Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: InfoSec Handlers Diary Blog - Internet Storm Center Diary 2013-03-02 InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Apple Blocks Older Insecure Versions of Flash Player

Published: 2013-03-02
Last Updated: 2013-03-02 18:23:36 UTC
by Scott Fendley (Version: 1)
0 comment(s)

Apple has recently stepped up its response to security issues involving 3rd party plug-ins.  They have aggressively used its anti-malware tool sets to enforce minimum versions of Adobe Flash, Oracle Java, and similar popular plug-ins.  The most recent ban is the result of the Adobe security bulletin shared earlier this week.  

 

--

Scott Fendley
ISC Handler

0 comment(s)

Evernote Security Issue

Published: 2013-03-02
Last Updated: 2013-03-02 18:02:10 UTC
by Scott Fendley (Version: 1)
1 comment(s)

Evernote, a popular app for note taking and archiving, reported that they had a security incident.  As a part of their incident response and operational security monitoring, their staff noted that the compromise had occured and that the attackers were actively attempting to access secured areas of their system.  While they did not have evidence of sensitive data being compromised, user profile data (passwords, email addresses and similar) has likely been.  In response, they are forcing all user credentials to be changed.

From an incident response point of view, I will have to commend Evernote for how they are handling the situation. 

It appears that their security operations was able to detect the incident in a reasonable period of time (within a day).  In addition, their communications/PR arm responded with good initial recommendations in the news article.  And while there is not much technical information yet, they were able to limit some of the questions about how they stored passwords (one way hash with salting).  It is my guess that Evernote has been preparing for the eventuality that a security breach would occur, and prepared all of the appropriate parties to respond.

Protect, Detect, Respond, Recover.  Remember to not just focus on one or two of these within the continuum.

And if you use Evernote, change your credentials soon to limit your personal exposure.

 

--

Scott Fendley ISC Handler

1 comment(s)
Diary Archives