Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
TCG publishes new ESAPI specification that simplifies TPM communication
https://www.realwire.com/releases/TCG-publishes-new-ESAPI-specification-that-simplifies-TPM-communication
Oregon, USA, October 28 2019 – Trusted Computing Group (TCG) has released a new landmark Enhanced System API (ESAPI) specification for the application program interface to access the full capabilities of the Trusted Platform Module (TPM) through the TPM Software Stack (TSS).
Making it simpler and more convenient for developers, the ESAPI specification helps vendors to utilize the Roots of Trust provided by the TPM and build a TPM command buffer manually, without the previous complexity that it entailed.
“The core idea of ESAPI is to have a consistent API that the device can talk to via the TSS, leaving very little programming for developers to do themselves. With this new specification, developers have access to a complete interface for the middle layers that are so important to TPM applications, so it is very exciting,” said Andreas Fuchs, Co-chair of TCG’s TPM Software Stack Work Group. “It’s currently a lot of effort to access the TPM as a developer, as you would need to learn all the internal specifics and the ways in which to communicate with the TPM, so this specification is game-changing.”
The ESAPI specification details how the interface provides 100 percent of the TPM’s functionality while reducing the program complexity that comes with communicating with the TPM. This marks the formulation of a simpler, comprehensive and generically specified interface for the middle layers – that are a necessity to TPM applications. Addressing a lot of the duties that need to be performed before you can talk to a TPM and taking the complexity out of manually building TPM command buffers, the new specification makes it more convenient for developers, saving time and resources.
As a result of the simplified access of the TPM’s functionality, manufacturers will be able to implement the Roots of Trust, Storage and Reporting in a device in a highly secure manner, without requiring a detailed knowledge of how to communicate with the TPM itself.
Set directly above the System API, the interface is designed to enable applications to send commands to the TPM using a small number of function calls when using sessions, while still allowing devices to work securely. ESAPI also provides a cryptographic functionality for applications wishing to encrypt the data stream from TSS 2.0 to the TPM and provides an enhanced session management functionality on top of the base SAPI functionality.
“TCG has been working on the new specifications for a while now, with several implementations of the specifications having already started based on the draft releases,” said Fuchs. “This is a really exciting time for TCG as we look to ensure that connected devices work as securely as possible both now and in the future.”
ESAPI is suitable for all applications, with no one use-case more relevant than any others, meaning it can be used universally. The interface is written in C99, allowing it to operate in a wide range of operating systems and to simplify the writing of language bindings to other languages.
The specification is targeted at experts who want to access the TPM from across the entire computing ecosystem, from servers and desktops to embedded devices.
==================================================================
This article seems to be a good development for Wave! More TPMs being enabled is good for Wave and organizations' cybersecurity!
Russia Will Test Its Ability to Disconnect from the Internet
https://www.nextgov.com/it-modernization/2019/10/russia-will-test-its-ability-disconnect-internet/160868/
The nascent RuNet is meant to allow the country to survive an attack — and Putin to monitor and control the population.
Russia will test its internal RuNet network to see whether the country can function without the global internet, the Russian government announced Monday. The tests will begin after Nov. 1, recur at least annually, and possibly more frequently. It's the latest move in a series of technical and policy steps intended to allow the Russian government to cut its citizens off from the rest of the world.
The rest of the article is at the link.
==================================================================
Given that Russia will potentially cut off its internet to future attacks, the rest of the world could be concerned about its cyber defensive posture. Enabling and using TPMs in billions of enterprise computers could protect organizations from a Russian cyber attack. This has been an often overlooked security chip, but should not be since it is a international standard.
Rather than waiting for the government to mandate an enabled TPM for the cyberhealth for organizations, the leading technology companies in the world (TCG) could emphasize the benefits of enabled TPMs in the event of a cyber attack.
Wave has solutions that could be very helpful in protecting organizations from potential cyber attacks!! November 1 is a week away.
==================================================================
https://www.wavesys.com/
Perceptions on the impact of data breaches and identity protection
https://www.helpnetsecurity.com/2019/10/22/perceptions-data-breaches/
4iQ recently completed research focusing on Americans’ attitudes about cybersecurity breaches and the efforts that organizations make to mitigate breaches’ effects on identity theft.
Where’s the data?
The findings indicate that a large proportion of Americans (44%) believe their personally identifiable information (PII) has been stolen as a result of a data breach. A strong majority (63%) are concerned that prior breaches could lead to future identity fraud, and a significant number (37%) believe they have already been a victim of fraud.
In addition to providing insights into the prevalence of citizen PII loss, the survey also uncovered perceptions around the effectiveness of those guarding data. While 75% of respondents perceived their employers to be “effective” or “very effective” at protecting PII, only 42% felt the same way about the government’s effectiveness.
Growing lack of trust
Similarly, in terms of actions taken in the wake of a breach resulting in PII loss, respondents also anticipated higher levels of response from employers than government.
More than 83% said they would expect security upgrades and proactive communications from employers and 54% would specifically expect the offer of identity protection services. This numbers shrunk to 74% and 50% for government breaches.
“We have heard about the growing lack of trust in government institutions, and when it comes to protecting PII, there’s a very good reason for the lack of confidence – the public sector worldwide has experienced a large number of data breaches,” said Monica Pal, CEO of 4iQ.
“4iQ saw a 291% increase in government sector breaches circulating in the underground in 2018. So far in 2019, we’ve validated over 700 government site breaches around the world, not including public records such as voter databases. This information, along with data breached from companies is being weaponized for identity theft, account takeover, fraud and other cyber fueled crime. It is high time that governments and companies get serious about working together to protect citizens, employees and consumers, and fight cybercrime.”
Feeling pressure
4iQ’s research also indicated that people may feel unprepared to contend with the threats presented by exposed personal information. When asked about their own effectiveness when it comes to protecting their PII, survey respondents actually rated themselves lower than their employers, with only 15% calling themselves “very effective,” versus 23% for their employers.
Everyday Americans may also feel significant pressure around avoiding mistakes with online security – 77% said that their employment status would be impacted by any mistakes they make with online security that compromised their employer’s systems, and 48% believed any errors they make could have a “high or very high impact” upon their employment.
“While cyber awareness campaigns and cybersecurity training are essential, it’s also important that we don’t simply pass the data protection buck to the end-user,” added Pal. “Citizens, consumers and employees can’t possibly be held responsible for all of the breaches of the past – government agencies and businesses must recognize that every employee is also a consumer and consumers are citizens and voters – who must be better protected from identity theft, account takeover, fraud and other cyber enabled crimes. In addition, consumers and companies must report these crimes and government agencies must do a better job of investigating, prosecuting and disrupting crimes.”
==================================================================
When one reads this article it's obvious that the government could be benefiting extraordinarily by using Wave's solutions (Wave VSC 2.0 in particular)!!! When using Wave VSC 2.0, devices on the network have to be known and approved to be able to access the data. Wave VSC 2.0 would stop the bad guys (unknown and unapproved devices) from getting access to the data!!!
==================================================================
The links below are highly informative!!
https://www.wavesys.com/
https://www.wavesys.com/contact-information
https://www.wavesys.com/products/wave-virtual-smart-card
https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Avast says hackers breached internal network through compromised VPN profile
https://www.zdnet.com/article/avast-says-hackers-breached-internal-network-through-compromised-vpn-profile/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A+Trending+Content&utm_content=5dae35168021ed000132129b&utm_medium=trueAnthem&utm_source=twitter
Czech antivirus maker discloses second attack aimed at compromising CCleaner releases.
Czech cyber-security software maker Avast disclosed today a security breach that impacted its internal network.
In a statement published today, the company said it believed the attack's purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident.
Avast said the breach occurred because the attacker compromised an employee's VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution.
The intrusion was detected on September 23, but Avast said it found evidence of the attacker targeting its infrastructure going as far back as May 14, this year.
"The user, whose credentials were apparently compromised [...], did not have domain admin privileges. However, through a successful privilege escalation, the actor managed to obtain domain admin privileges," said Jaya Baloo, Avast Chief Information Security Officer (CISO).
This sudden access rights elevation prompted the company to investigate, Baloo told ZDNet in an email today.
Staff eventually tracked down other security alerts inside Avast's ATA dashboard, alerts that engineers previously ignored, thinking they were false positives. ATA stands for Microsoft Advanced Threat Analytics, an on-premise network parsing engine and traffic analysis system that Microsoft sells to enterprises in order to protect internal networks from malicious attacks triggered from inside.
The alert showed that the compromised user account replicated Avast's Active Directory service, an effective digital map of the company's internal network.
Avast let hackers roam free for two weeks to track their intentions
Baloo said Avast intentionally left the compromised VPN profile active, with the purpose of tracking the attacker and observing their actions.
This lasted until October 15, when the company finished auditing previous CCleaner releases, and pushed out a new clean update.
At the same time, Avast also changed the digital certificate it was using to sign CCleaner updates. The new update was signed with a new digital certificate, and the company revoked the previous certificate used to sign older CCleaner releases. It did so to prevent attackers from using it to sign fake CCleaner updates, in case the hackers managed to get their hands on the old certificate during the recent intrusion.
The last step was to reset all employee credentials.
"Having taken all these precautions, we are confident to say that our CCleaner users are protected and unaffected," Baloo said.
The antivirus maker said it's currently investigating the incident together with the Czech intelligence agency, Security Information Service (BIS), the local Czech police force cybersecurity division, and an external forensics team.
Avast respectfully declined to provide additional details to other questions ZDNet sent the company today, citing the legal investigation. BIS also confirmed the investigation into the Avast hack today, claiming the attack was carried out by Chinese hackers.
Avast said there is no evidence at this time to suggest this attack was caused by the same Chinese hacker group who breached its infrastructure in 2017; however, the company pointed out that the intrusion was carried out by an experienced threat actor.
"From the insights we have gathered so far, it is clear that this was an extremely sophisticated attempt against us that had the intention to leave no traces of the intruder or their purpose, and that the actor was progressing with exceptional caution in order to not be detected," Baloo said.
The investigation is ongoing and the company promised more updates.
Avast previously received praises for the openness it showed while investigating the 2017 CCleaner hack, publishing several updates on the incident, as it continued to learn more about the 2017 breach in the subsequent months [1, 2, 3, 4].
The 2017 CCleaner hack happened before Avast bought Piriform, the company behind CCleaner. Hackers breached Piriform's network via a TeamViewer account and planted malware inside CCleaner. The attackers, believed to be a group of Chinese state-sponsored hackers, inserted malware that would only download a second-stage payload when CCleaner was installed on the network of a major company. The list of targets included Cisco, Microsoft, Google, NEC, and many other major companies. Avast said that 2.27 million users downloaded the tainted CCleaner software back in 2017; 1,646,536 computers where infected with the first-stage Floxif trojan that scanned for high-value targets; but only 40 computers received the second-stage trojan, a more powerful backdoor.
Avast told ZDNet it has no plans to discontinue CCleaner in light of the two attacks that targeted the app's infrastructure.
==================================================================
Wave has better security in its Wave VSC 2.0 (MFA)!!!! Breaches keep happening even to software security firms like Avast. That's one of the many reasons why organizations need better security provided by Wave!!
Please see https://www.wavesys.com/products/wave-virtual-smart-card for those many powerful reasons!!
For all of Wave's outstanding solutions see: https://www.wavesys.com/
Hardware-based encryption is the key to future proofing data protection concerns
http://digitalmarketingmagazine.co.uk/digital-marketing-data/hardware-based-encryption-is-the-key-to-future-proofing-data-protection-concerns/5077
This was a very interesting article posted on Trusted Computing Twitter
DISA wants a Pentagon-wide identity management system
The TPM which has been tested and developed over 20 years and with its interoperability, Wave being able to manage both the SED and TPMs and Wave’s usage of its solutions with large organizations including a government agency gives Wave VSC 2.0 a tremendous ‘edge’ in being a Grand Slam for the Pentagon. We just need a Bill Solms to have the Pentagon realize the outstanding security of the technology. Software security alone is the status quo and how effective is that really working. Hardware security (the TPM and SED) and software security is better than software security alone!!! BUY better security, BUY WAVE SOLUTIONS!!!
https://www.nextgov.com/cybersecurity/2019/10/disa-wants-pentagon-wide-identity-management-system/160638/
Trump Campaign Email Server Was Left Open To Attack
https://www.forbes.com/sites/leemathews/2019/10/17/trump-campaign-email-server-was-left-open-to-attack/amp/
This article gives an example of the importance of cybersecurity!
The number of data breaches (3800+) in the last six months could have been cut back dramatically by organizations using Wave solutions. The status quo is not working!! Much better can be done!! It seems that cybersecurity has recently been a top priority for presidential candidates now and the past few years. Wave has better security that has been relatively undiscovered but used by some large, well renowned organizations effectively such that these data breaches could all but disappear.
Organizations should purchase better security, PURCHASE WAVE SOLUTIONS!!! wavesys.com!!!!
Andrew Yang, Joe Biden come up short on cybersecurity despite campaign promises, analysis shows
https://www.newsweek.com/andrew-yang-joe-biden-fall-short-2020-candidates-cybersecurity-awareness-1465194?amp=1
Given that there were 3800+ breaches in the last six months, shouldn’t the candidates be familiarized with a better cybersecurity paradigm for the future.... trusted computing!!! 150+ companies support it, shouldn’t these candidates?!
How the Army Can Reduce Risk on Vehicle Program Development
https://breakingdefense.com/2019/10/how-the-army-can-reduce-risk-on-vehicle-program-development/
If the Army is using the TPM for its “edge-assure computing” shouldn’t the rest of government and other organizations?!! Please see wavesys.com for why turning on this TPM can bring about better security!!!!
Soldering spy chips inside firewalls is now a cheap hack, shows researcher
https://nakedsecurity.sophos.com/2019/10/14/soldering-spy-chips-inside-firewalls-is-now-a-cheap-hack-shows-researcher/amp/
Good article. Read - How does TPM work? (In post 245843) for how the TPM protects a computer in the event of nefarious activities! TPM based cybersecurity solutions such as Wave’s can provide better security!! Please see wavesys.com for more information!!!
76 percent of US businesses have experienced a cyber attack in the past year
https://www.zdnet.com/google-amp/article/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year/
Excerpt: 45 percent of respondents said that their organization’s IT posture is ‘ineffective’.
When one sees a statistic such as this, it becomes more and more apparent that Wave could be benefiting MANY more organizations!! It’s plausible that of the 45% citing their IT posture as ‘ineffective’, not many were using TPM based cybersecurity like Wave’s? (And should be). Their posture could easily go from ineffective to ‘VERY EFFECTIVE’ when using Wave solutions!!! Please see wavesys.com for better security!!!
What is Trusted Platform Module?
https://www.embedded-computing.com/news-releases/what-is-trusted-platform-module
With articles like this being read and absorbed by organizations, the TPM being enabled should be happening at a very brisk pace!! It’s just too beneficial for it not to be! Wave could be using its vast marketing connections to be stopping a LOT of organizations’ cyber problems with its outstanding TPM technology solutions!!!! If you are new to wavesys.com I recommend reading the Wave Alternative!!!
FBI Issues Surprise New Cyber Attack Warning
https://www.forbes.com/sites/zakdoffman/2019/10/07/fbi-issues-surprise-cyber-attack-warningurges-new-precautions/
Excerpt: Microsoft sees “less than 10% of users per month” using MFA on their enterprise accounts. WOW!! It sounds like there are a lot of users who could benefit BIG TIME by using Wave VSC 2.0!!! Wave VSC isn’t susceptible to the attacks on tokens and one time passwords as outlined in the article! Please see Wave VSC 2.0 and it’s many advantages at wavesys.com!!!
Scrambls Wins 2012 National Child Safety Award
https://www.wavesys.com/buzz/pr/scrambls-wins-2012-national-child-safety-award
As it relates to the previous post!!!
Here we go again: U.S. govt tells Facebook to kill end-to-end encryption for the sake of the children - Interesting article!!!
https://www.theregister.co.uk/2019/10/04/us_government_encryption/
Microsoft says Iranian hackers tried to hack a U.S. presidential campaign
https://arstechnica.com/tech-policy/2019/10/microsoft-says-iranian-hackers-tried-to-hack-a-us-presidential-campaign/?amp=1
A key feature of Wave VSC 2.0 - Protect against PHISHING malware and other network security threats by storing authentication credentials in hardware. Please see the other features and advantages of Wave VSC 2.0 (2FA) at wavesys.com!!!!
The Password-Sharing Problem That’s Costing Netflix Millions
https://www.fool.com/amp/investing/2019/09/30/the-password-sharing-problem-thats-costing-netflix.aspx
With all the experience Wavexpress had with proven hardware authentication, a company like Netflix could save billions annually by signing on with Wavexpress!!!
49% of infosec pros are awake at night worrying about their organization’s cybersecurity
https://www.helpnetsecurity.com/2019/10/02/organization-cybersecurity-readiness/
The reason why many infosec pros are up at night is due to their organization not having Wave solutions like Wave VSC 2.0 and Wave Endpoint Monitor. They would sleep well at night with the help of solutions such as these!!! Please see wavesys.com for what could lead to a restful night’s sleep!!!
Microsoft to make Windows 7 Extended Security Updates available to all business users
https://www.zdnet.com/article/microsoft-to-make-windows-7-extended-security-updates-available-to-all-business-users/
A corporate computer fleet with Windows 7, 8, 8.1, and/or 10 and Wave VSC 2.0 has better security!!! Ride the WAVE of better security!!! wavesys.com
Data Breach Warning For 200 Million Android and iOS Gamers
https://www.forbes.com/sites/daveywinder/2019/09/30/data-breach-warning-for-200-million-android-and-ios-gamers/amp/
Why are there disturbingly large breaches still occurring ? Many companies haven’t found and/or realized what Wave VSC 2.0 and Wave ERAS could do for them - STOP BREACHES!! There is great information at Wave Systems Corp. website wavesys.com!!
‘We have to hit the problem the way it hits us’ : How the FBI tracks a range of hacking threats
https://www.cyberscoop.com/fbi-cyberthreats-iran-china-russia-north-korea/
USE WAVE SOLUTIONS!! See Wavesys.com for more information!!
New Spyware Threatens Telegram’s 200 Million Users
https://www.infosecurity-magazine.com/news/new-spyware-threatens-telegrams/
With an article like this, Chadder would seem to be easily able to capitalize on the problem with Telegram. I seem to recall that Chadder used some form of Scrambls. SKS could be the comeback genius CEO of companies no one saw coming!!
60% of major U.S. firms have been hacked in cloud
https://www.securityweek.com/60-major-us-firms-have-been-hacked-cloud-study
The unauthorized access problem could be stopped by organizations using Wave VSC 2.0 and Wave Endpoint Monitor. The current cyber solutions are not working very effectively if there are stats like the ones in this article. Please see wavesys.com for better cyber solutions!!!
The top ‘human hacks’ to watch for now
https://www.darkreading.com/edge/theedge/the-top-human-hacks-to-watch-for-now/b/d-id/1335845
Sometimes education isn’t enough, and excellent cyber solutions like Scrambls and Wave VSC 2.0 could put a stop to the hacks in this article!! Check out wavesys.com!!
Businesses facing post breach financial fallout by losing customer trust
https://www.helpnetsecurity.com/2019/09/18/post-breach-financial-fallout/
The stakes are just too high to take a chance and not use Wave solutions!! Check out Wavesys.com!!
Senior Execs Shun Cyber Risk as Concerns Grow
https://www.infosecurity-magazine.com/news/senior-execs-shun-cyber-risk-as/
Call on Wave Systems Corp. to greatly increase your confidence in your organizations’ cybersecurity!!! Wavesys.com
A bug made some Windows Defender antivirus scans fail
https://www.helpnetsecurity.com/2019/09/19/windows-defender-scan-fail
Trump admin weighing retaliatory action against Iran after Saudi oil attack
https://www.nbcnews.com/politics/national-security/trump-admin-weighing-retaliatory-action-against-iran-after-saudi-oil-n1055531
Shouldn’t the U.S. insist on better security(Wave Systems technology) when there is the potential for Cyber War always lurking?! Wavesys.com
You should update Lastpass right now
https://gizmodo.com/you-should-update-lastpass-right-now-1838142059?utm_medium=sharefromsite&utm_source=gizmodo_copy&utm_campaign=top
Why risk using other MFA and password managers when your organization could use Wave VSC 2.0 with better security?! Please see Wave Systems Corp.’s website for better answers.
New Cyber Warning: ISIS Or Al-Qaeda Could Attack Using ‘Dirty Bomb’
By Forbes
One of the key features to Wave Endpoint Monitor is that it has real-time alerts for zero-day detection of APTs, and that could be very appealing for critical industries as well as the other features! Wave’s other solutions could also protect critical industries from ISIS or Al-Qaeda! Wavesys.com
Methinks
I have seen ads regarding this in the U.S. They must be having a lot of success with this! Wave Endpoint Monitor uses the TPM for anti-virus/malware protection but in Windows machines. WEM employs whitelisting with the TPM and I believe Google Chromebooks works similar to WEM to stop malware. If Google is using this as a marketing advantage shouldn’t Wave Endpoint Monitor be considered a big advantage when using Windows devices?!
Cyber-security incident at US power grid entity linked to unpatched firewalls
https://www.zdnet.com/article/cyber-security-incident-at-us-power-grid-entity-linked-to-unpatched-firewalls/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A+Trending+Content&utm_content=5d76c0ec145a570001542606&utm_medium=trueAnthem&utm_source=twitter
Leaky Server Exposes 419M Phone Numbers of Facebook Users from Threatpost. The TPM can act as a secret vault for sensitive data so Facebook users at least having the option of using it makes a lot of sense!
As the worlds of mobile and computer collide, TCG and GlobalPlatform are working together to enable smart security
Interesting article on Trusted Computing Twitter!!
Cost of data breaches to surpass $5 trillion in 2024
https://www.helpnetsecurity.com/2019/08/28/cost-of-data-breaches/
==========================================================================
Wave VSC 2.0 could save organizatioon s a LOT of MONEY and FRUSTRATION. Continuing with the stautus quo is costing organizations TRILLIONS!! Use the technology that has been tested and used for years in well renowned organizations: Wave VSC 2.0!!
Microsoft: Using multi-factor authentication blocks 99.9% of account hacks
https://www.zdnet.com/article/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A+Trending+Content&utm_content=5d65a0fc57819f0001696368&utm_medium=trueAnthem&utm_source=twitter
Microsoft cloud services are seeing 300 million fraudulent sign-in attempts every day. MFA can help protect accounts against many types of account takeover attacks.
Microsoft says that users who enable multi-factor authentication (MFA) for their accounts will end up blocking 99.9% of automated attacks.
The recommendation stands not only for Microsoft accounts but also for any other profile, on any other website or online service.
If the service provider supports multi-factor authentication, Microsoft recommends using it, regardless if it's something as simple as SMS-based one-time passwords, or advanced biometrics solutions.
"Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA," said Alex Weinert, Group Program Manager for Identity Security and Protection at Microsoft.
PASSWORDS DON'T MATTER ANYMORE
Weinert said that old advice like "never use a password that has ever been seen in a breach" or "use really long passwords" doesn't really help.
He should know. Weinert was one of the Microsoft engineers who worked to ban passwords that became part of public breach lists from Microsoft's Account and Azure AD systems back in 2016. As a result of his work, Microsoft users who were using or tried to use a password that was leaked in a previous data breach were told to change their credentials.
But Weinert said that despite blocking leaked credentials or simplistic passwords, hackers continued to compromise Microsoft accounts in the following years.
He attributed this to the fact that passwords or their complexity don't really matter anymore. Nowadays, hackers have different methods at their disposal to get their hands on users' credentials, and in most cases, the password doesn't matter.
With over 300 million fraudulent sign-in attempts targeting Microsoft cloud services every day, Weinert says that enabling a multi-factor authentication solutions blocks 99.9% of these unauthorized login attempts, even if hackers have a copy of a user's current password.
The 0.1% number accounts for more sophisticated attacks that use technical solutions for capturing MFA tokens, but these attacks are still very rare when compared to the daily hum of credential stuffing botnets.
GOOGLE SAID THE SAME THING IN MAY
Microsoft's boast that using MFA blocks 99.9% of automated account takeover (ATO) attacks isn't the first of its kind.
Back in May, Google said that users who added a recovery phone number to their accounts (and indirectly enabled SMS-based MFA) were also improving their account security.
"Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation," Google said at the time.
When both Google and Microsoft are recommending the same thing, it's probably a good time to start following their advice.
========================================================================
Wave VSC 2.0 is tokenless.
========================================================================
Microsoft will let some Windows 7 customers get free security updates for an extra year
https://techcrunch.com/2019/08/26/microsoft-enterprise-windows-7-security-updates/
In four months, Windows 7 will reach end-of-life and no longer receive security updates.
That’s going to be a problem for some enterprises that still run the decade-old operating system. Starting January 14, 2020, Windows 7 computers will stop receiving security patches, leaving enterprises vulnerable to malware.
According to the latest data, some 37% of all desktop consumer and enterprise computers still run Windows 7, with Windows 10 marginally ahead at 41%.
There will be, however, some reprieve for enterprise customers with active Windows 10 subscriptions.
A little-publicized document published by Microsoft says top-tier customers with Windows E5, Microsoft 365 E5 and Government E5 subscriptions will get extended security updates for a year at no additional charge. After the year expires, Microsoft will charge each enterprise device $50 to receive updates for a second year and $100 per device for a third year.
Qualifying subscriptions must remain active until the end of the year and throughout the extended security updates period to continue to receive security updates, the document said.
But for everyone else on other Windows subscription plans, Microsoft will begin charging from the moment Windows 7 falls out of support in January, with a final cut-off for extended security updates in January 2023.
The software and services giant began warning users in March that they would soon stop receiving critical and necessary security updates. Microsoft recommends users upgrade to Windows 10, or obtain extended security updates as a “last resort.”
News of the security update extension was first reported by Computerworld.
========================================================================
It could still be very economical and secure to use Windows 7 and extend past January 2020 by using Wave VSC 2.0 and Wave Solutions given the final deadline for support of Windows 7 is January 2023. For those who really can't upgrade to Windows 10 now, using Wave VSC 2.0 and Wave Solutions with Windows 7 could provide much needed protection. Having SEDs to protect against ransomware and lost laptops could also offer more protection with Wave SED management!! The links below show some of the strong and key benefits to these solutions!!
========================================================================
http://wavesys.com/products/wave-virtual-smart-card
http://wavesys.com/products/wave-self-encrypting-drive-management
========================================================================
Please see the links below for more information on Wave Solutions!!! Better security at less than half the cost!!!
http://wavesys.com/
http://wavesys.com/contact-information
Fortnite Hack Warning Issued For 250 Million Players
https://www.forbes.com/sites/daveywinder/2019/08/22/fortnite-hack-warning-issued-for-250-million-players/#1e8203019ffd
With 250 million registered gamers, Fortnite is nothing short of a global gaming phenomenon. It's also a prime target for criminals looking to profit on the competitive nature of Fortnite players. The latest security warning to be issued concerns one malicious Fortnite hack that promises to help you win but goes on to deliver data loss instead.
What is known about this malicious Fortnite hack?
Researchers at cloud security specialists Cyren have uncovered a Fortnite gaming hack, supposedly an aimbot cheat tool to give players an edge when disposing of opponents, that is really ransomware in disguise. Known as "Syrk" and with a filename of "SydneyFortniteHacks.exe,” the real aim of this hack is to cheat you out of your money.
Describing the ransomware, Maharlito Aquino and Kervin Alintanahin from Cyren warned that "we expect it to possibly be distributed via an upload to a sharing site and the link posted in Fortnite users in forums."
The deception of the cybercriminals behind Syrk doesn't end with disguising the malware as a game cheating hack; they have also disguised older ransomware known as Hidden-Cry as a new threat.
This, as it happens, is potentially good news. Because Hidden-Cry is already well-known and the source code for the ransomware has been widely shared online. More of why that could be a good thing in a moment, but first let's look at how Syrk works.
How does this Fortnite ransomware work?
If you download the supposed aimbot game hack, what you get is a large 12MB executable with several files embedded within. Once you run your aimbot download it will start to do a number of things, none of them welcome. These include connecting to a command-and-control server and using a Windows registry tweak to disable Windows Defender and User Access Control. Some Windows resources that could stymie Syrk progress are monitored closely, including the Task Manager.
Then things get nasty, with Syrk setting off on a mission to encrypt files including images, videos, documents, music and archives. If successful, all file types are encrypted and given a .syrk file extension.
A message is displayed to the victim demanding an unspecified ransom is paid and an email contact given to get instructions on how to do this. That warning states that if the payment isn't made before the displayed two-hour countdown timer reaches zero, then files in the photo folder will be deleted, followed by the desktop and document folders.
Should you pay the Fortnite hack ransom?
As mentioned previously, there is some potential good news in that the source code of the Hidden-Cry ransomware behind the Syrk facade has already been widely distributed online. "We believe it is possible for victims to recover deleted files," the Cyren researchers stated, "given the simple method used to delete the files." Those researchers have also suggested two possible methods that can be used to decrypt your files without paying a ransom for the decryption password.
These include the somewhat farcical revelation that the cybercriminals have embedded the decrypting tool in the malware download itself. That file, dh35s3h8d69s3b1k.exe, can be "used to create a PowerShell script based on the shared source of the Hidden-Cry decrypter," according to Cyren.
The second method is equally facepalm-worthy: the malware drops the files containing the ransomware decryption password onto your machine. Helpfully, it also includes a file that will delete all the malicious files it installed.
How to avoid being a victim of this malicious Fortnite hack
There is a really, really simple way to mitigate the risk of downloading this, or any other, malware posing as a Fortnite hack: Do. Not. Cheat.
Fortnite security issues refuse to go away
Fortnite has been in the news, for the wrong reasons, quite a lot this year already. You may have read about how users of one cracking forum managed to hack a rival cracking group and publish a database of more than 350,000 messages online earlier this month, for example. Amongst the messages exposed were several discussing the sale of "freshly cracked Fortnite accounts with skins," as well as advice for changing the email of those cracked accounts.
Also earlier in August, it was reported that malware called Baldr was distributed in Fortnite cheat hacks that were linked to in YouTube gaming videos. Baldr is a gaming site login credential stealer that is just as happy as stealing your credit card data.
On July 25, the infamous Fortnite player and Twitch streamer known as Ninja had his Instagram account with 14.1 million followers compromised. An image was posted promoting a "1000s of iPhone Xs" scam. The account was recovered very quickly, however, but it serves as a reminder to the value of the big names in gaming to the criminal fraternity.
========================================================================
Maybe the TPM should be mass adopted in the 'consumer' first?! Enable Trusted Computing #2 - known software on devices. This would help with the ransomware in this article and level the playing field for non-cheaters. Wave/TPM could help gravitate the players to a fair system of playing and stop the problems of ransomware!!
========================================================================
A message from BigWave
The shareholders provided a very good livelihood for Michael and Steven Sprague for many years. They know SO MUCH, have many great ideas, and are very creative! Along with Bill Solms, I believe they are the linchpins (if available) for ESW/Wave to be very, very successful. Yes, they didn’t earn a profit while they were at Wave, but the market wasn’t totally saturated with TPMs like it is now. I believe they would be VERY HELPFUL to ESW/Wave and to shareholders as they pursue a Tsunami of success!!!