Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back

Is it wrong to hack back in order to counter hacking attack when you have become a victim? — this has been a long time debate.

While many countries, including the United States, consider hacking back practices as illegal, many security firms and experts believe it as “a terrible idea” and officially “cautions” victims against it, even if they use it as a part of an active defense strategy.

Looks like one Avira email but… this is bait!

Looks like one Avira email but... this is bait!

It’s well known that Ransomware often spreads via email. Most of them are phishing emails. Of late some of those emails are claiming in their subject line that they are an invoice from Avira. But that’s not all: they also come with a malicious attachment. Are those real Avira mails? No. Avira will never send […]

The post Looks like one Avira email but… this is bait! appeared first on Avira Blog.

Default Settings, and Why the Initial Configuration is not the Most Secure

It’s true that it’s easiest and most convenient to start using new devices or software with their default settings. But it’s not the most secure, not by a long shot. Accepting the default configuration without reviewing what it actually is could be dangerous to your company’s confidential information.

The default settings are predetermined by the manufacturer and basically put usability before all else. In the case of a router, for example, this could be a predefined password, or in the case of an OS it could be the applications that come preinstalled. The primary concern is for the ease of use when getting started with a new product, without having to perform the configuration yourself. With three or four clicks, you’re ready to enjoy the use of your new device and are probably barely aware of having accepted the default settings.

The problem is, in many cases, the default passwords for a slew of devices (everything from routers to POS terminals) are easy to find on forums and other easy-to-find places on the internet. Case in point, one POS manufacturer used the same password for 25 years: 166816. The credential was easy to find with a simple Google search. Any business that failed to change the password was unwittingly exposing themselves and their clients to cyberattacks.

And money isn’t the only thing at stake. We need look no further than the our own company’s wifi network to witness serious potential danger, namely that the default credentials it comes with could be easily compromised. The danger is that someone from outside could connect the corporate network and even make internal changes, possibly even locking the owners out of it. It wouldn’t take an evil genius. If your device’s default configuration hasn’t been change, all it would take is someone with some basic technical skills and access to the Internet.

More than a password change                                              

­­­Any IT department in any corporate environment should be aware that changing the default sittings isn’t just about changing the password. In fact, the best thing would be to personally configure all operating systems from the beginning to increase their security.

It should be up to the company, for example, which applications and programs will be installed on the devices that employees will use, removing or adding options from the predefined ones, thus avoiding any software that is not going to be used. Such software, it should be said, could also end up being an added vulnerability. If at some point the program stops receiving security updates, it could actually become a gateway for cybercriminals. If it is unnecessary, might as well get rid of it and save yourself from future hassles.

In short, any configuration that comes straight from the factory can pose a short- or medium- term risk for companies. The best thing to do is to create a customized configuration with which security and protection against possible attacks remains in the hands of the company’s IT experts.

The post Default Settings, and Why the Initial Configuration is not the Most Secure appeared first on Panda Security Mediacenter.

Bring IT on! Meet with us and fulfill your passion for technology

Bring IT on! Meet with us and fulfill your passion for technology

Imagine yourself sitting on the couch, drinking an excellent coffee, and working on your favorite stuff, all while being surrounded by your close friends. That would be a great and productive work environment where you could clearly focus on your passion, right? Even Oprah once said: “The biggest adventure you can take is to live […]

The post Bring IT on! Meet with us and fulfill your passion for technology appeared first on Avira Blog.

SEC Consult SA-20170308-0 :: Multiple vulnerabilities in Navetti PricePoint

Posted by SEC Consult Vulnerability Lab on Mar 08

SEC Consult Vulnerability Lab Security Advisory < 20170308-0 >
=======================================================================
title: Multiple vulnerabilities
product: Navetti PricePoint
vulnerable version: 4.6.0.0
fixed version: 4.7.0.0 or higher
CVE number: –
impact: high/critical
homepage: http://www.navetti.com/
found: 2016-07-18
by:…