Investing in Cyber Security

With reports of security breaches and stolen data on the rise, many corporations are overhauling their Cyber Security programs and practices.

This lack of a sense of security is causing investors to take notice while stocks in Cyber Security are on the rise.

4 Million Breached by Suspected Chinese Hackers

U.S. officials suspect that as many as 4 million government workers suffered a breach of their personal records by Chinese hackers. The Federal Bureau of Investigation, F.B.I., is currently investigating the breach which is believed to be one of the largest known thefts of government data.

Cyber Security experts also suspect these same hackers may be responsible for similar thefts of personal data at major healthcare firms Anthem and Premera.

Guidance for Defending Against Destructive Malware

National Cyber Awareness System:

The National Security Agency (NSA)’s Information Assurance Directorate has released a report on Defensive Best Practices for Destructive Malware. This report details several  steps network defenders can take to detect, contain and minimize destructive malware infections.

US-CERT encourages users and administrators to review the NSA report and ICS-CERT TIP-15-022-01 for more information on destructive malware.

Microsoft Releases February 2015 Bulletin

National Cyber Awareness System

Microsoft has released updates to address vulnerabilities in Windows as part of the Microsoft Security Bulletin Summary for February 2015. Some of these vulnerabilities could allow remote code execution, security feature bypass, elevation of privilege, or disclosure of information.

US-CERT encourages users and administrators to review Microsoft Security Bulletin Summary MS15-FEB and apply the necessary updates.

Linux “Ghost” Remote Code Execution Vulnerability

National Cyber Awareness System:

The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu and Red Hat. The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.