IBM Security: Perspective on the Recent “Petya” Cyberattacks

454532-630x330

What is the Petya Ransomware campaign? A calculated ransomware campaign with a heavy footprint in Ukraine was detected on June 27, 2017. The source of the attack is currently unknown. To date, the attack has affected global organizations in the banking, pharmaceutical and transportation industries.

Most reports, and the ransom demand itself, refer to the activity as Petya, a well- known malware that has existed for quite some time, but at least one security company believes it is not a true Petya variant. IBM can confirm the ransomware tool is spreading via the National Security Agency (NSA) exploit ETERNALBLUE, similar to the WannaCry events last month.

Continue reading

Billions of Threats, Milliseconds to Respond: Automating Resiliency

Image of businesswoman in anger breaking metal chain

Time is not on our side. To succeed against threats, organizations need automation and cognitive technologies combined with strategy, process and testing. Effective resiliency requires investment, leadership and a culture where people imprint an always-on attitude onto their professional DNA.

For decades, business continuity was viewed as a way to prevent disasters when hardware and software failed. This process focused primarily on preparing for human error, poor change management and natural disasters like hurricanes, floods and fires. But now, more than any other time in history, cyberattacks are flooding the front lines in the resiliency battle. Cyberattacks aren’t just another threat — they’re the mother of all threats.

Continue reading

IBM Security: Perspective on the Global “WannaCry2” Cyberattacks Hitting Critical Infrastructure

wannacry-2

Image source: Internet

What is WannaCry2? A rapidly spreading cyberattack that was first detected in March and has impacted businesses in nearly 100 countries. Currently, the source of the attack is unknown. The WannaCry2 attacks have crippled critical infrastructure, including hospitals, telecommunications and distribution/supply chain services.

The scale of this attack was possible because of a vulnerability in the Microsoft Windows Operating System. Although it began like any routine phishing scheme – in which a user clicks on a bad link and malware takes over – WannaCry2’s exploitation of the Windows vulnerability enabled it to spread with great speed from one workstation to a network of users. As a result, it was an attack of one-to-many versus standard phishing attacks, which typically infect one user at a time. While the attack appears disabled now, we expect hackers to reanimate it rapidly, and organizations need to prepare fast.

Continue reading

模擬電腦攻擊 對抗網絡匪黨

(文章於2017年1月4日在香港經濟日報刊登)

30885751432_e02ebedc56_h

辦公室平凡的一天,一片細碎的聲音。忽然,營業代表發現無法查看產品狀況,助理亦無從出單收錢,大家牢騷爆發,IT 部門如臨大敵,只有負責人保持冷靜。事實上他不單冷靜,還感到心寒。因為不到一分鐘前,他才收到一條不知名訊息,指公司電腦已被對方綁架,想恢復運作便要於限時前付贖金,否則對方會刪除或公開數據。

各位看倌會怎辦?

Continue reading

雲端應用 宜借鏡Pokémon GO

(原文於2016年7月28日在香港經濟日報刊登)

pokemon-go-comes-with-some-bugs-940x400

就算你不好「Pokemon Go」,身邊總會有人在玩。員工在休息時把玩手機其實無傷大雅,我們也很難杜絕「寵物小精靈」在辦公室的出現。但企業在考慮保安原則時,仍要兼顧安全與效率。企業在決定採用個別雲端應用時,原來可借鏡同類的「Pokemon Go」的一些成功元素。

Continue reading

‘Pokemon Go’ and Five Security Requirements for Using Cloud Apps

(Note: This article is a repost from Security Intelligence)

security-lessons-from-pokemon-go-938x535

If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for Pikachu.

Five Lessons From ‘Pokemon Go’

In the workplace, cloud apps such as “Pokemon Go” are wildly popular — and have been for a while. We all want to play, but CISOs must consider some general security requirements to be both efficient and safe.

Here are five requirements from “Pokemon Go” that can be applied to adopting cloud apps in your organization.

Continue reading

Blockchain: It Really is a Big Deal

blockchain_socialtile_1024x512_1a_markingblockchainready_final

(This article is a repost from A Smarter Planet Blog)

Over the past two decades, the Internet, cloud computing and related technologies have revolutionized many aspects of business and society. These advances have made individuals and organizations more productive, and they have enriched many people’s lives.

Yet the basic mechanics of how people and organizations forge agreements with one another and execute them have not been updated for the 21st century. In fact, with each passing generation we’ve added more middlemen, more processes, more bureaucratic checks and balances, and more layers of complexity to our formal interactions–especially financial transactions. We’re pushing old procedures through new pipes.

This apparatus–the red tape of modern society–extracts a “tax” of many billions of dollars per year on the global economy and businesses.

What can be done? One potential solution is an intriguing technology called blockchain, which is little understood outside a small fraternity of computer scientists.

Continue reading