SHS Branding LAUNCH

Total Page:16

File Type:pdf, Size:1020Kb

SHS Branding LAUNCH MESSAGELABS INTELLIGENCE MESSAGELABS INTELLIGENCE JUNE 2010 As the FIFA World Cup Kicks-off, Scams, Malware and Spam Attacks Intensify Welcome to the June edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for June 2010 to keep you informed regarding the ongoing fight against viruses, spam, spyware and other unwelcome content. REPORT HIGHLIGHTS • Spam – 89.3% in June (a decrease of 0.9 percentage points since May) • Viruses – One in 276.4 emails in June contained malware (a decrease of 0.11 percentage points since May) • Phishing – One in 634.4 emails comprised a phishing attack (a decrease of 0.26 percentage points since May) • Malicious websites – 1,598 websites blocked per day (a decrease of 9.7% since May) • 30.3% of all malicious domains blocked were new in June (a decrease of 1.8 percentage points since May) • 12.5% of all web-based malware blocked was new in June (an increase of 0.1 percentage points since May) • MessageLabs Intelligence looks at why spam containing FIFA World Cup related messages is expected to increase as the competition continues ww w . m e s s a g e l a b s . c o m in f o @ m e s s a g e l a b s . c o m MESSAGELABS INTELLIGENCE REPORT ANALYSIS Spam containing FIFA World Cup related messages is expected to increase as the competition continues With the 2010 Soccer World Cup in progress, the organisations behind spam, scams and malicious attacks are poised to take full advantage of the world event and cash in on the excitement that surrounds it. Traditionally, notable holidays such as St. Valentine’s Day, Thanksgiving, Halloween and Christmas all receive a great deal of attention from the spammers. Newsworthy events, including celebrity deaths and natural disasters as well as major sporting activities are also popular themes, and the FIFA World Cup is no exception. Typically, the attackers seek to capture the attention of the victim, and entice them to take some action such as clicking on a link, which usually results in a successful attack. In spam, it is common to see newsworthy, sensational or even fabricated events, appear in the subject lines of spam emails, even when the message itself isn’t related to that event. Ultimately it serves as a way for spammers to get recipients to open the email and read the contents. A large proportion of spam featuring newsworthy events is related to selling some product, most frequently pharmaceutical or counterfeit watches and jewellery. But, newsworthy events are also a great opportunity for scammers who have nothing to sell to still get attention. Riding on the wave of expectation and excitement that surrounds the FIFA World Cup, scammers are constantly crafting a variety of attacks to convince unfortunate victims to part with their money. The graph shows the percentage of spam that contains at least one keyword1 related to the 2010 FIFA World Cup. It has been increasing dramatically during the last two months during the build up to the main event, as seen in figure 1. 25% 20% 15% 10% 5% 0% t t t r r r r r c c y v v n n b b c c c a a p p p a e e a a o o e e J J O O O A A A F F D D M M N N M 7 1 1 5 9 1 5 9 4 8 0 4 4 8 6 2 3 0 2 0 1 2 0 1 2 0 1 1 2 0 1 2 1 1 Figure 1: Trend in spam messages referring to football and soccer related keywords Almost without fail, spammers produce campaigns containing text that is related to practically every major newsworthy event. Spammers commonly use the following three approaches to exploit newsworthy events: 1 Keywords include variations of both “soccer” and “football,” as well as many other related words. For example, “soccer” is popularly used to refer to the sport within North America, and “football” is more common across Europe. 2 ww w . m e s s a g e l a b s . c o m in f o @ m e s s a g e l a b s . c o m MESSAGELABS INTELLIGENCE Zeitgeist: Taping into the Zeitgeist While spammers often continue to re-send the same spam campaigns, they include the latest news headlines either in the subject line or somewhere in the body to grab the attention of the recipient and increase the likelihood of the message being opened. Such campaigns tend be large in volume, and the headlines are almost certainly gathered automatically, using highly specialized spam tools that collect the latest news headlines from topical websites across the Internet. Therefore a given headline can appear very quickly in spam email very soon after the news breaks. A huge wave of pharmaceutical spam MessageLabs Intelligence recently analyzed exemplifies this approach. It included the following subjects: Subject: 20-hour wait in World Cup ticket line abidingly Subject: Are English soccer clubs worth buying? abbrev Subject: English soccer clubs worth buying? aggregating Subject: Football: Advocaat quits Belgium role admixtion Subject: Football: Alves sent off in Barca draw acromegalia Subject: Football: Americans to sell Liverpool adore Subject: Football: Argentine giants in decline adverting Subject: Football: Bayern lose Ribery appeal acclimatizer Subject: Football: Bayern smash seven goals adipolytic Subject: Football: Bayern win Bundesliga title acers Subject: Football: Bids race on for World Cups abyssobenthonic Subject: Football: Butt earns Germany call-up afara Subject: Football: Captain Adebayor quits Togo acylate Subject: Football: Chelsea close on title affectively Subject: Football: Chelsea four points clear acronymize Subject: Football: Defeat dents Arsenal's hopes admeasure Subject: Football: Eight-goal Chelsea claim title abo Subject: Football: European semis to go ahead advocatrice Subject: Football: Iniesta blow for Barcelona afterwash Subject: Football: Inter fight back to stun Barca ablator Subject: Football: Inter Milan win Italian Cup adoperation Subject: Football: Inter on course for treble actual Subject: Football: Inter stay on top in Serie A accorporate Subject: Football: Liverpool's losses mount agricultures Subject: Football: Lyon target win over Bayern abortional Subject: Football: Mandela welcomes trophy aetheogamous Subject: Football: Man dies in WC ticket queue acrylyl Subject: Football: Messi double boosts Barca albuginea Subject: Football: Milan coach Leonardo quits agral Subject: Football: Premier League cash grows actual Subject: Football: Real Madrid cut Barca's lead agitations Subject: Football: Ronaldo winner boosts Real aggradational Subject: Football: Spurs stun 10-man Chelsea affluence Subject: Football: Togo's ANC ban to be lifted albumens Subject: Football: Torres targets World Cup aition 3 ww w . m e s s a g e l a b s . c o m in f o @ m e s s a g e l a b s . c o m MESSAGELABS INTELLIGENCE Subject: Football: Tottenham win worth $75M airbill Subject: SA braces for World Cup beer battle adaption These mails may look football related, but in fact they are headlines scraped from one of hundreds of news sites, for example: • http://www.newsride.net/english/2010/04/football-bayern-smash-seven-goals/ • http://topics.treehugger.com/article/0bjO6jd9gY3d3 • http://www.onenewspage.com/news/Sports/20100502/10608732/Football-Ronaldo- winner-boosts-Real.htm To make the emails more unique the spammers add a random word at the end of each subject. This allows them to turn a few news headlines into potentially millions of subject variants. The email itself simply contains an image, which links to the well-known “Canadian Pharmacy2” website. On a typical day, approximately 80% of all spam is pharmaceutical, and the majority of that is related to the “Canadian Pharmacy” variety (which doesn’t necessarily relate to the country of Canada). Each day, billions of emails with rapidly varying subjects, such as these, are being sent. An example can be seen in figure 2. Figure 2: Example of spam ad containing football related keywords in the subject The example of pharmaceutical spam seen in figure 2 contains hyperlinks to websites under the control of the “Canadian Pharmacy” operation, such as that seen in figure 3. 2 For more information on “Canadian Pharmacy” spam and other related spam operations, visit the MessageLabs Intelligence blog at: http://www.symantec.com/connect/blogs/new-pharmacy-spam-brand-spotted 4 ww w . m e s s a g e l a b s . c o m in f o @ m e s s a g e l a b s . c o m MESSAGELABS INTELLIGENCE Figure 3: Typical example of a Canadian Pharmacy website This spam run was sent from the Cutwail botnet, one of the largest spamming botnets in operation at the moment. MessageLabs Intelligence currently estimates that Cutwail sends 3.8 million spam emails globally every minute, using 490-730 thousand infected PCs (or bots). Poison: Pick Your Poison The spammers frequently send the same old spam campaigns, but include large passages of text harvested from news websites (or sometimes from other websites, such as blogs), to act as anti-spam “poison” in the body of the mail message. This is intended to confuse signature-based or Bayesian anti-spam tools, and may also seek to obstruct attempts at tracking different types of spam. MessageLabs Intelligence tracked some examples using this technique that was related to the earthquake in Haiti. The approach is similar in many ways to zeitgeist techniques described earlier, where the text is included in the body of the email, rather than the subject. An example of random text being scraped from news sites and used to poison spam can be seen in these subjects: Subject: Hallo, dear kiminorii.
Recommended publications
  • Fortinet's March Threatscape Report Shows Domination of Ransomware and Troublesome Zero-Day
    Fortinet's March Threatscape Report Shows Domination of Ransomware and Troublesome Zero-Day Rise of Ransomware Is Primarily Driven by Bredolab and Pushdo Botnets SUNNYVALE, CA, Apr 01, 2010 (MARKETWIRE via COMTEX News Network) -- Fortinet(R) (NASDAQ: FTNT) -- a leading network security provider and worldwide leader of unified threat management (UTM) solutions -- today announced its March 2010 Threatscape report showed domination of ransomware threats with nine of the detections in the malware top ten list resulting in either scareware or ransomware infesting the victim's PC. Fortinet observed the primary drivers behind these threats to be two of the most notorious botnet "loaders" -- Bredolab and Pushdo. Another important finding is the aggressive entrance of a new zero-day threat in FortiGuard's top ten attack list, MS.IE.Userdata.Behavior.Code.Execution, which accounted for 25 percent of the detected activity last month. Key threat activities for the month of March include: -- SMS-based Ransomware High Activity: A new ransomware threat -- W32/DigiPog.EP -- appeared in Fortinet's top ten malware list. DigiPog is an SMS blocker using Russian language, locking out a system and aggressively killing off popular applications like Internet Explorer and Firefox until an appropriate code is entered into a field provided to the user. To obtain the code, a user must send an SMS message to the provided number, receiving a code in return. Upon execution, DigiPog registers the user's MAC address with its server. It is the first time that SMS-based ransomware enters Fortinet's top ten list, showing that the rise of ransomware is well on its way.
    [Show full text]
  • PC Anti-Virus Protection 2011
    PC Anti-Virus Protection 2011 12 POPULAR ANTI-VIRUS PROGRAMS COMPARED FOR EFFECTIVENESS Dennis Technology Labs, 03/08/2010 www.DennisTechnologyLabs.com This test aims to compare the effectiveness of the most recent releases of popular anti-virus software1. The products include those from Kaspersky, McAfee, Microsoft, Norton (Symantec) and Trend Micro, as well as free versions from Avast, AVG and Avira. Other products include those from BitDefender, ESET, G-Data and K7. The tests were conducted between 07/07/2010 and 22/07/2010 using the most up to date versions of the software available. A total of 12 products were exposed to genuine internet threats that real customers could have encountered during the test period. Crucially, this exposure was carried out in a realistic way, reflecting a customer’s experience as closely as possible. For example, each test system visited real, infected websites that significant numbers of internet users were encountering at the time of the test. These results reflect what would have happened if those users were using one of the seven products tested. EXECUTIVE SUMMARY Q Products that block attacks early tended to protect the system more fully The nature of web-based attacks means that the longer malware has access to a system, the more chances it has of downloading and installing further threats. Products that blocked the malicious and infected websites from the start reduced the risk of compromise by secondary and further downloads. Q 100 per cent protection is rare This test recorded an average protection rate of 87.5 per cent. New threats appear online frequently and it is inevitable that there will be times when specific security products are unable to protect from some of these threats.
    [Show full text]
  • SHS Branding LAUNCH
    MESSAGELABS INTELLIGENCE MESSAGELABS INTELLIGENCE FEBRUARY 2010 Spam Surges in February while Message Size Shrinks Welcome to the February edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for February 2010 to keep you informed regarding the ongoing fight against viruses, spam and other unwelcome content. REPORT HIGHLIGHTS Spam – 89.4% in February (an increase of 5.5% since January) Viruses – One in 302.8 emails in February contained malware (an increase of 0.02% since January) Phishing – One in 456.3 emails comprised a phishing attack (an increase of 0.04% since January) Malicious websites – 4,998 websites blocked per day (an increase of 184% since January) 41.6% of all malicious domains blocked were new in February (a decrease of 0.1% since January) 13.3 of all web-based malware blocked was new in February (an increase of 1.2% since January) Grum and Rustock to Blame for February Spam Surge While Volume Grows, Spam File Size Shrinks Waledac Botnet Makes a Comeback before its Demise Olympics-Themed Targeted Malware Gumblar Update REPORT ANALYSIS Grum and Rustock to Blame for Surge in February Spam As expected this time of year, spammers launched a number of spam campaigns related to St. Valentine‟s Day, celebrated on February 14. Around this time, spammers often change their spam runs to include references to the special date. However, the 5.5% increase in spam this month cannot be completely blamed on St. Valentine‟s Day alone. Figure 1 highlights the most recent spam surges in February, and further analysis reveals the underlying cause of these increases.
    [Show full text]
  • KOOBFACE: Inside a Crimeware Network
    JR04-2010 KOOBFACE: Inside a Crimeware Network By NART VILLENEUVE with a foreword by Ron Deibert and Rafal Rohozinski November 12, 2010 WEB VERSION. Also found here: INFOWAR http://www.infowar-monitor.net/koobface MONITOR JR04-2010 Koobface: Inside a Crimeware Network - FOREWORD I Foreword There is an episode of Star Trek in which Captain Kirk and Spock are confronted by their evil doppelgängers who are identical in every way except for their more nefarious, diabolical character. The social networking community Facebook has just such an evil doppelgänger, and it is called Koobface. Ever since the Internet emerged from the world of academia and into the world-of-the-rest-of-us, its growth trajectory has been shadowed by the emergence of a grey economy that has thrived on the opportunities for enrichment that an open, globally connected infrastructure has made possible. In the early years, cybercrime was clumsy, consisting mostly of extortion rackets that leveraged blunt computer network attacks against online casinos or pornography sites to extract funds from frustrated owners. Over time, it has become more sophisticated, more precise: like muggings morphing into rare art theft. The tools of the trade have been increasingly refined, levering ingenuous and constantly evolving malicious software (or malware) with tens of thousands of silently infected computers to hide tracks and steal credentials, like credit card data and passwords, from millions of unsuspecting individuals. It has become one of the world economy’s largest growth sectors—Russian, Chinese, and Israeli gangs are now joined by upstarts from Brazil, Thailand, and Nigeria—all of whom recognize that in the globally connected world, cyberspace offers stealthy and instant means for enrichment.
    [Show full text]
  • Targeted Attacks and Operation Aurora
    1. Infrastructure Security Targeted Attacks and Operation Aurora In this report, we will explain incidents that occurred between January and March 2010, and also examine incidents similar to Gumblar that have been occurring since December last year, as well as targeted attacks on U.S. corporations. Additionally, we will take a look at IIJ's MITF anti-malware activities and the technology involved. 1.1 Introduction This report summarizes incidents to which IIJ responded, based on general information obtained by IIJ itself related to the stable operation of the Internet, information from observations of incidents, information acquired through our services, and information obtained from companies and organizations with which IIJ has cooperative relationships. This volume covers the period of time from January 1 through March 31, 2010. In this period incidents of Gumblar and similar malware designed to steal IDs and passwords that we examined in our last report continued to occur, and many website alterations related to these incidents have been reported. A series of vulnerabilities that affect Web browsers and servers were also discovered. Besides these there was also a hijacking incident in which DNS information was manipulated without authorization, and SEO poisoning incidents that took advantage of a natural disaster. Targeted attacks on a number of major U.S. corporations were also a major topic. As seen above, the Internet continues to experience many security-related incidents. 1.2 Incident Summary Here, we discuss the IIJ handling and response to incidents that occurred between January 1 and March 31, 2010. Figure 1 shows the distribution of incidents handled during this period*1.
    [Show full text]
  • The Real Face of KOOBFACE: the Largest Web 2.0 Botnet Explained
    The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained A technical paper discussing the KOOBFACE botnet Written by Jonell Baltazar, Joey Costoya, and Ryan Flores Trend Micro Threat Research THE REAL FACE OF KOOBFACE: THE LARGEST WEB 2.0 BOTNET EXPLAINED TABLE OF CONTENTS Table of Contents .................................................................................................................. i Introduction...........................................................................................................................The WALEDAC Botnet 1 Overview................................................................................................................................3 KOOBFACE DOWNLOADER................................................................................................ 5 SOCIAL NETWORK PROPAGATION COMPONENTS ................................................................... 6 WEB SERVER COMPONENT .................................................................................................. 7 ADS PUSHER AND ROGUE ANTIVIRUS INSTALLER................................................................... 8 CAPTCHA BREAKERS........................................................................................................ 8 DATA STEALERS.................................................................................................................. 9 WEB SEARCH HIJACKERS .................................................................................................. 11 ROGUE DNS CHANGERS...................................................................................................
    [Show full text]
  • Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    Understanding Adversarial Strategies from Bot Recruitment to Scheduling 1 2(B) 1 1 Wentao Chang , Aziz Mohaisen ,AnWang, and Songqing Chen 1 George Mason University, Fairfax, USA {wchang7,awang10,sqchen}@gmu.edu 2 The University of Central Florida, Orlando, USA [email protected] Abstract. Today botnets are still one of the most prevalent and devas- tating attacking platforms that cyber criminals rely on to launch large scale Internet attacks. Botmasters behind the scenes are becoming more agile and discreet, and some new and sophisticated strategies are adopted to recruit bots and schedule their activities to evade detection more effectively. In this paper, we conduct a measurement study of 23 active botnet families to uncover some new botmaster strategies based on an operational dataset collected over a period of seven months. Our analysis shows that different from the common perception that bots are randomly recruited in a best-effort manner, bots recruitment has strong geograph- ical and organizational locality, offering defenses a direction and priority when attempting to shut down these botnets. Furthermore, our study to measure dynamics of botnet activity reveals that botmasters start to deliberately schedule their bots to hibernate and alternate in attacks so that the detection window becomes smaller and smaller. Keywords: Distributed denial of service · Botnets Behavioral analysis 1 Introduction Botnets are collections of networks of infected machines (aka bots) that are widely used to carry out a variety of malicious activities as instructed by a botmaster. As a result, botnets are notoriously known as one of the primary attack and threat vectors utilized against critical infrastructures and services in activities that include distributed denial of service (DDoS), spam distribution, phishing, scanning and network exploration, among others.
    [Show full text]
  • The Historical Perspective of Botnet Tools
    Current Journal of Applied Science and Technology 32(6): 1-8, 2019; Article no.CJAST.46653 ISSN: 2457-1024 (Past name: British Journal of Applied Science & Technology, Past ISSN: 2231-0843, NLM ID: 101664541) The Historical Perspective of Botnet Tools Maxwell Scale Uwadia Osagie1*, Osatohanmwen Enagbonma1 and Amanda Iriagbonse Inyang1 1Department of Physical Sciences, Faculty of Science, Benson Idahosa University, P.M.B 1100, GRA, Benin City, Edo State, Nigeria. Authors’ contributions This work was carried out in collaboration between all authors. Author MSUO designed the study, performed the statistical analysis, wrote the protocol, and wrote the first draft of the manuscript. Authors OE and AII managed the analyses of the study. All authors managed the literature searches, read and approved the final manuscript. Article Information DOI: 10.9734/CJAST/2019/v32i630040 Editor(s): (1) Prof. Gregory J. Grigoropoulos, Ship and Marine Hydrodynamics at the School of Naval Architecture and Marine Engineering (SNAME) of the National Technical University of Athens (NTUA), Greece. (2) Dr. Aurora Angela Pisano, Solid and Structural Mechanics, University Mediterranea of Reggio Calabria, Italy. Reviewers: (1) Tutunea Mihaela, Babes-Bolyai University from Cluj-Napoca, Romania. (2) Dr. Jose Ramón Coz Fernández, University Complutense of Madrid, Spain. (3) Iroju Olaronke, Adeyemi College of Education, Nigeria. Complete Peer review History: http://www.sdiarticle3.com/review-history/46653 Received 25 October 2018 Accepted 08 February 2019 Original Research Article Published 25 February 2019 ABSTRACT Bot as it is popularly called is an inherent attributes of botnet tool. Botnet is a group of malicious tools acting as an entity. Furthermore, history has it that the aim of what gave rise to botnet was the idea to simplify the method of message exchange within networking platform.
    [Show full text]
  • Cisco 2009 Midyear Security Report
    Cisco 2009 Midyear Security Report An update on global security threats and trends 1 Introduction 4 Online Security Risks 16 Vulnerabilities Cause for Concern: Technical Innovation and Trends The Weak Links in Social Networking of Online Criminals Malware: Conficker Combines Old Mac OS: Online Criminals Move Beyond Windows Cause for Concern: Criminal Sophistication and New Threats Cloud Computing: Protecting Data in the Cloud and Collaboration Prolific Spammers Caught and Indicted Productivity Applications: Targets of Cause for Optimism: Organizations Collaborate “Spamdexing”: SEO for Online Criminals Zero-Day Exploits to Shut Down Online Threats Financial Information Targeted by Top Alerts: January–June 2009 DNS Poisoning Web 2.0 Security: Filtering Dangerous Content Recent Social Engineering Spam Campaign: Swine Flu Conversations with a Botmaster 20 Data Loss and Compliance Botnets: The Rise — and Fall — of Data Loss Srizbi/Reactor Mailer Identity Theft The Takedown of Srizbi/Reactor Mailer Data Breaches Waledac: Storm 2.0 Insiders Battling the Botnets Web 2.0 Collaboration Quandaries and Mobile Device Threats: Text Message Scams Mobile Device Dilemmas U.S. Government: A New Administration, Compliance a New Focus on Cybersecurity HIPAA Gets HITECH The President’s Smart Phone “Addiction” New “Red Flags” Rules Technology: An Engine of U.S. Growth for the Securing Data Next “New Economy” Policies Geopolitical: Twitter Users Are Broadcasting the Revolution Economic Instability and Online Security 25 Conclusion and Recommendations Conclusion Security Community Making Strides Trends to Watch Spam to Return to Record High Levels More Attacks on Legitimate Websites Social Networking Attacks to Continue Recommendations Cisco Security Intelligence Operations All contents are Copyright © 2009 Cisco Systems, Inc.
    [Show full text]
  • Mcafee Threats Report: Second Quarter 2009 by Mcafee® Avert® Labs Report Mcafee Threats Report: Second Quarter 2009
    Report McAfee Threats Report: Second Quarter 2009 By McAfee® Avert® Labs Report McAfee Threats Report: Second Quarter 2009 Table of Contents Spam Bounces Back 3 New Zombies 4 New Zombies by Country 4 Spam by Country 5 Spam by Subject 6 Web Attacks Change Target 6 Coming From a Home Near You 9 Malware and PUPs 10 Web 2.0 and Twitter 11 Hacktivism Returns 14 Phishing 15 Malware: the Face of Cybercrime 16 Password-Stealing Trojans Grow Rapidly 16 Zeus 17 Crimeware as a Service 19 AutoRun Malware 21 About McAfee Avert Labs 24 About McAfee, Inc. 24 Report McAfee Threats Report: Second Quarter 2009 The McAfee Threats Report brings you the latest in statistics and analysis covering email- and web- based threats. This quarterly report has been created by the researchers at McAfee Avert Labs, whose worldwide staff provides a unique perspective of the threat landscape—ranging from consumers to enterprises, and from the United States to countries around the world. Join us now as we examine the leading security issues of the past three months. Once you’ve finished here, you can find more information at the McAfee Threat Center.1 You’ll also find our first-quarter Threats Report.2 In the second quarter of 2009, we saw spam production recover quickly from a recent setback and grow to record levels. Zombies, computers hijacked by spammers to send messages, also reached record numbers. We break down spam output by country and subject. On the web, malware on both legitimate and malicious sites continues to exploit browsers.
    [Show full text]
  • Les Attaques 2.0 Koobface Et Gumblar
    L’ACTUSÉCU 23 0-DAY, GUMBLAR, KOOBFACE, ANTI-SEC : QUAND LES PIRATES PASSENT A L'ACTION... SOMMAIRE Les meilleures conférences des dernières semaines à la loupe : BlackHat Amsterdam/USA et SSTIC 2009. Retour sur les attaques Gumblar, Koobface et Slowloris L’actualité du mois : Anti-Sec et vulnérabilité «0 day», patch Microsoft, PHPMyAdmin, Slowlaris, Safari local file access, Local root Linux, Trojan Skype... Les blogs, les logiciels et les extensions sécurité... Ce document est la propriété du cabinet XMCO Partners. Toute reproduction est strictement interdite. !!!!!!!!!!!!!!!!! [1] N°23 Tests d'intrusion Mise à l'épreuve de vos réseaux, systèmes et applications web par nos experts en intrusion SÉCU OWASP, OSSTMM, CCWAPSS Audit de sécurité L’ACTU L’ACTU Audit technique et organisationnel de la sécurité de votre Système d'Information Best Practices ISO 27001, PCI DSS, Sarbanes-Oxley Veille en vulnérabilités Suivi personnalisé des vulnérabilités et des correctifs affectant votre Système d'Information Réponse à intrusion Détection et diagnostic d'intrusion, collecte des preuves, étude des logs, autopsie de malware Vous êtes concerné par la sécurité informatique de votre entreprise ? Xmco Partners est un cabinet de conseil dont le métier est l'audit en sécurité informatique. À propos du cabinet Xmco Partners Fondé en 2002 par des experts en sécurité, dirigé par ses fondateurs, nous n'intervenons que sous forme de projets forfaitaires avec engagement de résultats. Les tests d'intrusion, les audits de sécurité, la veille en vulnérabilité constituent les axes majeurs de développement de notre cabinet. Parallèlement, nous intervenons auprès de Directions Générales dans le cadre de missions dʼaccompagnement de RSSI, dʼélaboration de schéma directeur ou encore de séminaires de sensibilisation auprès de plusieurs grands comptes français.
    [Show full text]
  • August 2018 Information Systems ISSN: 1946-1836
    Journal of Volume 11, Issue 2 August 2018 Information Systems ISSN: 1946-1836 Applied Research In this issue: 4. What’s “Appening” to our Privacy? A Student’s Perspective on Downloading Mobile Apps Karen Paullet, Robert Morris University Adnan A. Chawdhry, California University of Pennsylvania David M. Douglas, Robert Morris University Joseph Compimizzi, Florida Atlantic University 13. An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Melinda L. Korzaan, Middle Tennessee State University Amy H. Harris, Middle Tennessee State University Nita G. Brooks, Middle Tennessee State University 24. Information Security and Privacy Legislation: Current State and Future Direction Lex Dunlap, University of North Carolina Wilmington Jeff Cummings, University of North Carolina Wilmington Thomas Janicki, University of North Carolina Wilmington 33. Protecting IoT Devices from the Mirai Botnet Charles Frank, Dakota State University Samuel Jarocki, Dakota State University Cory Nance, Dakota State University Wayne E. Pauli, Dakota State University Journal of Information Systems Applied Research (JISAR) 11(2) ISSN: 1946-1836 August 2018 The Journal of Information Systems Applied Research (JISAR) is a double-blind peer- reviewed academic journal published by ISCAP, Information Systems and Computing Academic Professionals. Publishing frequency is three issues a year. The first date of publication was December 1, 2008. JISAR is published online (http://jisar.org) in connection with CONISAR, the Conference on Information Systems Applied Research, which is also double-blind peer reviewed. Our sister publication, the Proceedings of CONISAR, features all papers, panels, workshops, and presentations from the conference. (http://conisar.org) The journal acceptance review process involves a minimum of three double-blind peer reviews, where both the reviewer is not aware of the identities of the authors and the authors are not aware of the identities of the reviewers.
    [Show full text]