Archive for the ‘Uncategorized’ Category

I could not agree more with this Huffington Post blogger.  Small business is the soft under belly of network security and everyone needs to wake up.  Think about it, small business have just as valuable data as the large organization, and their security is weaker.  So it makes them an obvious target to siphon data from.

Its a two front problem.  these smaller businesses contain valuable customer information the attackers salivate over, and should these less secure businesses have secure connections,  username and password to a larger organization, then its a twofer for the attacker. More disturbing is these side doors may not be discovered for 3-6, months,  an estimate many security firms are showing, so its a pretty serious problem.

It’s not necessarily their fault though. The cost for security can be very expensive, which forces them to purchase out of the box solutions that sometimes gives them a false sense of security,  not mentioning their security talent may not be there.

By Francesco Trama

 

“Smaller targets can mean big rewards for cyber criminals
Small and medium-sized businesses are equally susceptible to attacks from hackers as are large entities and even government agencies. According to the National Cyber Security Alliance, an astonishing one in five small businesses falls victim to cyber crime each year. Even more frightening: According to an August 2013 story in PCWorld, of those small businesses whose systems are breached, roughly 60 percent go out of business within six months after the attack.”

http://www.huffingtonpost.com/mike-pugh/no-your-small-business-is_b_4164015.html

Since the UN Identified this back in February, do you think the infections have spread, or have been curtailed? I would say with near certainty they have grown exponentially like a plague in every direction uncontrollably.  Here in the US we are finding it difficult to manage our own break outs, even though at times we can slow the growth. Now imagine the “up and coming” tech areas to our south, still getting their “%^&*” together.

By no means am I saying “we” (US) has theirs together, I just consider us further along is all.

Given they are still in their “tech growing phase” these or any under developed tech areas should be considered high risk, and treated with higher scrutiny and limited how your networks are exposed to these areas.

By Francesco Trama

 

Explainer: Cybercrime in Latin America

” Illegal botnets, or networks of remote-controlled computers infected with malware, have been found throughout Latin America. Also known as “zombie computers,” these networks can be used for a variety of cybercrimes, ranging from stealing personal information to sending spam. Trustnet’s study found that nearly half of all global cybercrime takes place through remote access with methods like botnets.

Cybercriminals from anywhere in the world can control the botnets through command and control servers, or C&Cs. A February 2013 UN draft report identified significant clusters of C&Cs in the Caribbean basin, as well as Central America. Two types of malware spawned zombie computers in the region last year—one called Dorkbot that infected 80,000 computers in 10 Latin American countries, the other called the Flashback virus, which harmed 40,000 Latin American computers.”

Source: http://www.as-coa.org/articles/explainer-cybercrime-latin-america

I got this alert today that one of our local media outlets got hit with a possible DDoS.  Just a few miles from them sits PacketViper, LLC, and PacketViper, something which would have shutdown the attacking countries at their port without the need of an global outage.

By Francesco Trama

Surge in web requests temporarily shuts down Trib Total Media website

[read more]

Luckily this is not an issue with our customers, all they have to do is limit their access. I would image most of our US customers have already limited this access.

By Francesco Trama

http://www.pcmag.com/article2/0,2817,2425836,00.asp

Cyber attacks are on the rise, but where are they originating from? If you guessed China, you’re close, but most of the attack traffic during the quarter actually originated in Indonesia, according to a new report from Akamai.

In the second quarter, Akamai found that attacks originated in 175 countries, with Indonesia accounting for 38 percent of those attacks – up from 21 percent in the first quarter. China came in at No. 2 with 33 percent, down 1 percent this quarter. The U.S. stayed at No. 3, but dropped from 8.3 percent to 6.9 percent.

Every Cyber Attack has one thing in common. They can be launched and distributed from around the world, giving the attacker limitless possibilities, mobility, stealth, and time.

PRLog (Press Release)Oct. 15, 2013PITTSBURGHNetwork attacks are an unfortunate reality for everyone, and regardless of the size of your business, eventually the odds are that you will become a target. The world is a big place and every  IP address in every country is another potential hacker that could cost you time and money.  At some point, when you weigh the heightened cyber-risks that certain countries pose versus the amount of business transacted, the prudent businessman asks himself “Do I really need all this network traffic?”

Ask the folks at Viper Network Systems, developers of PacketViper Geo-IP Network Filter and experts in geographical filtering and security, and you will surely learn that in fact you do NOT need all that traffic.  In fact, Viper Network Systems will quickly show you that not only are you taking a huge unnecessary and unwarranted risk by thoughtlessly accepting all traffic from everywhere,  they will show you how you can quickly and easily eliminate the risk without any negative impact on your business.

According to Francesco Trama, President and CEO of Viper Network Systems, “No matter what industry your business falls in, the fact is that a good percentage of the traffic your security environment is dealing with is unnecessary.”

And once again, unnecessary traffic is unnecessary risk.For example, suppose you have an employee VPN, HR, or some Admin portal. Does the whole world need access to it?  Chances are, right now they have that access whether you want them to or not.  That needs to change.

Consider a typical cyber-threat scenario.  Most network attacks start with a simple scan or probing of the target’s public network space. Often, these attacks scan the entire network range and attempt to analyze business links within your web portal to see who you know and with whom you communicate.

These scans give the attacker valuable information about what options they should pull out of their bag of tricks to deploy against the exposed network services. Once they identify what type of Web, Mail, DNS, or other discrete port or server is available, the attacker will attempt to penetrate your exposed ports and test them for vulnerabilities and kinks. And again, since these hackers could be anywhere in the world and they can access a global network of proxies, they work and scheme under the safety of anonymity of compromised PC’s and poorly managed public spaces around the world.  With the attacker’s endless possibilities to exploit, probe, and attack vulnerabilities with little chance of being caught, these criminals can scan millions of networks around the world at their leisure looking for the right opportunity to present itself.  Unfortunately, in the cyber-security world, for the present, time is on the attacker’s side, and reports prove that eventually, they will breach someone’s network.  The question is, will it be yours?

If that scenario seems depressing or the prospect of being sued for damages caused by a breach to your network keeps you up at night, maybe it’s time to turn the tables on the hackers with Viper Network System’s enhanced Geo-IP filtering that puts you back in control of who gets to access your network.

The power and genius of Viper Network System’s flagship product “PacketViper” stems from its unique capability to restrict countries to a specific network port bi-directionally.  This one-of-a-kind tool makes it possible to block, limit, redirect, or alert which network ports countries may access.  This makes PacketViper the industry standard in Geo-IP filtering and puts it light-years ahead of its competitors in terms of both its power to protect and its precision and flexibility to match filter settings to an individual business needs.  And while PacketViper is already the best Geo-IP filter on the market, Viper Network Systems proprietary Global Network Lists, Redirection, Country Triggers, and Network Alerts all come standard with the PacketViper system, providing comprehensive and flexible geographical filtering that shapes global network traffic to each customer’s needs.

Amazingly, with all that power, Viper Network Systems developed PacketViper to install seamlessly inline, in front of your existing security environment, with a low startup cost and with no need to modify anything else in your network or security setup. This is a huge benefit for those environments which need updated, hardened, or simply feel they need to do something more.

In a matter of minutes, your security environment can be dramatically hardened and improved without the need of complex policies or steep learning curves for new and expensive security devices. PacketViper’s low latency, transparent, and near wire performance is a formidable opponent for the cyber-criminal, but its user-friendly and intuitive format will allow your network administrators to harness its power without missing a beat.

Interested in adding this essential additional layer to your security environment? Can’t believe it can be this simple? Viper Network Systems has recently released several videos which show definitively how Geo-IP network filtering improves your security landscape, and how the entire process can be completed in a few minutes and clicks of a mouse.  You can’t afford not to take a look at this next-generation complement to your security network.

About Viper Network Systems

Viper Network Systems has developed PacketViper, a intelligent Geo IP Network Filter capable of bi-directionally filtering any country at the network port level.   PacketViper removes unwanted probing, fights against DDOS attacks, spam, dramatically improves network performance, and much, much more. With PacketViper on the front line, security environments are less congested and more effective.

About PacketViper:

PacketViper replaced complex geo-location filtering, and turned it into a practical tool against cyber crime and attacks. PacketViper’s new advances in bi-directional per-port filtering performed at the gateway eliminate unwanted network traffic before it enters the security environment.   This has proved to combat DDOS, spam, port probing, breaches, and scanning threats, all while reducing bandwidth usage and improving performance.

 

By Francesco Trama