CounterTack Partners with ManTech Cyber Solutions for a More Comprehensive Platform

August 13, 2015

A new acquisition by CounterTack brings predictive capability to that company’s security offerings, we learn from “CounterTack Acquires ManTech Cyber Solutions” at eWeek. Specifically, it is a division of ManTech International, dubbed ManTech Cyber Solutions International (MCSI), that has been snapped up under undisclosed terms by the private security firm.

CounterTack president and CEO Neal Chreighton says the beauty of the deal lies in the lack of overlap between their tech and what MCSI brings to the table; while their existing products  can tell users what is happening or  has already happened, MCSI’s can tell them what to watch out for going forward. Writer Sean Michael Kerner elaborates:

“MCSI’s technology provides a lot of predictive capabilities around malware that can help enterprises determine how dangerous a malicious payload might be, Creighton said. Organizations often use the MCSI Responder Pro product after an attack has occurred to figure out what has happened. In contrast, the MCSI Active Defense product looks at issues in real time to make predictions, he said. A big area of concern for many security vendors is the risk of false positives for security alerts. With the Digital DNA technology, CounterTack will now have a predictive capability to be able to better determine the risk with a given malicious payload. The ability to understand the potential capabilities of a piece of malware will enable organizations to properly provide a risk score for a security event. With a risk score in place, organizations can then prioritize malware events to organize resources to handle remediation, he said.”

Incorporation of the open-source Hadoop means CounterTack can scale to fit any organization, and the products can be deployed on-premises or in the cloud. Cleighton notes his company’s primary competitor is security vendor CrowdStrike; we’ll be keeping an eye on both these promising  firms.

Based in Waltham, Massachusetts, CounterTack was founded in 2007. The company declares their Sentinel platform to be the only in-progress attack intelligence and response solution on the market (for now.) Founded way back in 1968, ManTech International develops and manages solutions for cyber security, C4ISR, systems engineering, and global logistics from their headquarters in Washington, DC. Both companies are currently hiring; click here for opportunities at CounterTack, and here for ManTech’s careers page.

Cynthia Murrell, August 13, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

ZeroFox: New Products Available

August 10, 2015

ZeroFOX is a social media centric cyber security firm. The company announced several new products which enable the company to provide end to end social media cyber security solutions.

The products are:

ZeroFOX Enterprise is now powered by FoxScript. FoxScript is a customizable, javascript-based language that allows security analysts to write unique rules for ZeroFOX’s data collection and analysis engines within ZeroFOX Enterprise. FoxScript makes security teams their own greatest innovators: professionals will have a tool at their disposal to track custom security threats and address the issues that matter most to their specific organization. ZeroFOX’s FoxScript will enable security teams to address targeted employee exploitation on social networks and social engineering in particular, cited by 46% of this year’s Black Hat attendees as their greatest cyber security concern.

ZeroFOX Recon, a social media vulnerability and phishing assessment application, enables organizations to discover their social assets and test their vulnerabilities with a comprehensive assessment.

ZeroFOX Threat Feed is an easily-digestible URL feed that provides real-time visibility into global phishing and malware attacks delivered via social media. Threat Feed integrates seamlessly into existing security technology to supercharge organization’s Threat Intelligence Platforms (TIP) or SIEMs with threats from where their people are most vulnerable. Threat Feed can also be directly integrated into leading firewall, web security and email security platforms.

The announcement included two interesting items in its announcement:

  1. Facebook scams are an effective method to breach an organization’s network.
  2. Twitter is a popular attack vector used by “Russian government backed hackers.”

Why search when one can copy “interesting” digital information?

Stephen E Arnold, August 10, 2015

YouTube Consumer: Do You Want a Pet RAT?

August 10, 2015

Because information access is shifting from the dinosaur approach (human figures out a query) to the couch potatoes’ approach (just consume what a click and an algorithm deliver), I will be adding more coverage of “enhanced” search and retrieval.

Today, we do RATs.

Navigate to “Google Profits from YouTube RAT Infestation, Says Consumer Group.” The idea is that you learn how to embed remote access tools on another couch potato’s computing device. There are quite a few folks into the RAT game.

The article suggests that the GOOG profits from instructional videos which teach folks how to use RATs. According to the write up, the Digital Citizens Alliance (DCA) has

called on YouTube to stop monetizing videos that promote the use and dissemination of RATs, saying in a release that there’s “no reason” why major brands should be running adverts alongside these videos:

No company - especially one as big as Google - should make even a penny from videos that show the faces of victims and IP addresses.

The BBC reports that Adam Benson, deputy director of the DCA, said that the trade in stolen webcam footage was “troubling” and called on Google to stop relying on computer-based methods to find and remove the videos.

Intrigued? There are industrial strength tools available to build your own RAT colony. To get the details, you will have to wait until my new study “Dark Web Basics” is available.

Stephen E Arnold, August 10, 2015

A Technical Shift in Banking Security

July 23, 2015

Banks may soon transition from asking for your mother’s maiden name to tracking your physical behavior in the name of keeping you (and their assets) safe. IT ProPortal examines “Fraud Prevention: Knowledge-Based Ananlytics in Steep Decline.” Writer Lara Lackie cites a recent report from the Aite Group that indicates a shift from knowledge-based analytics to behavioral analytics for virtual security checkpoints. Apparently, “behavioral analytics” is basically biometrics without the legal implications. Lackie writes:

“Examples of behavioural analytics/biometrics can include the way someone types, holds their device or otherwise interacts with it. When combined, continuous behavioural analysis, and compiled behavioural biometric data, deliver far more intelligence than traditionally available without interrupting the user’s experience….

Julie Conroy, research director, Aite Group, said in the report “When the biometric is paired with strong device authentication, it is even more difficult to defeat. Many biometric solutions also include liveliness checks, to ensure it’s a human being on the other end.’

“NuData Security’s NuDetect online fraud engine, which uses continuous behavioural analysis and compiled behavioral biometric data, is able to predict fraud as early as 15 days before a fraud attempt is made. The early detection offered by NuDetect provides organisations the time to monitor, understand and prevent fraudulent transactions from taking place.”

The Aite report shows over half the banks surveyed plan to move away from traditional security questions over the next year, and six of the 19 institutions plan to enable mobile-banking biometrics by the end of this year. Proponents of the approach laud behavioral analytics as the height of fraud detection. Are Swype patterns and indicators of “liveliness” covered by privacy rights? That seems like a philosophical question to me.

Cynthia Murrell, July 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Another the End of Article with Some Trivial Omissions

July 19, 2015

Far be it from me to find fault with an economics essay published by the British open source, online hip newspaper The Guardian. I want to point you at “The End of Capitalism Has Begun.” Like Francis Fukuyama’s end of book, the end seems to be unwilling to arrive. Note: if you find that the article has disappeared online, you may have to sign up to access the nuggets generated by The Guardian. Another alternative, which is pretty tough in rural Kentucky, is to visit your local convenience store and purchase a dead tree edition. Do not complain to me about a dead link, which in this blog are little tombstones marking online failures.

There is some rugby and polo club references in the article. The one that I circled was the reference to Karl Marx’s “The Fragment on Machines” from his thriller  The Grundrisse, which connoted to me “floor plans.” But, my German like my math skills are not what they used to be. Anyway, who am I kidding. I know you have read that document. If not, you can get a sniff at this link.

According to the Guardian, the point of the fragment is:

he [Marx] had imagined something close to the information economy in which we live. And, he wrote, its existence would “blow capitalism sky high.

The end of capitalism?

Another interesting item in the essay is the vision of the future. At my age, I do not worry too much about the future beyond waking each morning and recognizing my surroundings. The Guardian worries about 20175. Here’s the passage I highlighted:

I don’t mean this as a way to avoid the question: the general economic parameters of a post capitalist society by, for example, the year 2075, can be outlined. But if such a society is structured around human liberation, not economics, unpredictable things will begin to shape it.

Why raise the issue?

Now to the omission. I know this is almost as irrelevant as the emergence of a monitored environment. What about the growing IS/ISIS/Daesh movement? The Greek matter is interesting to me because if the state keeps on trucking down the interstate highway its has been following, the trucks will be loaded with folks eager to take advantage of the beach front property and nice views Greece affords.

I noted a number of other points away from which the essay steered its speeding Russian Zil. How does one find information in the end of world?

I think about information access more than I ponder the differences between Horatio in Hamlet and Daniel Doyce in Little Dorrit. To get up to speed on Daniel Doyce, check out this link.

Like Fukuyama’s social analysis, this end of may point to speaking engagements and consulting work. The hope is that the author may want these to be never-ending. Forget the information access and the implications and impacts of IS/ISIS/Daesh.

Let’s hope online search works unless it is now the end of that too.

Stephen E Arnold, July 19, 2015

dtSearch and Encrypted PDFs

July 18, 2015

Short honk: The Little Engine That Could information access system is dtSearch. Long a fave with Microsoft centric folks looking for an alternative for keyword search, dtSearch has added some oomph. “New dtSearch Release Enhances Support for Encrypted PDFs.” According to the write up:

The release expands these document filters to directly support a broader range of encrypted PDFs, covering PDF files encrypted with an owner password up to 128-bit RC4 and 128-bit and 256-bit AES.

For more information about what can be processed, navigate to www.dtsearch.com.

Stephen E Arnold, July 18, 2015

Search the Snowden Documents

July 16, 2015

This cat has long since forgotten what the inside of the bag looked like. Have you perused the documents that were released by Edward Snowden, beginning in 2013? A website simply titled “Snowden Doc Search” will let you do just that through a user-friendly search system. The project’s Description page states:

“The search is based upon the most complete archive of Snowden documents to date. It is meant to encourage users to explore the documents through its extensive filtering capabilities. While users are able to search specifically by title, description, document, document date, and release date, categories also allow filtering by agency, codeword, document topic, countries mentioned, SIGADS, classification, and countries shared with. Results contain not only full document text, pdf, and description, but also links to relevant articles and basic document data, such as codewords used and countries mentioned within the document.”

The result of teamwork between the Courage Foundation and Transparency Toolkit, the searchable site is built upon the document/ news story archive maintained by the Edward Snowden Defense Fund. The sites Description page also supplies links to the raw dataset and to Transparency Toolkit’s Github page, for anyone who would care to take a look. Just remember, “going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.” (Chrome)

Cynthia Murrell, July 16 , 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

How Not to Drive Users Away from a Website

July 15, 2015

Writer and web psychologist Liraz Margalit at the Next Web has some important advice for websites in “The Psychology Behind Web Browsing.” Apparently, paying attention to human behavioral tendencies can help webmasters avoid certain pitfalls that could damage their brands. Imagine that!

The article cites a problem an unspecified news site encountered when it tried to build interest in its videos by making them play automatically when a user navigated to their homepage. I suspect I know who they’re talking about, and I recall thinking at the time, “how rude!” I thought it was just because I didn’t want to be chastised by people near me for suddenly blaring a news video. According to Margalit, though, my problem goes much deeper: It’s an issue of control rooted in pre-history. She writes:

“The first humans had to be constantly on alert for changes in their environment, because unexpected sounds or sights meant only one thing: danger. When we click on a website hoping to read an article and instead are confronted with a loud, bright video, the automatic response is not so different from that our prehistoric ancestors, walking in the forest and stumbling upon a bear or a saber-toothed hyena.”

This need for safety has morphed into a need for control; we do not like to be startled or lost. When browsing the Web, we want to encounter what we expect to encounter (perhaps not in terms of content, but certainly in terms of format.) The name for this is the “expectation factor,” and an abrupt assault on the senses is not the only pitfall to be avoided. Getting lost in an endless scroll can also be disturbing; that’s why those floating menus, that follow you as you move down the page, were invented. Margalit  notes:

“Visitors like to think they are in charge of their actions. When a video plays without visitors initiating any interaction, they feel the opposite. If a visitor feels that a website is trying to ‘sell’ them something, or push them into viewing certain content without permission, they will resist by trying to take back the interaction and intentionally avoid that content.”

And that, of course, is the opposite of what websites want, so giving users the control they expect is a smart business move. Besides, it’s only polite to ask before engaging a visitor’s Adobe Flash or, especially, speakers.

Cynthia Murrell, July 15, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Skin Search

July 15, 2015

We reported on how billboards in Russia were getting smarter by using facial recognition software to hide ads advertising illegal products when they recognized police walking by.  Now the US government might be working on technology that can identify patterns on tattoos, reports Quartz in, “The US Government Wants Software That Can Detect And Interpret Your Tattoos.”

The Department of Justice, Department of Defense, and the FBI sponsored a competition that the National Institute of Standards and Technology (NIST) recently held on June 8 to research ways to identify ink:

“The six teams that entered the competition—from universities, government entities, and consulting firms—had to develop an algorithm that would be able to detect whether an image had a tattoo in it, compare similarities in multiple tattoos, and compare sketches with photographs of tattoos. Some of the things the National Institute of Standards and Technology (NIST), the competition’s organizers, were looking to interpret in images of tattoos include swastikas, snakes, drags, guns, unicorns, knights, and witches.”

The idea is to use visual technology to track tattoos among crime suspects and relational patterns. Vision technology, however, is still being perfected.  Companies like Google and major universities are researching ways to make headway in the technology.

While the visual technology can be used to track suspected criminals, it can also be used for other purposes.  One implication is responding to accidents as they happen instead of recording them.  Tattoo recognition is the perfect place to start given the inked variety available and correlation to gangs and crime.  The question remains, what will they call the new technology, skin search?

Whitney Grace, July 15, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

CSC Attracts Buyer And Fraud Penalties

July 1, 2015

According to the Reuters article “Exclusive: CACI, Booz Allen, Leidos Eyes CSC’s Government Unit-Sources,” CACI International, Leidos Holdings, and Booz Allen Hamilton Holdings

have expressed interest in Computer Sciences Corp’s public sector division.  There are not a lot of details about the possible transaction as it is still in the early stages, so everything is still hush-hush.

The possible acquisition came after the news that CSC will split into two divisions: one that serves US public sector clients and the other dedicated to global commercial and non-government clients.  CSC has an estimated $4.1 billion in revenues and worth $9.6 billion, but CACI International, Leidos Holdings, and Booz Allen Hamilton might reconsider the sale or getting the price lowered after hearing this news: “Computer Sciences (CSC) To Pay $190M Penalty; SEC Charges Company And Former Executives With Accounting Fraud” from Street Insider.  The Securities and Exchange Commission are charging CSC and former executives with a $190 million penalty for hiding financial information and problems resulting from the contract they had with their biggest client.  CSC and the executives, of course, are contesting the charges.

“The SEC alleges that CSC’s accounting and disclosure fraud began after the company learned it would lose money on the NHS contract because it was unable to meet certain deadlines. To avoid the large hit to its earnings that CSC was required to record, Sutcliffe allegedly added items to CSC’s accounting models that artificially increased its profits but had no basis in reality. CSC, with Laphen’s approval, then continued to avoid the financial impact of its delays by basing its models on contract amendments it was proposing to the NHS rather than the actual contract. In reality, NHS officials repeatedly rejected CSC’s requests that the NHS pay the company higher prices for less work. By basing its models on the flailing proposals, CSC artificially avoided recording significant reductions in its earnings in 2010 and 2011.”

Oh boy!  Is it a wise decision to buy a company that has a history of stealing money and hiding information?  If the company’s root products and services are decent, the buyers might get it for a cheap price and recondition the company.  Or it could lead to another disaster like HP and Autonomy.

Whitney Grace, July 1, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta