will not be available to notify you.</p>
<h2 style="text-align: justify;">7. Never Stop Learning</h2>
<p style="text-align: justify;">Finally, whatever you currently know about web security it’s never enough. Never stop learning about improving your <strong>web application’s security</strong> because literally every day brings a new exploit that may be used against your website. <strong>Zero day attacks</strong> happen out of the blue, which is why keeping yourself updated with any new security measures that you can implement is imperative. You can find such information from multiple web security blogs that detail how a website administrator should enforce their <strong>website’s security</strong>.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Mon, 15 Jun 2015 02:31:33 +1000</pubDate>
		</item>
		<item>
			<title>WordPress Audit Trail: Monitor Changes &amp; Security Alerts For WordPress Blogs, Websites, e-Shops - Regulatory Compliance</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/wordpress-audit-monitor-log-site-security-alerts.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/wordpress-audit-monitor-log-site-security-alerts.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-1a.png" alt="wordpress-audit-trail-log-site-security-alerts-1a" style="margin: 7px; float: left;" title="Monitor Changes &amp; Security Alerts For WordPress Blogs, Websites, e-Shops " />Monitoring</strong>, <strong>Auditing</strong> and obtaining <strong>Security Alerts</strong> for <strong>websites</strong> and <strong>blogs</strong> based on popular <strong>CMS systems</strong> such as <strong>WordPress</strong>, has become a necessity. <strong>Bugs</strong>, <strong>security exploits</strong> and <strong>security holes</strong> are being continuously discovered for every <strong>WordPress version</strong> making <strong>monitoring and auditing</strong> a <strong>high security priority</strong>. In addition, <strong>multi-user environments</strong> are often used for large <strong>WordPress websites</strong>, making it equally important to <strong>monitor WordPress user activity</strong>.</p>
<p style="text-align: justify;">Users with different privileges can login to the website’s admin pages and publish content, install a plugin to add new functionality to the website, or change a WordPress theme to change the look and feel of the website. From the admin pages of WordPress users can do anything, including taking down the website for maintenance, depending on their privileges.</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">The Need to Keep a Log of What is Happening on Your WordPress</span></h2>
<p style="text-align: justify;">Every type of multi-user software keeps an audit trail that records all user activity on the system. And, since modern business websites have become fully blown multi-user web applications, keeping a WordPress audit trail is a critical and must do task. A default installation of WordPress does not have an audit trail, but the good news is that there are plugins such as WP Security Audit Log that allow you to keep an audit trial of everything that is happening on your WordPress.</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-1b.png" target="_blank" title="Plugins like WP Security Audit Log provide detail tracking of all necessary events"><strong><img src="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-1.png" alt="wordpress-audit-trail-log-site-security-alerts-1" style="display: block; margin-left: auto; margin-right: auto;" title="Plugins like WP Security Audit Log provide detail tracking of all necessary events" /></strong></a><span style="font-size: 9pt; line-height: 115%;">Figure 1. Plugins like WP Security Audit Log provide detail tracking of all necessary events (click to enlarge)</span></p>
<p style="text-align: justify;">There are several advantages to keeping track of all the changes that take place on your WordPress website in an audit trail. Here are just a few:</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Keep Track Of Content &amp; Functionality Changes On Your WordPress</span></h2>
<p style="text-align: justify;">By keeping a WordPress audit trail you can find out who did what on your WordPress website. For example; who published an article, or modified existing and already published content of an article or a page, installed a plugin, changed the theme or modified the source code of a file.</p>
<p align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-2b.png" target="_blank" title="Searching for specific events in WordPress Security Audit Log"><img src="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-2.png" alt="Searching for specific events in WordPress Security Audit Log" title="Searching for specific events in WordPress Security Audit Log" /></a></p>
<p align="center">Figure 2. Searching for specific events in WordPress Security Audit Log (click to enlarge)</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Be Alerted to Suspicious Activity on Your WordPress</span></h2>
<p style="text-align: justify;">By keeping a WordPress Audit trail you can also be alerted to suspicious activity on your WordPress at an early stage, thus thwarting possible hack attacks. For example, when a WordPress is hacked, typically the attackers reset a user’s password or create a new account to login to WordPress. By using an add-on such as Email Notifications you can create specific rules so when important changes happen on your WordPress they are logged and you are notified via email.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/wordpress-audit-trail-log-site-security-alerts-3.png" alt="wordpress-audit-trail-log-site-security-alerts-3" style="display: block; margin-left: auto; margin-right: auto;" title=" WP Security Audit Log: Creating customized email alerts for your WordPress site " /><span style="font-size: 9pt; line-height: 115%;"> Figure 3. WP Security Audit Log: Creating customized email alerts for your WordPress site </span></p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Ensure the Productivity of Your Users &amp; Employees</span></h2>
<p style="text-align: justify;">Nowadays many businesses employ remote workers. As much as businesses benefit by employing remote workers, there are disadvantages. For example, while the activity of employees who work from the office can be easily tracked, that of remote workers cannot. Therefore if your business website is powered by WordPress, when you install a WordPress audit trail plugin you can keep track of everything your web team is doing on the website, including the login and logout times, and location.</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Ensure Your Business WordPress Websites Meet Mandatory Regulatory Compliance Requirements </span></h2>
<p style="text-align: justify;">If you have an online business, or if you are any sort of business via your WordPress website, there is a number of regulatory compliance requirements your website needs to adhere to, such as the PCI DSS. One common requirement these regulatory compliance requirements have is logs. As a website owner you should keep a log, or audit trail, of all the activity that is happening on your website.</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Ease WordPress Troubleshooting </span></h2>
<p style="text-align: justify;">If you already have experience managing a multi-user system, you know that if something breaks down users will never tell you what they did. This is common, especially when administering customers’ websites. The customer has administrative access to WordPress. Someone installs a plugin, the website goes haywire yet it is no one’s fault. By keeping a WordPress audit trail you can refer to it and easily track any website changes that took place, thus making troubleshooting really easy.</p>
<h2 style="text-align: left;"><span style="font-weight: normal; font-style: normal;">Keep A WordPress Audit Trail</span></h2>
<p style="text-align: justify;">There are several other <strong>advantages</strong> when you <strong>keep a WordPress audit trail to keep a record of all the changes</strong> that take place on your <strong>WordPress</strong> site, such as having the ability to generate reports to justify your charges. The list of advantages can be endless but the most important one is <strong>security</strong>. Typically overlooked, <strong>logging</strong> also helps you ensure the <strong>long term security</strong> of your <strong>WordPress website</strong>. </p>
<p style="text-align: right;" align="right">&nbsp;</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Wed, 06 Apr 2016 22:57:57 +1000</pubDate>
		</item>
		<item>
			<title>Understanding SQL Injection Attacks &amp; How They Work. Identify SQL Injection Code &amp; PHP Caveats</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/understanding-sql-injection-attacks-how-they-work-and-protecting-webservers.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/understanding-sql-injection-attacks-how-they-work-and-protecting-webservers.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/Introduction-to-SQL-Injection-01.png" alt="Introduction-to-SQL-Injection-01" style="margin: 7px; float: left;" title="Understand &amp; Protect from SQL Injections – SQL Injection code examples" />SQL Injections</strong> have been keeping <strong>security experts</strong> busy for over a decade now as they continue to be one of the <strong>most common type</strong> of <strong>attacks against webservers, websites</strong> and <strong>web application servers</strong>. In this article, we explain <strong>what a SQL injection is</strong>, show you <strong>SQL injection examples</strong> and analyse how these type of attacks manage to <strong>exploit web applications and webservers</strong>, providing hackers <strong>access to sensitive data</strong>.</p>
<div style="text-align: justify;">Additional interesting <strong>Web Hacking</strong> and <strong>Web Security content</strong>:</div>
<ul class="checkbox">
<li>
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/security-tips-how-to-protect-your-websites-and-webservers-from-hackers.html" target="_blank" title="Protect Your Websites &amp; Web Server From Hackers">7 Security Tips to Protect Your Websites &amp; Web Server From Hackers</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/automation-web-application-security-testing.html" target="_blank" title="Importance of Automating Web Application Security Testing &amp; Penetration Testing">The Importance of Automating Web Application Security Testing &amp; Penetration Testing</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/implications-of-unsecure-webservers-and-websites-for-oganizations-companies.html" target="_blank" title="Implications of Unsecure Webservers &amp; Websites for Organizations &amp; Businesses">The Implications of Unsecure Webservers &amp; Websites for Organizations &amp; Businesses</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/netsparker-discovery-wordpress-dom-xss-scripting-vulnerability.html" target="_blank" title="WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker">WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/choosing-web-application-security-scanner.html" target="_blank" title="Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools">Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools</a></div>
</li>
</ul>
<h2 style="text-align: justify;">What Is A SQL Injection?</h2>
<p style="text-align: justify;">Websites operate typically with two sides to them: the <strong>frontend</strong> and <strong>backend</strong>.&nbsp; <strong>The frontend</strong> is the element we see, the rendered HTML, images, and so forth.&nbsp; On the <strong>backend</strong> however, there are layers upon layers of systems rendering the elements for the frontend. One such layer, the database, most commonly uses a database language called <strong>SQL</strong>, or <strong><em>Structured Query Language</em></strong>. This standardized language provides a logical, human-readable sentence to perform definition, manipulation, or control instructions on relational data in tabular form. The problem, however, is while this provides a structure for human readability, it also opens up a major problem for security.</p>
<div style="text-align: justify;">Typically, when data is provided from the frontend to the backend of a website – e.g. an HTML form with username and password fields – this data is inserted into the sentence of a SQL query. This is because rather than assign that data to some object or via a <em>set()</em> function, the data has to be concatenated into the middle of a string. As if you were printing out a concatenated string of debug text and a variable’s value, SQL queries work in much the same way. The problem, however, is because the database server, such as MySQL or PostgreSQL, must be able to lexically analyse and understand the sentence’s grammar and parse <em>variable=value</em> definitions. There must exist certain specific requirements, such as wrapping string values in quotes. A SQL injection vulnerability, therefore, is where unsanitized frontend data, such as quotation marks, can disrupt the intended sentence of a SQL query.</div>
<h2 style="text-align: justify;">How Does A SQL Injection Work?</h2>
<p style="text-align: justify;">So what does “disrupt the intended sentence of a SQL query” mean? A SQL query reads like an English sentence:</p>
<p style="text-align: justify;"><em>Take variable foo and set it to <strong>‘bar’</strong> in table <strong>foobar</strong>.</em><br />Notice the single-quotes around the intended value, <em><strong>bar</strong></em>. But if we take that value, add a single quote and some additional text, we can <em>disrupt the intended sentence,</em> creating two sentences that change the entire effect. So long as the database server can lexically understand the sentence, it is none the wiser and will happily complete its task.&nbsp; So what would this look like?</p>
<p style="text-align: justify;">If we take that value <em><strong>bar</strong></em> and change it to something more complex – <em><strong>bar’</strong></em> <em>in table <strong>foobar</strong></em>. <strong>Delete all values not equal to ‘</strong> – it completely disrupts everything. The sentence is thus changed as follows:</p>
<p style="text-align: justify;"><em>Take variable <strong>foo</strong> and set it to<span style="color: #ff0000;"> <strong>‘bar’</strong> in table <strong>foobar</strong>. Delete all values not equal to ‘’</span> in table <strong>foobar</strong>.</em></p>
<p style="text-align: justify;">Notice how dramatically this disrupts the intended sentence? By<em> injecting</em> additional information, including syntax, into the sentence, the entire intended function and result has been disrupted to effectively delete everything in the table, rather than just change a value.</p>
<h2 style="text-align: justify;">What Does A SQL Injection Look Like?</h2>
<p style="text-align: justify;">In code form, a SQL injection can find itself in effectively any place a SQL query can be altered by the user of a web application. This means things like query strings e.g: <em>example.com/?this=query_string</em>, form content (such as a comments section on a blog or even a username &amp; password input fields on a login page), cookie values, HTTP headers (e.g. X-FORWARDED-FOR), or practically anything else.&nbsp; For this example, consider a simple query string in PHP:</p>
<p class="box-info" style="text-align: justify;"><strong>Request URI: /?username=admin</strong><br />&nbsp;<br />1.&nbsp; $user = $_GET['username'];<br />2.&nbsp; mysql_query("UPDATE tbl_users SET admin=1 WHERE username='$user'");</p>
<p style="text-align: justify;">First, we will break this down a bit.</p>
<p style="text-align: justify;">On line #1, we set the value of the username field in the query string to the variable<em> $user</em>.</p>
<p style="text-align: justify;">On line #2, we insert that variable’s value into the query string’s sentence. Substituting the variable for the value <em><strong>admin</strong></em> in the URI, the database query would ultimately be parsed as follows by MySQL:</p>
<p class="box-info" style="text-align: justify;">UPDATE tbl_users SET admin=1 WHERE username='admin'</p>
<p style="text-align: justify;">However, a lack of basic sanitization opens this query string up to serious consequences. All an attacker must do is put a single quote character in the username query string field in order to alter this sentence and inject whatever additional data he or she would like.</p>
<p style="text-align: justify;">Here is an example of what this would look like:</p>
<p class="box-info" style="text-align: justify;"><strong>Request URI: /?username=admin' OR 'a'='a</strong><br />&nbsp;<br />1.&nbsp; $user = $_GET['username'];<br />2.&nbsp; mysql_query("UPDATE tbl_users SET admin=1 WHERE username='$user'");</p>
<p style="text-align: justify;">Now, with this altered data, here is what MySQL would see and attempt to evaluate:</p>
<p class="box-info" style="text-align: justify;">UPDATE tbl_users SET admin=1 WHERE username='admin' OR 'a'='a'</p>
<p style="text-align: justify;">Notice, now, that if the letter <em><strong>A</strong></em> equals the letter <em><strong>A</strong></em> (basically true=true), all users will be set to admin status.</p>
<h4 style="text-align: justify;">Ensuring Code is Not Vulnerable to SQL Injection Vulnerabilities</h4>
<p style="text-align: justify;">If we were to add a function, <a href="https://secure.php.net/manual/en/function.mysql-real-escape-string.php" target="_blank" rel="nofollow noopener" title="mysql_real_escape_string()"><em>mysql_real_escape_string()</em></a> for example, on line #1, that would prevent this particular variable from being vulnerable to a <a href="https://www.netsparker.com/web-vulnerability-scanner/vulnerability-security-checks-index/sql-injection/" target="_blank" rel="nofollow noopener" title="SQL injection">SQL injection</a>. In practice, it would look like this:</p>
<p class="box-info">Request URI: /?username=admin' OR 'a'='a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.&nbsp; $user = mysql_real_escape_string($_GET['username']);<br />2.&nbsp; mysql_query("UPDATE tbl_users SET admin=1 WHERE username='$user'");</p>
<p style="text-align: justify;">This function escapes certain characters dangerous to MySQL queries, by prefixing those characters with backslashes. Rather than evaluate the single quote character literally, MySQL understands this prefixing backslash to mean do not evaluate the single quote. Instead, MySQL treats it as part of the whole value and keeps going.&nbsp; The string, to MySQL, would therefore look like this:</p>
<p style="text-align: justify;"><br /><span class="box-info">UPDATE tbl_users SET admin=1 WHERE username='admin\' OR \'a\'=\'a'</span></p>
<p style="text-align: justify;">Because each single quote is escaped, MySQL considers it part of the whole username value, rather than evaluating it as multiple components of the SQL syntax. The SQL injection is thus avoided, and the intention of the SQL sentence is thus undisrupted.</p>
<p style="text-align: justify;">Caveat: For these examples, we used older, deprecated functions like<strong> <em>mysql_query()</em> </strong>and <strong><em>mysql_real_escape_string()</em></strong> for two reasons:</p>
<p style="text-align: justify; margin-left: 30px;">1.&nbsp;&nbsp;&nbsp; Most PHP code still actively running on websites uses these deprecated functions;<br />2.&nbsp;&nbsp;&nbsp; It allows us to provide simple examples easier for users to understand.</p>
<p style="text-align: justify;">However, the right way to do it is to use prepared SQL statements. For example, the <em>prepare()</em> functions of the <a href="https://php.net/manual/en/book.mysqli.php" target="_blank" rel="nofollow noopener" title="MySQLi">MySQLi</a> and <a href="https://php.net/manual/en/ref.pdo-mysql.php" target="_blank" rel="nofollow noopener" title="PDO_MySQL">PDO_MySQL</a> PHP extensions allow you to format and assemble a SQL statement using directive symbols very much like a <strong><em>sprintf()</em></strong> function does. This prevents any possibility of user input injecting additional SQL syntax into a database query, as all input provided during the execution phase of a prepared statement is sanitized.&nbsp; Of course, this all assumes you are using PHP, but the idea still applies to any other web language.</p>
<h2 style="text-align: justify;">SQL Injection Is The Most Widely Exploited Vulnerability</h2>
<p style="text-align: justify;">Even though it has been more than sixteen years since the first documented attack of SQL Injection, it is still a very popular vulnerability with attackers and is widely exploited. In fact SQL Injection has always topped the OWASP Top 10 list of most exploited vulnerabilities.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 08 Aug 2015 18:32:00 +1000</pubDate>
		</item>
		<item>
			<title>Web Application Security Interview on Security Weekly – Importance of Automated Web Application Security</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/netsparker-ceo-interview-importance-of-automated-web-application-scanner.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/netsparker-ceo-interview-importance-of-automated-web-application-scanner.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/netsparker-importance-of-automated-web-application-scanner.png" alt="netsparker-importance-of-automated-web-application-scanner" style="margin: 7px; float: left;" title="netsparker-importance-of-automated-web-application-scanner" />A few weeks back Security Weekly interviewed Ferruh Mavituna, Netsparker’s CEO and Product Architect. Security Weekly is a popular podcast that provides free content within the subject matter of IT security news, vulnerabilities, hacking, and research and frequently interviews industry leaders such as John Mcafee, Jack Daniel and Bruce Schneier.</p>
<p style="text-align: justify;">During the 30 minutes interview, Security Weekly’s host Paul Asadoorian and Ferruh Mavituna highlight how important it is to use an automated web application security scanner to find vulnerabilities in websites and web applications. They also briefly discuss web application firewalls and their effectiveness, and how Netsparker is helping organizations improve their post scan process of fixing vulnerabilities with their online web application security scanner Netsparker Cloud.</p>
<p style="text-align: justify;">Paul and Ferruh covered several other aspects of web application security during this interview, so if you are a seasoned security professional, a developer or a newbie it is a recommended watch. &nbsp;</p>
<p style="text-align: justify;">To view the interview, click on the image below:</p>
<p style="text-align: center;"><a href="https://www.youtube.com/watch?v=8xXR4-K-PyE" target="_blank" rel="nofollow noopener" title="Netsparker CEO explains the importance of automated web application security scanners"><img src="https://www.firewall.cx/images/stories/netsparker-ceo-interview-importance-of-automated-web-application-scanner.png" alt="netsparker-ceo-interview-importance-of-automated-web-application-scanner" style="margin: 7px; vertical-align: bottom;" title="Netsparker CEO explains the importance of automated web application security scanners" /></a><br />Figure 1. Netsparker CEO explains the importance of automated web application security scanners</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Wed, 01 Jul 2015 18:59:33 +1000</pubDate>
		</item>
		<item>
			<title>WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/netsparker-discovery-wordpress-dom-xss-scripting-vulnerability.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/netsparker-discovery-wordpress-dom-xss-scripting-vulnerability.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/netsparker-discovery-wordpress-dom-xss-scripting-vulnerability-1.png" alt="netsparker-discovery-wordpress-dom-xss-scripting-vulnerability-1" style="margin: 7px; float: left;" title="Netsparker WordPress DOM XSS Cross-site Scripting Vulnerability" />8th of May 2015</strong>, <strong>Netsparker</strong> annouced yesterday the discovery of <strong>critical security vulnerability</strong> contained an <strong>HTML file</strong> found on many <strong>WordPress themes</strong>, including <strong>WordPress.org hosted websites</strong>. As reported by Netsparker the <strong>specific HTML file is vulnerable to cross-site scripting attacks and session hijack.</strong> WordPress.org has already issued an official annoucement and patch (v4.2.2) and recommends WordPress administrators <strong>update their website files</strong> and <strong>themes</strong>.</p>
<p style="text-align: justify;">The <strong>Genericons icon font package</strong>, which is used in a number of popular themes and plugins, <strong>contained an HTML file vulnerable to a cross-site scripting attack</strong>. All affected themes and plugins hosted on&nbsp;WordPress.org&nbsp;(including the Twenty Fifteen default theme) have been updated yesterday by the WordPress security team to address this issue by removing this nonessential file.&nbsp;To help protect other Genericons usage, <strong>WordPress 4.2.2</strong> proactively scans the wp-content directory for this HTML file and removes it. Reported by&nbsp;Robert Abela of Netsparker.</p>
<p style="text-align: justify;">By exploiting a <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/understanding-xss-cross-site-scripting-attacks-and-types-of-xss-exploits.html" target="_blank" title="Cross-site scripting vulnerability">Cross-site scripting vulnerability</a> the attacker can <strong>hijack a logged in user’s session</strong>. This means that the malicious hacker can <strong>change</strong> the logged in <strong>user’s password</strong> and invalidate the session of the victim while the <strong>hacker maintains access</strong>. As seen from the XSS example in Netsparker's article, if a web application is vulnerable to cross-site scripting and the <strong>administrator’s session is hijacked</strong>, the malicious <strong>hacker</strong> exploiting the vulnerability <strong>will have full admin privileges on that web application</strong>.</p>
<h4 style="text-align: justify;">Related Security Articles</h4>
<ul>
<li class="checkbox" style="text-align: justify;">
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/implications-of-unsecure-webservers-and-websites-for-oganizations-companies.html" target="_blank" title="The Implications of Unsecure Webservers &amp; Websites for Organizations &amp; Businesses">The Implications of Unsecure Webservers &amp; Websites for Organizations &amp; Businesses</a></div>
</li>
<li class="checkbox" style="text-align: justify;">
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/automation-web-application-security-testing.html" target="_blank" title="The Importance of Automating Web Application Security Testing &amp; Penetration Testing">The Importance of Automating Web Application Security Testing &amp; Penetration Testing</a></div>
</li>
<li class="checkbox" style="text-align: justify;">
<div><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/choosing-web-application-security-scanner.html" target="_blank" title="Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools">Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools</a></div>
</li>
</ul>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 09 May 2015 04:52:46 +1000</pubDate>
		</item>
		<item>
			<title>Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/choosing-web-application-security-scanner.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/choosing-web-application-security-scanner.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/choosing-web-application-security-scanner-1.jpg" alt="choosing-web-application-security-scanner-1" style="margin: 7px; float: left;" title="Selecting the right Web Security Scanner" />In the world of information security there exist many tools, from small open source products to full appliances to secure a system, a network, or an entire corporate infrastructure.&nbsp; Of course, everyone is familiar with the concept of a firewall – even movies like Swordfish and TV shows like NCIS have so very perfectly described, in riveting detail, what a firewall is.&nbsp; But there are other, perhaps less sexy utilities in a security paradigm.</p>
<p style="text-align: justify;">Various concepts and security practices – such as using complex passphrases, or eschewing passphrases entirely, deeply vetting email sources, safe surfing habits, etc. – are increasingly growing trends among the general workforce at large, especially with the ubiquity of computers at every desk.&nbsp; But security in general is still unfortunately looked at as an afterthought, even when a lack thereof begets massive financial loss at a seemingly almost daily level.</p>
<p style="text-align: justify;">Security engineers are all too often considered an unnecessary asset, simply a menial role anybody can do; A role that can be assumed as yet another hat worn by developers, system administrators, or, well, perhaps just someone who only shows a modest capability with Excel formulas.&nbsp; Whatever the reason for such a decision, be it financial or otherwise, the consequences can be severe and long-lasting.&nbsp; Sony underestimated the value of a strong and well-equipped security team multiple times, choosing to forego a powerful army in lieu of a smaller, less outfitted and, thus, thinner stretched but cheaper alternative.&nbsp; This, in turn, yielded among the largest multiple security breaches to ever be seen, especially by a single corporation.&nbsp; Were their security department better outfitted with the right tools, it is quite possible those events would have played out entirely different.</p>
<h2 style="text-align: justify;">Using The Right Security Tools</h2>
<p style="text-align: justify;">So, what constitutes “the right tools”?&nbsp; Many things.&nbsp; A well-populated team of capable security engineers certainly can be considered a valuable tool in building a strong security posture within an infrastructure.&nbsp; But, more specifically and very critically, it is what assets those engineers have at their disposal that may mean the difference between a minor event that never even makes it outside the corporate headquarters doors, and a major event that results in a corporation paying for identity theft protection for millions of customers.&nbsp; Those tools of course vary widely depending on the organization, but one common element they all do – or at least absolutely should – share is a <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners.html" target="_blank" title="web application security scanner">web application security scanner</a>.</p>
<h2 style="text-align: justify;">What Is A Web Application Security Scanner?</h2>
<p style="text-align: justify;">A website that accepts user input in any form, be it URL values or submitted content, is a complex beast.&nbsp; Not only does the content an end user provides change the dynamics of the website, but it even has the potential to cripple that website if done maliciously and left unprotected against.&nbsp; For every possibility of user content, the amount of potential attack vectors increases on a magnitude of near infinity.&nbsp; It is literally impossible for a security engineer, or even team thereof, to account for all these possibilities by hand and, especially, test them for known or unknown vulnerabilities.</p>
<p style="text-align: justify;">Web scanners exist for this very purpose, designed carefully to predict potential and common methods of attack, then brute-force test them to find any possibility of an existing vulnerability.&nbsp; And they do this at a speed impossible for humans to replicate manually.&nbsp; This is crucial for many reasons, namely that it saves time, it is thorough and comprehensive, and, if designed well, adaptive and predictive to attempt clever methods that even the most skilled security engineer may not immediately think of.&nbsp; Truly, not using a web security scanner is only inviting potentially irreparable harm to a web application and even the company behind it.&nbsp; But the question remains: Which web scanner works the best?</p>
<h2 style="text-align: justify;">Options Galore - How To Choose Which Web Scanner Is Right For You</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/choosing-web-application-security-scanner-2.jpg" alt="choosing-web-application-security-scanner-2" style="margin: 7px; float: left;" title="Choosing the right Web Security Scanner" />Many websites and web applications are like a human fingerprints, with no two being alike.&nbsp; Of course, many websites may use a common backend engine – Wordpress, an MVC framework like Laravel or Ruby on Rails, etc. – but the layers on top of those engines, such as plugins or custom coded additions, are often a quite unique collection.&nbsp;</p>
<p style="text-align: justify;">The backend engine is also not the only portion to be concerned with.&nbsp; Frontend vulnerabilities may exist with each of these layers, such as cross-site scripting, insecurely implemented jQuery libraries, and add-ons, poor sanitization against AJAX communication models, and many more.&nbsp; Each layer presents another nearly endless array of input possibilities to test for vulnerabilities.</p>
<p style="text-align: justify;">A web scanner needs to be capable of digging through these unique complexities and provide accurate, reliable findings.&nbsp; False positives can waste an engineer’s time, or worse, send a development team on a useless chase to perform unit tests, wasted looking for a falsely detected vulnerability.&nbsp; And if the scanner is difficult to understand or provides little understanding of the detected vulnerabilities, it makes for a challenging or undesirable utility that may go unused.&nbsp; Indeed, a well-designed web security scanner that delivers on all fronts is an important necessity for a strong security posture and a better secured infrastructure.</p>
<h2 style="text-align: justify;">Final Thoughts</h2>
<p style="text-align: justify;">There is no one perfect solution that will solve all problems and completely secure your website such that it becomes impenetrable.&nbsp; Further, a web security scanner will only be as effective as the security engineers or developers fixing all flaws it finds.&nbsp; A web security scanner is only the first of many, many steps, but it indeed is an absolutely critical one for a powerful security posture.</p>
<p style="text-align: justify;">Indeed, we keep returning to that phrase – <em>security posture</em> – because it is a perfectly analogous way to look at web application, system, and infrastructure security for both what it provides and what is required for good posture: a strong backbone.&nbsp; Focused visibility and a clear view of paths over obstructions is not possible with a slouched posture.&nbsp; Nothing will provide that vision as clearly as a web security scanner will, and no backbone is complete without a competent and useful web security scanning solution at its top.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Tue, 14 Apr 2015 09:17:45 +1000</pubDate>
		</item>
		<item>
			<title>Comparing Netsparker Cloud-based and Desktop-based Security Software solutions – Which solution is best for you?</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-vs-desktop-based-security-solutions.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-vs-desktop-based-security-solutions.html</guid>
			<description><![CDATA[<p style="text-align: justify;">If you are reading this you have heard about the Cloud Computing. If not, I would be worried! Terms such as Cloud Computing, Software as a Service, Cloud Storage has become a permanent fixture in adverts, marketing content and technical documentation.</p>
<p style="text-align: justify;">Many Windows desktop software applications have moved to the “cloud”. Though, even though the whole industry wants you and your data in the cloud, have you ever looked into the pros and cons of the cloud? Does it make sense to go into that direction?</p>
<p style="text-align: justify;">Let’s use web application security scanners as an example, software that is used to automatically identify vulnerabilities and security flaws in websites and web applications. Most, if not all of the industry leading vendors have both a desktop edition and an online service offering. In fact Netsparker just launched their all new service offering; Netsparker Cloud, the online false positive free web application security scanner. In such case which one should you go for?</p>
<p style="text-align: justify;">As clearly explained in Netsparker Desktop VS Netsparker Cloud both web security solutions are built around the same scanning engine, hence their vulnerability detection capabilities are the same. The main differences between both of them are the other non-scan related features, which also define the scope of the solution.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/cloud-based-vs-desktop-based-security-solutions-1b.png" target="_blank" title="Netsparker Cloud-based Website security scanner"><img src="https://www.firewall.cx/images/stories/cloud-based-vs-desktop-based-security-solutions-1.png" alt="cloud-based-vs-desktop-based-security-solutions-1" style="display: block; margin-left: auto; margin-right: auto;" title="Netsparker Web-Based Security Application" /></a>Figure 1. Netsparker Cloud-based Security Sanner (Click to enlarge)</p>
<p style="text-align: justify;">For example Netsparker Desktop is ideal for small teams, or security professionals who work on their own and have a small to medium workload. On the other hand Netsparker Cloud is specifically designed for organizations which run and manage a good number of websites and maybe even have their own team of developers and security professionals. It is a multi–user platform, has a vulnerability tracking solution (a system that is similar to a normal bug tracking solution but specifically designed for web application vulnerabilities) and it is fully scalable, to accommodate the simultaneous scanning of hundreds and thousands of web applications.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/cloud-based-vs-desktop-based-security-solutions-2b.png" target="_blank" title="Netsparker Desktop-based Website security scanner"><img src="https://www.firewall.cx/images/stories/cloud-based-vs-desktop-based-security-solutions-2.png" alt="cloud-based-vs-desktop-based-security-solutions-2" style="display: block; margin-left: auto; margin-right: auto;" title="Netsparker Desktop-Based Security Application" /></a>Figure 2. Netsparker Desktop-based Security Sanner (Click to enlarge)</p>
<p style="text-align: justify;">Do not just follow the trend, inform yourself. Yes, your readings might be flooding with cloud related terms, the industry is pushing you to move your operations to the <strong>cloud</strong> as it is cheaper and <strong>more reliable</strong>, but as clearly explained in the <strong>desktop vs cloud web scanner comparison</strong>, both solutions still have a place in today’s industry.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Wed, 25 Mar 2015 21:46:20 +1100</pubDate>
		</item>
		<item>
			<title>The Importance of Automating Web Application Security Testing &amp; Penetration Testing </title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/automation-web-application-security-testing.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/automation-web-application-security-testing.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/automation-web-application-security-testing-1.jpg" alt="automation-web-application-security-testing-1" style="margin: 7px; float: left;" title="Automating Web Application Security Scanning" />Have you ever tried to make a list of all the attack surfaces you need to secure on your networks and web farms? Try to do it and there will be one thing that will stand out; keeping websites and web applications secure. We have <strong>firewalls</strong>, <strong>IDS</strong> and <strong>IPS systems</strong> that inspect every packet that reaches our servers and are able to drop it should it be flagged as <strong>malicious</strong>, but what about <strong>web applications</strong>?</p>
<p style="text-align: justify;"><strong>Web application security</strong> is different than <strong>network security</strong>. When configuring a firewall you control who accesses what, but when it comes to web application security you have to allow everybody in, including the bad guys and expect that everyone plays by the rules. Hence <strong>web applications should be secure</strong>; web application security should be given <strong>much more attention</strong> and considering the complexity of today’s web applications, it should be <strong>automated</strong>.</p>
<p style="text-align: justify;">Let’s dig in deep in this subject and see why it needs to be automated.</p>
<h2 style="text-align: justify;">Automated Web Security Testing Saves Time</h2>
<p style="text-align: justify;">Also known as <strong>Penetration Testing</strong> or “<strong>pen testing</strong>”, this is the process by which a security engineer or “pen tester” applies a series of <strong>injection</strong> or <strong>vulnerability tests</strong> against areas of a website that accept user input to find potential exploits and alert the website owner before they get taken advantage of and become massive headaches or even financial losses. Common places for this can include user data submission areas such as authentication forms, comments sections, user viewing configuration options (like layout selections), and anywhere else that accepts input from the user. This can also include the URL itself, which may have a Search Engine Optimization-friendly URI formatting system.</p>
<p style="text-align: justify;">Most MVC frameworks or web application suites like WordPress offer this type of URI routing. (We differentiate a URL and URI. A URL is the entire address, including the <strong>http://</strong> portion, the entire domain, and everything thereafter; whereas the URI is the portion starting usually after the domain (but sometimes including, for context), such as /user/view/123 or test.com/articles/123.)</p>
<p style="text-align: justify;">For example, your framework may take a URI style as test.com/system/function/data1/data2/, where system is the controlling system you wish to invoke (such as an articles system), function is the action you wish to invoke (such as read or edit), and the rest are data values, typically in assumed positions (such as year/month/article-title).</p>
<p style="text-align: justify;">Each of these individual values require a specific data type, such as a string, an integer, a certain regular expression match, or infinite other possibilities. If data types are not strictly enforced, or – sadly as often as this really does happen – user-submitted data is properly sanitized, then a hacker can potentially gain information to get further access, if not even force direct backdoor access via a&nbsp; <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/how-sql-injection-attacks-work-examples.html" target="_blank" title="SQL injection">SQL injection</a> or a remote file inclusion. Such vulnerabilities are such a prevalent and consistent threat, that for example <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/how-sql-injection-attacks-work-examples.html" target="_blank" title="SQL Injection has made it to the OWASP Top 10 list for over 14 years">SQL Injection has made it to the OWASP Top 10 list for over 14 years</a>.</p>
<p style="text-align: justify;">There exist potentially millions, billions, or more combinations of various URIs in your web application, including ones it may not support by default or even to your knowledge. There could be random<a href="http://php.net/manual/en/function.phpinfo.php"></a>phpinfo(); scripts publicly accessible that mistakenly got left in by a developer, an unchecked user input somewhere, some file upload system that does not properly prevent script execution – any random number of possibilities. No security engineer or his team can reasonably assume for or test all of these possibilities. And black-hat hackers know all this too, sometimes better than those tasked to protect against these threats.</p>
<h2 style="text-align: justify;">Automation Isn’t Just Used By The Good Guys</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/automation-web-application-security-testing-2.jpg" alt="automation-web-application-security-testing-2" style="margin: 7px; float: left;" title="Inspecting Web Applications for Vulnerabilities" />Many automated security tools exist not to test and find security holes, but to exploit them when found. Black-hat hackers intent on disrupting your web application possess automated suites as well, because they too, know a manual approach is a waste of time (that is, until they find a useful exploit, and by then it’s sometimes too late).</p>
<p style="text-align: justify;">Some utilities, like <a href="http://ha.ckers.org/slowloris/"></a><strong>Slowloris</strong>, exist to exploit known weaknesses in common web services, like the Apache web server itself. Others pray on finding opportunity in the form of insecure common web applications – older versions of Wordpress, phpBB, phpMyAdmin, cPanel, or other frequently exploited web applications. There exist <a href="https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/"></a>dozens of categorical vulnerabilities, each with thousands or millions of various attack variants. Looking for these is a daunting task.</p>
<p style="text-align: justify;">As quickly as you can spin up a web application, a hacker can automatically scan it and possibly find vulnerabilities. Leveraging an automated web application vulnerability scanner like Netsparker or Netsparker Cloud provides you the agility and proactivity to find and prevent threats before they become seriously damaging problems. This holds especially true for complex web applications such as large forum systems, blogging platforms and custom web applications. The more possibility for user submitted data and functionality, the more opportunity for vulnerabilities to exist and be exploited. And remember, this changes again for every new version of the web application you install. A daunting task, indeed.</p>
<p style="text-align: justify;">Without automation of web application security testing, a true strong security posture is impossible to achieve. Of course, many other layers ultimately exist – least-privilege practice, segregated (jail, chroot, virtual machine) systems, firewalls, etc. – but if the front door is not secure, what does it matter if the walls are impenetrable? With the speed afforded by automation, a strong and capable web vulnerability scanner, and of course patching found flaws and risks, security testing guarantees as best as reasonably possible that the front door to your web application and underlying infrastructure remains reinforced and secure.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Thu, 26 Feb 2015 08:23:16 +1100</pubDate>
		</item>
		<item>
			<title>Statistics Highlight the State of Security of Web Applications - Many Still Vulnerable to Hacker Attacks</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/state-of-security-of-web-applications.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/state-of-security-of-web-applications.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/state-of-security-of-web-applications-1.png" alt="state-of-security-of-web-applications-1" style="display: block; margin: 7px; float: left;" title="Web Security Hacking - Passwords" />Netsparker</strong> use <strong>open source web applications</strong> such as Twiki for a total different purpose than what they were intended for. They used them to test their own web application security scanners.</p>
<p style="text-align: justify;">Netsparker need to ensure that their scanners are able to <strong>crawl</strong> and <strong>identify attack surfaces</strong> on all sort of <strong>web applications</strong>, and identify as much vulnerabilities as possible. Hence they frequently scan open source web applications. They use open source web applications as a test bed for their crawling and scanning engine.</p>
<p style="text-align: justify;">Thanks to such exercise <strong>Netsparker</strong> are also helping developers ship more secure code, since they report their findings to the developers and sometimes also help them remediate the issue. When such web application vulnerabilities are identified Netsparker release an advisory and between <strong>2011</strong> and <strong>2014</strong> Netsparker published <strong>87 advisories</strong>.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/state-of-security-of-web-applications-2.png" alt="state-of-security-of-web-applications-2" style="display: block; margin-left: auto; margin-right: auto;" title="state of security of web applications" /></p>
<p style="text-align: justify;">A few days ago Netsparker released some statistics about the 87 advisories they published so far. As a quick overview, from these statistics we can see that <a href="https://www.firewall.cx/security/web-application-vulnerability-scanners/protecting-user-cookies-from-xss-vulnerabilities-attacks.html" target="_blank" title="Netsparker cross-site scripting">cross-site scripting</a> is the most common vulnerability in the open source web applications that were scanned. Is it a coincidence? Not really.</p>
<p style="text-align: justify;">The article also explains why most probably many web applications are vulnerable to this vulnerability, which made it to the OWASP Top 10 list ever since.</p>
<p style="text-align: justify;">The conclusion we can draw up from such statistics is quite predictable, but at the same time shocking. There is still a very long way to go in web application security, i.e. web applications are still poorly coded, making them an easy target for malicious hacker attacks.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Wed, 04 Feb 2015 07:30:00 +1100</pubDate>
		</item>
		<item>
			<title>The Implications of Unsecure Webservers &amp; Websites for Organizations &amp; Businesses</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/implications-of-unsecure-webservers-and-websites-for-oganizations-companies.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/implications-of-unsecure-webservers-and-websites-for-oganizations-companies.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-1.png" alt="implications-of-unsecure-webservers-websites-1" width="135" height="135" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites" />Long gone are the days where a simple port scan on a <strong>company’s webserver</strong> or <strong>website</strong> was considered enough to <strong>identify security issues and exploits</strong> that needed to be <strong>patched</strong>. With all the recent <strong>attacks on websites</strong> and <strong>webservers</strong> which caused millions of dollars in damage, we thought it would be a great idea to analyze the <strong>implications vulnerable webservers</strong> and <strong>websites</strong> have for companies, while providing useful information to help <strong>IT Departments</strong>, <strong>security engineers</strong> and <strong>application developers</strong> proactively avoid unwanted situations.</p>
<p style="text-align: justify;">Unfortunately companies and webmasters turn their attention to their webservers and websites, after the damage is done, in which case the cost is always greater than any proactive measures that could have been taken to avoid the situation.</p>
<h2 style="text-align: justify;">Most Security Breaches Could Have Been Easily Prevented</h2>
<p style="text-align: justify;">Without doubt, corporate websites and webservers are amongst the highest preference for hackers. <strong>Exploiting well-known vulnerabilities</strong> provides them with easy-access to databases that contain sensitive information such as <strong>usernames</strong>, <strong>passwords</strong>, <strong>email addresses</strong>, <strong>credit &amp; debit card numbers</strong>, <strong>social security numbers</strong> and much more.</p>
<p style="text-align: justify;">The sad part of this story is that in most cases, hackers made use of <strong>old exploits and vulnerabilities</strong> to scan their targets and eventually<strong> gain unauthorized access</strong> to their systems.</p>
<p style="text-align: justify;">Most security experts agree that if companies <strong>proactively scanned</strong> and <strong>tested</strong> their systems using well-known <strong>web application security scanner tools</strong> e.g <strong>Netsparker</strong>, the security breach could have been easily avoided. The <strong>Online Trust Alliance</strong> (<strong>OTA</strong>) comes to also confirm this as they analyzed thousands of security breaches that occurred in the <strong>first half of 2014</strong> and <strong>concluded that these could have been easily prevented</strong>. [Source: OTA Website]<a href="https://www.otalliance.org/news-events/press-releases/ota-determines-over-90-data-breaches-2014-could-have-been-prevented" rel="nofollow"><br /></a></p>
<p class="box-info" style="text-align: justify;">Tools such as Web Application Vulnerability Scanners are used by security professionals to automatically scan websites and web applications for hidden vulnerabilities.</p>
<p style="text-align: justify;">When reading through recent security breaches, we can slowly begin to understand the implications and disastrous effects these had for companies and customers. Quite often, the figure of affected users who’s information was compromised, was in the millions. We should also keep in mind that in many cases, the <strong>true magnitude</strong> of any such security incident is very rarely made known to the public.</p>
<p style="text-align: justify;">Below are a few of the <strong>biggest security data breaches</strong> which exposed an unbelievable amount of information to hackers:</p>
<h4 style="text-align: justify;">&nbsp;eBay.com – 145 Million Compromised Accounts</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-2.png" alt="implications-of-unsecure-webservers-websites-2" width="100" height="41" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites ebay" />In late February – early March 2014, the eBay database that held customer names, encrypted passwords, email addresses, physical addresses, phone numbers, dates of birth and other personal information, was compromised, exposing sensitive information to hackers. [Source:&nbsp; bgr.com website]</p>
<h4 style="text-align: justify;">JPMorgan Chase Bank – 76 Million Household Accounts &amp; 7 Million Small Business</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-3.png" alt="implications-of-unsecure-webservers-websites-3" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites JP Morgan" />In June 2014, JPMorgan Chase bank was hit badly and had sensitive personal and financial data exposed for over 80 million accounts. The hackers appeared to obtain a list of the applications and programs that run on the company’s computers and then crosschecked them with <strong>known vulnerabilities</strong> for each <strong>program</strong> and <strong>web application</strong> in order to find an entry point back into the bank’s systems.<br />[Source: nytimes.com website]</p>
<p class="box-info" style="text-align: justify;">Find security holes on your websites and fix them before they do by scanning your websites and web applications with a Web Application Security Scanner.</p>
<h4>Forbes.com – 1 Million User Accounts</h4>
<p><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-4.png" alt="implications-of-unsecure-webservers-websites-4" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites Forbes.com" />In February 2014, the Forbes.com website was succumbed to an attack that <strong>leaked over 1 million user accounts</strong> that contained email addresses, passwords and more.&nbsp; The Forbes.com Wordpress-based backend site was defaced with a number of news posts. [Source: cnet.com website]</p>
<h4 style="text-align: justify;">Snapchat.com – 4.6 Million Username Accounts &amp; Phone numbers</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-5.png" alt="implications-of-unsecure-webservers-websites-5" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites SnapChat.com" />In January 2014, Snapchat’s popular website had over <strong>4.6 million</strong> usernames and phone numbers exposed due to a brute force enumeration attack against their Snapchat API. The information was publicly posted on several other sites, creating a major security concern for Snapchat and its users.<br />[Source: cnbc.com website]</p>
<h4 style="text-align: justify;">USA Businesses: Nasdaq, 7-Eleven and others – 160 Million Credit &amp; Debit Cards</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-6.png" alt="implications-of-unsecure-webservers-websites-6" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites Nasdaq" />In 2013 a massive underground attack was uncovered, revealing that <strong>over 160 million credit and debit cards</strong> were stolen during the past seven years. Five Russians and Ukrainians used advanced hacking techniques to steal the information during these years.&nbsp; Attackers targeted over <strong>800,000 bank accounts</strong> and penetrated servers used by the Nasdaq stock exchange.<br />[Source: nydailynews.com website]</p>
<h4 style="text-align: justify;">AT&amp;T - 114,000 iPad Owners (Includes White House Officers, US Senate &amp; Military Officials)</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-7.png" alt="implications-of-unsecure-webservers-websites-7" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites AT&amp;T" />In 2010, a major security breach on AT&amp;T’s website compromised <strong>over 114,000 customer accounts</strong>, revealing names, email addresses and other information. AT&amp;T acknowledged the attack on its webservers and commented that the risk was limited to the subscriber’s email address. &nbsp;<br />Amongst the list were apparently officers from the White House, member of the US Senate, staff from NASA, New York Times, Viacom, Time Warner, bankers and many more. [Source: theguardian.com website]</p>
<h4 style="text-align: justify;">Target&nbsp; - 98 Million Credit &amp; Debit Cards Stolen</h4>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/implications-of-unsecure-webservers-websites-8.png" alt="implications-of-unsecure-webservers-websites-8" style="margin: 7px; float: left;" title="The Implications of unsecure webservers &amp; websites Target" />In 2013, during the period 27th of November and 15th of December more than <strong>98 million credit and debit card accounts</strong> were stolen from <strong>1,787 Target stores</strong> across the United States. Hackers managed to install malware on Target’s computer systems to capture customers cards and then installed an exfiltration malware to move stolen credit card numbers to staging points around the United States in order to cover their tracks. The information was then moved to the hackers computers located in Russia.</p>
<p style="text-align: justify;">The odd part in this security breach is that the infiltration was caught by FireEye – the $1.6 million dollar malware detection tool purchased by Target, however according to online sources, when the alarm was raised at the security team in Minneapolis, no action was taken as <strong>40 million credit card numbers</strong> and <strong>70 million addresses</strong>, phone numbers and other information was pulled out of Target’s mainframes!&nbsp; [Source: Bloomberg website]</p>
<p class="box-info" style="text-align: justify;">SQL Injections &amp; Cross-Site Scripting are one of the most popular attack methods on Websites and Web Applications. Security tools such as Web Vulnerability Scanners allow us to uncover these vulnerabilities and fix them before hackers exploit them.<a href="https://www.netsparker.com/netsparker-web-application-security-scanner/automatically-check-security-websites/?utm_source=firewallcx&amp;utm_medium=bannersider&amp;utm_campaign=firewallcx" target="_blank" rel="nofollow noopener" title="Find WebServer Security Holes with Netsparker"><strong><br /></strong></a></p>
<h4 style="text-align: justify;">Implications for Organizations &amp; Businesses</h4>
<p style="text-align: justify;">It goes without saying that organizations suffer major damages and losses when it comes to security breaches. When the security breaches happens to affect millions of users like the above examples, it’s almost impossible to calculate an exact dollar ($) figure.</p>
<p style="text-align: justify;"><strong>Security Experts agree</strong> that <strong>data security breaches</strong> are among the <strong>biggest challenges</strong> organizations face today as the problem has both <strong>financial</strong> and <strong>legal</strong> implications.</p>
<p style="text-align: justify;"><strong>Business Loss</strong> is the biggest contributor to overall data breach costs and this is because it breaks down to a number of other sub-categories, of which the most important are outlined below:</p>
<ul class="check">
<li style="text-align: justify;"><strong>Detection of the data breach</strong>. Depending on the type of security breach, the business can lose substantial amounts of money until the breach is successfully detected. Common examples are defaced website, customer orders and credit card information being redirected to hackers, orders manipulated or declined.</li>
<li style="text-align: justify;"><strong>Escalation Costs</strong>. Once the security breach has been identified, emergency security measures are usually put into action. This typically involves bringing in Internet security specialists, the cybercrime unit (police) and other forces, to help identify the source of the attack and damage it has caused. Data backups are checked for their integrity and everyone is on high-alert.</li>
<li style="text-align: justify;"><strong>Notification Costs</strong>. Customers and users must be notified as soon as possible. Email alerts, phone calls and other means are used to get in contact with the customers and request them to change passwords, details and other sensitive information. The company might also need to put together a special team that will track and monitor customer responses and reactions.</li>
<li style="text-align: justify;"><strong>Customer Attrition</strong>. Also known as customer defection. After a serious incident involving sensitive customer data being exposed, customers are more likely to stop purchasing and using the company’s services. Gaining initially a customer’s trust requires sacrifices and hard work – trying to re-gain it after such an incident means even more sacrifices and significantly greater costs. In many cases, customers choose to not deal with the company ever again, costing it thousands or millions of dollars.</li>
<li style="text-align: justify;"><strong>Legal Implications</strong>. In many cases, customers have turned against companies after their personal information was exposed by a security breach. Legal actions against companies are usually followed by lengthy law suites which end up costing thousands of dollars, not to mention any financial compensation that will be awarded to the end customers.&nbsp; One example is Target’s security breach mentioned previously which is now facing multiple lawsuits from customers.</li>
</ul>
<p style="text-align: justify;">As outlined previously, the <strong>risk for organizations is high</strong> and there are a lot in stake from both, <strong>financial</strong> and <strong>legal prospective</strong>.&nbsp; The <strong>security breach</strong> examples mentioned in this article make a good point on how big and serious a security breach can become, but also the <strong>implications for companies and customers</strong>. Our next article will focus on <strong>guidelines</strong> that can <strong>help</strong> us <strong>prevent data breaches</strong> and <strong>help our organization</strong>, <strong>company</strong> or <strong>business</strong> to deal with them.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Tue, 03 Feb 2015 03:15:13 +1100</pubDate>
		</item>
		<item>
			<title>The Importance of Monitoring and Controlling Web Traffic in Enterprise &amp; SMB Networks - Protecting from Malicious Websites - Part 1</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/security-protect-enterprise-smb-network-web-monitoring-part1.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/security-protect-enterprise-smb-network-web-monitoring-part1.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/security-protect-enterprise-smb-network-web-monitoring-p1-1.jpg" alt="security-protect-enterprise-smb-network-web-monitoring-p1-1" style="margin: 7px; float: left;" title="Network Pulse - monitoring" />This article expands on our popular <a href="https://www.firewall.cx/tools-tips-reviews/security-articles.html" target="_blank" title="Network Security Articles">security articles</a> (<a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems.html" target="_blank" title="The importance of patching enterprise and SMB network systems">Part 1</a> &amp; <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html" target="_blank" title="The importance of patching enterprise and SMB network systems - Part 2">Part 2</a>) that covered the <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems.html" target="_blank" title="importance of patching enterprise and SMB network systems">importance of patching enterprise and SMB network systems</a> to <strong>protect them from hijacking</strong>, <strong>hacking attempts</strong>, <strong>unauthorized access to sensitive data</strong> and more. While <strong>patching systems is essential</strong>, another equally important step is the <strong>monitoring of Web traffic</strong> to <strong>control user activity</strong> on the web and <strong>prevent users</strong> from <strong>accessing dangerous sites</strong> and Internet resources that could jeopardize the company’s security.</p>
<p style="text-align: justify;">The ancient maxim – <strong>prevention is better than cure</strong> – holds good in cyberspace as well, and it is prudent to detect beforehand signs of trouble, which if allowed to continue, might snowball into something uncontrollable. One of the best means of such prevention is through monitoring web traffic and to locate potential sources of trouble.</p>
<p style="text-align: justify;">Even if attackers are unable to gain access to your network, they can still hold you to ransom by launching a <strong>Distributed Denial of Service</strong> or <strong>DDoS attack</strong>, wherein they choke the bandwidth of your network. Regular customers will not be able to gain access to your servers. Generally downtime for any company these days translates to loss of income and damage to the company’s reputation. Attackers these days might also refuse to relent until a ransom amount is paid up. Sounds a bit too far-fetched? Not really.</p>
<h2 style="text-align: justify;">Live Attacks &amp; Hacking Attempts On The Internet</h2>
<p style="text-align: justify;">It’s hard to image what really is happening right now on the Internet: How many attacks are taking place, the magnitude of these attacks, the services used to launch attacks, attack origins, attack targets and much more.&nbsp; Hopefully we’ll be able to help change than for you right now…</p>
<p style="text-align: justify;">The screenshot below was taken after monitoring the <a href="https://www.digitalattackmap.com/" target="_blank" rel="nofollow noopener" title="Norse network">Norse network</a> which <strong>collects and analyzes live threat intelligence</strong> from darknets in hundreds of locations in over <strong>40 countries</strong>. The attacks are taken from a small subset of live flows against the <strong>Norse honeypot infrastructure</strong> and <strong>represent actual worldwide cyber-attacks</strong>:</p>
<p style="text-align: center;"><a href="https://www.firewall.cx//images/stories/security-protect-enterprise-smb-network-web-monitoring-p1-2b.png" target="_blank" title="Internet Attacks - live on the Internet"><img src="https://www.firewall.cx//images/stories/security-protect-enterprise-smb-network-web-monitoring-p1-2a.jpg" alt="security-protect-enterprise-smb-network-web-monitoring-p1-2a" style="margin: 7px auto; display: block; vertical-align: middle;" title="Live Internet Attacks - Sample of 15 minutes with over 5800 targets" /></a>Click to enlarge</p>
<p style="text-align: justify;">In around <strong>15 minutes</strong> of monitoring attacks, we saw more than <strong>5000 different origins</strong> launching attacks to over <strong>5800 targets</strong>, of which <strong>99% of the targets</strong> are located in the <strong>United States</strong> and <strong>50% of the attack origins were from China</strong>.</p>
<p style="text-align: justify;">The sad truth is that the majority of these attacks are initiated from compromised computer systems &amp; servers, with unrestricted web access. All it takes today is for one system to visit an infected site and that could be enough to bring down the whole enterprise network infrastructure while at the same time launch a massive attack against Internet targets.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/security-protect-enterprise-smb-network-web-monitoring-p1-3.jpg" alt="security-protect-enterprise-smb-network-web-monitoring-p1-3" style="margin: 7px; float: left;" title="Evernote Hacked" />In June 2014, <strong>Evernote</strong> and <strong>Feedly</strong>, working largely in tandem, went down with a <strong>DDoS attack</strong> within two days of each other. <strong>Evernote</strong> recovered the same day, but <strong>Feedly</strong> had to suffer more. Although there were <strong>two more DDoS attacks</strong> on Feedly that caused it to lose business for another two days, normalcy was finally restored. According to the CEO of Feedly, they refused to give in to the demands of ransom in exchange for ending the attack and were successful in neutralizing the threat.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/security-protect-enterprise-smb-network-web-monitoring-p1-4.jpg" alt="security-protect-enterprise-smb-network-web-monitoring-p1-4" style="margin: 7px; float: left;" title="Domino Pizza Hacked" /><strong>Domino's Pizza</strong> had over <strong>600,000 Belgian and French customer records stolen</strong> by the hacking group Rex Mundi. The <strong>attackers demanded $40,000</strong> from the fast food chain in exchange for not publishing the data online. It is not clear whether Domino's complied with the ransom demands. However, they reassured their customers that although the attackers did have their names, addresses and phone numbers, they however, were unsuccessful in stealing their financial and banking information. The <strong>Twitter account</strong> of the <strong>hacking group</strong> was <strong>suspended</strong>, and they never released the information.</p>
<p style="text-align: justify;">Apart from external attacks, misbehavior from employees can cause equal if not <strong>greater damage</strong>. Employees viewing pornographic material in the workspace can lead to a huge number of issues. Not only is porn one of the biggest <strong>time wasters</strong>, it chokes up the <strong>network bandwidth</strong> with <strong>non-productive downloads</strong>, including bringing in <strong>unwanted virus</strong>, malware and <strong>Trojans</strong>. Co-workers unwillingly exposed to offensive images can find the workplace uncomfortable and this may further lead to charges of sexual harassment, dismissal and lawsuits, all expensive and disruptive.</p>
<p style="text-align: justify;">Another major problem is <strong>data leakage</strong> via <strong>e-mail</strong> or <strong>webmail</strong> – <strong>intended</strong> or <strong>by accident</strong>. Client data, unreleased financial data and confidential plans leaked through emails may cause devastating impact to the business including <strong>loss of client confidence</strong>.</p>
<p style="text-align: justify;"><strong>Web monitoring</strong> provides <strong>answers</strong> to several of these problems. This type of monitoring need not be very intrusive or onerous, but with the right policies and training, employees easily learn to differentiate between appropriate and inappropriate use.</p>
<h2 style="text-align: justify;">Few Of The Biggest Web Problems</h2>
<p style="text-align: justify;">To monitor the web, you must know the issues that you need to focus on. Although organizations differ in their values, policies and culture, there are some common major issues on the Web that cause the biggest headaches:</p>
<ul class="checkbox">
<li style="text-align: justify;"><strong>Torrents</strong> And <strong>Peer-To-Peer Networks</strong> offer free software, chat, music and video, which can be easily downloaded. However, this can hog the bandwidth causing <strong>disruptions</strong> in operation such as for <strong>video conferencing</strong> and <strong>VoIP</strong>. Moreover, such sites also contain pirated software, bootlegged movies and inappropriate content that are mostly tainted with various types of virus and Trojans.</li>
<li style="text-align: justify;"><strong>Gaming sites</strong> are notorious for hogging bandwidth and wasting productive time. Employees often find these sites hard to resist and download games. Most of the games carry lethal payloads of virus and other malware, with hackers finding them a common way for SEO poisoning. Even when safe, games disrupt productivity and clog the network.</li>
<li style="text-align: justify;"><strong>Fun sites</strong>, although providing a harmless means of relieving stress, may be offensive and inappropriate to coworkers. Whether your policies allow such humor sites, they can contain SEO poisoned links and Trojans, often clogging networks with their video components.</li>
<li style="text-align: justify;"><strong>Online Shopping</strong> may relate to purchase of work-appropriate items as well as personal. Although the actual purchase may not take up much time, surfing for the right product is a huge time waster, especially for personal items. Individual policies may either limit the access to certain hours of the day or block these sites altogether.</li>
<li style="text-align: justify;"><strong>Non-Productive Surfing</strong> can be a huge productivity killer for any organization. Employees may be obsessed with tracking shares, sports news or deals on commercial sites such as Craigslist and eBay. Company policies can block access to such sites entirely, or limit the time spent on such sites to only during lunchtime.</li>
</ul>
<p style="text-align: justify;">According to a survey involving over <strong>3,000 employees</strong>, Salary.com found <strong>over 60%</strong> involved in visiting sites unrelated to their work every day. <strong>More than 20%</strong> spent above <strong>five hours a week</strong> on <strong>non-work related sites</strong>. Nearly half of those surveyed looked for a new job using office computers in their work time.</p>
<p style="text-align: justify;">In the next part of our article, we will examine the importance of placing a company security policy to help avoid users visiting sites they shouldn't, stop waisting valuable time and resources on activities that can compromise the enterprise's network security and more. We also take an in-depth look on how to effectively monitor and control traffic activity on the Web in real-time, plus much more.</p>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->
<p>&nbsp;</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Thu, 20 Nov 2014 08:47:46 +1100</pubDate>
		</item>
		<item>
			<title>Protect Enterprise &amp; SMB Networks From Exploits, Hacking &amp; Attacks By Correctly Patching Systems</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/protecting-enterprise-smb-by-patching-systems-1.jpg" alt="protecting-enterprise-smb-by-patching-systems-1" style="margin: 7px; float: left;" title="Protect Enterprise Systems from Hacking by Patching them" /><strong>Protecting Enterprise</strong> and <strong>Small-Medium Business networks</strong> from <strong>exploits</strong> and <strong>hacking attempts</strong> is not an easy task.</p>
<p style="text-align: justify;">Each year software giants release new systems that bring new features and functionality to <strong>Enterprise</strong> and <strong>SMB companies</strong> aiming to increase collaboration, productivity, and generally make life easier for everyone, except IT Managers, System Engineers and Administrators.</p>
<p style="text-align: justify;">Unfortunately history has proven many times in the past that new operating systems and applications are often bundled with a generous amount of security issues which are usually detected after a security incident.</p>
<p style="text-align: justify;">Almost every company, regardless of its size, whether large or small, has faced data breaches and had important data, personal records and financial information stolen. Sadly, most companies never even know about the data breach until it's too late!</p>
<p style="text-align: justify;">For example, in May 2014, the notorious <strong>Syrian Electronic Army</strong> attacked and successfully stole credentials from <strong>eBay</strong>. They managed to steal personal records of over <strong>230 million users</strong>, compromising usernames, passwords, phone numbers and physical addresses, leaving eBay users vulnerable to identity theft.</p>
<p class="box-info" style="text-align: justify;">Did you know that the <strong>PCI Data Security Standard</strong> (<strong>PCI DSS</strong>) provides a framework for developing a robust data security process - including prevention, detection and appropriate reaction to security incidents?</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/protecting-enterprise-smb-by-patching-systems-3.jpg" alt="protecting-enterprise-smb-by-patching-systems-3" style="margin: 7px; float: left;" title="P.F Chang's System Hacking" />Last month, a huge data breach at <strong>P. F. Chang's</strong>, the famous chain restaurant, compromised payment information of their customers. Criminals hacked more than <strong>33 restaurants</strong> between <strong>October 2013</strong> and <strong>June 2014</strong> at P. F. Chang's and managed to record the data belonging to an <strong>unestimated number of credit and debit cards</strong> used at the restaurant's locations. Subsequently, these newly stolen credit and debit cards were <strong>put up for sale</strong> on the black market. The identity of the attackers is yet to be worked out, and worst of all, P. F. Chang was alerted in <strong>June 2014</strong> by the <strong>US Secret Service</strong> about the data breach! It seems like they were totally unaware of what was happening for a period of over 9 months!</p>
<p style="text-align: justify;">A majority of the machines had data successfully siphoned off them because they had a common problem – they were not fully patched. It is suspected that software used in the machines had vulnerabilities and attackers used the security holes to enter and steal information. <strong>Patches are meant to fix flaws in the software</strong>, <strong>preventing attackers from gaining access through the flaws</strong>. However, applying patches in time is something that most users typically delay. The patching cycle too, adds to the security problems.</p>
<p style="text-align: justify;">Typically, vendors issue patches as they discover vulnerabilities in their software. Sometimes, security experts <strong>discover a flaw in software</strong> and <strong>publicize it even before the vendor has had time to come up with a fix</strong>. This makes all machines using the <strong>software vulnerable to attack</strong>.</p>
<p style="text-align: justify;">Furthermore, the very act of announcing a patch makes machines vulnerable until the patch has actually been applied. There is usually a <strong>time lag</strong> between the<strong> announcement of the patch</strong>, <strong>acquiring it</strong> and <strong>applying it</strong>. Very few people actually apply the patch as soon as it is released, sometimes as an oversight, but mostly delayed - to test if the patch does not cause their business processes to break down.</p>
<p style="text-align: justify;">Attackers make use of this time lag to exploit exposed vulnerabilities. As most attackers take the path of the least resistance, they scan machines until they have located one that has not yet been patched and they get in. Therefore, if you put more effort in patching up front, not only do you keep your own machines protected and up-to-date, your users also remain safe from sundry attackers.</p>
<p style="text-align: justify;">To defeat the attacker successfully, the organization needs to be adequately prepared. The process of securing information is not a static goal, but has to be treated as a dynamic process that requires flexible, skilled and disciplined management with a response cycle that ensures continuous improvement.</p>
<p style="text-align: justify;">Following are a few simple rules that help make the process much easier to handle:</p>
<h2 style="text-align: justify;">A Systematic Approach</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/protecting-enterprise-smb-by-patching-systems-2.jpg" alt="protecting-enterprise-smb-by-patching-systems-2" style="margin: 7px; float: left;" title="Security Lock for patch management software" />Patching requires the IT team to be ever vigilant and thoroughly systematic. To begin with, everyone must realize the <strong>importance of patching</strong> and the team effort should generate unselfish cooperation. In today's scenario, apart from the Operating System, software tools from several vendors are also used simultaneously. Therefore, apart from the patches and updates for Windows from Microsoft, the IT team may also have to handle fixes from vendors such as Adobe and other vendors. <strong>Relying on updates from the vendors may not be enough</strong> - the IT team must also look out for white papers and other product reviews published independently.</p>
<h2 style="text-align: justify;">Manage Your Assets</h2>
<p style="text-align: justify;">Inventory your tools and systems to know what you have. Asset management makes it easier for your IT team to know width of the patch management it has to tackle. The team must be abreast of the installation of any new application, service pack and patch, which makes this an all-time job.</p>
<h2 style="text-align: justify;">Organize Your Processes</h2>
<p style="text-align: justify;">Although there are many good tools for <strong>patch management</strong>, it still requires the complex process to be handled smartly, with a right strategy and with proper teamwork. If your organization is highly centralized, the IT team can work as a core group, performing the entire asset management and determining the needs and priorities of patching, including testing and rollout.</p>
<p style="text-align: justify;">For geographically distributed organizations, several local IT groups may be the norm. Although communication between the individual groups is important, each group must acquire their own tools and gain independent patching expertise.</p>
<p style="text-align: justify;">Proper patch management requires the IT team to be fully in control while end users are discouraged from doing their own patching, unless IT has provided them with detailed instructions and training for patching.</p>
<h2 style="text-align: justify;">Automate Your Processes</h2>
<p style="text-align: justify;">Nowadays, there are a <strong>few good tools available for patch management</strong> that can automate the process of <strong>patching</strong> and they work on <strong>multiple platforms</strong>. Automating the process relieves the IT team from the tedious process of having to manually test and install each patch.</p>
<p style="text-align: justify;">IT can set the automatic functions to scour for new patches constantly and organize the patches by their importance. They can also automate the process of mapping the company's vulnerabilities according to their priorities against the patches available. This provides them with a clear roadmap of what to patch and in what sequence.</p>
<p style="text-align: justify;">It is evident that companies of every size should give high-priority in correctly patching their systems. <strong>Keeping systems up-to-date</strong> has proven to be an <strong>effective method against targeted attacks seeking to exploit vulnerable systems</strong>. Our <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html" target="_blank" title="Protecting Enterprise &amp; SMB Networks Part 2">next article</a> focuses on additional ways to help simplify the patching process for companies. <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html" target="_blank" title="Protecting Enterprise &amp; SMB Networks Part 2">Click Here</a> to read <strong><a href="https://www.firewall.cx/tools-tips-reviews/security-articles/protecting-enterprise-smb-by-patching-systems-part-2.html" title="Protecting Enterprise &amp; SMB Networks Part 2">Protecting Enterprise &amp; SMB Networks From Exploits, Hacking &amp; Attacks By Correctly Patching Systems - Part 2</a></strong>.</p>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
  <o:PixelsPerInch>110</o:PixelsPerInch>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->]]></description>
			<category>Security Articles</category>
			<pubDate>Mon, 11 Aug 2014 03:06:26 +1000</pubDate>
		</item>
		<item>
			<title>The Most Dangerous Websites On The Internet &amp; How To Effectively Protect Your Enterprise From Them</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/the-most-dangerous-websites-and-how-to-protect-your-company.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/the-most-dangerous-websites-and-how-to-protect-your-company.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/whitepapers/whitepaper-malicious-website-content.jpg" alt="whitepaper-malicious-website-content" width="250" height="188" style="margin: 7px; float: left; border: 1px solid #000000;" title="The Most Dangerous Websites On The Internet &amp; How To Effectively Protect Your Enterprise From Them" />Companies and users around the world are struggling to keep their network environments safe from malicious attacks and hijacking attempts by leveraging services provided by high-end firewalls, Intrusion Detection Systems (IDS), antivirus software and other means.&nbsp;&nbsp; While these appliances can mitigate attacks and hacking attempts, we often see the whole security infrastructure failing because of attacks initiated from the inside, effectively by-passing all protection offered by these systems.</p>
<p style="text-align: justify;">I’m sure most readers will agree when I say that end-users are usually responsible for attacks that originate from the internal network infrastructure. A frequent example is when users find a link while browsing the Internet they tend to click on it to see where it goes even if the context suggests that the link may be malicious. Users are unaware of the hidden dangers and the potential damage that can be caused by clicking on such links.</p>
<p style="text-align: justify;">The implications of following links with malicious content can vary for each company, however, we outline a few common cases often seen or read about:</p>
<ul class="plus" style="text-align: justify;">
<li>Hijacking of the company’s VoIP system, generating huge bills from calls made to overseas destination numbers (toll fraud)</li>
<li>The company’s servers are overloaded by thousands of requests made from the infected workstation(s)</li>
<li>Sensitive information is pulled from the workstations and sent to the hackers</li>
<li>Company Email servers are used to generate and send millions of spam emails, eventually placing them on a blacklist and causing massive communication disruptions</li>
<li>Remote control software is installed on the workstations, allowing hackers to see everything the user is doing on their desktop</li>
<li>Torrents are downloaded and seeded directly from the company’s Internet lines, causing major WAN disruptions and delays</li>
</ul>
<p style="text-align: justify;">As you can see there are countless examples we can analyze to help us understand how serious the problem can become.</p>
<p style="text-align: justify;"><strong>Download this whitepaper if you are interested to:</strong></p>
<ul class="checkbox" style="text-align: justify;">
<li>Learn which are the Top 10 Dangerous sites users visit</li>
<li>Learn the Pros and Cons of each website category</li>
<li>Understand why web content filtering is important</li>
<li>Learn how to effectively block sites from compromising your network</li>
<li>Learn how to limit the amount of the time users can access websites</li>
<li>Effectively protect your network from end-user ‘mistakes’</li>
<li>Ensure user web-browsing does not abuse your Internet line or Email servers</li>
</ul>
<p class="box-hint">We apologise however the whitepaper is no longer available by the vendor.&nbsp; <a href="https://www.firewall.cx/">Head to our homepage</a> to read up on new network and security related articles.</p>
<p style="text-align: justify;">&nbsp;</p>
]]></description>
			<category>Security Articles</category>
			<pubDate>Mon, 04 Nov 2013 06:08:01 +1100</pubDate>
		</item>
		<item>
			<title>Download Your Free Whitepaper: How to Secure your Network from Cyber Attacks</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/how-to-fight-cybercrime.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/how-to-fight-cybercrime.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/whitepapers/whitepaper-fight-cybercrime-module.jpg" alt="whitepaper-fight-cybercrime-module" width="82" height="50" style="margin: 7px; float: left;" title="McAfee Antivirus Report" />Cybercriminals are now focusing their attention on small and mid-sized businesses because they are typically easier targets than large, multinational corporations.<br />This white paper examines the rising security threats that put small and medium businesses at risk. It also highlights important security considerations that SMBs should be aware of.</p>
<p style="text-align: justify;">Download this whitepaper if you’re interested to:</p>
<ul class="checkbox">
<li style="text-align: justify;">Learn on how to adopt best practices and boost your business security.</li>
<li style="text-align: justify;">Evaluate the SMB digital footprint.</li>
<li style="text-align: justify;">Know what to look for in new security solutions.</li>
</ul>
<p class="box-hint">We apologise however the whitepaper is no longer available by the vendor.&nbsp; <a href="https://www.firewall.cx">Head to our homepage</a> to read up on new network and security related articles.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Thu, 01 Aug 2013 08:00:00 +1000</pubDate>
		</item>
		<item>
			<title>A Networked World: New IT Security Challenges</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/networked-world-new-security-challenges.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/networked-world-new-security-challenges.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/network-security-1.jpg" alt="network-security-1" width="250" height="187" style="margin: 7px; float: left;" />This is the age of networks. Long ago, they said, ‘the mainframe is the computer’. Then it changed to ‘the PC is the computer’. That was followed by ‘the network is the computer’. Our world has been shrunk, enlightened and speeded up by this globe encapsulating mesh of interconnectivity. Isolation is a thing of the past. Now my phone brings up my entire music collection residing on my home computer. My car navigates around the city, avoiding traffic in real time. We have started living in intelligent homes where we can control objects within it remotely.</p>
<p style="text-align: justify;">On a larger scale, our road traffic system, security CCTV, air traffic control, power stations, nuclear power plants, financial institutions and even certain military assets are administered using networks. We are all part of this great cyber space. But how safe are we? What is our current level of vulnerability?</p>
<h2>Tower, Am I Cleared For Landing?</h2>
<p style="text-align: justify;">March 10, 1997: It was a routine day of activity at Air Traffic Control (ATC) at Worcester, Massachusetts, with flight activity at its peak. Suddenly the ground to air communications system went down. This meant that ATC could not communicate with approaching aircraft trying to land. This was a serious threat to all aircraft and passengers using that airport. All incoming flights had to be diverted to another airport to avoid a disaster.</p>
<p style="text-align: justify;">This mayhem was caused by a 17 year old hacker named Jester. He had used a normal telephone line and physically tapped into it, giving him complete control of the airport’s entire communications system. His intrusion was via a telephone junction box, which in turn ended up being part of a high end fire backbone. He was caught when, directed by the United States Security Service, the telephone company traced the data streams back to the hacker’s parents’ house. Jester was the first juvenile to be charged under the Computer Crimes Law.</p>
<p style="text-align: justify;">As our world becomes more and more computerised and our computer systems start interconnecting, the level of vulnerability goes up. But should this mean an end to all advancement in our lives? No. We need to make sure we are safe and the things that make our lives easier and safer are also secure.</p>
<h2>Intruder Alert</h2>
<p style="text-align: justify;"><strong>April 1994</strong>: An US Airforce Base realised that their high level security network was not just hacked, but <img src="https://www.firewall.cx/images/stories/network-security-2.png" alt="network-security-2" width="200" height="180" style="margin: 7px; float: left;" />secure documents were stolen. This resulted in an internal cyber man-hunt. The bait was laid and all further intrusions were monitored. A team of 50 Federal Agents finally tracked down 2 hackers who were using US based social networking systems to hack into the Airforce Base. But it was later revealed that the scope of intrusion was not just limited to the base itself: they had infiltrated a much bigger military organisation. The perpetrators were hackers with the aliases of ‘datastreamcowboy’ and ‘kuji’.</p>
<p style="text-align: justify;">‘Datastreamcowboy’ was a 16 year old British national who was apprehended on May 4<sup>th</sup> 1994, and ‘kuji’ was a 21 year old technician named Mathew Bevan from Cardiff, Wales. ‘datastreamcowboy’ was like an apprentice to ‘kuji’. ‘datastreamcowboy’ would try a method of intrusion and, if he failed, he would go back to ‘kuji’ for guidance. ‘kuji’ would mentor him to a point that on subsequent attempts ‘datastreamcowboy’ would succeed.</p>
<p style="text-align: justify;">What was their motive? Bragging rights in the world of hacking for being able to penetrate the security of the holy grail of all hackers: the Pentagon.</p>
<p style="text-align: justify;">But the future might not see such benign motives at play. As command and control of military installations is becoming computerised and networked, it has become imperative to safeguard against intruders who might break into an armoury with the purpose of causing damage to it or to control and use it with malice.</p>
<h2>Social Virus</h2>
<p style="text-align: justify;">October 2005: The social networking site MySpace was crippled by a highly infectious computer virus. The virus took control of millions of online MySpace profiles and broadcasted the hacker’s messages. The modus operandi of the hacker was to place a virus on his own profile. Whenever someone visited his profile page, he/she would be infected and their profile would show the hacker’s profile message. These new users now being infected would spread the infection through their friends on MySpace, and this created a massive chain reaction within the social network community. The mass infection caused the entire MySpace social network to grind to a halt.</p>
<p style="text-align: justify;">Creator of this mayhem was Sammy Kamkar, a 19 year old. But his attack was not very well organised as he left digital footprints and was later caught. Banned from using a computer for 3 years, he later became a security consultant helping companies and institutions safeguard themselves against attacks.</p>
<p style="text-align: justify;">What that showed the world was the fact that a cyber attack could come from anywhere, anytime.</p>
<p style="text-align: justify;">In our current digital world we already know that a lot of our complex systems like Air Traffic Control, power stations, dams, etc are controlled and monitored using computers and networks. Let’s try to understand the technology behind it to gauge where the security vulnerabilities come from.</p>
<h2>SCADA: Observer &amp; Controller</h2>
<p style="text-align: justify;">Over the last few decades, SCADA technology has enabled us to have greater control over predominantly mechanical systems which were, by design, very isolated. But what is SCADA? What does it stand for?</p>
<p style="text-align: justify;">SCADA is an acronym for <strong>S</strong>upervisory <strong>C</strong>ontrol <strong>A</strong>nd <strong>D</strong>ata <strong>A</strong>cquisition. A quick search on the internet and you would find the definition to be as follows:</p>
<p style="text-align: justify;"><strong>SCADA</strong>&nbsp;(<strong>supervisory control and data acquisition</strong>) is a type of&nbsp;industrial control system&nbsp;(ICS). Industrial control systems are&nbsp;computer&nbsp;controlled systems that monitor and control industrial processes that exist in the physical world. SCADA systems historically distinguish themselves from other ICS systems by being large scale processes that can include multiple sites and large distances.&nbsp;These processes include industrial, infrastructure, and facility-based processes as described below:</p>
<ul style="text-align: justify;">
<li>Industrial processes&nbsp;include those of manufacturing, production,&nbsp;power generation,&nbsp;fabrication and refining, and may run in continuous, batch, repetitive, or discrete modes.</li>
<li>Infrastructure&nbsp;processes may be public or private and include&nbsp;water treatment&nbsp;and distribution, wastewater collection and&nbsp;treatment,&nbsp;oil and gas pipelines,&nbsp;electrical power transmission&nbsp;and&nbsp;distribution, wind farms,&nbsp;civil defence siren&nbsp;systems and large communication systems.</li>
<li>Facility processes occur both in public facilities and private ones, including buildings,&nbsp;airports,&nbsp;ships, and&nbsp;space stations. They monitor and control&nbsp;heating, ventilation and air conditioning&nbsp;systems (HVAC),&nbsp;access and&nbsp;energy consumption.</li>
</ul>
<p style="text-align: justify;">This effectively lets us control the landing lights on a runway, gates of a reservoir or a dam, connection and disconnection of power grids to a city supply.</p>
<p style="text-align: justify;">Over the last decade all such systems have become connected to the internet. However, when SCADA was being developed no thought was given to security. No one imagined that a SCADA based system would end up on the internet. Functionality and convenience were given higher priority and security was ignored, hence SCADA carries the burden of inherent security flaws.</p>
<p style="text-align: justify;">Tests have been performed extensively to map the vulnerabilities of a networked SCADA system. A test was done on a federal prison which used SCADA to control gates and security infrastructure. Within two weeks, a test hacker had full control of all the cell doors. The kit the hacker used was purchased from the open market for a value as low as $2500.</p>
<p style="text-align: justify;">But, thankfully, more and more thought is given today when designing a SCADA based system which will be used over a network. Strict security policies and intrusion detection and avoidance technologies are implemented.</p>
<h2>Where’s My Money?</h2>
<p style="text-align: justify;">The year <strong>1994 – 1995</strong> saw a momentous change in our financial industry: the entire financial sector was now online. Paper transactions were a thing of the past. Vast sums of money now change location in a matter of milliseconds. The share markets, along with complex monetary assets, now trade using the same cyber space which we use for social networking, shopping etc. As this involved a lot of money, money being transferred in unimaginable amounts, the financial industry, especially banks, went to great lengths to protect themselves.</p>
<p style="text-align: justify;">As happens in our physical world with the advent of better locks thieves change their ways to adapt as well. Hackers have developed tools that can bypass encryptions to steal funds, or even hold an entire institution to ransom. Average annual loss due to cyber heist has been estimated at nearly 1.3 million dollars. Since banks hardly hold any cash in their branches your ordinary bank robbery would hardly amount to $6000 – $8000 in hard cash.</p>
<p style="text-align: justify;">Cyber heist is a criminal industry with staggering rewards. The magnitude is in hundreds of billions of dollars. But most cyber intrusions in this industry go unreported because of its long term impact on the compromised institution’s reputation and credibility.</p>
<h2>Your Card Is Now My Card!</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/network-security-3.jpg" alt="network-security-credit-card-hacked" width="250" height="188" style="margin: 7px; float: left;" /><strong>2005</strong>: Miami, Florida. A Miami hacker made history in cyber theft. Alberto Gonzales would drive around Miami streets looking for unsecured wireless networks. He hooked onto the unsecure wireless network of a retailer, used it to reach the retailer’s headquarters and stole credit card numbers from its databases. He then sold these card details to Eastern European cyber criminals. In the first year, he stole 11.2 million card details. By the end of the second year he had stolen about 90 million card details.</p>
<p style="text-align: justify;">He was arrested in July 2007 while trying to use one of these stolen cards. On subsequent interrogation it was revealed that he had stored away 43 million credit card details on servers in Latvia and Ukraine.</p>
<p style="text-align: justify;">In recent times we know a certain gaming console organisation had its online gaming network hacked and customer details stolen. For that organisation, the security measures taken subsequent to that intrusion were ‘too little too late’, but all such companies that hold customer credit card details consequently improved their network security setup.</p>
<h2>Meltdown By Swatting</h2>
<p style="text-align: justify;">January 2005: A hacker with the alias ‘dshocker’ was carrying out an all out attack on several big corporations in the US. He used stolen credit cards to fund his hacking activities. He managed to break through a firewall and infect large numbers of computers. This enabled him to take control of all of those machines and use their collective computing power to carry out a Denial of Service Attack on the corporation itself. The entire network went into a meltdown. Then he did something that is known today as ‘swatting’. Swatting is an action that dupes the emergency services into sending out an emergency response team. This false alarm and follow up raids would end up costing the civic authorities vast sums of money and resources.</p>
<p style="text-align: justify;">He was finally arrested when his fraudulent credit card activities caught up with him.</p>
<h2>Playing Safe In Today’s World</h2>
<p style="text-align: justify;">Today technology is a great equaliser. It has given the sort of power to individuals that only nations could boast of in the past. All the network intrusions and their subsequent effects can be used individually or together to bring a nation to its knees. The attackers can hide behind the cyber world and their attacks can strike anyone without warning. So what we need to do is to stay a step ahead.</p>
<p style="text-align: justify;">We can’t abolish using the network, the cloud or the things that have given us more productivity and efficiency. We need to envelop ourselves with stricter security measures to ensure that all that belongs to us is safe, and amenities used by us everyday are not turned against us. This goes for everyone, big organisations and the individual using his home network.</p>
<p style="text-align: justify;">At home, keep your wireless internet connection locked down with a proper password. Do not leave any default passwords unchanged. That is a security flaw that can be taken advantage of. On your PCs and desktops, every operating system comes with its own firewall. Keep it on. Turning it off for convenience will cost you more than keeping it on and allowing only certain applications to communicate safely with the internet. In your emails, if you don’t recognise a sender’s email, do not respond or click on any of the links it may carry. These can be viruses ready to attack your machines and create a security hole through which the hacker will enter your home network. And for cyber’s sake, please, you haven’t won a lottery or inherited millions from a dead relative. So all those emails telling you so are just fakes. They are only worth deleting.</p>
<p style="text-align: justify;">The simple exercise of keeping your pop-up blocker turned on will keep your surfing through your browser a lot safer. Your operating system, mainly Windows and Linux, lets you keep a guest account so whenever a ‘guest’ wants to check his/her emails or surf the web have them use this account instead of your own. Not that you don’t trust your guest but they might innocently click on something while surfing and not know what cyber nastiness they have invited into your machine. The guest account has&nbsp; minimal privileges for users so it can be safe. Also, all accounts must have proper passwords. Don’t let your machine boot up to an administrator account with no password set. That is a recipe for disaster. Don’t use a café’s wireless network to check your bank balance. That can wait till you reach home. Or just call the bank up. That’s safer.</p>
<p style="text-align: justify;">At work, please don’t plug an unauthorised wireless access point into your corporate network, this can severely compromise it. Use strong passwords for accounts, remove old accounts not being used. Incorporate strong firewall rules and demarcate effective DMZ so that you stay safer. Stop trying to find a way to jump over a proxy, or disable it. You are using company time for a purpose that can’t be work related. If it is needed, ask the network administrator for assistance.</p>
<p style="text-align: justify;">I am not an alarmist, nor do I believe in sensationalism. I believe in staying safe so that I can enjoy the fruits of technology. And so should you, because you deserve it.</p>
<p style="text-align: justify;">Readers can also visit our<a href="https://www.firewall.cx/tools-tips-reviews/security-articles.html" target="_blank" title="Network Security section">Network Security section</a> which offers a number of interesting articles covering Network Security.</p>
<h4 class="About-Writer">About the Writer</h4>
<p>Arani Mukherjee holds a Master’s degree in Distributed Computing Systems from the University of Greenwich, UK and works as network designer and innovator for remote management systems, for a major telecoms company in UK. He is an avid reader of anything related to networking and computing. Arani is a highly valued and respected member of Firewall.cx, offering knowledge and expertise to the global community since 2005.</p>
<p>&nbsp;</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Wed, 29 May 2013 08:30:00 +1000</pubDate>
		</item>
		<item>
			<title>Introduction To Network Security - Part 2</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro-p2.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro-p2.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article builds upon our first article Introduction to <a href="https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro.html" target="_blank" title="Introduction to Network Security - Part 1">Network Security - Part 1</a>. This article is split into 5 pages and covers a variety of topics including:</p>
<ul>
<li>Tools and Attacker Uses</li>
<li>General Network Tools</li>
<li>Exploits</li>
<li>Port Scanners</li>
<li>Network Sniffers</li>
<li>Vulnerability Scanners</li>
<li>Password Crackers</li>
<li>What is Penetration Testing</li>
<li>More Tools</li>
<li>Common Exploits</li>
<li>A Brief Walk-through of an Attack</li>
<li>and more.</li>
</ul>
<h2>Tools An Attacker Uses</h2>
<p style="text-align: justify;">Now that we've concluded a brief introduction to the types of threats faced by both home users and the enterprise, it is time to have a look at some of the tools that attackers use.</p>
<p style="text-align: justify;">Keep in mind that a lot of these tools have legitimate purposes and are very useful to administrators as well. For example I can use a network sniffer to diagnose a low level network problem or I can use it to collect your password. It just depends which shade of hat I choose to wear.</p>
<h2 style="text-align: justify;">General Network Tools</h2>
<p style="text-align: justify;">As surprising as it might sound, some of the most powerful tools especially in the beginning stages of an attack are the regular network tools available with most operating systems. For example and attacker will usually query the 'whois' databases for information on the target. After that he might use 'nslookup' to see if he can transfer the whole contents of their DNS zone (called a zone transfer -- big surprise !!). This will let him identify high profile targets such as webservers, mailservers, dns servers etc. He might also be able to figure what different systems do based on their dns name -- for example sqlserver.victim.com would most likely be a database server. Other important tools include traceroute to map the network and ping to check which hosts are alive. You should make sure your firewall blocks ping requests and traceroute packets.</p>
<h2>Exploits</h2>
<p style="text-align: justify;">An exploit is a generic term for the code that actually 'exploits' a vulnerability in a system. The exploit can be a script that causes the target machine to crash in a controlled manner (eg: a buffer overflow) or it could be a program that takes advantage of a misconfiguration.</p>
<p style="text-align: justify;">A 0-day exploit is an exploit that is unknown to the security community as a whole. Since most vulnerabilities are patched within 24 hours, 0-day exploits are the ones that the vendor has not yet released a patch for. Attackers keep large collections of exploits for different systems and different services, so when they attack a network, they find a host running a vulnerable version of some service and then use the relevant exploit.</p>
<h2 style="text-align: justify;">Port Scanners</h2>
<p style="text-align: justify;">Most of you will know what portscanners are. Any system that offers TCP or UDP services will have an open port for that service. For example if you're serving up webpages, you'll likely have TCP port 80 open, FTP is TCP port 20/21, Telnet is TCP 23, SNMP is UDP port 161 and so on.</p>
<p style="text-align: justify;">A portscanner scans a host or a range of hosts to determine what ports are open and what service is running on them. This tells the attacker which systems can be attacked.<br />For example, if I scan a webserver and find that port 80 is running an old webserver -- IIS/4.0, I can target this system with my collection of exploits for IIS 4. Usually the port scanning will be conducted at the start of the attack, to determine which hosts are interesting.</p>
<p style="text-align: justify;">This is when the attacker is still footprinting the network -- feeling his way around to get an idea of what type of services are offered and what Operating Systems are in use etc. One of the best portscanners around is Nmap (https://www.insecure.org/nmap). Nmap runs on just about every operating system is very versatile in how it lets you scan a system and has many features including OS fingerprinting, service version scanning and stealth scanning. Another popular scanner is Superscan (https://www.foundstone.com) which is only for the windows platform.</p>
<h2 style="text-align: justify;">Network Sniffers</h2>
<p style="text-align: justify;">A network sniffer puts the computers NIC (network interface card or LAN card) into 'promiscuous mode'. In this mode, the NIC picks up all the traffic on its subnet regardless of whether it was meant for it or not. Attackers set up sniffers so that they can capture all the network traffic and pull out logins and passwords. The most popular network sniffer is TCPdump as it can be run from the command line -- which is usually the level of access a remote attacker will get. Other popular sniffers are Iris and Ethereal.</p>
<p style="text-align: justify;">When the target network is a switched environment (a network which uses layer 2 switches), a conventional network scanner will not be of any use. For such cases, the switched network sniffer Ettercap (http://ettercap.sourceforge.net) and WireShark (https://www.wireshark.org) are very popular. Such programs are usually run with other hacking capable applications that allow the attacker to collect passwords, hijack sessions, modify ongoing connections and kill connections. Such programs can even sniff secured communications like SSL (used for secure webpages) and SSH1 (Secure Shell - a remote access service like telnet, but encrypted).</p>
<h2 style="text-align: justify;">Vulnerability Scanners</h2>
<p style="text-align: justify;">A vulnerability scanner is like a portscanner on steroids, once it has identified which services are running, it checks the system against a large database of known vulnerabilities and then prepares a report on what security holes are found. The software can be updated to scan for the latest security holes. These tools are very simple to use unfortunately, so many script kiddies simply point them at a target machine to find out what they can attack. The most popular ones are Retina (http://www.eeye.com), Nessus (http://www.nessus.org) and GFI LanScan (http://www.gfi.com). These are very useful tools for admins as well as they can scan their whole network and get a detailed summary of what holes exist.</p>
<h2 style="text-align: justify;">Password Crackers</h2>
<p style="text-align: justify;">Once an attacker has gained some level of access, he/she usually goes after the password file on the relevant machine. In UNIX like systems this is the /etc/passwd or /etc/shadow file and in Windows it is the SAM database. Once he gets hold of this file, its usually game over, he runs it through a password cracker that will usually guarantee him further access. Running a password cracker against your own password files can be a scary and enlightening experience. L0phtcrack cracked my old password fR7x!5kK after being left on for just one night !</p>
<p style="text-align: justify;">There are essentially two methods of password cracking :</p>
<p style="text-align: justify;"><strong>Dictionary Mode</strong> - In this mode, the attacker feeds the cracker a word list of common passwords such as 'abc123' or 'password'. The cracker will try each of these passwords and note where it gets a match. This mode is useful when the attacker knows something about the target. Say I know that the passwords for the servers in your business are the names of Greek Gods (yes Chris, that's a shout-out to you ;)) I can find a dictionary list of Greek God names and run it through the password cracker.</p>
<p style="text-align: justify;">Most attackers have a large collection of wordlists. For example when I do penetration testing work, I usually use common password lists, Indian name lists and a couple of customized lists based on what I know about the company (usually data I pick up from their company website). Many people think that adding on a couple of numbers at the start or end of a password (for example 'superman99') makes the password very difficult to crack. This is a myth as most password crackers have the option of adding numbers to the end of words from the wordlist. While it may take the attacker 30 minutes more to crack your password, it does not make it much more secure.</p>
<p style="text-align: justify;"><strong>Brute Force Mode</strong> - In this mode, the password cracker will try every possible combination for the password. In other words it will try aaaaa, aaaab, aaaac, aaaad etc. this method will crack every possible password -- its just a matter of how long it takes. It can turn up surprising results because of the power of modern computers. A 5-6 character alphanumeric password is crackable within a matter of a few hours or maybe a few days, depending on the speed of the software and machine. Powerful crackers include <strong>l0phtcrack </strong>for windows passwords and <strong>John the Ripper</strong> for UNIX style passwords.</p>
<p style="text-align: justify;">For each category, I have listed one or two tools as an example. At the end of this article I will present a more detailed list of tools with descriptions and possible uses.</p>
<hr class="system-pagebreak" title="2. Penetration-Testing" />
<h2 style="text-align: justify;">What is Penetration-Testing?</h2>
<p style="text-align: justify;">Penetration testing is basically when you hire (or perform yourself) security consultants to attack your network the way an attacker would do it, and report the results to you enumerating what holes were found, and how to fix them. It's basically breaking into your own network to see how others would do it.</p>
<p style="text-align: justify;">While many admins like to run quick probes and port scans on their systems, this is not a penetration test -- a penetration tester will use a variety of specialised methods and tools from the underground to attempt to gain access to the network. Depending on what level of testing you have asked for, the tester may even go so far as to call up employees and try to social engineer their passwords out of them (social engineering involves fooling a mark into revealing information they should not reveal).</p>
<p style="text-align: justify;">An example of social engineering could be an attacker pretending to be someone from the IT department and asking a user to reset his password. Penetration testing is probably the only honest way to figure out what security problems your network faces. It can be done by an administrator who is security aware, but it is usually better to pay an outside consultant who will do a more thorough job.</p>
<p style="text-align: justify;">I find there's a lack of worthwhile information online about penetration testing -- nobody really goes about describing a good pen test, and what you should and shouldn't do. So I've hand picked a couple of good papers on the subject and then given you a list of my favourite tools, and the way I like to do things in a pen-test.</p>
<p style="text-align: justify;">This is by no means the only way to do things, it's like subnetting -- everyone has their own method -- this is just a systematic approach that works very well as a set of guidelines. Depending on how much information you are given about the targets as well as what level of testing you're allowed to do, this method can be adapted.</p>
<h2 style="text-align: justify;">Papers Covering Penetration Testing</h2>
<p>I consider the following works essential reading for anyone who is interested in performing pen-tests, whether for yourself or if you're planning a career in security:</p>
<p>'Penetration Testing Methodology - For Fun And Profit' - Efrain Tores and LoNoise, you can google for this paper and find it.</p>
<p>'An Approach To Systematic Network Auditing' - Mixter (http://mixter.void.ru)</p>
<p>'Penetration Testing - The Third Party Hacker' - Jessica Lowery. Boy is this ever a good paper ! (https://www.sans.org/rr/papers/index.php?id=264)</p>
<p>'Penetration Testing - Technical Overview' - Timothy P. Layton Sr. also from the www.sans.org (https://www.sans.org) reading room</p>
<h2>Pen-test Setup</h2>
<p style="text-align: justify;">I don't like working from laptops unless its absolutely imperative, like when you have to do a test from the inside. For the external tests I use a Windows XP machine with Cygwin (www.cygwin.com) and VMware (www.vmware.com) most linux exploits compile fine under cygwin, if they don't then I shove them into vmware where I have virtual machines of Red Hat, Mandrake and Win2k boxes. In case that doesnt work, the system also dual boots Red Hat 9 and often I'll just work everything out from there.</p>
<p style="text-align: justify;">I feel the advantage of using a microsoft platform often comes from the fact that 90% of your targets may be microsoft systems. However the flexibility under linux is incomparable, it is truely the OS of choice for any serious hacker.. and as a result, for any serious security professional. There is no best O/S for penetration testing -- it depends on what you need to test at a point in time. That's one of the main reasons for having so many different operating systems set up, because you're very likely to be switching between them for different tasks.</p>
<p style="text-align: justify;">If I don't have the option of using my own machine, I like to choose any linux variant.<br /> I keep my pen-tests strictly to the network level, there is no social engineering involved or any real physical access testing other than basic server room security and workstation lockdown (I don't go diving in dumpsters for passwords or scamming employees).</p>
<p style="text-align: justify;">I try as far as possible to determine the Rules Of Engagement with an admin or some other technically adept person with the right authorisation, not a corporate type. This is very important because if you do something that ends up causing trouble on the network, its going to make you look very unprofessional. It's always better to have it done clearly in writing -- this is what you are allowed to do.</p>
<p style="text-align: justify;">I would recommend this even if you're an admin conducting an in-house test. You can get fired just for scanning your own network if its against your corporate policy. If you're an outside tester, offer to allow one of their people to be present for your testing if they want. This is recommended as they will ultimately be fixing most of these problems and being in-house people they will be able to put the results of the test in perspective to the managers.</p>
<h2>Tools</h2>
<p style="text-align: justify;">I start by visiting the target website, running a whois, DNS zone transfer (if possible) and other regular techniques which are used to gather as much network and generic information about the target. I also like to pick up names and email addresses of important people in the company -- the CEO, technical contacts etc. You can even run a search in the newsgroups for @victim.com to see all the public news postings they have made. This is useful as a lot of admins frequent bulletin boards for help. All this information goes into a textfile. Keeping notes is critically important, it's very easy to forget some minor detail that you should include in your end report.</p>
<p style="text-align: justify;">Now for a part of the arsenal -- not in any order and far from the complete list.</p>
<p style="text-align: justify;"><strong>Nmap </strong>- Mine (and everyone elses) workhorse port scanner with version scanning, multiple scan types, OS fingerprinting and firewall evasion tricks. When used smartly, Nmap can find any Internet facing host on a network.</p>
<p style="text-align: justify;"><strong>Nessus </strong>- My favourite free vulnerability scanner, usually finds something on every host. Its not too stealthy though and will show up in logs (this is something I don't have to worry about too much).</p>
<p style="text-align: justify;"><strong>Retina </strong>- A very good commercial vulnerability scanner, I stopped using this after I started with nessus but its very very quick and good. Plus its vulnerability database is very up-to-date.</p>
<p style="text-align: justify;"><strong>Nikto </strong>- This is a webserver vulnerability scanner. I use my own hacked up version of this perl program which uses the libwhisker module. It has quite a few IDS evasion modes and is pretty fast. It is not that subtle though, which is why I modified it to be a bit more stealthy.</p>
<p style="text-align: justify;"><strong>Cisco Scanner</strong> - This is a small little windows util I found that scans IP ranges for routers with the default password of 'cisco'. It has turned up some surprising results in the past and just goes to show how even small little tools can be very useful. I am planning to write a little script that will scan IP ranges looking for different types of equipment with default passwords.</p>
<p style="text-align: justify;"><strong>Sophie Script</strong> - A little perl script coupled with user2sid and sid2user (two windows programs) which can find all the usernames on a windows machine.</p>
<p style="text-align: justify;"><strong>Legion</strong> - This is a windows file share scanner by the erstwhile Rhino9 security group. It is fast as hell and allows you to map the drive right from in the software.</p>
<p style="text-align: justify;"><strong>Pwdump2</strong> - Dumps the content of the windows password sam file for loading into a password cracker.</p>
<p style="text-align: justify;"><strong>L0phtcrack 3.0</strong> - Cracks the passwords I get from the above or from its own internal SAM dump. It can also sniff the network for password hashes or obtain them via remote registry. I have not tried the latest version of the software, but it is very highly rated.</p>
<p style="text-align: justify;"><strong>Netcat</strong> - This is a TCP/UDP connection backend tool, oh boy I am lost without this ! Half my scripts rely on it. There is also an encrypted version called cryptcat which might be useful if you are walking around an IDS. Netcat can do anything with a TCP or UDP connection and it serves as my replacement to telnet as well.</p>
<p style="text-align: justify;"><strong>Hping2</strong> - A custom packet creation utility, great for testing firewall rules among other things.</p>
<p style="text-align: justify;"><strong>SuperScan</strong> - This is a windows based port scanner with a lot of nice options. Its fast, and has a lot of other neat little tools like NetBIOS enumeration and common tools such as whois, zone transfers etc.</p>
<p style="text-align: justify;"><strong>Ettercap</strong> - When sniffing a switched network, a conventional network sniffer will not work. Ettercap poisons the ARP cache of the hosts you want to sniff so that they send packets to you and you can sniff them. It also allows you to inject data into connections and kill connections among other things.</p>
<p style="text-align: justify;"><strong>Brutus</strong> - This is a fairly generic protocol brute forcing tool. It can bruteforce HTTP, FTP, Telnet and many other login authentication systems. This is a windows tool, however I prefer Hydra for linux.</p>
<h2>Bunch of Common Exploits Effeciently Sorted</h2>
<p style="text-align: justify;">This is my collection of exploits in source and binary form. I sort them in subdirectories by operating system, then depending on how they attack - Remote / Local and then according to what they attack - BIND / SMTP / HTTP / FTP / SSH etc etc. The binary filenames are arbitrary but the source filenames instantly tell me the name of the exploit and the version of the software vulnerable.</p>
<p style="text-align: justify;">This is essential when you're short on time and you need to 'pick one'. I don't include DoS or DDoS exploits, there is nobody I know who would authorise you to take down a production system. Don't do it -- and tell them you arent doing it.. and only if they plead with you should you do it.</p>
<h2>Presenting Reports</h2>
<p style="text-align: justify;">This is the critical part -- it's about presenting what you found to people who probably don't understand a word of what your job is about other than you're costing them money. You have to show them that there are some security problems in your network, and this is how serious they might be.</p>
<p style="text-align: justify;">A lot of people end the pen-test after the scanning stage. Unless someone specifically tells me to do this, I believe it is important you exploit the system to at least level 1. This is important because there is a very big difference in saying something is vulnerable and actually seeing that the vulnerability is executable. Not to mention when dealing with a corporate type, seeing 'I gained access to the server' usually gets more attention than 'the server is vulnerable to blah blah'.</p>
<p style="text-align: justify;">After you're done, make a VERY detailed chronological report of everything you did, including which tools you used, what version they are, and anything else you did without using tools (eg. SQL injection). Give gory technical details in annexes -- make sure the main document has an executive summary and lots of pie charts that they can understand. Try and include figures and statistics for whatever you can.</p>
<p style="text-align: justify;">To cater to the admins, provide a report for each host you tested and make sure that for every security hole you point out, you provide a link to a site with a patch or fix, . Try to provide a link to a site with detailed information about the hole preferably bugtraq or some well known source -- many admins are very interested in these things and appreciate it.</p>
<hr class="system-pagebreak" title="3. A Brief Walk-through of an Attack" />
<h2>A Brief Walk-through of an Attack</h2>
<p style="text-align: justify;">This is an account of how an attacker in the real world might go about trying to exploit your system. There is no fixed way to attack a system, but a large number will follow the similar methodology or at least the chain of events.</p>
<p style="text-align: justify;">This section assumes that the attacker is moderately skilled and moderately motivated to breaking into your network. He/She has targeted you due to a specific motive -- perhaps you sacked them, or didn't provide adequate customer support (D-link India are you listening ? ;)). Hopefully this will help you figure out where your network might be attacked, and what an attacker might do once they are on the inside.</p>
<p style="text-align: justify;">Remember that attackers will usually choose the simplest way to get into the network. The path of least resistance principle always applies.</p>
<h2>Reconnaissance &amp; Footprinting</h2>
<p style="text-align: justify;">Here the attacker will try to gather as much information about your company and network as they can without making a noise. They will first use legitimate channels, such as google and your company webpage to find out as much about you as they can. They will look for the following information:</p>
<p style="text-align: justify;"><br /> • <strong>Technical information</strong> is a goldmine, things like a webpage to help your employees log in from home will be priceless information to them. So also will newsgroup postings by your IT department asking how to set up particular software, as they now know that you use this software and perhaps they know of a vulnerability in it.</p>
<p style="text-align: justify;">• <strong>Personal information</strong> about the company and its corporate structure. They will want information on the heads of IT departments, the CEO and other people who have a lot of power. They can use this information to forge email, or social engineer information out of subordinates.</p>
<p style="text-align: justify;">• <strong>Information about your partners</strong>. This might be useful information for them if they know you have some sort of network connection to a supplier or partner. They can then include the supplier's systems in their attack, and find a way in to your network from there.</p>
<p style="text-align: justify;">• <strong>General news</strong>. This can be useful information to an attacker as well. If your website says that it is going down for maintenance for some days because you are changing your web server, it might be a clue that the new setup will be in its teething stages and the admins may not have secured it fully yet.</p>
<p style="text-align: justify;">They will also query the whois databases to find out what block of IP addresses you own. This will give them a general idea of where to start their network level scans.<br /> After this they will start a series of network probes. The most basic of which will be to determine if you have a firewall, and what it protects. They will try and identify any systems you have that are accessible from the Internet.</p>
<p style="text-align: justify;">The most important targets will be the ones that provide public services. These will be :</p>
<p style="text-align: justify;">• <strong>Webservers</strong> - usually the front door into the network. All webserver software has some bugs in it, and if you're running home made CGI scripts such as login pages etc, they might be vulnerable to techniques such as SQL injection.</p>
<p style="text-align: justify;">• <strong>Mail servers</strong> - Sendmail is very popular and most versions have at least one serious vulnerability in them. Many IT heads don't like to take down the mail server for maintenance as doing without it is very frustrating for the rest of the company (especially when the CEO doesn't get his mail).</p>
<p style="text-align: justify;">• <strong>DNS servers</strong> - Many implementations of BIND are vulnerable to serious attacks. The DNS server can be used as a base for other attacks, such as redirecting users to other websites etc.</p>
<p style="text-align: justify;">• <strong>Network infrastructure</strong> - Routers and switches may not have been properly secured and may have default passwords or a web administration interface running. Once controlled they can be used for anything from a simple Denial of Service attack by messing up their configurations, to channeling all your data through the attackers machine to a sniffer.</p>
<p style="text-align: justify;">• <strong>Database servers</strong> - Many database servers have the default sa account password blank and other common misconfigurations. These are very high profile targets as the criminal might be looking to steal anything from your customer list to credit card numbers. As a rule, a database server should never be Internet facing.</p>
<p style="text-align: justify;">The more naive of the lot (or the ones who know that security logs are never looked at) may run a commercial vulnerability scanner such as nessus or retina over the network. This will ease their work.</p>
<h2>Exploitation Phase</h2>
<p style="text-align: justify;">After determining which are valid targets and figuring out what OS and version of software they are using (example which version of Apache or IIS is the web server running), the attacker can look for an exploit targeting that particular version. For example if they find you are running an out of date version of Sendmail, they will look for an exploit targeting that version or below.</p>
<p style="text-align: justify;">They will first look in their collection of exploits because they have tested these. If they cannot find one, they will look to public repositories such as https://www.packetstormsecurity.nl. They will probably try to choose common exploits as these are more likely to work and they can probably test them in their own lab.</p>
<p style="text-align: justify;">From here they have already won half the game as they are behind the firewall and can probably see a lot more of the internal network than you ever intended for them to. Many networks tend to be very hard to penetrate from the outside, but are woefully unprotected internally. This hard exterior with a mushy interior is a recipe for trouble -- an attacker who penetrates the first line of defense will have the full run of your network.</p>
<p style="text-align: justify;">After getting in, they will also probably install backdoors on this first compromised system to provide them with many ways in, in case their original hole gets shut down. This is why when you identify a machine that was broken into, it should be built up again from scratch as there is no way of knowing what kind of backdoors might be installed. It could be tricky to find a program that runs itself from 2:00AM to 4:00AM every night and tries to connect to the attackers machine. Once they have successfully guaranteed their access, the harder part of the intrusion is usually over.</p>
<h2>Privilege Escalation Phase</h2>
<p style="text-align: justify;">Now the attacker will attempt to increase his security clearance on the network. He/She will usually target the administrator accounts or perhaps a CEO's account. If they are focused on a specific target (say your database server) they will look for the credentials of anyone with access to that resource. They will most likely set up a network sniffer to capture all the packets as they go through the network.</p>
<p style="text-align: justify;">They will also start manually hunting around for documents that will give them some interesting information or leverage. Thus any sensitive documents should be encrypted or stored on systems with no connection to the network. This will be the time they use to explore your internal network.</p>
<p style="text-align: justify;">They will look for windows machines with file sharing enabled and see what they can get out of these. Chances are if they didn't come in with a particular objective in mind (for example stealing a database), they will take whatever information they deem to be useful in some way.</p>
<h2>Clean Up Phase</h2>
<p style="text-align: justify;">Now the attacker has either found what they were looking for, or are satisfied with the level of access they have. They have made sure that they have multiple paths into the network in case you close the first hole. They will now try to cover up any trace of an intrusion. They will manually edit log files to remove entries about them and will make sure they hide any programs they have installed in hard to find places. <br /> <br /> Remember, we are dealing with an intruder who is moderately skilled and is not just interested in defacing your website. They know that the only way to keep access will be if you never know something is amiss. In the event that there is a log they are unable to clean up, they may either take a risk leaving it there, or flood the log with bogus attacks, making it difficult for you to single out the real attack.</p>
<hr class="system-pagebreak" title="4. Where Can I Find More Information?" />
<h2>Where Can I Find More Information?</h2>
<p style="text-align: justify;">Without obviously plugging our site too much, the best place for answers to questions relating to this article is in our forums. The Security/Firewalls Forum is the best place to do this -- so you can ask anything from the most basic to the most advanced questions concerning network security there. A lot of common questions have already been answered in the forums, so you will quite likely find answers to questions like 'Which firewall should I use ?'.</p>
<p style="text-align: justify;">As far as off-site resources are concerned, network security is a very vast field and there is seemingly limitless information on the subject. You will never find information at so-called hacker sites full of programs. The best way to learn about network security is to deal with the first word first -- you should be able to talk networking in and out, from packet header to checksum, layer 1 to layer 7.</p>
<p style="text-align: justify;">Once you've got that down, you should start on the security aspect. Start by reading a lot of the papers on the net. Take in the basics first, and make sure you keep reading. Wherever possible, try to experiment with what you have read. If you don't have a home lab, you can build one 'virtually'. See the posts in the Cool Software forum about VMware.</p>
<p style="text-align: justify;"><br /> Also, start reading the security mailing lists such as bugtraq and security-basics. Initially you may find yourself unable to understand a lot of what happens there, but the newest vulnerabilities are always announced on these lists. If you follow a vulnerability from the time its discovered to when someone posts an exploit for it, you'll get a very good idea of how the security community works.. and you'll also learn a hell of a lot in the process.</p>
<p style="text-align: justify;">If you're serious about security, it is imperative that you learn a programming language, or at least are able to understand code if not write your own. The best choices are C and assembly language. However knowing PERL and Python are also valuable skills as you can write programs in these languages very quickly.</p>
<p style="text-align: justify;">For now, here are a few links that you can follow for more information:</p>
<p style="text-align: justify;">www.securityfocus.com - A very good site with all the latest news, a very good library and tools collection as well as sections dedicated to basics, intrusion detection, penetration testing etc. Also home of the Bugtraq mailing list.</p>
<p style="text-align: justify;">www.sans.org - A site with excellent resources in its reading room, people who submit papers there are trying for a certification and as a result its mostly original material and of a very high calibre.</p>
<p style="text-align: justify;">www.security-portal.com - A good general security site.</p>
<p style="text-align: justify;">www.cert.org - The CERT coordination center provides updates on the latest threats and how to deal with them. Also has very good best practice tips for admins.</p>
<p style="text-align: justify;">www.securityfocus.com/archive/1 - This is the link to Bugtraq, the best full disclosure security mailing list on the net. Here all the latest vulnerabilities get discussed way before you see them being exploited or in the press.</p>
<p style="text-align: justify;">www.insecure.org - The mailing lists section has copies of bugtraq, full disclosure, security-basics, security-news etc etc. Also the home of nMap, the wonderful port scanner.</p>
<p style="text-align: justify;">seclists.org - This is a direct link to the security lists section of insecure.org.</p>
<p style="text-align: justify;">www.grc.com - For windows home users and newbies just interested in a non technical site. The site is home to Shields Up, which can test your home connection for file sharing vulnerabilities, do a port scan etc, all online. It can be a slightly melodramatic site at times though.</p>
<p style="text-align: justify;">www.eeye.com - Home of the Retina Security Scanner. Considered the industry leader. The E-Eye team also works on a lot of the latest vulnerabilities for the windows platform.</p>
<p style="text-align: justify;">www.nessus.org - Open source vulnerability scanner, and IMNSHO the best one going. If you're a tiger team penetration tester and you don't point nessus at a target, you're either really bad at your job or have a very large ego. If there's a vulnerability in a system, nessus will find it.</p>
<p style="text-align: justify;">www.zonelabs.com - ZoneAlarm personal firewall for windows, considered the best, and also the market leader.</p>
<p style="text-align: justify;">www.sygate.com - Sygate Personal Firewall, provides more configuration options than ZoneAlarm, but is consequently harder to use.</p>
<p style="text-align: justify;">www.secinf.net - Huge selection of articles that are basically windows security related.</p>
<p style="text-align: justify;">www.searchsecurity.com - A techtarget site which you should sign up for, very good info. Chris writes for searchnetworking.com its sister site.. I don't think the references could be much better.</p>
<p style="text-align: justify;">www.antioffline.com - A very good library section on buffer overflows etc.</p>
<p style="text-align: justify;">www.packetstormsecurity.nl - The largest selection of tools and exploits possible.</p>
<hr class="system-pagebreak" title="5. Conclusion" />
<h2>Conclusion</h2>
<p style="text-align: justify;">This 5-page article should serve as a simple introduction to network security. The field itself is too massive to cover in any sort of article, and the amount of cutting edge research that goes on really defies comprehension. <br /> <br /> Some of the most intelligent minds work in the security field because it can be a very challenging and stimulating environment. If you like to think out-of-the-box and are the sort of person willing to devote large amounts of your time to reading and questioning why things happen in a particular way, security might be a decent career option for you. <br /> <br /> Even if you're not interested in it as a career option, every admin should be aware of the threats and the solutions. Remember, you have to think like them to stop them !<br /> <br /> If you're interested in network security, we highly recommend you read through the networking and firewall sections of this website. Going through the whole site will be some of the most enlightening time you'll ever spend online. <br /> <br /> If you're looking for a quick fix, here are a few of the more important areas that you might want to cover:<br /> <br /> <a href="https://www.firewall.cx/networking.html" target="_blank" title="Introduction to Networking">Introduction to Networking</a><br /> <br /> <a href="https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html" target="_blank" title="Introduction to Firewalls">Introduction to Firewalls</a><br /> <br /> <a href="https://www.firewall.cx/networking/network-address-translation.html" target="_blank" title="Introduction to Network Address Translation (NAT)">Introduction to Network Address Translation (NAT)</a><br /> <br /> <a href="https://www.firewall.cx/networking/network-fundamentals/dos-attacks.html" target="_blank" title="Denial Of Service&nbsp;(DoS) Attacks">Denial Of Service&nbsp;(DoS) Attacks</a><br /> <br /> <a href="https://www.firewall.cx/networking/network-fundamentals/secure-home-network.html" target="_blank" title="Locking down Windows networks">Locking down Windows networks</a><br /> <br /> <a href="https://www.firewall.cx/networking/network-protocols.html" target="_blank" title="Introduction to Network Protocols">Introduction to Network Protocols</a><br /> <br /> Also check out our <a href="https://www.firewall.cx/downloads.html" target="_blank" title="downloads section">downloads section</a> where you will find lots of very good security and general networking tools.<br /> <br /> We plan on putting up a lot of other security articles in the near future. Some will be basic and introductory like this one, while some may deal with very technical research or techniques. <br /> <br /> As always feel free to give us feedback and constructive criticism. All flames however will be directed to <span style="color: #ff0000;">/dev/null</span> ;)</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Tue, 06 Mar 2012 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Are Cloud-Based Services Overhyped?</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-overhype.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-overhype.html</guid>
			<description><![CDATA[<p>In these hard economic times, cloud computing is becoming a more attractive option for many organizations. Industry analyst firm, The 451 Group predicts that the marketplace for cloud computing will grow from $8.7bn in revenue in 2010 to $16.7bn by 2013. Accompanying this is an increasing amount of hype about cloud computing.</p>
<p style="text-align: justify;" align="left">Cloud computing has gone through different stages, yet because the Internet only began to offer significant bandwidth in the 1990s, it became something for the masses over the last decade. Initial applications were known as Hosted Services. Then the term Application Service Provider emerged, with some hosted offerings known as Managed Services. More recently, in addition to these terms, Software as a Service (SaaS) became a catchphrase.&nbsp; And as momentum for hosted offerings grew, SaaS is now complemented by Infrastructure as a Service, Platform as a Service, and even Hardware as a Service.</p>
<p align="left"><strong>Is this a sign of some radical technology shift, or simply a bit more of what we have seen in the past?&nbsp;</strong></p>
<p style="text-align: justify;" align="left">The answer is both. We are witnessing a great increase in global investment towards hosted offerings. These providers are expected to enjoy accelerated growth as Internet bandwidth becomes ubiquitous, faster, and less expensive; as network devices grow smaller; and as critical mass builds. Also, organizations are moving towards cloud services of all kinds through the use of different types of network devices – take, for example, the rise of smart phones, the iPad tablet, and the coming convergence of television and the Internet.</p>
<p style="text-align: justify;" align="left">Yet, although cloud solutions may emerge as dominant winners in some emerging economies, on-premise solutions will remain in use. While start-ups and small businesses might find the cloud as the cheaper and safer option for their business – enjoying the latest technology without needing to spend money on an IT infrastructure, staff, and other expenses that come with on premise solutions; larger businesses usually stick to on-premise solutions for both philosophical and practical reasons such as wishing to retain control, and the ability to configure products for their own specific needs.</p>
<p style="text-align: justify;" align="left">Gartner's chief security analyst, John Pescatore, for example, believes that cloud security is not enough when it comes to the upper end of the enterprise, financial institutions, and the government. On the other hand, he states that smaller businesses may actually get better security from the cloud. The reason behind this is that while the former has to protect confidential data and cannot pass it on to third parties, the latter is given better security (multiple backup locations, 24/7 monitoring, physical security protecting sites, and more).</p>
<p style="text-align: justify;" align="left">Although the cloud might appear to be finding its fertile ground only now, especially in these times of belt-tightening, hosted services have been around for a while. For this reason, when choosing a cloud provider, always make sure you choose a company that has proven itself in the marketplace.</p>
<p style="text-align: justify;" align="left">&nbsp;</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Fri, 22 Jul 2011 07:33:52 +1000</pubDate>
		</item>
		<item>
			<title>What if it Rains in the Cloud?</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-rain.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-rain.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">Cloud computing has become a cost-effective model for small and medium-sized enterprises, SMEs, that wish to use the latest technology on-demand and with no commitments or need to purchase and manage software products. These features have made hosted services an attractive choice, such that industry analyst firm, The 451 Group, has predicted the marketplace for cloud computing will grow from $8.7billion in revenue in 2010 to $16.7billion by 2013.</p>
<p style="text-align: justify;" align="left">Yet, many organizations think twice when it comes to entrusting their data to third parties. Let's face it, almost every web user has an account on sites such as Gmail or Facebook – where personal information is saved on a separate mainframe; but when it comes to businesses allowing corporate data to go through third parties, the danger and implications are greater as an error affects a whole system, not just a single individual.</p>
<h2 align="left">So The Question Arises: What If It Rains In The Cloud?</h2>
<p style="text-align: justify;" align="left">Some SMEs are apprehensive about using hosted services because their confidential data is being handled by third parties and because they believe the solution provider might fail. Funnily enough, it's usually the other way around. Subject to selecting a reputable provider, smaller businesses can attain better security via cloud computing as the solution provider usually invests more in security (multiple backup locations, 24/7 monitoring, physical security protecting sites, and more) than any individual small business could. Also, the second the service provider patches security vulnerability, all customers are instantly protected, as opposed to downloadable patches that the IT team within a company must apply.</p>
<p style="text-align: justify;" align="left">And, to prevent data leaks, cloud services providers make it their aim to invest in the best technology infrastructures to protect their clients' information, knowing that even the slightest mistake can ruin their reputation – not to mention potential legal claims – and, with that, their business.</p>
<p style="text-align: justify;" align="left">A drawback with some hosted services is that if you decide you want to delete a cloud resource, this might not result in true wiping of the data. In some cases, adequate or timely deletion might be impossible for example, because the disk that needs to be destroyed also stores data from other clients. Also, certain organizations find it difficult to entrust their confidential data to third parties.</p>
<h2 align="left">Use Your Umbrella</h2>
<p style="text-align: justify;" align="left">Cloud computing can be the better solution for many SMEs, particularly in the case of start-ups and small businesses which cannot afford to invest in a proper IT infrastructure. The secret is to know what to look for when choosing a provider: Engage the services of a provider that will provide high availability and reliability. It would be wise to avoid cloud service providers that do not have much of a track record, and that perhaps are of limited size and profitability, subject to M&amp;A activity, and changing development priorities.</p>
<p style="text-align: justify;" align="left">To enjoy the full potential promised by the technology, it is important to choose a hosted service provider that has proven itself in the marketplace and that has solid ownership and management, applies stringent security measures, uses multiple data centers so as to avoid a single point of failure, provides aggressive solid service level agreement, and is committed to cloud services for the long term.</p>
<p style="text-align: justify;" align="left">Following these suggestions, you can have a peace of mind that your data is unlikely to be subjected to ‘bad weather'!</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Fri, 22 Jul 2011 07:30:53 +1000</pubDate>
		</item>
		<item>
			<title>Three Reasons Why SMEs Should Also Consider Cloud-Based Solutions </title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-solutions-sme.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/cloud-based-solutions-sme.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left"><strong>Small and medium enterprises</strong> (SMEs) are always looking for the optimum way to implement technology within their organizations be it from a technical, financial or personal perspective. Technology solutions can be delivered using one of three common models: as on-premise solutions (i.e. installed on company premises), hosted services (handled by an external third party) or a mix of both. Let's take a look at the cloud-based solutions in this brief post.</p>
<h2 align="left">The Reasons for Cloud-based Backup Solutions</h2>
<p style="text-align: justify;" align="left">When talking about a hosted service, we are referring to a delivery model which enables SMEs to make the most out of the latest technology through a third party. Cloud-based solutions or services are gaining in popularity as an alternative strategy for businesses , especially for startups and small businesses, particularly when considering the three reasons below:</p>
<p style="text-align: justify;" align="left">&nbsp; <strong><em>Financial </em></strong>– Startups and very small SMEs often find it financially difficult to set up the infrastructure and IT system required when they are starting or still building the business. The additional cost to build an IT infrastructure and recruit IT personnel is at times too high and not a priority IT when they just need email and office tools. In such scenario a hosted service makes sense because the company can depend on a third party to provide additional services, such as archiving and email filtering, at a monthly cost. This reduces costs and allows the business to focus on other important areas requiring investment. As the business grows, the IT needs of that company will dictate to what extent a hosted or managed service is necessary and cost-effective.</p>
<p style="text-align: justify;" align="left">&nbsp; <strong><em>Build your business </em></strong> – The cost saving aspect is particularly important for those businesses that require a basic IT infrastructure but it still want to benefit from security and operational efficiency without spending any money. Hosted / managed services give companies the option to test and try technologies before deciding whether they need to move their IT in-house or leave it in the hands of third parties.</p>
<p style="text-align: justify;" align="left">&nbsp; <strong><em>Pay-as-you-go or rental basis </em></strong> – Instead of investing heavily in IT hardware, software and personnel, a pay-per-use or subscription system makes more sense. Companies choosing this delivery model would do well, however, to read contractual agreements carefully. Many vendors/providers tie in customers for two or three years, which may be just right for a startup SME, but companies should look closely at any associated costs if they decide to stop the service and at whether migrating their data will prove a very costly affair. The key to choosing a hosted or managed service is to do one's homework and plan well. Not all companies will find a cloud-based service to be suitable even if the cost structure appears to be attractive.</p>
<h2 align="left">Are There Any Drawbacks To This System?</h2>
<p style="text-align: justify;" align="left">Despite all the advantages mentioned above, some SMEs are still apprehensive when it comes to cloud-based solutions because they are concerned about their data's security. Although an important consideration, a quality cloud-based provider will have invested heavily in security and, more often than not, in systems that are beyond what a small business can afford to implement. A good provider will have invested in multiple backup locations, 24/7 monitoring, physical security to protect sites, and more.</p>
<p style="text-align: justify;" align="left">On the other hand, the fact that the data would be exposed to third parties and not handled internally could be seen as a drawback by some companies, especially those handling sensitive data. As stated earlier, beware of the fine print and medium- to long-term costs before committing.</p>
<h2 align="left">Another Option</h2>
<p style="text-align: justify;" align="left">If you're a server-hugger and need to have that all-important server close to your office, businesses can always combine their on-premise solution with a hosted or managed service – benefiting from the advantages and doing away with the inherent disadvantages.</p>
<p style="text-align: justify;" align="left">Every company is different and whether you decide to go for a cloud-based solution or not, keep in mind that there is no right or wrong – it's all a matter of what your current business's infrastructure is like and your needs at the time. However, if you are a startup or a small business, cloud-based solutions are an attractive option worth taking into consideration.</p>
<p class="arrow" style="text-align: justify;" align="left">&nbsp;</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Fri, 22 Jul 2011 07:26:03 +1000</pubDate>
		</item>
		<item>
			<title>61% of SMEs use Email Archiving in-house – What About the Others ?</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/email-security-archiving.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/email-security-archiving.html</guid>
			<description><![CDATA[<p style="text-align: justify;">A recent survey on email archiving, based on 202 US-based SMEs, found that a growing number of organizations are considering or would consider a third-party hosted email archiving service. A total of 18% of those organizations that already use an email archiving solution, have opted for a hosted service, while 38% said are open to using such a service.</p>
<p style="text-align: justify;">At the same time, 51% of those surveyed said they would still only use an on-premise email archiving solution.</p>
<p style="text-align: justify;">The findings paint an interesting picture of email archiving use among SMEs. Apart from the shocking statistic that more than 63% do not archive their email, those that do, or consider doing so, are interested in the various options available.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/articles-email-archiving-1.jpg" alt="articles-email-archiving-1" width="447" height="422" /></p>
<h2>On-premise or Hosted?</h2>
<p style="text-align: justify;">An increasing number of IT services are now offered as Software as a Service (SaaS) or hosted by a third party. Many services prove to be very cost effective when implemented at the scale which outsource service providers can manage, but there are still many admins – as the survey shows – who prefer to keep everything in house; security personnel who want to maintain data integrity internally, and business leaders who do not see the value of a cloud solution for their organization because their requirements dictate otherwise.</p>
<h2>What is Email Archiving?</h2>
<p style="text-align: justify;">At its simplest, email archiving technology helps businesses maintain a copy of all emails sent or received from all users. This indispensible solution can be used for searches and to meet eDiscovery, compliance audits and reviews, to increase the overall long term storage capacity of the email system, and as a disaster recovery repository to ensure data availability.</p>
<p style="text-align: justify;">Because email is so heavily tied to the internet, email archiving can readily be outsourced to service providers and can often be combined with other outsourced services like spam and malware filtering. Hosted email archiving eases the load on your IT staff, allowing them to focus on core activities, and can be a more economical solution than paying for additional servers, storage, and tape backups. It does of course require you to entrust your data to a third party, and often this is where companies may opt for an internal solution.</p>
<p style="text-align: justify;">An internal email archiving solution, on the other hand, requires only minimal care and feeding, and offers the advantage of maintaining all data internally.</p>
<p style="text-align: justify;">Email archiving solutions are essential for all businesses of any size, and organizations should consider the pros and cons of both hosted and on-premises email archiving, and deploy the solution which best suits their company's budget and needs.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 16 Jul 2011 10:21:49 +1000</pubDate>
		</item>
		<item>
			<title>Email Security - Can't Live Without It!</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/email-security-threat.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/email-security-threat.html</guid>
			<description><![CDATA[<p>This white paper explains why antivirus software alone is not enough to protect your organization against the current and future onslaught of computer viruses. Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.</p>
<p>We apologize but this paper is no longer available. Back to the <a href="https://www.firewall.cx/tools-tips-reviews/security-articles.html" title="Security Articles">Security Articles</a> section.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 16 Jul 2011 09:25:30 +1000</pubDate>
		</item>
		<item>
			<title>Log-Based Intrusion-Detection and Analysis in Windows Servers</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/news-log-based-id-gfi.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/news-log-based-id-gfi.html</guid>
			<description><![CDATA[<h2 style="text-align: justify;">Introduction - How to Perform Network-Wide Security Event Log Management</h2>
<p style="text-align: justify;">Microsoft Windows machines have basic audit facilities but they fall short of fulfilling real-life business needs(i.e., monitoring Windows computers in real-time, periodically analyzing security activity, and maintaining along-term audit trail). Therefore, the need exists for a log-based intrusion detection and analysis tool such as EventsManager.</p>
<p style="text-align: justify;">This paper explains how EventsManager’s innovative architecture can fill the gapsin Windows’ security log functionality – without hurting performance and while remaining cost-effective. Itdiscusses the use of EventsManager to implement best practice and fulfill due diligence requirementsimposed by auditors and regulatory agencies; and provides strategies for making maximum use of GFIEventsManager’s capabilities.</p>
<p class="box-hint" style="text-align: justify;">This white paper is no longer available by the vendor. To read similar interesting security articles, please visit our <a href="https://www.firewall.cx/tools-tips-reviews/security-articles.html" title="Security Articles section">Security Articles section</a>.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Tue, 12 Jul 2011 05:04:57 +1000</pubDate>
		</item>
		<item>
			<title>Web Monitoring for Employee Productivity Enhancement</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/web-monitoring-gfi.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/web-monitoring-gfi.html</guid>
			<description><![CDATA[<p style="text-align: justify;">All too often when web monitoring and Internet use restrictions are put into place it hurts company morale and does little to</p>
<p style="text-align: justify;">enhance employee productivity. Not wanting to create friction in the workplace many employers shy away from using what could be a significant employee productivity enhancement tool. Wasting time through Internet activities is simple and it’s a huge hidden cost to business. Just answering a few personal e-mails, checking the sports scores, reading the news headlines and checking to see how your bid is holding up can easily waste an hour of time each day. If the company has an 8 person CAD department and each of them spends an hour day on the above activities, that’s a whole employee wasted!</p>
<p style="text-align: justify;">Employees both want and don’t want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement.</p>
<h2 style="text-align: justify;">Why Employees Don’t Want Internet Blocking</h2>
<ol style="text-align: justify;">
<li>They don’t know what is blocked and what is allowed. This uncertainty creates fear that they may do “something” that could hurt their advancement opportunities or worse jeopardize their job.</li>
<li>Someone ruined it for everyone and that person still works here. When everyone is punished, no one is happy. Resentment builds against the employee known to have visited inappropriate websites.</li>
<li>There’s no procedure in place for allowing an employee access to a blocked website. When an employee finds that a website they tried to access is blocked, what do they do? Certainly this indiscretion is going to show up on a report somewhere. What if they really need that site? Is there a procedure in place for allowing this person to access it?</li>
</ol>
<p style="text-align: justify;">Uncertainty is fodder for loss of morale. In today’s economic climate employees are especially sensitive to any action that can be perceived as clamping down on them. Therefore a web monitoring program must be developed that can be viewed in a positive light by all employees.</p>
<h2 style="text-align: justify;">Why Employers are Afraid of Internet Blocking</h2>
<ul style="text-align: justify;">
<li>The potential of adding to IT costs and human resources headaches takes the away the value from web monitoring. The Internet is a big place and employees are smart. Employers don’t want to get into a situation where they are simply chasing their tail, trading one productivity loss by incurred costs and frustration elsewhere.</li>
</ul>
<ul style="text-align: justify;">
<li>Employers want to allow employee freedom. There is general recognition by employers that a happy employee is a loyal productive employee. Allowing certain freedoms creates a more satisfying work environment. The impact of taking that away may cause good employees to leave and an increase in turn over can be costly.</li>
</ul>
<p>The fear of trading one cost for another or trading one headache for another has prevented many employers from implementing internet monitoring and blocking. A mistrust of IT services may also come into play.Technology got us into this situation, where up to 20% of employee time is spent on the Internet, many employers don’t trust that technology can also help them gain that productivity back. A monitoring program needs to be simple to implement and maintain.</p>
<h2>Why Employees Want Internet Controls</h2>
<ul style="text-align: justify;">
<li>Employees are very aware of what their co-workers are doing or not doing. If an employee in the office spends an hour every day monitoring their auctions on ebay, or reading personal e-mail or chatting onIM every other employee in the office knows it and resents it. If they are working hard, everyone elseshould be too.</li>
<li>Unfortunately pornographic and other offensive material finds its way into the office when the Internet is unrestricted. Exposure to this material puts the employee in a difficult situation. Do they tell the boss? Do they try to ignore it? Do they talk to the employee themselves? The employee would rather not be put into this situation.</li>
<li>Employees want to work for successful, growing companies. Solid corporate policies that are seen as a necessary means to continue to propel the company forward add to employee satisfaction. Web monitoring can be one of those policies.</li>
</ul>
<h2>How Employers can Gain Employee Support for Web Monitoring</h2>
<ul style="text-align: justify;">
<li>Provide a clear, fair policy statement and expose the reasoning and goals. Keep it simple. Employees won’t read a long policy position paper. Stick to the facts and use positive language.</li>
<li>Policies that make sense to staff are easy to enforce</li>
<li>Policies with goals are easy to measure</li>
<li>When the goal has been reached celebrate with your employees in a big way. Everyone likes to feel like part of the team.</li>
<li>Empower your employees. White list, don’t black list. Let each employee actively participate in deciding which sites are allowed and which aren’t for them. Let the employee tell you what they need to be most productive and then provide it, no questions asked.</li>
<li>Most job positions can be boiled down to between 5 and 20 websites. Employees know what they need. Ask them to provide a list.</li>
<li>Show employees the web monitoring reports. Let them see the before and after and let them see the on-going reports. This will encourage self monitoring. This is an enforcement tool in disguise. Employees know that management can view these reports too and will take care that they make them look good.</li>
<li>Send employees a weekly report on their Internet usage. They will look at and will act upon to make sure they are portrayed to management in the best light and may even compare themselves against others.</li>
</ul>
<h2>Summary</h2>
<p style="text-align: justify;">Web monitoring is good for business. The Internet as a productivity tool has wide acceptance but recent changes have brought new distractions costing business some of those productivity gains. The Internet can be controlled but needs to be done in a way that allows for employee buy-in, self monitoring and self enforcement to be successful.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Mon, 11 Jul 2011 01:26:32 +1000</pubDate>
		</item>
		<item>
			<title>Security Threats: A Guide for Small &amp; Medium Businesses</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/security-threats-smb-guide.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/security-threats-smb-guide.html</guid>
			<description><![CDATA[<p style="text-align: justify;">A successful business works on the basis of revenue growth and loss prevention. Small and medium-sized businesses are particularly hit hard when either one or both of these business requirements suffer. Data leakage, down-time and reputation loss can easily turn away new and existing customers if such situations are not handled appropriately and quickly. This may, in turn, impact on the company’s bottom line and ultimately profit margins. A computer virus outbreak or a network breach can cost a business thousands of dollars. In some cases, it may even lead to legal liability and lawsuits.<br /><br />The truth is that many organizations would like to have a secure IT environment but very often this need comes into conflict with other priorities. Firms often find the task of keeping the business functions aligned with the security process highly challenging. When economic circumstances look dire, it is easy to turn security into a checklist item that keeps being pushed back. However the reality is that, in such situations, security should be a primary issue. The likelihood of threats affecting your business will probably increase and the impact can be more detrimental if it tarnishes your reputation.This paper aims to help small and medium-sized businesses focus on threats that are likely to have an impact on, and affect, the organization. <br /><br />These threats specifically target small and medium-sized business rather than enterprise companies or home users.<strong><strong><br /></strong></strong></p>
<h2>Security Threats That Affect SMBs - Malicious Internet Content</h2>
<p style="text-align: justify;">Most modern small or medium-sized businesses need an Internet connection to operate. If you remove thismeans of communication, many areas of the organization will not be able to function properly or else they maybe forced to revert to old, inefficient systems. Just think how important email has become and that for manyorganizations this is the primary means of communication. Even phone communications are changing shapewith Voice over IP becoming a standard in many organizations.At some point, most organizations have been the victim of a computer virus attack. <br /><br />While many may have antivirusprotection, it is not unusual for an organization of more than 10 employees to use email or the internetwithout any form of protection. Even large organizations are not spared. Recently, three hospitals in Londonhad to shut down their entire network due to an infection of a version of a worm called Mytob. Most of the timewe do not hear of small or medium-sized businesses becoming victims of such infections because it is not intheir interest to publicize these incidents. Many small or medium-sized business networks cannot afford toemploy prevention mechanisms such as network segregation. <br /><br />These factors simply make it easier for a worm tospread throughout an organization.Malware is a term that includes computer viruses, worms, Trojans and any other kinds of malicious software.Employees and end users within an organization may unknowingly introduce malware on the network whenthey run malicious executable code (EXE files). Sometimes they might receive an email with an attached wormor download spyware when visiting a malicious website. Alternatively, to get work done, employees maydecide to install pirated software for which they do not have a license. This software tends to have more codethan advertised and is a common method used by malware writers to infect the end user’s computers. Anorganization that operates efficiently usually has established ways to share files and content across theorganization. These methods can also be abused by worms to further infect computer systems on the network.Computer malware does not have to be introduced manually or consciously. <br /><br />Basic software packages installedon desktop computers such as Internet Explorer, Firefox, Adobe Acrobat Reader or Flash have their fair share ofsecurity vulnerabilities. These security weaknesses are actively exploited by malware writers to automaticallyinfect victim’s computers. Such attacks are known as drive-by downloads because the user does not haveknowledge of malicious files being downloaded onto his or her computer. In 2007 Google issued an alert 1describing 450,000 web pages that can install malware without the user’s consent.</p>
<h2 style="text-align: justify;">Then You Get Social Engineering Attacks<strong><br /></strong></h2>
<p style="text-align: justify;">This term refers to a set of techniques whereby attackers make themost of weaknesses in human nature rather than flaws within the technology. A phishing attack is a type ofsocial engineering attack that is normally opportunistic and targets a subset of society. A phishing emailmessage will typically look very familiar to the end users – it will make use of genuine logos and other visuals(from a well-known bank, for example) and will, for all intents and purposes, appear to be the genuine thing.When the end user follows the instructions in the email, he or she is directed to reveal sensitive or privateinformation such as passwords, pin codes and credit card numbers.<br /><br />Employees and desktop computers are not the only target in an organization. Most small or medium-sizedcompanies need to make use of servers for email, customer relationship management and file sharing. Theseservers tend to hold critical information that can easily become a target of an attack. Additionally, the movetowards web applications has introduced a large number of new security vulnerabilities that are activelyexploited by attackers to gain access to these web applications. If these services are compromised there is ahigh risk that sensitive information can be leaked and used by cyber-criminals to commit fraud.</p>
<h2 style="text-align: justify;">Attacks on Physical Systems</h2>
<p style="text-align: justify;">Internet-borne attacks are not the only security issue that organizations face. Laptops and mobiles areentrusted with the most sensitive of information about the organization. These devices, whether they arecompany property or personally owned, often contain company documents and are used to log on to thecompany network. More often than not, these mobile devices are also used during conferences and travel, thusrunning the risk of physical theft. <br /><br />The number of laptops and mobile devices stolen per year is ever on theincrease. Attrition.org had over 400 articles in 20082 related to high profile data loss, many of which involvedstolen laptops and missing disks. If it happens to major hospitals and governments that have established ruleson handling such situations, why should it not happen to smaller businesses?</p>
<h2 style="text-align: justify;">Another Threat Affecting Physical Security is that of Unprotected Endpoints</h2>
<p style="text-align: justify;">USB ports and DVD drives can bothbe used to leak data and introduce malware on the network. A USB stick that is mainly used for work and maycontain sensitive documents, becomes a security risk if it is taken home and left lying around and othermembers of the family use it on their home PC. While the employee may understand the sensitive nature of theinformation stored on the USB stick, the rest of the family will probably not. <br /><br />They may copy files back and forthwithout considering the implications. This is typically a case of negligence but it can also be the work of atargeted attack, where internal employees can take large amounts of information out of the company.Small and medium-sized businesses may overlook the importance of securing the physical network and serverroom to prevent unauthorized persons from gaining access. Open network points and unprotected serverrooms can allow disgruntled employees and visitors to connect to the network and launch attacks such as ARP spoofing to capture network traffic with no encryption and steal passwords and content.</p>
<h2 style="text-align: justify;">Authentication and Privilege Attacks</h2>
<p style="text-align: justify;">Passwords remain the number one vulnerability in many systems. It is not an easy task to have a secure systemwhereby people are required to choose a unique password that others cannot guess but is still easy for them toremember. Nowadays most people have at least five other passwords to remember, and the password used forcompany business should not be the same one used for webmail accounts, site memberships and so on. Highprofile intrusions such as the one on Twitter3 (the password was happiness), clearly show that passwords areoften the most common and universal security weakness and attacks exploiting this weakness do not require alot of technical knowledge.<br /><br />Password policies can go a long way to mitigate the risk, but if the password policy is too strict people will findways and means to get around it. They will write the password on sticky notes, share them with their colleaguesor simply find a keyboard pattern (1q2w3e4r5t) that is easy to remember but also easy to guess. <br /><br />Most complex password policies can be easily rendered useless by non-technological means.In small and medium-sized businesses, systems administrators are often found to be doing the work of thenetwork operators and project managers as well as security analysts. Therefore a disgruntled systemsadministrator will be a major security problem due to the amount of responsibility (and access rights) that he orshe holds. With full access privileges, a systems administrator may plan a logic bomb, backdoor accounts or leaksensitive company information that may greatly affect the stability and reputation of the organization.Additionally, in many cases the systems administrator is the person who sets the passwords for importantservices or servers. When he or she leaves the organization, these passwords may not be changed (especially ifnot documented) thus leaving a backdoor for the ex-employee. <br /><br />A startup company called JournalSpace4 wascaught with no backups when their former system administrator decided to wipe out the main database. Thisproved to be disastrous for the company which ended up asking users to retrieve their content from Google’scache.The company’s management team may also have administrative privileges on their personal computers orlaptops. The reasons vary but they may want to be able to install new software or simply to have more controlof their machines. The problem with this scenario is that one compromised machine is all that an attacker needsto target an organization. <br /><br />The firm itself does not need to be specifically picked out but may simply become avictim of an attack aimed at a particular vulnerable software package. Even when user accounts on the network are supposed to have reduced privileges, there may be times whereprivilege creep occurs. For example, a manager that hands over an old project to another manager may retainthe old privileges for years even after the handover!</p>
<p style="text-align: justify;">When his or her account is compromised, the intruder alsogains access to the old project.Employees with mobile devices and laptop computers can pose a significant risk when they make use ofunsecured wireless networks whilst attending a conference or during their stay at a hotel. In many cases,inadequate or no encryption is used and anyone ‘in between’ can view and modify the network traffic. This canbe the start of an intrusion leading to compromised company accounts and networks.</p>
<h2>Denial Of Service</h2>
<p>In an attempt to minimize costs, or simply through negligence, most small and some medium-sized businesseshave various single points of failures. Denial of service is an attack that prevents legitimate users from makinguse of a service and it can be very hard to prevent. The means to carry out a DoS attack and the motives mayvary, but it typically leads to downtime and legitimate customers losing confidence in the organization - and itis not necessarily due to an Internet-borne incident.<br /><br />In 2008 many organizations in the Mediterranean Sea basin and in the Middle East suffered Internet downtimedue to damages to the underwater Internet cables. Some of these organizations relied on a single Internetconnection, and their business was driven by Internet communications. <br /><br />Having such a single point of failureproved to be very damaging for these organizations in terms of lost productivity and lost business. Reliability isa major concern for most businesses and their inability to address even one single point of failure can be costly.If an organization is not prepared for a security incident, it will probably not handle the situation appropriately.<br /><br />One question that needs to be asked is: if a virus outbreak does occur, who should handle the various steps thatneed to be taken to get the systems back in shape? If an organization is simply relying on the systemsadministrator to handle such incidents, then that organization is not acknowledging that such a situation is notsimply technical in nature. It is important to be able to identify the entry point, to approach the personsconcerned and to have policies in place to prevent future occurrences - apart from simply removing the virusfrom the network! If all these tasks are left to a systems administrator, who might have to do everything ad hoc,then that is a formula for lengthy downtime.<span style="text-decoration: underline;"><span style="text-decoration: underline;"><strong><br /></strong></span></span></p>
<h2>Addressing Security Threats - An Anti-virus is not an Option</h2>
<p style="text-align: justify;">The volume of malware that can hit organizations today is enormous and the attack vectors are multiple.Viruses may spread through email, websites, USB sticks, and instant messenger programs to name but a few. Ifan organization does not have an anti-virus installed, the safety of the desktop computers will be at the mercyof the end user – and relying on the end user is not advisable or worth the risk.</p>
<p style="text-align: justify;">Protecting desktop workstations is only one recommended practice. Once virus code is present on a desktopcomputer, it becomes a race between the virus and the anti-virus. Most malware has functionality to disableyour anti-virus software, firewalls and so on. Therefore you do not want the virus to get to your desktopcomputer in the first place!The solution is to deploy content filtering at the gateway.</p>
<p style="text-align: justify;">Anti-virus can be part of the content filtering strategywhich can be installed at the email and web gateway. Email accounts are frequently spammed with maliciousemail attachments. These files often appear to come from legitimate contacts thus fooling the end user intorunning the malware code. Leaving the decision to the user whether or not to trust an attachment received byemail is never a good idea.</p>
<p style="text-align: justify;">By blocking malware at the email gateway, you are greatly reducing the risk that endusers may make a mistake and open an infected file. Similarly, scanning all incoming web (HTTP) traffic formalicious code addresses a major infection vector and is a requirement when running a secure networkenvironment.</p>
<h2 style="text-align: justify;">Security Awareness</h2>
<p style="text-align: justify;">A large percentage of successful attacks do not necessarily exploit technical vulnerabilities. Instead they rely onsocial engineering and people’s willingness to trust others. There are two extremes: either employees in anorganization totally mistrust each other to such an extent that the sharing of data or information is nil; or, at theother end of the scale, you have total trust between all employees.</p>
<p style="text-align: justify;">In organizations neither approach isdesirable. There has to be an element of trust throughout an organization but checks and balances are just asimportant. Employees need to be given the opportunity to work and share data but they must also be aware ofthe security issues that arise as a result of their actions. This is why a security awareness program is soimportant.For example, malware often relies on victims to run an executable file to spread and infect a computer ornetwork.</p>
<p style="text-align: justify;">Telling your employees not to open emails from unknown senders is not enough. They need to betold that in so doing they risk losing all their work, their passwords and other confidential details to thirdparties. They need to understand what behavior is acceptable when dealing with email and web content.Anything suspicious should be reported to someone who can handle security incidents. Having opencommunication across different departments makes for better information security, since many socialengineering attacks abuse the communication breakdowns across departments.</p>
<p style="text-align: justify;">Additionally, it is important tokeep in mind that a positive working environment where people are happy in their job is less susceptible toinsider attacks than an oppressive workplace.</p>
<h2>Endpoint Security</h2>
<p style="text-align: justify;">A lot of information in an organization is not centralized. Even when there is a central system, information isoften shared between different users, different devices and copied numerous times. In contrast with perimetersecurity, endpoint security is the concept that each device in an organization needs to be secured. It isrecommended that sensitive information is encrypted on portable devices such as laptops. <br /><br />Additionally,removable storage such as DVD drives, floppy drives and USB ports may be blocked if they are considered to bea major threat vector for malware infections or data leakage.Securing endpoints on a network may require extensive planning and auditing. For example, policies can beapplied that state that only certain computers (e.g. laptops) can connect to specific networks. It may also makesense to restrict usage of wireless (WiFi) access points.</p>
<h2>Policies</h2>
<p style="text-align: justify;">Policies are the basis of every information security program. It is useless taking security precautions or trying tomanage a secure environment if there are no objectives or clearly defined rules. Policies clarify what is or is notallowed in an organization as well as define the procedures that apply in different situations. They should beclear and have the full backing of senior management. Finally they need to be communicated to theorganization’s staff and enforced accordingly.<br /><br />There are various policies, some of which can be enforced through technology and others which have to beenforced through human resources. For example, password complexity policies can be enforced throughWindows domain policies. On the other hand, a policy which ensures that company USB sticks are not takenhome may need to be enforced through awareness and labeling. <br /><br />As with most security precautions, it isimportant that policies that affect security are driven by business objectives rather than gut feelings. If securitypolicies are too strict, they will be bypassed, thus creating a false sense of security and possibly create newattack vectors.</p>
<h2>Role Separation</h2>
<p style="text-align: justify;">Separation of duties, auditing and the principle of least privilege can go a long way in protecting anorganization from having single points of failure and privilege creep. By employing separation of duties, theimpact of a particular employee turning against the organization is greatly reduced. For example, a systemadministrator who is not allowed to make alterations to the database server directly, but has to ask thedatabase administrator and document his actions, is a good use of separation of duties. <br /><br />A security analyst whoreceives a report when a network operator makes changes to the firewall access control lists is a goodapplication of auditing. If a manager has no business need to install software on a regular basis, then his or heraccount should not be granted such privileges (power user on Windows). These concepts are very importantand it all boils down to who is watching the watchers.</p>
<h2>Backup and Redundant Systems</h2>
<p style="text-align: justify;">Although less glamorous than other topics in Information Security, backups remain one of the most reliablesolutions. Making use of backups can have a direct business benefit when things go wrong. Disasters do occurand an organization will come across situations when hardware fails or a user (intentionally or otherwise)deletes important data. <br /><br />A well-managed and tested backup system will get the business back up and runningin very little time compared to other disaster recovery solutions. It is therefore important that backups are notonly automated to avoid human error but also periodically tested. It is useless having a backup system ifrestoration does not function as advertised.Redundant systems allow a business to continue working even if a disaster occurs. <br /><br />Backup servers andalternative network connections can help to reduce downtime or at least provide a business with limitedresources until all systems and data are restored.</p>
<h2>Keeping your Systems Patched</h2>
<p style="text-align: justify;">New advisories addressing security vulnerabilities in software are published on a daily basis. It is not an easytask to stay up-to-date with all the vulnerabilities that apply for software installed on the network, thereforemany organizations make use of a patch management system to handle the task. It is important to note thatpatches and security updates are not only issued for Microsoft products but also for third party software. Forexample, although the web browser is running the latest updates, a desktop can still be compromised whenvisiting a website simply because it is running a vulnerable version of Adobe Flash. <br /><br />Additionally it may beimportant to assess the impact of vulnerability before applying a patch, rather than applying patchesreligiously. It is also important to test security updates before applying them to a live system. The reason is that,from time to time, vendors issue patches that may conflict with other systems or that were not tested for yourparticular configuration. <br /><br />Additionally, security updates may sometimes result in temporary downtime, forexposureSimple systems are easier to manage and therefore any security issues that apply to such systems can beaddressed with relative ease. However, complex systems and networks make it harder for a security analyst toassess their security status. For example, if an organization does not need to expose a large number of services on the Internet, the firewall configuration would be quite straightforward. However, the greater the company’sneed to be visible – an online retailer, for example – the more complex the firewall configuration will be, leavingroom for possible security holes that could be exploited by attackers to access internal network services.<br /><br />When servers and desktop computers have fewer software packages installed, they are easier to keep up-todateand manage. This concept can work hand in hand with the principle of least privilege. By making use offewer components, fewer software and fewer privileges, you reduce the attack surface while allowing forsecurity to be more focused to tackle real issues.</p>
<h2>Conclusion</h2>
<p>Security in small and medium-sized businesses is more than just preventing viruses and blocking spam. In 2009,cybercrime is expected to increase as criminals attempt to exploit weaknesses in systems and in people. Thisdocument aims to give managers, analysts, administrators and operators in small and medium-sized businessesa snapshot of the IT security threats facing their organization. Every organization is different but in manyinstances the threats are common to all. Security is a cost of doing business but those that prepare themselveswell against possible threats will benefit the most in the long term.<span><span style="font-family: verdana,geneva;"></span></span></p>
<p><br /><br /></p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 09 Jul 2011 11:49:52 +1000</pubDate>
		</item>
		<item>
			<title>Web Security Software Dealing With Malware</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/web-security-malware.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/web-security-malware.html</guid>
			<description><![CDATA[<p style="text-align: justify;">It is widely acknowledged that any responsible modern-day organization will strive to protect its network against malware attacks. Each day brings on a spawning of increasingly sophisticated viruses, worms, spyware, Trojans, and all other kinds of malicious software which can ultimately lead to an organization's network being compromised or brought down. Private information can be inadvertently leaked, a company's network can crash; whatever the outcome, poor security strategies could equal disaster. Having a network that is connected to the Internet leaves you vulnerable to attack, but Internet access is an absolute necessity for most organizations, so the wise thing to do would be to have a decent web security package installed on your machines, preferably at the gateway.</p>
<p style="text-align: justify;">There are several antivirus engines on the market and each product has its own heuristics, and subsequently its own particular strengths and weaknesses. It's impossible to claim any one as the best overall at any given time. It can never be predicted which antivirus lab will be the quickest to release an update providing protection against the next virus outbreak; it is often one company on one occasion and another one the next.</p>
<p style="text-align: justify;">Web security can never be one hundred percent guaranteed at all times, but, there are ways to significantly minimize the risks. It is good and usual practice to use an antivirus engine to help protect your network, but it would naturally be much better to use <em>several </em>of them at once. Why is this? If, hypothetically speaking, your organization uses product A, and a new virus breaks out, it might be Lab A or Lab B, or any other antivirus lab, which releases an update the fastest. So the logical conclusion would be that, the more AV engines you make use of, the greater the likelihood of you nipping that attack in the bud.</p>
<p style="text-align: justify;">This is one of the ways in which web security software can give you better peace of mind. Files which are downloaded on any of your company's computers can each be scanned using several engines, rather than just one, which could significantly reduce the time it will take to obtain the latest virus signatures, therefore diminishing the risk to your site by each new attack.</p>
<p style="text-align: justify;">Another plus side of web security software is that multiple download control policies can be set according to the individual organization's security policies, which could be either user, group or IP-based, controlling the downloading of different file types such as JavaScript, MP3, MPEG, exe, and more by specific users/groups/IP addresses. Hazardous files like Trojan downloader programs very often appear disguised as harmless files in order to gain access to a system. A good web security solution will analyze and detect the real file types HTTP/FTP file downloads, making sure that files which are downloaded contain no viruses or malware.</p>
<p style="text-align: justify;">The long and short of it is this: you want the best security possible for your network, but it's not within anyone's power to predict where the next patch will come from. Rather than playing Russian roulette by sticking to one AV engine, adopt a web security package that will enable you to use several of them.</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 09 Jul 2011 11:44:30 +1000</pubDate>
		</item>
		<item>
			<title>The Web Security Strategy for Your Organization</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/web-security-strategy.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/web-security-strategy.html</guid>
			<description><![CDATA[<p style="text-align: justify;">In today's business world, internet usage has become a necessity for doing business. Unfortunately, a company's use of the internet comes with considerable risk to its network and business information.</p>
<p style="text-align: justify;">Web security threats include phishing attacks, malware, scareware, rootkits, keyloggers, viruses and spam. While many attacks occur when information is downloaded from a website, others are now possible through drive-by attacks where simply visiting a website can infect a computer. These attacks usually result in data and information leakage, loss in productivity, loss of network bandwidth and, depending on the circumstances, even liability issues for the company. In addition to all this, cleanup from malware and other types of attacks on a company's network are usually costly from both the dollar aspect as well as the time spent recovering from these web security threats.</p>
<p style="text-align: justify;">Fortunately, there are steps a company can take to protect itself from these web security threats. Some are more effective than others, but the following suggestions should help narrow down the choices.</p>
<h2 style="text-align: justify;">Employee Internet Usage Policy</h2>
<p style="text-align: justify;">The first and probably the least expensive solution would be to develop and implement an employee internet usage policy. This policy should clearly define what an employee can and cannot do when using the internet. It should also address personal usage of the internet on the business computer. The policy should identify the type of websites that can be accessed by the employee for business purposes and what, if any, type of material can be downloaded from the internet. Always make sure the information contained in the policy fits your unique business needs and environment.</p>
<h2 style="text-align: justify;">Employee Education</h2>
<p style="text-align: justify;">Train your employees to recognize web security threats and how to lower the risk of infection. In today's business environment, laptops, smartphones, iPads, and other similar devices are not only used for business purposes, but also for personal and home use. When devices are used at home, the risk of an infection on that device is high and malware could easily be transferred to the business network. This is why employee education is so important.</p>
<h2 style="text-align: justify;">Patch Management</h2>
<p style="text-align: justify;">Good patch management practices should also be in place and implemented using a clearly-defined patch management policy. Operating systems and applications, including browsers, should be updated regularly with the latest available security patches. The browser, whether a mobile version used on a smartphone or a full version used on a computer, is a primary vector for malware attacks and merits particular attention. Using the latest version of a browser is a must as known vulnerabilities would have been addressed</p>
<h2 style="text-align: justify;">Internet Monitoring Software</h2>
<p style="text-align: justify;">Lastly, I would mention the use of internet monitoring software. Internet monitoring software should be able to protect the network against malware, scareware, viruses, phishing attacks and other malicious software. A robust internet monitoring software solution will help to enforce your company's internet usage policy by blocking connections to unacceptable websites, by monitoring downloads, and by monitoring encrypted web traffic going into and out of the network.</p>
<p>There is no single method that can guarantee 100% web security protection, however a well thought-out strategy is one huge step towards minimizing risk that the network could be targeted by the bad guys.</p>
<p>&nbsp;</p>
<p></p>
<p><br /><br /></p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sat, 09 Jul 2011 11:40:00 +1000</pubDate>
		</item>
		<item>
			<title>Introduction To Network Security - Part 1</title>
			<link>https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years.</p>
<p style="text-align: justify;" align="left">All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every system rather than being thrown in as an afterthought. Usually programmers would concentrate on getting a program working, and then (if there was time) try and weed out possible security holes.</p>
<p style="text-align: justify;" align="left">Now, applications must be coded from the ground up with security in mind, as these applications will be used by people who expect the security and privacy of their data to be maintained.</p>
<p style="text-align: justify;">This article intends to serve as a very brief introduction to information security with an emphasis on networking.</p>
<p style="text-align: justify;">The reasons for this are twofold:</p>
<p style="text-align: justify;">Firstly, in case you did not notice.. this is a networking website,</p>
<p style="text-align: justify;">Secondly, the time a system is most vulnerable is when it is connected to the Internet.</p>
<p style="text-align: justify;">For an understanding of what lies in the following pages, you should have decent knowledge of how the Internet works. You don't need to know the ins and outs of every protocol under the sun, but a basic understanding of network (and obviously computer) fundamentals is essential.</p>
<p style="text-align: justify;">If you're a complete newbie however, do not despair. We would recommend you look under the Networking menu at the top of the site...where you will find our accolade winning material on pretty much everything in networking.</p>
<h2>Hacker or Cracker?</h2>
<p style="text-align: justify;">There is a very well worn out arguement against using the incorrect use of the word 'hacker' to denote a computer criminal -- the correct term is a 'cracker' or when referring to people who have automated tools and very little real knowledge, 'script kiddie'. Hackers are actually just very adept programmers (the term came from 'hacking the code' where a programmer would quickly program fixes to problems he faced).</p>
<p style="text-align: justify;">While many feel that this distinction has been lost due to the media portraying hackers as computer criminals, we will stick to the original definitions through these articles more than anything to avoid the inevitable flame mail we will get if we don't !</p>
<p style="text-align: justify;"><strong>On to the Cool Stuff!</strong></p>
<p style="text-align: justify;">This introduction is broadly broken down into the following parts :</p>
<p style="text-align: justify;">• The Threat to Home Users<br />• The Threat to the Enterprise<br />• Common Security Measures Explained<br />• Intrusion Detection Systems<br />• Tools an Attacker Uses<br />• What is Penetration-Testing?<br />• A Brief Walk-through of an Attack<br />• Where Can I Find More Information?<br />• Conclusion</p>
<h2 align="left">The Threat to Home Users</h2>
<p style="text-align: justify;">Many people underestimate the threat they face when they use the Internet. The prevalent mindset is "who would bother to attack me or my computer?", while this is true -- it may be unlikely that an attacker would individually target you, as to him, you are just one more system on the Internet.</p>
<p style="text-align: justify;">Many script kiddies simply unleash an automated tool that will scan large ranges of IP addresses looking for vulnerable systems, when it finds one, this tool will automatically exploit the vulnerability and take control of this machine.</p>
<p style="text-align: justify;">The script kiddie can later use this vast collection of 'owned' systems to launch a denial of service (DoS) attacks, or just cover his tracks by hopping from one system to another in order to hide his real IP address.</p>
<p style="text-align: justify;">This technique of proxying attacks through many systems is quite common, as it makes it very difficult for law enforcement to back trace the route of the attack, especially if the attacker relays it through systems in different geographic locations.</p>
<p style="text-align: justify;">It is very feasible -- in fact quite likely -- that your machine will be in the target range of such a scan, and if you haven't taken adequate precautions, it will be owned.</p>
<p style="text-align: justify;">The other threat comes from computer worms that have recently been the subject of a lot of media attention. Essentially a worm is just an exploit with a propagation mechanism. It works in a manner similar to how the script kiddie's automated tool works -- it scans ranges of IP addresses, infects vulnerable machines, and then uses those to scan further.</p>
<p style="text-align: justify;">Thus the rate of infection increases geometrically as each infected system starts looking for new victims. In theory a worm could be written with such a refined scanning algorithm, that it could infect 100% of all vulnerable machines within ten minutes. This leaves hardly any time for response.</p>
<p style="text-align: justify;">Another threat comes in the form of viruses, most often these may be propagated by email and use some crude form of social engineering (such as using the subject line "I love you" or "Re: The documents you asked for") to trick people into opening them. No form of network level protection can guard against these attacks.</p>
<p style="text-align: justify;">The effects of the virus may be mundane (simply spreading to people in your address book) to devastating (deleting critical system files). A couple of years ago there was an email virus that emailed confidential documents from the popular Windows "My Documents" folder to everyone in the victims address book.</p>
<p style="text-align: justify;">So while you per se may not be high profile enough to warrant a systematic attack, you are what I like to call a bystander victim.. someone who got attacked simply because you could be attacked, and you were there to be attacked.</p>
<p style="text-align: justify;">As broadband and always-on Internet connections become commonplace, even hackers are targetting the IP ranges where they know they will find cable modem customers. They do this because they know they will find unprotected always-on systems here that can be used as a base for launching other attacks.</p>
<h2 align="left">The Threat to the Enterprise</h2>
<p style="text-align: justify;">Most businesses have conceded that having an Internet presence is critical to keep up with the competition, and most of them have realised the need to secure that online presence.</p>
<p style="text-align: justify;">Gone are the days when firewalls were an option and employees were given unrestricted Internet access. These days most medium sized corporations implement firewalls, content monitoring and intrusion detection systems as part of the basic network infrastructure.</p>
<p style="text-align: justify;">For the enterprise, security is very important -- the threats include:</p>
<p style="text-align: justify;">• Corporate espionage by competitors, <br />• Attacks from disgruntled ex-employees <br />• Attacks from outsiders who are looking to obtain private data and steal the company's crown jewels (be it a database of credit cards, information on a new product, financial data, source code to programs, etc.)<br />• Attacks from outsiders who just want to use your company's resources to store pornography, illegal pirated software, movies and music, so that others can download and your company ends up paying the bandwidth bill and in some countries can be held liable for the copyright violations on movies and music.</p>
<p style="text-align: justify;">As far as securing the enterprise goes, it is not enough to merely install a firewall or intrustion detection system and assume that you are covered against all threats. The company must have a complete security policy and basic training must be imparted to all employees telling them things they should and should not do, as well as who to contact in the event of an incident. Larger companies may even have an incident response or security team to deal specifically with these issues.</p>
<p style="text-align: justify;">One has to understand that security in the enterprise is a 24/7 problem. There is a famous saying, "A chain is only as strong as its weakest link", the same rule applies to security.</p>
<p style="text-align: justify;">After the security measures are put in place, someone has to take the trouble to read the logs, occasionally test the security, follow mailing-lists of the latest vulnerabilities to make sure software and hardware is up-to-date etc. In other words, if your organisation is serious about security, there should be someone who handles security issues.</p>
<p style="text-align: justify;">This person is often a network administrator, but invariably in the chaotic throes of day-to-day administration (yes we all dread user support calls ! :) the security of the organisation gets compromised -- for example, an admin who needs to deliver 10 machines to a new department may not password protect the administrator account, just because it saves him some time and lets him meet a deadline. In short, an organisation is either serious about security issues or does not bother with them at all.</p>
<p style="text-align: justify;">While the notion of 24/7 security may seem paranoid to some people, one has to understand that in a lot of cases a company is not specifically targetted by an attacker. The company's network just happen to be one that the attacker knows how to break into and thus they get targetted. This is often the case in attacks where company ftp or webservers have been used to host illegal material.</p>
<p style="text-align: justify;">The attackers don't care what the company does - they just know that this is a system accessible from the Internet where they can store large amounts of warez (pirated software), music, movies, or pornography. This is actually a much larger problem than most people are aware of because in many cases, the attackers are very good at hiding the illegal data. Its only when the bandwidth bill has to be paid that someone realises that something is amiss.</p>
<h2>Firewalls</h2>
<p style="text-align: justify;">By far the most common security measure these days is a firewall. A lot of confusion surrounds the concept of a firewall, but it can basically be defined as any perimiter device that permits or denies traffic based on a set of rules configured by the administrator. Thus a firewall may be as simple as a router with access-lists, or as complex as a set of modules distributed through the network controlled from one central location.</p>
<p style="text-align: justify;">The firewall protects everything 'behind' it from everything in front of it. Usually the 'front' of the firewall is its Internet facing side, and the 'behind' is the internal network. The way firewalls are designed to suit different types of networks is called the firewall topology.</p>
<p style="text-align: justify;">Here is the link to a detailed explanation of different firewall topologies :<a href="https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html" target="_blank" title="Firewall.cx Firewall Topologies">Firewall.cx Firewall Topologies</a></p>
<p style="text-align: justify;">You also get what are known as 'personal firewalls' such as Zonealarm, Sygate Personal Firewall , Tiny Personal Firewall , Symantec Endpoint Security etc.</p>
<p style="text-align: justify;">These are packages that are meant for individual desktops and are fairly easy to use. The first thing they do is make the machine invisible to pings and other network probes. Most of them also let you choose what programs are allowed to access the Internet, therefore you can allow your browser and mail client, but if you see some suspicious program trying to access the network, you can disallow it. This is a form of 'egress filtering' or outbound traffic filtering and provides very good protection against trojan horse programs and worms.</p>
<p style="text-align: justify;">However firewalls are no cure all solution to network security woes. A firewall is only as good as its rule set and there are many ways an attacker can find common misconfigurations and errors in the rules. For example, say the firewall blocks all traffic except traffic originating from port 53 (DNS) so that everyone can resolve names, the attacker could then use this rule to his advantage. By changing the source port of his attack or scan to port 53, the firewall will allow all of his traffic through because it assumes it is DNS traffic.</p>
<p style="text-align: justify;">Bypassing firewalls is a whole study in itself and one which is very interesting especially to those with a passion for networking as it normally involves misusing the way TCP and IP are supposed to work. That said, firewalls today are becoming very sophisticated and a well installed firewall can severely thwart a would-be attackers plans.</p>
<p style="text-align: justify;">It is important to remember the firewall does not look into the data section of the packet, thus if you have a webserver that is vulnerable to a CGI exploit and the firewall is set to allow traffic to it, there is no way the firewall can stop an attacker from attacking the webserver because it does not look at the data inside the packet. This would be the job of an intrusion detection system (covered further on).</p>
<h2>Anti-Virus Systems</h2>
<p style="text-align: justify;">Everyone is familiar with the desktop version of anti virus packages like Norton Antivirus and Mcafee. The way these operate is fairly simple -- when researchers find a new virus, they figure out some unique characteristic it has (maybe a registry key it creates or a file it replaces) and out of this they write the virus 'signature'.</p>
<p style="text-align: justify;">The whole load of signatures that your antivirus scans for what is known as the virus 'definitions'. This is the reason why keeping your virus definitions up-to-date is very important. Many anti-virus packages have an auto-update feature for you to download the latest definitions. The scanning ability of your software is only as good as the date of your definitions. In the enterprise, it is very common for admins to install anti-virus software on all machines, but there is no policy for regular update of the definitions. This is meaningless protection and serves only to provide a false sense of security.</p>
<p style="text-align: justify;">With the recent spread of email viruses, anti-virus software at the MTA (Mail Transfer Agent , also known as the 'mail server') is becoming increasingly popular. The mail server will automatically scan any email it recieves for viruses and quarantine the infections. The idea is that since all mail passes through the MTA, this is the logical point to scan for viruses. Given that most mail servers have a permanent connection to the Internet, they can regularly download the latest definitions. On the downside, these can be evaded quite simply. If you zip up the infected file or trojan, or encrypt it, the anti-virus system may not be able to scan it.</p>
<p style="text-align: justify;">End users must be taught how to respond to anti virus alerts. This is especially true in the enterprise -- an attacker doesn't need to try and bypass your fortress like firewall if all he has to do is email trojans to a lot of people in the company. It just takes one uninformed user to open the infected package and he will have a backdoor to the internal network.</p>
<p style="text-align: justify;">It is advisable that the IT department gives a brief seminar on how to handle email from untrusted sources and how to deal with attachments. These are very common attack vectors simply because you may harden a computer system as much as you like, but the weak point still remains the user who operates it. As crackers say 'The human is the path of least resistance into the network'.</p>
<h2>Intrusion Detection Systems</h2>
<p style="text-align: justify;">IDS's have become the 'next big thing' the way firewalls were some time ago. There are bascially two types of Intrusion Detection Systems :</p>
<p style="text-align: justify;">• Host based IDS<br />• Network based IDS</p>
<p style="text-align: justify;">Host based IDS - These are installed on a particular important machine (usually a server or some important target) and are tasked with making sure that the system state matches a particular set baseline. For example, the popular file-integrity checker Tripwire -- this program is run on the target machine just after it has been installed. It creates a database of file signatures for the system and regularly checks the current system files against their known 'safe' signatures. If a file has been changed, the administrator is alerted. This works very well as most attackers will replace a common system file with a trojaned version to give them backdoor access.</p>
<p style="text-align: justify;">Network based IDS - These are more popular and quite easy to install. Basically they consist of a normal network sniffer running in promiscuous mode (in this mode the network card picks up all traffic even if its not meant for it). The sniffer is attached to a database of known attack signatures and the IDS analyses each packet that it picks up to check for known attacks. For example a common web attack might contain the string '/system32/cmd.exe?' in the URL. The IDS will have a match for this in the database and will alert the administrator.</p>
<p style="text-align: justify;">Newer IDS' support active prevention of attacks - instead of just alerting an administrator, the IDS can dynamically update the firewall rules to disallow traffic from the attacking IP address for some amount of time. Or the IDS can use 'session sniping' to fool both sides of the connection into closing down so that the attack cannot be completed.</p>
<p style="text-align: justify;">Unfortunately IDS systems generate a lot of false positives (a false positive is basically a false alarm, where the IDS sees legitimate traffic and for some reason matches it against an attack pattern) this tempts a lot of administrators into turning them off or even worse -- not bothering to read the logs. This may result in an actual attack being missed.</p>
<p style="text-align: justify;">IDS evasion is also not all that difficult for an experienced attacker. The signature is based on some unique feature of the attack, and so the attacker can modify the attack so that the signature is not matched. For example, the above attack string '/system32/cmd.exe?' could be rewritten in hexadecimal to look something like the following:</p>
<div class="info" style="text-align: justify;"><em><span style="color: #ff0000;">'2f%73%79%73%74%65%6d%33%32%2f%63%6d%64%2e%65%78%65%3f'</span></em></div>
<p style="text-align: justify;">Which might be totally missed by the IDS. Furthermore, an attacker could split the attack into many packets by fragmenting the packets. This means that each packet would only contain a small part of the attack and the signature would not match. Even if the IDS is able to reassemble fragmented packets, this creates a time overhead and since IDS' have to run at near real-time status, they tend to drop packets while they are processing. IDS evasion is a topic for a paper on its own.</p>
<p style="text-align: justify;">The advantage of a network based IDS is that it is very difficult for an attacker to detect. The IDS itself does not need to generate any traffic, and in fact many of them have a broken TCP/IP stack so they don't have an IP address. Thus the attacker does not know whether the network segment is being monitored or not.</p>
<h2>Patching and Updating</h2>
<p style="text-align: justify;">It is embarassing and sad that this has to be listed as a security measure. Despite being one of the most effective ways to stop an attack, there is a tremendously laid back attitude to regulary patching systems. There is no excuse for not doing this, and yet the level of patching remains woefully inadequate. Take for example the MSblaster worm that spread havoc recently. The exploit was known almost a month in advance, and a patch had been released, still millions of users and businesses were infected. While admins know that having to patch 500 machines is a laborious task, the way I look at it is I would rather be updating my systems on a regular basis than waiting for disaster to strike and then running around trying to patch and clean up those 500 systems.</p>
<p style="text-align: justify;">For the home user, its a simple matter of running the automatic update software that every worthwhile OS comes with. In the enterprise there is no 'easy' way to patch large numbers of machines, but there are patch deployment mechanisms that take a lot of the burden away. Frankly, it is part of an admin's job to do this, and when a network is horribly fouled up by the latest worm it just means someone, somewhere didn't do his job well enough.</p>
<p style="text-align: right;">Click here to read '<a href="https://www.firewall.cx/tools-tips-reviews/security-articles/network-security-intro-p2.html" title="Introduction to Network Security- Part 2">Introduction to Network Security - Part 2</a>'</p>]]></description>
			<category>Security Articles</category>
			<pubDate>Sun, 04 Mar 2012 08:00:00 +1100</pubDate>
		</item>
	</channel>
</rss>
