Endpoint Protector Appliance: Stop data theft on Windows and Mac

First USB 3.0 Storage Devices

September 23rd, 2009 by Agent Smith (0) endpoint security,In the News,In The Spotlight

Were you bored of or unhappy with your common, old and no-longer-cool USB 2.o portable toys? It’s time to enjoy the freshness of a new device once more! The USB 3.o HDD devices have been launched and apparently are fully functional. LucidPort Technologies is currently showcasing its SuperSpeed USB 3.0 storage devices at the Intel Developers Forum (September 22nd to 24th). And you’ll soon be able to get them for yourself. Soon means in this case sometime this year.

Here’s a description of the devices from StorageNewsletter.com:

Designed with LucidPort’s USB300 USB 3.0 to SATA bridge chip, these SuperSpeed USB drives can transfer up to 250 Mbytes/sec. Existing USB 2.0 drives run between 25 to 35 Mbytes/sec. These drives are fully backwards compatible to legacy USB 2.0/1.1 hosts and can operate with the standard USB mass storage drivers found in Windows, MacOS, and Linux PCs today.

In short, 10 times the performance of an USB 2.0 device. Impressive indeed. Now let’s see how many USB 3.0 flash drives get lost and what new breaches they lead to :) Yes, very optimistic of yours truly, Agent Smith, to say that :)

New US healthcare rules criticized by encryption experts

September 21st, 2009 by Agent Smith (1) Laws & Standards

The data breach rules that become effective on September 23rd have been harshly criticized by a security firm specializing in encryption. According to the Health Information Technology for Economic and Clinical Health (HITECH) Act, US health organization using encryption will no longer be required to    notify their clients of data breaches, regardless of how ineffective the encryption system is.

According to the act, only healthcare providers and plans that have implemented the HIPAA standards but fail to encrypt the sensitive data they keep on their clients will have to let individuals know their private details have been breached. Even in such a case, explains The Register, it will be up to each organization to decide if there is a real risk for those affected and only afterward issue data breach notices.

“The protection law should address everyone – including those who have already implemented encryption, since most encryption systems are point-to-point even when they say otherwise,” said Mark Bower, director of information protection solutions at Voltage Security.

In its present form, the HITECH Act provides a quick and often inefficient fix to make ammends with data security rules.

DuPont Insider Breach, Take #2

September 16th, 2009 by Agent Smith (0) Data Theft & Loss,Default,DLP,In the News

DuPont seems unable to stay away from malicious employees, determined to steal ans sell their secrets. Two years after an insider breach thought to have caused losses of USD 400 million, DuPont has first fired and then filed a lawsuit against a Chinese-born employee, accusing him of misappropriation of trade secrets. As explained by DarkReading, DuPont discovered the employee’s incriminating actions while reviewing his hard drive prior to transferring him to China. He had downloaded a number of proprietary files about the OLED, claims the company.

“As a science company, DuPont acts to protect our unique and confidential technologies,” a company issued statement said. “These events underscore our unwavering commitment to protect the integrity of our proprietary science and technology for the benefit of DuPont shareholders, employees and customers.”

Putting their employees behind bars and making them pay fines might be a solution. But probably not the most effective. If I may, I’d recommend some proactive data loss prevention instead :)

Website exposes sensitive data on Californian commuters

September 11th, 2009 by Agent Smith (2) Identity Theft,In The Spotlight

Military personnel included in exposed group of carpooling employees

A website built to help commuters carpool to work is exposing sensitive information of workers for hundreds of employers in Southern California, including at least one military installation. The reason for the data breach was caused by programming errors in the website code.

The bugs, discovered on the RideMatch.info website enable hackers to easily access personal information such as names, home addresses, phone numbers, the times they commute to and from work, and in some cases employee numbers. According to a recent article published by The Register, the SQL injection vulnerability was still active 2 days ago, although it has been discovered two weeks before and reported to a developer who runs the website.

The issue has been discovered and reported bu Kristian Hermansen, a security researcher. Upon receiving a form to fill in by his employer, apparently a legal requirement for all employees, he investigated the website where the information was to be posted.

Endpoint Security and Device Control Solutions with low TCO and great ROI.

RideMatch.info is a joint project developed by transit authorities in five regional governments in Southern California. Each individual using the website enters work and home addresses and the time they leave from each. Based on the data, the website then teams them with others who live and work nearby and commute at similar times, thus providing an effective carpool matchmaking services. Too bad the same range of data can be accessed by any hacker willing to exploit the vulnerability!

IDC: Most Insider Leaks are Accidents

September 3rd, 2009 by Agent Smith (1) In The Spotlight,Research and Studies,security breach

When it comes to security breaches leading to data loss, accidents caused by insiders are more frequent and generally do more damage than those caused by insiders with malicious intents, shoes a new study published by industry research firm IDC industry research firm and sponsored bu RSA.

According to a report, 52 % of respondents characterized their insider threat incidents as predominantly accidental, while only 19% believed the threats were deliberate. Another 26 % said their insider issues were an equal combination of accidental and malicious threats.

“One of the things that jumped out at us from the study was how many insider incidents are unintentional,” says Chris Young, senior vice president of RSA products, quoted by Dark Reading. “These are individual actors who often are just trying to do their jobs and don’t understand that what they are doing is dangerous.” Read more