OpenSSL warns vendors against using vulnerability info for marketing

Security advisories for OpenSSL should not be used for competitive advantage, according to the development project behind the widely used cryptography component.

The warning comes from the OpenSSL Project, which has published for the first time guidelines for how it internally handles security problems, part of an ongoing effort to strengthen the project following the Heartbleed security scare in April.

High severity issues such as remote code execution vulnerabilities will be kept private within OpenSSLs development team, ideally for no longer than a month until a new release is ready.

If an update is planned, a notification will be released on the openssl-announce email list, but no further information about the issues will be given, it said.

Some organizations that develop a general purpose OS that includes OpenSSL will be prenotified with more details about the patches in order to have a few days to prepare. But the OpenSSL Project warned that the more people that are notified in advance, the higher the likelihood that a leak will occur.

We may withdraw notifying individual organizations from future prenotifications if they leak issues before they are public or over time do not add value (value can be added by providing feedback, corrections, test results, etc.), it wrote.

If information on a vulnerability leaks, it makes it more likely that attackers may be able to figure out the software flaw and launch attacks before software products are patched.

The OpenSSL Project also advised that it is not acceptable for organizations to use advance notice in marketing as a competitive advantage. It objects, for example, to marketing claims such as if you had bought our product/used our service you would have been protected a week ago.

OpenSSL has been undergoing an intense code review since the Heartbleed vulnerability was discovered in April. The flaw affected tens of thousands of websites across the Internet and many software applications.

OpenSSL is a cryptographic library that enables SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption. Most websites use either SSL or TLS, which is indicated in browsers with a padlock symbol.

More here:
OpenSSL warns vendors against using vulnerability info for marketing

Switzerland will host Edward Snowden, if he testifies against the NSA

THE SWISS attorney general has said that whistleblower Edward Snowden can reside there if he responds to state requests for testimony against the US National Security Agency (NSA).

Snowden was the source of leaked documents and information relating to the US Prism programme and the UK Tempora takeaway. The Swiss attorney general said that the US would not be able to force extradition if the local government regards such a request as politically motivated.

A document provided to the Swiss Sunday newspaper Sonntagszeitung is titled, "What are the rules would apply to consider when Edward Snowden would [be] brought to Switzerland and then the United States would make a request for extradition", and it relates that the rules would allow the movement and repel the requests.

Speaking to the newspaper, Snowden's Swiss lawyer Marcel Bosonnet revealed that he is pleased with the results of the study, commenting that, "The legal requirements for safety are met."

Presently Snowden has a residency permit in Russia, and that was recently extended by three years. Snowden has been in Moscow for a year and a month now, after he arrived there from Hong Kong expecting to move to Cuba.

He has already provided testimony in Europe, and told assembled ministers that he knew that what he was doing was the right thing.

"I worked for the United States' Central Intelligence Agency. The National Security Agency. The Defense Intelligence Agency," he said. "I love my country, and I believe that spying serves a vital purpose and must continue. And I have risked my life, my family and my freedom to tell you the truth."

View original post here:
Switzerland will host Edward Snowden, if he testifies against the NSA

Couples Can’t Keep Their Hands Off Each Other’s Phones

By John P. Mello Jr. 09/08/14 3:49 PM PT

Worried about the NSA spying on your smartphone? How about online hackers? Truth be told, the greatest threat to your confidential information is a lot closer to you -- namely, your partner.

That's what a recent survey of more than 13,000 people in the United States revealed.

Avast last week reported its findings. Among them: The majority of women snoop on their men's phones just because they're curious, but a third of married women peek at their hubby's mobile to see if he's faithful.

Paranoia? Maybe not. Seven of 10 women who snooped on their partner's phone found evidence he was deceiving them. More than half the peeping men found such evidence about their women.

Once they had the goods, women were 20 percent more likely to confront their significant other with the incriminating evidence, Avast researchers discovered.

"It surprised us that people you trust would be checking your phone," said Jude McColgan, Avast president of mobile.

Much is made of elaborate schemes to break into someone's phone, but that's typically not a problem for a partner. Almost half the women surveyed (41 percent) and a third of the men (33 percent) said their partner's phone wasn't protected by a pass code.

"It's remarkable that people don't use their pass codes," McColgan told TechNewsWorld. "That's scary if you lose your phone, because you're essentially carrying a PC in your pocket, and all your information is wildly at risk."

In Fourth Amendment circles, advocates often refer to a "reasonable expectation of privacy."

Read more here:
Couples Can't Keep Their Hands Off Each Other's Phones

Snowden shouldn’t be extradited to US if he testifies about NSA spying, says Swiss gov

Secure remote control for conventional and virtual desktops

Master spook blabbermouth Edward Snowden should be granted safe passage to and from Switzerland if he testifies about surveillance, the country's attorney general has reportedly said.

Last year, the one-time NSA sysadmin leaked files revealing some of the secret spying tactics of UK and US spooks.

Snowden currently has temporary residency in Russia, where he has been living for more than a year now.

According to two separate reports in Swiss newspapers Sonntags Zeitung and Le Matin published on Sunday, Snowden would not be extradited to the US if he stands as a "witness in criminal proceedings, or [appears] as part of a parliamentary inquiry" in Switzerland.

That's apparently the opinion of the country's attorney general, who expressed that view in November last year to help work out legalities relating to any potential visit from whistleblower Snowden.

The two newspapers reported the Swiss government law advisor's opinion, after viewing a confidential document.

The top Swiss lawyer added that any US efforts to extradite Snowden if he were to testify in Switzerland would be considered "political" and thereby rejected by authorities in the country.

Only "higher state obligations" could overrule that position, the AG reportedly added.

Snowden, meanwhile, has indicated that he is willing to testify in Switzerland. His Zurich lawyer Marcel Bosonnet was said to be pleased with the AG's comments. He was quoted by Sonntags Zeitung as saying "the legal requirements for [Snowden's] safe conduct are met."

More:
Snowden shouldn't be extradited to US if he testifies about NSA spying, says Swiss gov

Porticor and nScaled Deliver Secure and Compliant Business Continuity and Disaster Recovery …

Porticor Adds Software-Defined Encryption Key Management to nScaled's Leading IT BCDR Platform for Complete Protection of Replicated Data in the Cloud

CAMPBELL, Calif., and SAN FRANCISCO Porticor and nScaled today announced the industry's first joint solution integrating software-defined homomorphic encryption key management to protect customers' cloud information and applications replicated for IT Business Continuity and Disaster Recovery (BCDR).

Porticor is a leading cloud data security company delivering the only cloud-based key management and data encryption solution that infuses trust into the cloud and keeps cloud data confidential. nScaled is a provider of automated, integrated IT Business Continuity and Disaster Recovery (BCDR) solutions.

nScaled's Disaster Recovery as a Service (DRaaS) platform replicates data, servers, operating systems and applications to protect and deliver critical IT services to users in case of a man-made or natural disaster, equipment failure or data loss. nScaled's DRaaS hybrid cloud solution ensures that replicas are up to date at all times, including both the data and the "virtual machine images" of the code that runs the applications. Forrester Research, Inc., named nScaled a Leader in The Forrester Wave: Disaster-Recovery-As-A-Service Providers, Q1 2014.

Porticor adds key management and encryption to nScaled's solution. Integrated into nScaled's physical and virtual appliance, Porticor encrypts the data store of each application backed up by nScaled's solution seamlessly and transparently. Porticor is also implemented on nScaled's cloud, ensuring that any data replicated to the nScaled cloud is also encrypted. The result is multifaceted, data-at-rest and in-transmission encryption solution that protects information at the customer's data center and in the cloud.

"We are in the insurance business so clients share personal and account information about their employees with us," said Aatash Patel, IT Director at Covala Group, a leading enroller and administrator of voluntary, supplemental individual disability benefits for large employers. "With nScaled in place serving our disaster recovery needs, we needed a private cloud data encryption solution that was high performing and compatible with our VMware environment. Porticor has been our answer to protect clients' confidential information, and help us meet their compliance requirements. We spun up Porticor with nScaled in our cloud without any technical training, and support has been very helpful at both companies. I am very happy with what both vendors are doing together so far."

For a white paper on the partnership and joint solution now available, see http://www.porticor.com/porticor-nscaled-secure-dr/.

"Business continuity and disaster recovery have been one of the most successful services offered through the cloud model, and nScaled delivers the industry's leading automated and integrated solution," said Mark Jameson, VP of Worldwide Sales and Product Strategy at nScaled. "Together with Porticor we are providing the most secure and reliable Disaster Recovery as a Service (DRaaS) to protect customer's data and applications."

"Cloud providers, including providers delivering DRaaS, offer a shared responsibility' model for the security and protection of customer applications and data," said Gilad Parann-Nissany, Porticor founder and CEO. "Now that we have teamed with nScaled, customers can be assured that their applications and information will be available and safe from loss due to disasters and cloud data security threats."

Cloud data encryption provides an effective layer of protection against new cloud security challenges, including internal cloud data center threats, information protection in a shared environment, and compliance requirements which mandate information to be secured both on premises and in the cloud. The challenge created is not in encrypting the data, but with managing the encryption keys. To provide secure cloud management of encryption keys for outsourced data center services to the nScaled cloud, Porticor uses a highly sophisticated and patented approach split key encryption and homomorphic key management.

Continue reading here:
Porticor and nScaled Deliver Secure and Compliant Business Continuity and Disaster Recovery ...

@CloudExpo | PCI-DSS Encryption Requirements

Significant money is at stake and in need of protection in the Payment Card Industry (PCI). The global payment card industry covers several sectors: banks and financial institutions (acquirers), issuers, processors, service providers, merchants carrying out transactions online and via point of sale terminals in bricks and mortar stores, large and small.

PCI SecurityThe PCI Security Organizations Data Security Standard (DSS) applies to your business if you store, process or transmit cardholder data (CHD). The PCI supply chain is not an isolated entity. It needs to protect itself well beyond its own

perimeter fences. This is because business entities also need to protect the billions of people every day that key in their Personal Identity Numbers (PINs) and other personal data as they trade or carry out transactions in store or over the Internet, from fixed and mobile devices using payment cards. Increasingly, commerce takes place via mobile devices over wireless networks, with the card itself rarely being physically present at the store.

As credit and debit cards are used more and more, checks are disappearing in many economies. In a mobile, electronic, global world, the payment card industry continues to grow. In May 2014, for example, 47.1 billion was spent in the United Kingdom on cards of all types (credit and debit), a 7.5% annual growth in spending rates over May 2013, at a time where the countrys economy is a long way from recovery.

Its not surprising therefore that the payment card industry attracts people of malicious intent.

PCI-DSS Encryption RequirementsIn this reality, if your business occupies any of the nodes in the payment card supply chain, you must comply with the 12 core requirements of PCI-DSS to keep perpetrators of payment card fraud at bay. You will need to ensure you have the same levels of protection, and thus of PCI-DSS compliance, in the cloud and in your data centers. In addition, you must make sure that all third-party service providers you use are fully PCI-compliant.

Several of the 12 PCI-DSS requirements are relevant for cloud security. However, on this occasion, well single out those sections of requirement number 3, which relate specifically to the protection of stored cardholder data. As youll see below, you can comply with these requirements by using Porticors data encryption and cloud key management system.

PCI-DSS Encryption: Requirement 3Requirement 3.4, for example, states that you must make sure that Primary Account Numbers (PANs) are unreadable, wherever they are stored. Our solution ensures your compliance here thanks to strong hashing (SHA-2) and AES-256 encryption, augmented by robust encryption key management.

You must not tie decryption keys to user accounts, regardless of whether you encrypt at the disk, file- or column-level of the database, nor must you allow access to the cryptographic key by native operating systems. Your compliance is assured on both points with Porticors key management algorithm, which by default splits the key. This keeps it independent of the OS, as well as administrators and service providers in your supply chain. In other words, access is limited to very few custodians and, always acting together, rather than any one on their own, ensures your compliance with requirements 3.5.1 and 3.5.2.

Continued here:
@CloudExpo | PCI-DSS Encryption Requirements

SyncDog Announces Partnership with SafeLogic, Integrating CryptoComply to SyncDog Sentinel Product for Compliant …

Reston, VA (PRWEB) September 08, 2014

SyncDog, Inc. an industry-leading provider of enterprise mobility solutions, today announced a technology partnership with SafeLogic, a provider of innovative encryption products for applications in servers, workstations, appliances, and mobile devices. SyncDog, known for its SentinelSecure mobile security solutions, will feature SafeLogics CryptoComply module at MobileCON, part of the Super Mobility Week expo in Las Vegas, September 9th-11th.

SyncDogs flagship product SentinelSecure provides mobile app containerization, active mobile server monitoring, mobile device provisioning and administration with end-to-end transaction monitoring. SyncDog has licensed SafeLogics CryptoComply module for deployment on iOS and Android platforms, to provide FIPS 140-2 validated encryption in SyncDogs SentinelSecure container product. SyncDog will be taking orders for SyncDog SentinelSecure featuring CryptoComply at MobileCON in Las Vegas, with full integration for the combined product offering slated for October 1, 2014.

FIPS 140 was established as a benchmark for encryption over 20 years ago, and it is now demanded by enterprise customers worldwide in addition to the government and military, said SafeLogic CEO Ray Potter. The SyncDog partnership now provides wider distribution of a defense-grade secure mobile container to public and private industry, as well as local, state and federal government. We are proud to be a piece of the SentinelSecure solution.

We are excited to be able to offer encryption that has been certified to the FIPS 140 standard, said SyncDog President and CEO Jonas Gyllensvaan. We look forward to discussing this new development and other client work with our SentinelSecure product line at MobileCON in Las Vegas.

Gyllensvaan and Potter will be available to the media in the SyncDog booth (#7711) at MobileCON from 1:00-2:00 PM Pacific Time on Tuesday, September 9. A media advisory has been issued and can be accessed here for this editorial interview opportunity.

About SyncDog, Inc.

A mobile workforce fueled by BYOD is fast replacing traditional computing as the most complex work platform for IT professionals to manage. IT shops are now forced to support platforms running outside of their standard networks creating a nearly insurmountable dilemma for maintaining service quality and security.

SyncDog, Inc. offsets this burden in a comprehensive solution that manages pro-active mobile device monitoring, mobile device security, mobile application containerization, and compliance reporting. Our flagship product SyncDog Enterprise Mobility Platform solves the mobility service & security dilemma that keeps IT staff in the dark about service disruptions and security issues caused by malicious and careless users. With SyncDog Enterprise Mobility, IT administrators have the enterprise visibility to be proactive with application delivery and security giving them the freedom to focus on driving revenue to the organization.

The mobile workforce is the new enterprise norm and disruptions to mobile service delivery and system-wide security can be devastating to both revenue and reputation. SyncDog Enterprise Mobility is a powerful combination of low overhead and predictive intelligence for all of todays mobile platforms. Your network supports every transaction crossing it and SyncDog helps you understand it. More info: http://www.syncdog.com.

Read more here:
SyncDog Announces Partnership with SafeLogic, Integrating CryptoComply to SyncDog Sentinel Product for Compliant ...

Chef muscles up with Microsoft, Amazon

Chef, a popular open source software program for managing the configuration settings of servers, software and other IT components, now can reach deeper into the data center with the help of some intertwined services from Microsoft, VMware and Amazon Web Services (AWS).

Chef 12, released Monday, also comes with a new licensing model that should make it easier for customers to add or remove premium features.

The Chef IT automation software provides a way for administrators to write scripts, often called recipes, to configure and deploy a new piece of equipment or software. Recipes can be used to automate the management of large numbers of assets.

Since its initial release in 2009, Chef has been downloaded over 10 million times. It is used by companies such as Facebook, Hewlett-Packard, Rackspace, AirBnB and others.

To extend the capabilities of Chef, the company has leveraged resources offered by other IT vendors.

For instance, a backup copy of Chef can now be stored and run on AWS Elastic Block Storage (EBS).

Should the main Chef server go down, operations can shift to EBS. Organizations can set up copies of the Chef server in different geographic areas, for extra protection in times of disaster.

Eventually, Chef will also support block storage services from other cloud services as well.

A new replication feature allows users to synchronize configuration data across multiple Chef servers, which can provide a single set of policies across all the locations being managed by Chef.

You could use a single Chef server as a central location for developing policies for configuration and management, said Colin Campbell, Chef director of patterns and practices.

Read more:
Chef muscles up with Microsoft, Amazon

A visual history of open source

September 08, 2014, 10:56 AM The open source movement has brought good things to the lives of countless people around the world. But have you ever wondered how it all got started? Check out this infographic that walks you through the birth of open source in the 1950s to today's thriving open source world.

According to Piktochart:

From operating systems to development tools and programming languages to browsers and thousands of utilities and applications, Open Source has led the way. Now, discover the movement's history.

More at Piktochart

Image credit: InformIT

Hat tip: Arccore on Google+

Note that I've only included a small chunk of the infographic in the quote box above. Be sure to click through to see the entire thing. I think it's a great visual representation of how far open source has come over the years.

The infographic is based on five Wikipedia articles. Here are links to each of them if you want to enjoy some additional reading:

GNU Project Open Source Free Software Movement History of Free and Open Source Software Open Source Initiative

LibreOffice 4.0 versus Microsoft Office 2013 Technology Personalized compares LibreOffice 4.0 to Microsoft Office 2013, and finds that LibreOffice 4.0 holds its own against Microsoft's office suite.

Read the original post:
A visual history of open source

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

AFP EXCLUSIVE: U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

By Richard Walker —

A plot by the Central Intelligence Agency (CIA) and Israel’s Mossad to kidnap National Security Agency (NSA) whistleblower Edward Snowden was foiled by agents of Russia’s intelligence agency, the Federal Security Service (FSB).

Continue reading