WebProNews

Tag: Symantec

  • Satya Nadella Replacing John Thomson as Microsoft Board Chairman

    Satya Nadella Replacing John Thomson as Microsoft Board Chairman

    Satya Nadella is replacing John Thompson as chairman of Microsoft’s board, in addition to his role as CEO.

    John Thompson is the former CEO of Symantec, and joined Microsoft’s board in 2012. He initially held the role of lead independent director, from 2012 to 2014, when he became chairman.

    The board has now voted to make Nadella chairman, while Thompson will return to being lead independent director. The move is no doubt an acknowledgement of Nadella’s role in making Microsoft the powerhouse it is today.

    During his tenure, Microsoft has pivoted, from focusing on its operating system and office software, to a heavy emphasis on cloud computing, coming in only behind AWS in the market. The company has also focused on making its software and products run on all major platforms, rather than excluding others in favor of Windows.

    The board is clearly happy with the job Nadella is doing, and wants him to have an even larger role in strategic decision-making.

    In this role, Nadella will lead the work to set the agenda for the board, leveraging his deep understanding of the business to elevate the right strategic opportunities and identify key risks and mitigation approaches for the board’s review. As lead independent director, Thompson will retain significant authority including providing input on behalf of the independent directors on board agendas, calling meetings of the independent directors, setting agendas for executive sessions, and leading performance evaluations of the CEO.

  • Cloud Company CloudFlare Acquires Browser Company S2 Systems

    Cloud Company CloudFlare Acquires Browser Company S2 Systems

    BizJournal is reporting that CloudFlare, after recently raising $525 million in its IPO, has purchased S2 Systems.

    CloudFlare is a web infrastructure and security company and “is one of the world’s largest networks.” The CloudFlare service “protects websites from all manner of attacks, while simultaneously optimizing performance.” CloudFlare allows websites to scale with demand and ensures high performance with data centers in 200 cities around the world.

    S2 creates browser isolation technology. This is a relatively new approach to browser security “that allows customers to launch browser code in the cloud rather than users’ devices. This technology is designed to be more secure.” As a result, if there is malicious code, the customer’s computers are insulated from the potential attack.

    The purchase is a logical addition to CloudFlare’s suite of security tools, and the company had been looking for some time at adding the capability. According to BizJournal, the company had approached a number of startups, as well as Symantec, to explore different options. S2 was the only one that the right blend of performance and security.

    “They have a similar culture and outlook as us. We have an engineering-driven culture where we like to tackle big hard tasks. I think that resonated with S2. We also are interested in making the Internet more accessible to the other half of the world who does not have it. This is part of our larger vision that we share,” CEO Matthew Prince told BizJournal’s Dawn Kawamoto.

    In spite of this acquisition, Prince said the company does not plan to go on a purchasing spree, preferring home-grown solutions.

  • Microsoft Azure Wins Big, Lands Deal With Cybersecurity Firm Symantec

    Cybersecurity expert Symantec is looking to cut down on its data center costs by moving some of its workload to Microsoft Azure. The deal between the two companies, which was revealed on Monday, would see Symantec delivering its Norton product line to its customers from Azure.

    Microsoft announced that Symantec has already moved “105 critical consumer digital safety capabilities” to its data centers to provide support for services like advanced threat protection, reputation scoring, and security telemetry. The security firm is also utilizing Azure to keep track of its financial, security and operational metrics.

    However, this extensive cloud migration will take time and extensive planning before it’s finalized. Moving the selected apps and data to Microsoft’s cloud servers will take about 18 months from its commencement last year to its expected completion on March 2018.

    This isn’t the first time that Microsoft and Symantec have worked together though. But this latest collaboration comes on the heels of Symantec’s view to adopt hybrid cloud policies to enhance performance and agility while lowering their operating costs.

    Sheila Jordan, Symantec’s CIO and senior vice president, said that the cloud is crucial in their strategy to streamline operations, accelerate innovation and protect and empower their customers. She also added that Microsoft has been a reliable partner in ensuring their strategy’s success.

    The Mountain View-based security software company’s decision to have Microsoft’s cloud facilities host its line of consumer security products is not only a major win for Azure but also a clear affirmation of the company’s data security capacities.

    Symantec’s current plans will undoubtedly assist Microsoft and its partners to sell the cloud to large enterprises. A lot of companies are still laboring under the assumption that the cloud is less secure than in-house data centers. But having two major enterprises like Microsoft and Symantec standardizing their workloads on Azure would give other businesses the confidence to shift their own data and software over to the cloud.

    Image result for microsoft azure

    Public cloud facilities like Azure or Amazon Web Services are composed of a large set of computer servers, networking apparatus and storage systems which are rented out to companies that do not want to run or expand their data centers. This is particularly useful to businesses with uneven workloads.

    A lot of big companies, like Salesforce and Infor have already taken advantage of the cloud’s capabilities for about two years now. Hopefully, many more companies will follow them into the cloud.

    [Featured image via Microsoft]

  • Email Spam Rate Lowest In Over A Decade

    Email spam levels have reached a twelve-year low according to research from Symantec.

    The company released its June Intelligence Report looking at targeted attacks and phishing, vulnerabilities, malware, mobile and social media, and of course spam.

    “There is good news this month on the email-based front of the threat landscape,” it says. “According to our metrics, the overall spam rate has dropped to 49.7 percent. This is the first time this rate has fallen below 50 percent of email for over a decade. The last time Symantec recorded a similar spam rate was clear back in September of 2003.”

    Screen shot 2015-07-17 at 4.50.18 PM

    The mining sector had the highest spam rate at over 56%.

    Screen shot 2015-07-17 at 4.51.00 PM

    All organization sizes had around a 52-53% spam rate according to the study, but those with 251-500 employees had the highest rate at 53.2%.

    “Phishing rates and email-based malware were also down this month,” the summary says. “However, there were 57.6 million new malware variants created in June, up from 44.5 million pieces of malware created in May and 29.2 million in April. This increase in activity lends more evidence to the idea that, with the continued drops in email-based malicious activity, attackers are simply moving to other areas of the threat landscape”

    You can find the full report here.

    Images via Wikimedia Commons, Symnatec

  • Software Revenue Rose 4.8% Last Year

    Software Revenue Rose 4.8% Last Year

    The PC market is in a funk, with PC manufacturers scrambling to find a way to make desktop and notebook PCs relevant within the new reality of mobile tablets and smartphones. That doesn’t mean, however, that the software companies providing the applications for the PC market are headed the same way. As businesses and consumers push forward with their already-capable PCs, software sales are still growing.

    Market research firm Gartner today released a new report showing that global software revenue hit $407.3 billion during 2013. This is up 4.8% from the $388.5 billion the industry earned during 2012.

    Though it is clear that the software industry is enduring the hardware shift of the past few years, software itself is also undergoing a major transition. According to Gartner this shift involves companies that are both supporting existing traditional software infrastructures while rolling out new cloud-based solutions and pioneering other subscription-based services. Even many of those PC hardware companies that are struggling to hold back the rising tide of mobile devices are re-configuring their business models to rely more on enterprise software and security services.

    “The software market has been changing shape over the past five years, and cloud is driving the bulk of this change as software vendors acquire and provide applications and infrastructure technology to support the cloud and the internet of things (IoT) movement,” said Joanne Correia, research VP at Gartner. “A clear indicator of this is that for the first time we have a pure cloud vendor in the top 10.”

    The cloud vendor Correia referenced is Salesforce.com, a customer relationship management (CRM) company that provides businesses with cloud-based CRM solutions. Salesforce ranks tenth on Gartner’s list of the top ten software vendors of 2013 ranked by revenue. The company saw its revenues increase by over 33% year-over-year in 2013, up to $3.8 billion.

    The list is led by the perennial heavyweight of the software business, Microsoft, which grew software revenue 6% to hit $65.7 billion in 2013. They are led by Oracle ($29.6 billion), IBM ($29.1%), SAP ($18.5 billion), and Symantec ($6.4 billion). Another heavily cloud-based business, VMware, rose to eighth place on Gartner’s list by increasing revenue 14.1% to $4.8 billion in 2013.

  • Facebook Accused Of Killing Google+ Traffic With Faulty Security Alerts [UPDATED]

    UPDATE: I’ve received a response from Facebook, who says that “unfortunately, this was indeed a glitch in our spam prevention system.”

    We integrate with many different external blacklists including Norton and when there’s a block on their service we provide a warning to our users. We only use our external blacklist system to protect our users and would never use it to reduce traffic for competitive reasons.

    ORIGINAL ARTICLE: Is Facebook purposefully scaring users with questionable security alerts in order to cut traffic to Google+?

    That’s the story coming from some Google+ users. They claim that when clicked, certain links to Google+ that appear on Facebook are displaying a frightening warning message to its users – “Security Alert: This Link May Not Be Safe.”

    And the warning comes courtesy of Symantec.

    Elgan Media’s Mike Elgan shared this to Google+ early this morning:

    Mike Elgan

    Facebook resorting to ever more dirty tricks against Google+.

    Facebook has taken its cheating to a new low. 

    As you know, I auto-post Google+ posts to Facebook. The link brings my Facebook followers back to Google+ for the pictures and comments and for the complete post. 

    But now, when they click on the link, my followers get a scary "Security Alert: This Link May Not Be Safe" warning.  

    As far as I can tell, Facebook is lying. Flat-out lying as a dirty trick to reduce traffic to Google+. I can't think of any other explanation. 

    And they're apparently paying Symantec to take the blame for the lie. 

    Both companies know that a link to Google+ is perfectly safe. There are no banner ads and no way for malicious code to be downloaded from Google+. There has never, to the best of my knowledge, been a malware event originating from a Google+ link. 

    Even after you click "Ignore this warning," every single link is flagged in the same way, with no "learning" or option to accept all links from the site. 

    I wonder what +Robert Scoble thinks of this.

    Props to +Roberto Acevedo III for pointing this out to me. 

    A few hours later, Elgan posted an update that said “Facebook is no longer putting up a ‘Security Alert’ for Google+ links. I guess they didn’t like the bad publicity. Let’s hear it for the power of the ‘What’s Hot’ list!!”

    Some commenters continued to report that they were still getting the message, albeit with the stuff from Norton removed.

    I don’t get a Norton warning, but I get a security alert. I guess Norton busted Facebooks balls for exploiting their name, and now they changed it to the following:

    “Please be careful
    For the safety and privacy of your Facebook account, remember to never enter your password unless you’re on the real Facebook web site. Also be sure to only download software from sites you trust. To learn more about staying safe on the internet, visit Facebook’s Security Page. Please also read the Wikipedia articles on malware and phishing.”

    Others said that the problem is hardly new:

    Bubble bursting… this has been happening for many many months… the alerts for some people will show and then stop…. you are not special +Mike Elgan I have posted about this a few times (with screenshots) over the last few months.

    As far as I can tell it is triggered when there is a certain amount and kind of activity along with content topics… gasp! Yes, topics… FB does censor! OMG! What a thought! No, it cannot be! Anyway…. this is LAME that this is on whats hot as it has, as I stated, been happening on and off since the early days of G+… Many others have posted about it as well many times over the past year of G+’s life.

    In April, Facebook announced a deal with a few security companies – Symantec’s Norton Antivirus being one of them. The deal now allows users to download free trial periods of their software, and it also gave Facebook access to their data on malicious sites.

    FYI, if you run Norton’s Safe Web Check on Google+, it comes up clean.

    I’ve reached out to Facebook for comment and will update this article accordingly.

  • Symantec Confirms Norton Antivirus Source Code Leak

    Symantec has confirmed the authenticity of a segment of Norton AntiVirus 2006 source code leaked to the internet last week. The stolen code was leaked to The Pirate Bay as a part of retaliatory attacks by hackers affiliated with the Anonymous movement, following the arrest and indictment of several suspected hackers on Tuesday. The leak also coincided with the first celebration of Anonymous’s traditional “Fuck FBI Friday” attacks since the arrests.

    In a statement Friday evening, Symantec confirmed the code’s authenticity, but denied that the leak comprised any sort of security risk. “As we have already stated publicly, our analysis shows that due to the age of the exposed code and the fact that it is only a small subset of the complete code, Symantec antivirus or endpoint security consumer and business customers – including anyone running Norton products – should not be in any increased danger of cyber attacks resulting from this incident,” asserts the company’s blog.

    The digital security company also anticipates the release of additional code segments that it suspects Anonymous already possesses, including yet unreleased code for Norton Internet Security 2006. Other portions of code for Norton Utilities, pcAnywhere, and Norton Antivirus, have already been leaked online.

    Symantec concluded its confirmation of the leaks by again reiterating that consumers running up-to-date versions of Norton AntiVirus should have nothing to worry about. “Again, the code that has been exposed is so old that current out-of-the-box security settings will suffice against any possible threats that might materialize as a result of this incident,” claims the company.

    Stolen portions of Norton AntiVirus source code were the focus of an extortion attempt of Symantec in January.

    Also included in last week’s Anonymous hacks were police supplier New York Iron Works, the Australian Justice Department, Spanish infosec company Panda Security and the Vatican website.

  • Anonymous Releases Symantec Code From 2006, Deface Web Sites

    Anonymous continues its promise of attacking a new Web site every Friday as part of its “Fuck FBI Friday” campaign. The victims this week are New York City Ironworks, Symantec, which should be familiar to anyone who follows the exploits of Anonymous, and the Australian Department of Justice.

    The AnonymousIRC Twitter account let it be known yesterday that the group had taken down the Web site for New York Iron Works. What had this company done to incur the wrath of Anonymous? They supply the police of New York City with the equipment they use. While the defacement is no longer on the main page, the Google cache is still holding on to it. It’s similar to the church attacks last week, but this is in response to the Anonymous arrests made last week due to Sabu betraying LulzSec.

    This isn’t the first time Anonymous has retaliated for the arrests of LulzSec members. They took down Panda Security’s Web sites the day after the arrests for their hand in assisting the FBI with the arrests.

    As always, the text explaining the defacement is informative and entertaining:

    (once again)
    LOVE TO LULZSEC / ANTISEC FALLEN FRIENDS
    THOSE WHO TRULY BELIEVED WE COULD MAKE A DIFFERENCE
    LOVE TO THOSE BUSTED ANONS, FRIENDS WHO ARE FIGHTING FOR THEIR OWN FREEDOM NOW
    LOVE TO THOSE WHO FIGHTED FOR THEIR FREEDOM IN TUNISIA, EGYPT, LIBYA
    SYRIA, BAHRAIN, YEMEN, IRAN, ETC AND ETC AND ETC
    LOVE TO THOSE WHO FIGHTED FOR FREEDOM OF SPEECH, FOR A REAL DEMOCRACY,
    FOR A GOVT FREE OF CORRUPTION,
    FOR A FREE WORLD WHERE WE ARE ABLE TO SHARE OUR KNOWLEDGE FREELY

    LOVE TO THOSE WHO FIGHT FOR SOMETHING THEY BELIEVE IN

    WE ARE ANTISEC
    WE ARE THE NEW AND THE OLD LULZSEC GUARD
    WE ARE THE NEW SHADOW GUERRILLA

    WE ARE THE KNIGHTS OF THE LULZ
    WE LL FIGHT TILL THE END

    TO FBI AND OTHER SHITS
    YOU HAVE OUR LOGS, WE HAVE ALL THOSE PMs AND PRIVATE CHATs U DONT WANT TO MAKE PUBLIC
    YOU REALLY FUCKED IT UP TRYING TO TRAP PEOPLE

    ALL YOUR BASE ARE BELONG TO US

    hello friends!
    As the events are unfolding they are changing the fundamental of history as we know it. But dont be mistaken for, We will fight any individual, organization, corporation, and/or government that hinder our movement. While some of our methods may seem unjust we believe that the action taken is needed. We are fighting the very institutions those are supposed to protect us. Fueled by money and power… the true nature of the government is at best: weak.

    To our fallen brothers Your work has not been forgotten, your skills and teachings has spawn another generation of an elite squander. Like the knights at the round table, we have shared may common interests but let us not forget the game we play. AntiSec is still alive and well. We refuse to let some cheesecake ass player hater snitch divert us from our path in life.. a leader? at best a lame-facebook-user-gangsta-wannabe asshole blogger.. Our numbers are many and our skills are eminence… Jeremy, your presence will always live in our hearts..

    > i lol’d at the lame-fb shit..
    > XD

    The tweet and the defacement call for the release of Jeremy Hammond, one of the hackers arrested last week as part of the FBI sting targeting members of LulzSec.

    This was not the only attack, however, as Anonymous also leaked the source code from Symantec’s Norton Antivirus 2006 onto The Pirate Bay Thursday evening according to a Twitter user by the name of @AnonymouStun.

    Symantec responded to the leak on The Inquirer saying that the source code was from the 2006 edition of Norton AntiVirus and that current users are not at risk.

    @AnonymouStun refutes this by saying that Symantec has been using the same source code since and that it’s even being used in the most recent edition of the software.

    In what may be the final attack to conclude today’s Fuck FBI Friday, Anonymous has also taken down the Web site for the Australian Justice Department and defaced it with a giant ASCII Anonymous logo. Wikileaks, who has quite the history with Anonymous, says the defacement is a response to “Australian government failure to support Australians overseas.”

    If you’re confused, they mean Julian Assange, founder of Wikileaks. He’s an Australian-born citizen fighting extradition to Sweden in the UK courts with a decision to be made regarding said extradition in the near future.

    This may be the end of today’s FFF operations, but they will continue until Anonymous feels they’ve had enough. We’ll keep you updated on any more attacks should they happen today.

  • Microsoft Adds Tenth Member to Board

    Microsoft Corp. today announced that John W. Thompson, chief executive officer of privately held Virtual Instruments and former chairman and CEO of Symantec Corp., was appointed to the company’s board of directors, returning the board’s size to 10 members.

    Thompson currently serves as CEO of Virtual Instruments, a privately held company located in San Jose, Calif., whose products are designed to ensure the performance and availability of applications deployed in virtualized and private cloud computing environments. Since 2009, Thompson has been an active investor in early-stage technology companies in Silicon Valley.

    Thompson served as chairman and CEO of Symantec Corp., helping transform Symantec into a leader in security, storage and systems management solutions. During his 10-year tenure as CEO from 1999 to 2009, Symantec’s revenues grew from $632 million to $6.2 billion, and its worldwide workforce grew to more than 17,500 employees. Thompson stepped down as CEO of Symantec in 2009, and stepped down from Symantec’s board of directors in 2011.

    Previously, Thompson held a number of leadership positions at IBM, including sales, marketing, software development and general manager of IBM Americas. He was a member of IBM’s Worldwide Management Council.

    Thompson currently serves on the board of United Parcel Service, and he has served on a number of government boards and commissions, including the Financial Crisis Inquiry Commission, the National Infrastructure Advisory Committee, and the Silicon Valley Blue Ribbon Task Force on Aviation Security and Technology. He formerly served on the national board of Teach for America, an organization dedicated to eliminating educational inequities for all children.

  • Symantec Confirms Extortion Attempt

    Symantec Confirms Extortion Attempt

    Hackers using the Twitter Handle @YamaTouigh have been tweeting about Symantec and its Norton antivirus product throughout January claiming that they will be releasing the source codes for the security product. Earlier this week Symantec confirmed that they have been the victims of an attempted extortion by @YamaTough, who claims to be affiliated with the ‘anonymous’ group.

    A Symantec representative commented on the attempt:

    In January an individual claiming to be part of the ‘Anonymous’ group attempted to extort a payment from Symantec in exchange for not publicly posting stolen Symantec source code they claimed to have in their possession. Symantec conducted an internal investigation into this incident and also contacted law enforcement given the attempted extortion and apparent theft of intellectual property. The communications with the person(s) attempting to extort the payment from Symantec were part of the law enforcement investigation. Given that the investigation is still ongoing, we are not going to disclose the law enforcement agencies involved and have no additional information to provide”.

    Here are some segments from the impatient ‘Anonymous’ @YamaTough hacker as he negotiates the $50,000 demanded payment from a Symantec employee:

    “If you are trying to trace with the ftp trick it’s just worthless. If we detect any malevolent tracing action we cancel the deal. Is that clear? You’ve got the doc files and pathes [sic] to the files. what’s the problem? Explain.”

    “If we dont hear from you in 30m we make an official announcement and put your code on sale at auction terms. We have many people who are willing to get your code. Dont f*** with us.”

    Apparently, the Hackers were on to Symantec for contacting higher authorities but never the less continued in their negotiations until they finally cut contact with the Symantec employee who claimed they needed more time:

    “Since no code yet being released and our email communication wasnt also released we give you 10 minutes to decide which way you go after that two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size (rar) 10 minutes if no reply from you we consider it a START this time we’ve made mirrors so it will be hard for you to get rid of it.”

    Symantec insists that users of their products are not under any significantly higher risk of attack due to the theft however; Symantec asked its PCAnywhere users to disable the product until the company could issue a software update. They assure clients that this will protect them against attacks resulting from the theft of the source code.

  • Anonymous’ Celebration Over pcAnywhere Shortlived?

    Anonymous’ Celebration Over pcAnywhere Shortlived?

    Last week, Symantec Corp. issued an announcement that all users of their pcAnywhere software should disable it until further notice. An Indian hacker affiliated with Anonymous going by the handle YamaTough had released the source code to Symantec’s Norton Utilities PC software, and the software company foresaw a risk to all users of pcAnywhere.

    The release of the source code had been trumpeted by Anonymous on January 4.

    Upon news of Symantec’s announcement, Anonymous did a victory dance on Twitter.

    With middle-finger flourish, Symantec responded that Anonymous had not stolen their code. But, they did recognize that it was in the hands of Anonymous now.

    Yesterday, Symantec announced a patch and free upgrade to all pcAnywhere customers, even those not normally eligible for an upgrade. This move effectively renders Anonymous’ possession of its code a moot point.

    So, what is the purpose of grabbing and releasing code for a product when a quick patch release prevents its use? To make Symantec dance in public for a couple of days?

    There has been a lawsuit filed against Symantec, alleging that the company scares people into buying its software by making misleading claims about the health of their computers. The lawsuit is filed by private parties, not affiliated with Anonymous.

    We would love to hear from Anonymous about what purpose their actions serve. Is there something inherently evil about Symantec that they wish to highlight? About the (bloated) Norton Utilities software? Is it related to the lawsuit? What public statement does this make? If Symantec ends up being seen by the public as victims of unscrupulous hackers (as opposed to being seen as bumbling in its own security), does that mean the move backfired?

    In contrast with all the laudable moves Anonymous has made in the past year or so (e.g. support of activists in Tahrir, support of Wikileaks, support of the #Occupy movement), why should the general public not see this as a mean-spirited adolescent prank?

  • pcAnywhere Compromised: Disable Immediately!

    pcAnywhere Compromised: Disable Immediately!

    On January 4, Anonymous tweeted that an Indian hacker group had posted Symantec source code to Pastebin.

    In response to this warning, Symantec has issued a security white paper (pdf) recommending that all users of pcAnyhwere disable the software until further notice.

    “Upon investigation of the claims made by Anonymous regarding source code disclosure, Symantec believes that the disclosure was the result of a theft of source code that occurred in 2006. We believe that source code for the 2006-era versions of the following products was exposed: Norton Antivirus Corporate Edition; Norton Internet Security; Norton SystemWorks (Norton Utilities and Norton GoBack); and pcAnywhere.”

    pcAnywhere is a Norton product that allows for direct PC to PC communication.If the ctolen source code is actually released, the damage to networks that use pcAnywhere could be considerable.

    More detailed information from the white paper:

    Our current analysis shows that all pcAnywhere 12.0, 12.1 and 12.5 customers are at increased risk, as well as customers with prior, unsupported versions of the product. pcAnywhere is also bundled in three Symantec products, Altiris Client Management Suite and Altiris IT Management Suite versions 7.0 or later, and Altiris Deployment Solution with Remote v7.1. In addition, customers with earlier versions of Altiris suites may have opted to leverage pcAnywhere. The increased risk is isolated to the pcAnywhere components only. There are no known impacts to the rest of the components in the Altiris products or the pcAnywhere Solution component that provides integration between pcAnywhere and the Symantec Management Console. Customers should validate the remote control tools currently in use.

    There are also secondary risks associated with this situation. If the malicious user obtains the cryptographic key they have the capability to launch unauthorized remote control sessions. This in turn allows them access to systems and sensitive data. If the cryptographic key itself is using Active Directory credentials, it is also possible for them to perpetrate other malicious activities on the network.

    In an internal pcAnywhere environment, if a network sniffer was in place on a customer’s internal network and the attacker had access to the encryption details, the pcAnywhere traffic could be intercepted and decoded. This implies that a customer either has a malicious insider who planted the network sniffer or has an unknown Botnet operating in their environment. As always, security best practices are encouraged to mitigate this risk.

    Since pcAnywhere exchanges user login credentials, the risk exists that a network sniffer or Botnet could intercept this exchange of information but even then it would be a difficult task to actually interpret the data even if the pcAnywhere source code is actually released. For environments with remote users, this credential exchange introduces an additional level of exposure to external attacks.

  • Symantec Acquires LiveOffice

    Symantec Acquires LiveOffice

    Symantec announced that it has acquired cloud-based archiving service LiveOffice for $115 million to extend a new ” intelligent information governance solution” to the cloud.

    The solution, Symantec says, will enable organizations to “bridge the gap between business, legal and IT, reduce their risks and costs, and empower employees to work freely in a connected world.”

    Customers will be able to choose between on-premise, cloud or hybrid delivery of such a solution. The company says that through the existing integrations between LiveOffice and the recently acquired Clearwell eDiscovery Platform, customers can export info from LiveOffice to the platform where it is collected along with info from Enterprise Vault and other data sources.

    Symantec says the acquisition will also lead to tighter integration between archiving and Symantec.cloud’s email security and management features.

    “What were once disparate issues — information management, eDiscovery, and data security — are rapidly coming together due to the explosion of electronically stored information and the on-premise and cloud-based technologies that deliver and disseminate it. Organizations are increasingly demanding that these issues be addressed in a unified way through information governance,” stated Brian Dye, VP, Information Intelligence Group at Symantec. “As a market leader for storage, eDiscovery and security, Symantec continues to enhance its offerings and deepen its commitment to provide the most comprehensive intelligent information governance solutions.”

    The acquisition closed on Jan. 13.

  • Hacker “Yama Tough” To Release Norton Antivirus Source Code?

    A Hacker that goes by “Yama Tough” has been tweeting bout Symantec and its Norton antivirus product. YamaTough said on Twitter that he (or she) plans to release the full source code of the product on Tuesday.

    This comming tuesday behold the full Norton Antivirus 1,7Gb src, the rest will follow… 1 day ago via web · powered by @socialditto

    Yama Tough has been tweeting about Norton and Symantec throughout the month. Here are some earlier tweets leading up to this one:

    @SgtSecondary Brother spread the word about Symantec SRC busted !!! https://t.co/2EB2oXtJ 12 days ago via web · powered by @socialditto

    Symantec NAV source code busted
    https://t.co/2EB2oXtJ 12 days ago via web · powered by @socialditto

    @Symantecjobfeed you guys r in trouble http://t.co/HGKXIuLU Symantec source code owneed like shit 12 days ago via web · powered by @socialditto

    @Trutherton Let Symantec comment on this one: Full Norton AV src Package complete file list http://t.co/TK0G9hnO 11 days ago via web · powered by @socialditto

    @YourAnonNews Brothers! Our accounts and mirrors are being locked, please retweet our new Symantec source code owneed http://t.co/S1AAimpU 11 days ago via web · powered by @socialditto

    @YourAnonNews right after that the Symantec Owneed pastebin vanished, and many other bins of Anonymous, it’s a government sponsored attack 11 days ago via web · powered by @socialditto

    Since pastebin is down we g+ updates go 4 it https://t.co/TMjvbvwt 10 days ago via web · powered by @socialditto

    The Inquirer shares the following statement on the matter from Symantec:

    “The code for Norton Utilities that was posted publicly is related to the 2006 version of Norton Utilities only. That version of the product is no longer sold or supported. The current version of Norton Utilities has been completely rebuilt and shares no common code with Norton Utilities 2006. The code that has been posted for the 2006 version poses no security threat to users of the current version of Norton Utilities.”

    “Furthermore, we have no indications that the code disclosure impacts the functionality or security of any of Symantec’s other solutions. Lastly, there are no indications that customer information has been impacted or exposed at this time. As always, in general, Symantec recommends that users keep their solutions updated which will help ensure protection against any new possible threats.”

    I guess we’ll find out this week if the statement is accurate.

  • 100,000 Apps Enable Leakage of Facebook Profile Info, According to Symantec

    Security firm Symantec released a report indicating that there are about 100,000 Facebook apps that accidentally enable the leakage of Facebook user info to third-parties like advertisers and analytics platforms. The firm has confirmed the issue with Facebook, which it says has “taken corrective action to help eliminate the issue.”

    “Symantec has discovered that in certain cases, Facebook IFRAME applications inadvertently leaked access tokens to third parties like advertisers or analytic platforms,” says Symantec’s Nishant Doshi. “We estimate that as of April 2011, close to 100,000 applications were enabling this leakage. We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties.”

    “Access tokens are like ‘spare keys’ granted by you to the Facebook application,” Doshi explains. “Applications can use these tokens or keys to perform certain actions on behalf of the user or to access the user’s profile. Each token or ‘spare key’ is associated with a select set of permissions, like reading your wall, accessing your friend’s profile, posting to your wall, etc.”

    According to the security firm, while Facebook currently uses OAuth 2.0 for authentication by default, older schemes that are still supported and used by “hundreds of thousands” of apps are where the problem begins.

    “There is no good way to estimate how many access tokens have already been leaked since the release Facebook applications back in 2007,” says Doshi. “We fear a lot of these tokens might still be available in log files of third-party servers or still being actively used by advertisers. Concerned Facebook users can change their Facebook passwords to invalidate leaked access tokens. Changing the password invalidates these tokens and is equivalent to “changing the lock” on your Facebook profile.”

    Yesterday, Facebook issued an update to its Developer Roadmap, outlining plans requiring all sites and apps to migrate to OAuth 2.0. All apps must migrate to the format by September 1.

    Facebook and privacy concerns are certainly not strangers. Time and time again, something happens that brings concerns back into the spotlight. Last month, Facebook announced a new suite of safety tools and advanced security features.

  • Royal Wedding Brings Out the Cyber Criminals

    Cyber criminals are exploiting the world’s fascination with the British Royal Wedding, which is taking place on Friday. They’re using the attention the event is getting to bolster spam campaigns and push rogue antivirus software through black hat search tactics, according to security firm Symantec.

    “As with any major event, criminals have been quick to take advantage of the online attention,” a Symantec representative tells WebProNews.

    Among the threats is a spam email campaign, which advertises a replica of Princess Diana’s engagement ring. This has been going around since February.

    “Furthermore, as we had anticipated, we have recently observed additional spam campaigns making use of this significant event to promote various products,” said Symatec’s Suyog Sainkar. “In one such recent spam campaign, email promoting a ‘limited edition Buckingham Mint Royal Wedding Commemorative Coin’ at a discounted rate is being observed.”

    Royal Wedding Spam Email

    As noted, the threats don’t stop at email. All kinds of search terms related to Prince William, Kate Middleton, and the royal wedding are being searched for by interested Internet users. This has been quite clear, looking at Google Trends from day to day.

    Fake pages are being set up to rank for terms that people are searching for. “At one point, a search for ‘william and kate movie imdb’ returned 61 malicious links in the first 100 search results,” said Sainkar. “Fifty-eight of the first 100 results for the search term ‘princess diana death photos’ and 45 of the first 100 results for the search term ‘royal wedding guest list kanye’ also led to malicious sites.”

    Royal Wedding search spam

    Other search terms, Symantec says have been commonly turning up “poisoned links” include: “william and kate movie cast,” “prince charles age,” “princess diana death facts,” “prince harry last name,” “william and kate movie on lifetime,” “royal wedding guest list bush,” “royal wedding guest list snubs,” “prince charles siblings,” and “the royal wedding date and time”.

    “We have seen over 500 compromised sites being used in this campaign over the past few days,” said Sainkar. “Attackers create multiple fake pages on each site and use unethical SEO techniques—such as keyword stuffing, cloaking, and link farming—to “game” the search engine algorithms to achieve high search engine rankings.”

    According to a Norton survey, 62% of Americans are likely to follow the British Royal Wedding.

  • Spammers Hijack Google Brand to Push Online Pharmacy

    Google Accredited Spam

    Symantec’s MessageLabs Intelligence recently tracked a new pharmaceutical spam campaign that promotes an online pharmacy, claiming that it is "Google-accredited". 

    "This is obvious brand hijacking: Google does not host or approve any pharmacy sites," a representative for the security firm tells WebProNews. 

    "The spam message contains text promoting a drug for preventing hair loss and links to a blog set up on a popular free blogging site," she explains. "Anyone following the link will be directed to the spammer’s blog, which contains spam-related content and links to the spammer’s pharmaceutical site. An image contains the Google logo with the two ‘o’ letters replaced by differently-shaped tablets – a realistic technique given Google’s famous ‘doodles’."

    "In the last two days alone, Symantec.cloud has automatically blocked over 250 similar spam-created blogs," the rep says. "Spammers clearly want to capitalize on Google’s universally known name and increasingly diverse product range to add legitimacy to their products. This type brand hijacking is a serious problem for well-known brands which can be potentially damaging to their reputation."

    I don’t know how often people do their pharmaceutical shopping based on unsolicited email, but it’s certainly something to be aware of.

  • One Out Of Five Facebook Users May Be Exposed To Malware

    However careful you’ve been when using Facebook up until now, it may be time to grow even more cautious.  New stats from BitDefender indicate that at least one out of five Facebook users have been exposed to threats via their news feeds.

    That conclusion’s based on data from BitDefender’s Safego app, and may actually be conservative.  The data doesn’t cover whatever’s been sent through private messages, for example.  Plus, the 14,000 or so people who have downloaded the security-related app might be a little more paranoid than the average Farmville-obsessed individual, and they might have more security-conscious friends.

    Still, Caroline McCarthy was able to report yesterday, "20 percent of Facebook users are exposed to malicious posts in their ‘news feeds’ of friends’ activity, generally defined as posts that, when clicked on, result in ‘the user’s account being hijacked and in malware being automatically posted on the walls of the respective user’s friends.’"

    McCarthy later added, "Over 60 percent of attacks come from notifications from malicious third-party applications on Facebook’s developer platform."

    That’s a serious cause for concern.  No one likes getting infected by a virus, and users and advertisers might grow a little less fond of Facebook if they ever start to feel like the site is making it too easy for malware authors to attack them.

    On the other hand, these sorts of problems are difficult to escape.  Paul Wood, MessageLabs Intelligence Senior Analyst at Symantec, pointed out in an email to WebProNews, "Whatever methods of communication that mankind invents, sooner or later someone will find a way of taking advantage of the new invention and using it for illicit gain, whether this is for theft, confidence trickery or nuisance advertising."

  • Location-Based Services Too New to Know How They’ll Be Abused

    Last week, Symantec’s MessageLabs Intelligence Sr. Analyst Paul Wood shared some predictions for online threats in the coming year with us. With the increasing emergence of location-based services, we wondered what kind of threats (beyond the obvious) come with this new territory. 

    "One attack that may be predicted is for malware faking location information in order to boost ranking or prominence of the spoofed location," Wood told us. "This type of information will be of value in the reconnaissance stage prior to a targeted attack, or perhaps prior to burgling someone’s house – the robber can know the owner is elsewhere." 

    We asked Wood to elaborate this a bit. "Most attacks are conducted for profit," he says. "Therefore for a new service to be utilized as a source of attacks the methods by which the attack can be used to make money need to be clear. In the case of location sharing, it’s not clear how this information can be used to make money for the legitimate provider of the service, and equally unclear how this can be subverted by criminals for their profit, unless it’s part of a surveillance or reconnaissance process prior to an attack."

    Paul Wood Talks Security Threats in 2011"One way that location sharing may be expected to raise revenue for the provider is by offering services by which the most popular ‘X’ in location ‘Y’, according to the number of people registering their location, can be promoted," he explains. "This could be by allowing a service provider to promote themselves as the most popular ‘coffee shop’ in ‘New York’ according to location sharing. In this case, there is a motive for less popular and less scrupulous service providers to artificially boost their popularity according to location sharing by buying fake location sharing registrations from criminals who have illegal access to mobile devices or location sharing accounts."

    If it can be done, I’m sure it will be. 

    "If location sharing is used to boost rankings in any system then this gives criminals a motivation to subvert the system," he adds. "However, at the moment, location sharing is very new, it’s not clear how it will be used by the companies providing the service and so not clear how it may be abused either."

    On the topic of "boosting ranking or prominence", when asked if search engines are capable of detecting fake location sharing entries, he admits he has no idea. He also says he’s not familiar with any such instances in the past. 

    If location-based services continue to pick up steam, and Google continues its trend of delivering location-based results, I’m betting we will start go see more integration between the two (not unlike what we’ve seen with real-time search). This will be something to keep an eye on to say the least. 

    When asked if this kind of thing could occur within Facebook and/or Twitter with their respective location-based offerings, Wood says, "We cannot comment on specific services. However, humans are social creatures that always take advantage of efficient methods for indulging their hunger for communication with their friends, family and contacts."

    "My guess is that ever since the first language was invented, there have been liars and con men who have found ways to subvert the new means of communication to their own ends," he continues. "If an attacker is able to identify the individual concerned and then use public services to track them, this may be a concern – do you want everyone and anyone to know your location or the location of your mobile device at all times? This is where privacy controls come in to play – parents may wish to benefit from this technology for their children, but privacy is important when publishing this type of data – if that information were to fall into the wrong hands, the consequences could be disastrous; for example, cyber bullying and cyber stalking are already increasingly becoming a concern for many individuals."

    The United States Air Force is apparently concerned. A recent report says the Air Force has warned its troops about using location-based services for fear that they can jeopardize missions. While it’s unclear whether other branches of the military have issued similar warnings, the Army’s Chief of Strategic Communications recently told WebProNews that the Army doesn’t have many social media restrictions, as long as lives aren’t being put in danger, meaning communications don’t violate "operational security" – they don’t reveal anything involving upcoming missions. He didn’t talk specifically about location-based services, however, but they are becoming very much part of social media.

  • Threats to Expect in Mobile, Social, Location and Email in 2011

    It’s getting late in the year, and it’s about time to start looking forward to 2011. While we can speculate about a great many topics, few trends are going to be as important to anticipate as those related to security. We asked an expert in the field about some of the things he is anticipating. WebProNews interviewed Paul Wood, MessageLabs Intelligence Sr. Analyst at Symantec Hosted Services about what businesses and consumers can expect to deal with in order to stay secure over the next year. 

    Mobile Phones and Tablets

    First off, we asked what implications all of the new mobile devices and tablets coming out have on security in the coming year. "Three trends emerge," Wood tells us. "Increased mobile device processing power will mean more opportunity for malware to run on these devices. As their numbers and use increase, they become a viable target for attackers. Many brands of mobile devices will share the same chipsets and threats targeting vulnerabilities in some chipsets will emerge in 2011."

    "Increased convergence from a technology perspective means that more people than before are using mobile devices to access their email and social networking circles," he continues. "From a corporate perspective, business users will be accessing business data and services whilst on the move – often outside the boundaries of the physical corporate network – so applying the same rules to enforce acceptable usage policies, for example – will become more important."

    Paul Wood Talks Security Threats in 2011"Security protection will be required to work seamlessly across many platforms as users switch between devices and laptops used to store and transmit information online," he adds. "Businesses will look to the cloud to secure their information longer-term, irrespective of how the data is accessed. There will also be a drive for stronger cloud-based authentication and for the cloud to remove malicious threats before they reach the network or device."

    Social Media Threats

    When asked whether social networks like Facebook and Twitter will start becoming bigger security problems or less of an issue in the next year, Wood says, "Social networking will continue to be a persuasive force and will continue to be exploited as a means of running confidence tricks – social engineering attacks – and for distributing malware. The level of risk will remain unchanged from this year, but the level of sophistication involved may increase. This may manifest as phishing attacks to compromise legitimate accounts and third-party apps may be likely to continue to be a source of malware and attacks against privacy. We expect to see more fraud targeting virtual online currencies."

    Location-Based Services

    As you’re probably aware, location sharing is becoming more common thanks to capabilities in mobile phones as well as the market saturation of check-in apps. We asked Wood if threats based on the sharing of location are going to become a bigger problem. "Probably not, it’s difficult to see how to monetize attacks over the internet using location sharing," he says. "One attack that may be predicted is for malware faking location information in order to boost ranking or prominence of the spoofed location. This type of information will be of value in the reconnaissance stage prior to a targeted attack, or perhaps prior to burgling someone’s house – the robber can know the owner is elsewhere." 

    You may recall a site/Twitter account called PleaseRobMe, dedicated to illustrating that very point. 

    Email Spam 

    As far as changes over the next year with regards to email spam, Wood says, "It’s going to remain in excess of 90% of all email for most of 2011. Botnets will continue to be a major threat and a major source of spam – currently 90% of spam is sent from botnets."

    "Spam will increasingly use URL shortening links as these are legitimate domains – we may even find a legitimate shortening domain being compromised or spammers establishing their own such services, using disposable domain names and chaining them together," he predicts. "Spam will increasingly make use of the news and current affairs by consuming RSS feeds from major news aggregators and using these headlines as subjects in the messages. More spam will be sent from new economic areas, particularly East Africa as increased broadband capacity is deployed in the region."

    The One Thing Businesses Should Do

    Finally, we asked Wood if he could name one thing as the single most important step businesses should take to protect their data, what would it be?

    "Know what it is that you’re trying to protect," he answers. "Too many businesses look for magic bullets that will make security go away. The reality is that security is achieved by knowing what it is that you are trying to protect – know your assets, who has access to these assets and under what circumstances, and what are the attacks directed against the assets. By considering these issues, businesses can build coherent defences that protect their systems yet also allow employees to get on with their work."

    Symantec’s Kevin Haley has some more interesting predictions for 2011 in a new report here.

  • How Will Bit.ly Work with Twitter’s Link Wrapping?

    Besides hinting at new features and talking about user stats, Twitter also made a couple announcements this week. One is that all Twitter apps use OAuth. The other is that it will start tracking every t.co link users click. This is Twitter’s own default URL-shortener. 

    Twitter sent an email to users saying, "In the coming weeks, we will be expanding the roll-out of our link wrapping service t.co, which wraps links in Tweets with a new, simplified link… When this happens, all links shared on Twitter.com or third-party apps will be wrapped with a t.co URL."

    "When you click on these links from Twitter.com or a Twitter application, Twitter will log that click. We hope to use this data to provide better and more relevant content to you over time."

    This may be a good thing for users from a security standpoint. Symantec says that short URL spam and phishing attacks are rising sharply. "With the announcement that Twitter will be rolling-out its own short URL service, many malicious attacks through this route will be thwarted," says Amanda Grady, Senior Analyst at Symantec. "Through Twitter’s added analysis, they will be able to check if the short URL is directing users towards a site with malware and alert them in advance. This should reduce phishing attacks on Twitter accounts and prevent criminals from directing users to infected websites.

     What about other URL-shortening services? Well, Bit.ly Twitter’s old favorite, has posted an update on the matter. "Following this week’s OAuth and apps announcements, some of our users have inquired about how bit.ly will work with Twitter’s new link-wrapping service," says Bit.ly’s Matt LeMay. "Link-wrapping will enable Twitter to collect traffic data and block spam, but it will not interfere with bit.ly analytics, bit.ly Pro custom domains, or bit.ly Enterprise usage — you will be able to shorten, share and track links with bit.ly exactly as you do now."
     

    Bit.ly custom domain

    "Many of our partners are already using their bit.ly Pro short links with t.co, since all links shared via the Twitter Tweet Button have been wrapped in t.co since the button launched last month," he adds. "Link-wrapping will happen automatically and invisibly in the background."

    Bit.ly says its been working closely with Twitter and other social media platforms to continue improvements across the web.