<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Sun, 17 Nov 2019 17:13:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Changing Behaviours through DevOps</title>
		<link>https://www.interxect.com/changing-behaviours-through-devops/</link>
					<comments>https://www.interxect.com/changing-behaviours-through-devops/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sun, 17 Nov 2019 00:18:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[DevOps]]></category>
		<guid isPermaLink="false">https://www.interxect.com/?p=1220</guid>

					<description><![CDATA[The world of work is changing. There is no place where this is truer than in the world of Information Technology. With these changes, being technically sound is not good enough, there are behavioural, or soft skills that will be required. This is why beyond a technology strategy you also require a behaviour strategy, one [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>The world of work is changing. There is no place where this is truer than in the world of Information Technology.</p>



<p>With these changes, being technically sound is not good enough, there are behavioural, or soft skills that will be required.</p>



<span id="more-1220"></span>



<p>This is why beyond a technology strategy you also require a behaviour strategy, one where that no matter where the technology goes your people can be ready. </p>



<p>Change the behaviour and change thinking.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="935" height="507" src="https://www.interxect.com/main/wp-content/uploads/2019/11/Shooks-Model-for-Change.png" alt="" class="wp-image-1224" srcset="https://www.interxect.com/main/wp-content/uploads/2019/11/Shooks-Model-for-Change.png 935w, https://www.interxect.com/main/wp-content/uploads/2019/11/Shooks-Model-for-Change-300x163.png 300w, https://www.interxect.com/main/wp-content/uploads/2019/11/Shooks-Model-for-Change-768x416.png 768w" sizes="(max-width: 935px) 100vw, 935px" /><figcaption>Shook&#8217;s Model for Change</figcaption></figure>



<p>Here I suggest a behaviour strategy that revolves around introducing <a href="https://www.interxect.com/what-is-devops/">DevOps</a> to develop these four areas that I consider to be critical for the future of work.</p>



<h2 class="wp-block-heading">1. Analytical and strategic thinking</h2>



<p>As things change quickly, you need to think ahead, and then be able to put the pieces in place to get there. For this you need to be able to look at all the trends and analyse it, then put a strategy in place to take advantage of the opportunities.</p>



<p>We need to employ systems thinking to see how we can increase productivity and flow through the process. And use data to make better decisions.</p>



<p>This aligns with the 1st Way of DevOps, thinking from left to right.</p>



<h2 class="wp-block-heading">2. Think of the end customer and user-centred design</h2>



<p>In the world of automation, the things that will make humans, well, human, is our ability to connect. We often refer to this as Emotional Intelligence.</p>



<p>This is going to be a key skill in the future of work. It will allow us to develop services that help the customers and not cater for ourselves, such as novel technological solutions that add little value to the customer. Yeah, that&#8217;s a pretty cool server, but did it reduce the wait times of our customers?</p>



<p>Take time to speak with customers, even if there are no issues or projects ongoing so we can understand them.</p>



<p>This aligns with the 2nd Way of DevOps, increase and amplify feedback loops.</p>



<h2 class="wp-block-heading">3. Creativity and innovation</h2>



<p>Creativity and innovation is a key part of ensuring that we can stay relevant. This means thinking of new ways to use emerging technology to meet business and personal goals. It also means doing experiments and trying new things.</p>



<p>This aligns with the 3rd Way of DevOps, the development of a culture of experimentation and learning.</p>



<h2 class="wp-block-heading">4. Active and Purposeful Learning</h2>



<p>In a fast-changing environment, you need to keep up with the new technologies otherwise you may get left behind. This means actively taking time to learn new things, and also learning from mistakes.</p>



<p>It also means not being afraid to make mistakes and developing a growth mindset, whereby you don&#8217;t believe that your abilities are fixed, but that you can change.</p>



<p>I&#8217;ve also encouraged my team to be purposeful with their learning, in that don&#8217;t learn as they do, which is reactive by nature, but choose to learn something even if it&#8217;s not actively in use. And also teach others so that they may learn as well.</p>



<p>This also aligns with the 3rd Way of DevOps, the development of a culture of experimentation and learning.</p>
<p>Original article: <a href="https://www.interxect.com/changing-behaviours-through-devops/" rel="bookmark" title="Permanent link to 'Changing Behaviours through DevOps'">Changing Behaviours through DevOps</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/changing-behaviours-through-devops/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1220</post-id>	</item>
		<item>
		<title>The Heartbleed Bug: What is it and what to do about it Don&#039;t let it ruin your day</title>
		<link>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/</link>
					<comments>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 02:30:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[heartbleed bug]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=964</guid>

					<description><![CDATA[The Heartbleed Bug announced on Monday 7th April has far reaching effects. See what it is about and what you can do about it.]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-medium wp-image-965" alt="heartbleed" src="https://www.interxect.com/main/wp-content/uploads/2014/04/heartbleed-247x300.png" width="247" height="300" />There is a serious bug out there that can compromise your data and you probably wouldn&#8217;t know it.<span id="more-964"></span></p>
<h2>The Bleeding Heart Bug</h2>
<p>The Heartbleed bug (CVE-2014-0160) was <a href="https://www.openssl.org/news/secadv_20140407.txt" target="_blank">publicly disclosed on Monday</a> and affects specific versions of the OpenSSL application. OpenSSL is a generally used open-source implementation of the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) Cryptographic method and is used on about 66% of all public websites. The bug has been present in the software since December 2011.</p>
<p>The bug is not a weakness in SSL/TLS itself, but rather is bug in OpenSSL implementation of it that can potentially allow attackers to access the unencrypted data stored within a server&#8217;s memory. With enough data, an attacker can find out your server encryptions keys, your passwords and any other information passed over the communication. The attackers can then use the compromised keys to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.</p>
<h2>Who are vulnerable?</h2>
<p>Because of the widespread adoption of the OpenSSL software and the ability to be attacked without leaving a trace, it means that we are all vulnerable because you can&#8217;t tell if your data has been compromised.</p>
<p>Not only websites are vulnerable, as many hardware and software vendors implement use OpenSSL in their products. <a href="http://www.networkworld.com/news/2014/041014-heartbleed-cisco-juniper-280593.html" target="_blank">Cisco and Juniper has listed advisories warning of the bug in their products</a>.</p>
<h2>What should you do?</h2>
<p>All businesses, website owners and users of affected services should take action on this bug.</p>
<p><strong>Step 1: Determine if any of your servers may be affected.</strong></p>
<p>You can use the <a href="http://filippo.io/Heartbleed/" target="_blank">check script on Filippo Valsorda&#8217;s web site</a> to check your public services.</p>
<p>Check with vendors if any of your internal services may be affected.</p>
<p><a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" target="_blank">C|NET has a list of the top 100 sites around the web to determine if they have been patched or may be affected</a></p>
<p>Website owners with their sites on hosted services should check with their service provider if they have taken action on the bug and if they were ever vulnerable.</p>
<p><strong>Step 2: Patch services for which you are able to patch yourself.</strong></p>
<p>These include any owned servers or virtual servers that you use, or internal, private servers or devices.</p>
<p><strong>Step 3: Re-Key your SSL Certificates</strong></p>
<p>This involves regenerating and reinstalling the private keys on your servers. While the risk may be small, the fact that you will not know if your key was compromised, this is a recommended precautionary step.</p>
<p><strong>Step 4: Change your passwords</strong></p>
<p>It&#8217;s important that you change any passwords that you may have on any of the affected systems AFTER you have patched OpenSSL and re-keyed your certificates. Doing so before you performed the prior steps means that if your keys were compromised, an attacked would be able to discover your new passwords.</p>
<p>If you are a service user and don&#8217;t run any services yourself, find out from the provider if they were vulnerable and if they patched their services (or use the check script in Step 1).</p>
<h2>Don&#8217;t Panic</h2>
<p>While the bug is serious, it&#8217;s important to not panic. Keep a clear head and follow the steps.</p>
<p>For more information about the bug and to keep updated <a href="http://heartbleed.com/" target="_blank">check out heartbleed.com</a>.</p>
<p>Original article: <a href="https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/" rel="bookmark" title="Permanent link to 'The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small>'">The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">964</post-id>	</item>
		<item>
		<title>Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B Hopes to Bolster Security Strategy</title>
		<link>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/</link>
					<comments>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Tue, 23 Jul 2013 13:02:12 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[acquisition]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Clam AV]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Intrusion prevention system]]></category>
		<category><![CDATA[IPS]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[Sourcefire]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=797</guid>

					<description><![CDATA[Cisco Systems today announced an agreement to purchase Sourcefire, the makers of the open source intrusion detection/protection system, Snort. The deal is reported to be $2.7 billion in cash.]]></description>
										<content:encoded><![CDATA[<p><a href="http://thevarguy.com/open-source-application-software-companies/cisco-serving-open-source"><img decoding="async" class="size-medium wp-image-798 alignleft" alt="cisco-logo" src="https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-300x199.jpg" width="300" height="199" srcset="https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-300x199.jpg 300w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-768x510.jpg 768w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-1024x680.jpg 1024w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo.jpg 1600w" sizes="(max-width: 300px) 100vw, 300px" /></a>Cisco Systems today announced an agreement to purchase <a href="http://www.sourcefire.com/" target="_blank">Sourcefire</a>, the makers of the open source intrusion detection/protection system, Snort, and anti-virus, Clam AV. The deal is reported to be worth about US$2.7 billion in cash.<span id="more-797"></span></p>
<p>Sourcefire also has in its portfolio next-generation firewalls and advanced malware protection solutions.</p>
<p>Cisco hopes to improve it&#8217;s security solutions with the new acquisition, although I am not very clear as to how. At the moment, I am tending to believe that this is an acquihire, for Cisco to gain Sourcefire&#8217;s strong cadre of security experts.</p>
<p>My concern now is what will happen to the open source solutions that Sourcefire currently provides. Snort and Clam AV have proven very popular within the security industry. Snort especially is used in many solutions to provide excellent IDS/IPS to networks. Fortunately, because it&#8217;s open source software (OSS), it can be forked to create another product based on the code, but without the right support may just languish.</p>
<p>Cisco used to be very open contributing greatly to the open source community, and still continues to once it deals with open standards, but from my own observations, I see Cisco closing avenues where there is direct competition. On the plus side, Cisco may have some technologies that will improve their current security offerings, so customers who are into Cisco may benefit.</p>
<p>I&#8217;ll adopt a wait and see approach for now, but I expect stocks of Cisco to rise with this acquisition.</p>
<p>Read Cisco&#8217;s <a href="http://blogs.cisco.com/news/cisco-bolsters-security-strategy-with-agreement-to-acquire-sourcefire/" target="_blank">announcement of the acquisition here</a>.</p>
<p>Original article: <a href="https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/" rel="bookmark" title="Permanent link to 'Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B <small class="subtitle">Hopes to Bolster Security Strategy</small>'">Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B <small class="subtitle">Hopes to Bolster Security Strategy</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">797</post-id>	</item>
		<item>
		<title>Zeus Malware Reboot SMEs and Small Financial Institutions Beware</title>
		<link>https://www.interxect.com/zeus-malware-reboot/</link>
					<comments>https://www.interxect.com/zeus-malware-reboot/#comments</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 07 Jun 2013 01:34:12 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Financial Risk]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[zeus]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=702</guid>

					<description><![CDATA[The Zeus trojan has undergone another version change and is now targeting small to medium businesses. Both small business and small financial institutions should be aware of the threat and what steps they can follow to lower their risk of attack.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-post-image wp-image-703 alignleft" alt="Virus" src="https://www.interxect.com/main/wp-content/uploads/2013/06/Fotolia_38933331_XS-250x200.jpg" width="250" height="200" /><a title="Trojan.Zbot" href="http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99" target="_blank">The Zeus trojan</a> has undergone another version change and is now targeting small to medium businesses (SMB or SME), according to <a title="ZeuS Malware Returns, Targets SMBs" href="http://www.informationweek.com/smb/security/zeus-malware-returns-targets-smbs/240156113" target="_blank">this article by Information Week</a>.</p>
<p>Zeus is a malicious software application (termed malware) that is designed to steal online credentials and other personally identifiable information (PII); it is geared to stealing banking credentials and information from users.</p>
<p>Zeus is a trojan, so it is disguised as something &#8216;safe&#8217;, and usually spread by links via email, comments on websites, and through social media, <a title="Notorious Zeus banking Trojan is gaining speed on Facebook" href="http://www.nbcnews.com/technology/notorious-zeus-banking-trojan-gaining-speed-facebook-6C10213925" target="_blank">especially facebook</a>.<span id="more-702"></span></p>
<p>SMBs are particularly attractive because they have more money than the average individual and often have lax security mechanisms in place to mitigate against malicious attacks. According to Symantec in its <a title="Internet Security Threat Report 2013" href="http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf" target="_blank">Internet Security Threat Report 2013</a>, the largest growth area for targeted attacks in 2012 was with small businesses. As it says, &#8220;money stolen from a small business is as easy to spend as money stolen from a large business.&#8221;</p>
<p>Symantec had found in an <a title="New Survey Shows U.S. Small Business Owners Not Concerned About Cybersecurity" href="http://www.symantec.com/about/news/release/article.jsp?prid=20121015_01" target="_blank">earlier survey</a> that many small businesses are not concerned about IT security and usually believe that the data that they have holds little value to attackers.  I have also had to educate some of my clients about the risks involved if their data, or even their servers, were stolen.</p>
<p>The <a title="Cyber security and fraud" href="http://www.fsb.org.uk/frontpage/assets/fsb_cyber_security_and%20_fraud_paper_2013.pdf" target="_blank">Federation of Small Businesses in the UK reported</a> that small businesses lose £785 million to cybercrime per year. The sad thing is that many a small business would go bankrupt if an attack was successful at draining their bank accounts.</p>
<p>Not only small businesses should be on the alert, but many small financial institutions, such as credit unions, should be aware of the threats and risks. Many of these institutions lack the resources and infrastructure of their larger counterparts and may be ill prepared for those attacks.</p>
<p>So what are some of the ways that small businesses can protect themselves.</p>
<ol>
<li>Have up-to-date anti-virus, anti-spyware and anti-malware software installed and running.</li>
<li>Keep your PCs updated to all the latest software and security patches.</li>
<li>Use <a title="5 Tips To Help You To Secure and Manage Your Passwords" href="https://www.interxect.com/main/2012/06/5-tips-to-help-you-to-secure-and-manage-your-passwords/" target="_blank">strong passwords</a> on banking websites. If your bank offers a hardware security token, consider getting that service.</li>
<li>Train employees to recognise and avoid suspicious emails or links. Also keep an open environment that allows employees to report if they accidently click on a link; time is of the essence for these attacks.</li>
<li>If you have any suspicions about an email or message (such as snail mail) received that purports to be from your bankers, call them using the number from the phone book to verify the information. Do not use any numbers, email addresses or internet addresses from the message to contact them.</li>
<li>Use a computer account without administrative rights.</li>
<li>Always type in the internet address of the bank into your browser. Do not click any links within emails to access the online bank.</li>
<li>Limit access to computers that will be used to access online bank applications. Also limit the applications or sites that those computers will be allowed to access to limit exposure to malicious content.</li>
<li>If you can&#8217;t dedicate a computer to access online banking, then consider using a <a title="Live CD" href="http://en.wikipedia.org/wiki/Live_CD" target="_blank">Live CD</a> of an operating system to just access the online banking system.</li>
</ol>
<p>For small financial institutions:</p>
<ol>
<li><span style="line-height: 13px;">Make the required investments to secure your data and network.</span></li>
<li>Perform regular security assessments to identify and address risks.</li>
<li>Train your employees to become more aware of security risks and what they must do to reduce those risks.</li>
<li>Educate your customers as to what they can do to protect themselves.</li>
</ol>
<p>Online banking is a huge timesaver for many a small business and with the right checks and balances can continue to be a safe way to manage your business&#8217; finances.</p>
<p><em><strong>Do you have any other tips that I should have mentioned? Feel free to add them to the comments below.</strong></em></p>
<p>Original article: <a href="https://www.interxect.com/zeus-malware-reboot/" rel="bookmark" title="Permanent link to 'Zeus Malware Reboot <small class="subtitle">SMEs and Small Financial Institutions Beware</small>'">Zeus Malware Reboot <small class="subtitle">SMEs and Small Financial Institutions Beware</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/zeus-malware-reboot/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">702</post-id>	</item>
		<item>
		<title>Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean ... and what we can do about it!</title>
		<link>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/</link>
					<comments>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 03 May 2013 16:45:52 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Caribbean]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[trends]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=691</guid>

					<description><![CDATA[Trend Micro, working jointly with the Organization of American States (OAS), released a study outlining the current state of cybersecurity in Latin America and the Caribbean. I read the reports and have distilled some of the highlights for you.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2013/05/Fotolia_19006864_XS.jpg"><img loading="lazy" decoding="async" class="size-post-image wp-image-692 alignleft" alt="cybercrime" src="https://www.interxect.com/main/wp-content/uploads/2013/05/Fotolia_19006864_XS-250x200.jpg" width="250" height="200" /></a>Today Trend Micro, working jointly with the Organization of American States (OAS), released a study outlining<a title="The State of Cybersecurity in Latin America" href="http://blog.trendmicro.com/trendlabs-security-intelligence/the-state-of-cybersecurity-in-latin-america/" target="_blank"> the current state of cybersecurity in Latin America and the Caribbean</a>. The study, while not eye opening – many of the risks have been known by IT Security Professionals for some time – offers a real qualitative and quantitative study of the cybersecurity threats that exists in the region.</p>
<p>While the report focused more on Latin America (the only Caribbean country with significant attention was Jamaica), our close proximity to South and Latin America means that we should consistently remain abreast of the developments there.</p>
<p>I read the reports and have distilled some of the highlights for you.<span id="more-691"></span></p>
<h2>In General</h2>
<p>A general increase in cyber incidents were reported by most countries. However, the belief is that this was due to better detection and security mechanisms put in place, indicating that attacks were happening all the time but were previously undetected. The report noted that in many instances there was no rating or scale used for the incidents that were detected.</p>
<h2>Growth of Hactivism</h2>
<p>An interesting trend that was noted was the growth in hacktivism or politically motivated hacking. These instances were not driven by financial gain, but were coordinated attack campaigns in response to legislative initiatives. These attacks brought the issue of cyber security to the forefront, and may have provided some benefit by making those in authority more aware of the threats out there.</p>
<h2>Financial Losses</h2>
<p>The report wasn’t able to quantify the losses caused by hacking, stating that it was impossible to gather, but still said that it was very high, possibly even greater than losses of any other form of crime. I find this a rather dubious claim though, and would prefer to see more evidence before stating such.</p>
<h2>Threat to Industrial Control Systems</h2>
<p>Industrial Control Systems (ICS) are at an even greater risk in the region, than in many other parts of the world. I gather that the report also included financial, transportation, healthcare, and telecommunications as having ICS. Trend micro found many ICS devices connected to the Internet, possibly for remote management and administration. This may not be a problem in itself, but it found that these systems will both unprotected by a password or unpatched. I know of a few cyber scams that have hit telecommunications companies within the region, but none that have hit industrial systems… as yet!</p>
<h2>Keeping up with Cybercriminals</h2>
<p>Trend micro found that the hackers in the region were learning from their counterparts in other developed countries, mainly from Eastern Europe. Meanwhile, law enforcement authorities were having a hard time keeping up with the cybercrime developments. The report cited inexperienced cybercrime investigators and the shortage of prosecutors who specialize in technology related offenses. There is also a need for highly skilled professionals who can secure networks, diagnose intrusions, and effectively manage cyber incidents.</p>
<h2>Inadequate Security and Awareness of the General Citizenry</h2>
<p>One of the conclusions formed was that the greatest form of attack was via file infections. This is an indication of insufficient security mechanisms on personal PCs and a lack of awareness of the general citizenry of how to protect themselves from cyber threats.</p>
<h2>Impediments to Cybersecurity within the Region</h2>
<p>The report brought to fore some of the major issues impeding the region’s cyber security efforts.</p>
<ul>
<li>Lack of information being shared about security events such as breaches, intrusion attempts, or attacks.</li>
<li>Lack of law enforcement or federal laws and regulations.</li>
<li>Skewed data about security incidents that may not be factual or just anecdotal evidence (“I heard that this happend&#8230;”).</li>
<li>Differing standards as to what constituted a cyber incidents. Some countries only counted attacks on the Government as incidents, while others count everything.</li>
<li>Lack of National Computer Security Incident Response Team (CSIRT).</li>
<li>Lack of highly skilled professionals in the area of cyber security.</li>
</ul>
<h2>Recommendations</h2>
<p>The report included three recommendations for governments and organizations in the region to help improve the state of cyber security.</p>
<ol>
<li>Raise awareness of safe cyber habits and general cybersecurity awareness among Internet users, critical infrastructure operators, and government employees.</li>
<li>Invest in and promote enrollment in technical degree programs to ensure an ample pool of qualified candidates from which to draw professionals that would be needed to fill the increasing number of information security careers.</li>
<li>Continue strengthening policy mechanisms to assign governmental roles and responsibilities related to cyber security and codifying information sharing and cooperation mechanisms.</li>
</ol>
<p>I would also include that the formation of CSIRT’s at both the organizational and the national levels, even at the regional level. This would help coordinate activities in addressing cyber security. And while I do not think we need to go as far as having degree programs, we do need to increase the pool of people who deeply know information security.</p>
<p>I recommend that you read <a title="Latin American and Caribbean Cybersecurity Trends and Government Responses" href="http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-latin-american-and-caribbean-cybersecurity-trends-and-government-responses.pdf" target="_blank">the report here (pdf)</a>, and please forward it to others, especially those in the position to take the cause forward.</p>
<p><em id="__mceDel">Do you think that enough efforts are being made to improve cyber security at both the organizational and that the governmental levels? Leave your comments below.</em></p>
<p>Original article: <a href="https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/" rel="bookmark" title="Permanent link to 'Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean <small class="subtitle">... and what we can do about it!</small>'">Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean <small class="subtitle">... and what we can do about it!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">691</post-id>	</item>
		<item>
		<title>Widespread Attack on WordPress Websites</title>
		<link>https://www.interxect.com/widespread-attack-on-wordpress-websites/</link>
					<comments>https://www.interxect.com/widespread-attack-on-wordpress-websites/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 13 Apr 2013 13:12:32 +0000</pubDate>
				<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=686</guid>

					<description><![CDATA[Over the past 3-4 days there have been a widespread, distributed attack on Wordpress sites.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-687" alt="Wordpress Login" src="https://www.interxect.com/main/wp-content/uploads/2013/04/wordpress_login_admin-250x200.png" width="250" height="200" />Over the past 3-4 days there has been a widespread, distributed attack on WordPress sites according to this article by <a title="Hackers Point Large Botnet At WordPress Sites To Steal Admin Passwords And Gain Server Access" href="http://techcrunch.com/2013/04/12/hackers-point-large-botnet-at-wordpress-sites-to-steal-admin-passwords-and-gain-server-access/" target="_blank">TechCrunch</a>.</p>
<p>The attacks use bots to attempt a brute force attack on WordPress installations using the default &#8220;admin&#8221; username and a dictionary of passwords.</p>
<p>Many websites, including ours, run on WordPress. It is recommended that you use a different administrative username and a strong password. Even if you are using a different administrative username, you should still use a strong password. See our article &#8211; <a title="5 Tips To Help You To Secure and Manage Your Passwords" href="https://www.interxect.com/main/2012/06/5-tips-to-help-you-to-secure-and-manage-your-passwords/" target="_blank">5 Tips To Help You To Secure and Manage Your Passwords</a> &#8211; on tips for strong password creation.</p>
<p>The attacks have died down over time, and many ISPs have put in measures to secure their users. Our ISP put out this <a title="Widespread Attack on WordPress Installations" href="http://www.site5.com/blog/s5/widespread-attack-against-wordpress-installations/20130412/" target="_blank">notice</a> yesterday. But this is no reason to relax. Security is about eternal vigilance, and you can bet that the next wave is coming.</p>
<p>Original article: <a href="https://www.interxect.com/widespread-attack-on-wordpress-websites/" rel="bookmark" title="Permanent link to 'Widespread Attack on WordPress Websites'">Widespread Attack on WordPress Websites</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/widespread-attack-on-wordpress-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">686</post-id>	</item>
		<item>
		<title>Security audit finds dev OUTSOURCED his JOB to China to goof off at work Can you stop this from happening in your business?</title>
		<link>https://www.interxect.com/security-audit-finds-dev-outsourced-his-job-to-china-to-goof-off-at-work/</link>
					<comments>https://www.interxect.com/security-audit-finds-dev-outsourced-his-job-to-china-to-goof-off-at-work/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Mon, 21 Jan 2013 18:57:41 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[outsourcing]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[work]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=639</guid>

					<description><![CDATA[The news reported that a top programmer in an infrastructure firm had outsourced his duties to a Chinese consultancy while he goofed off during work. Behaviour like this in your business can put it in serious risk for losses. How can you reduce the chances of such a thing happening? I have one way that may shock you.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/2013/01/security-audit-finds-dev-outsourced-his-job-to-china-to-goof-off-at-work/outsourcing-keyboard-key-finger/" rel="attachment wp-att-646"><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-646" alt="Outsourcing" src="https://www.interxect.com/main/wp-content/uploads/2013/01/Fotolia_46666259_XS-250x200.jpg" width="250" height="200" /></a>This one took me by surprise. The Register reported that a <a href="http://www.theregister.co.uk/2013/01/16/developer_oursources_job_china/">security audit found that a developer OUTSOURCED his job to China to goof off at work</a>. I certainly never thought of this as something that could happen, but it did, and it should be something that businesses should be concerned about.<span id="more-639"></span></p>
<p>This is purely an issue of work ethic, and the business is hardly to blame for the actions of the employee, however, if any damages were to occur because of it, the business may have been held accountable for it. To the business&#8217; credit, it had performed a security audit and was able to detect the act. But how many other businesses do not do the same? What other activities are taking place within your business that you are not aware of and has the potential to bring you heavy losses, both in reputation and finances?</p>
<p>Unethical behaviour in IT departments is of particular concern, as there is real potential of serious damage.</p>
<h2>How can we prevent this?</h2>
<p>The question remains how can businesses protect themselves from unethical behaviour such as this? I have pondered this for some time as many businesses use the NDA &#8211; Non-Disclosure Agreement &#8211; as a way to keep workers honest, but this still depends on ethics. You can act like &#8220;big brother&#8221; and monitor your employees&#8217; every move, but that will just decrease morale. A regular and consistent audit may be the best way to capture these events, but this suffers from two disadvantages &#8211; it&#8217;s a costly recurring expense, and it captures incidents after the fact, when the damage is already done.</p>
<p>There is one thing you can try that I think is the best option.</p>
<h2>Another Approach</h2>
<p>The best way to approach this, in my opinion, is to try to prevent it from happening at all. We do this by maintaining a proper and open relationship with your employees.</p>
<p>Be approachable to employees and allow them speak openly about their concerns. Sincerely try to address their concerns and be honest about situations &#8211; if they can&#8217;t trust you, then they will have no qualms about betraying your trust.</p>
<p>Create a culture of ethical habits by setting the example for the employees to follow, such as giving recognition and credit where due, by not engaging in corrupt practices, or by not pushing the envelope of what might be ethical behaviour.</p>
<h2>The Best Way?</h2>
<p>Will this prevent bad behaviour from ever happening? No,  I seriously doubt that. Within everyone there is a bad and good side &#8211; yin and yang &#8211; and what you need to do is create an environment where it is easier to do good, and be good. Perhaps I&#8217;m being optimistic, but I&#8217;d rather be a wrong optimist than a right pessimist.</p>
<p>Original article: <a href="https://www.interxect.com/security-audit-finds-dev-outsourced-his-job-to-china-to-goof-off-at-work/" rel="bookmark" title="Permanent link to 'Security audit finds dev OUTSOURCED his JOB to China to goof off at work <small class="subtitle">Can you stop this from happening in your business?</small>'">Security audit finds dev OUTSOURCED his JOB to China to goof off at work <small class="subtitle">Can you stop this from happening in your business?</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/security-audit-finds-dev-outsourced-his-job-to-china-to-goof-off-at-work/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">639</post-id>	</item>
		<item>
		<title>Java 7 Update 6 0-Day Exploit in the Wild</title>
		<link>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/</link>
					<comments>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 30 Aug 2012 11:53:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Java applet]]></category>
		<category><![CDATA[Java Virtual Machine]]></category>
		<category><![CDATA[Oracle Corporation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Zero-day attack]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=390</guid>

					<description><![CDATA[Java, a programming language whose runtime libraries are used by millions of computer systems all over the world, has several vulnerabilities, one of which is already exploitable by malicious hackers.]]></description>
										<content:encoded><![CDATA[<p><a href="http://commons.wikimedia.org/wiki/File%3AJava_logo_and_wordmark.svg" target="_blank"><img loading="lazy" decoding="async" class="zemanta-img-inserted zemanta-img-configured alignleft" title="Java (programming language)" alt="Java (programming language)" src="http://upload.wikimedia.org/wikipedia/commons/a/a4/Java_logo_and_wordmark.svg" width="144" height="264" /></a></p>
<p>The latest version of Java &#8211; Version 7 Update 6 &#8211; has several vulnerabilities, one of which a proof-of-concept exploit has been <a title="Zero Day Season is not over yet" href="http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html" target="_blank">released in the wild</a>. <span id="more-390"></span>Rapid7, owners of the <a title="Metasploit" href="http://www.rapid7.com/products/penetration-testing.jsp" target="_blank">Metasploit Framework</a>, already has a<a title="Let's start the week with a new Java 0-day in Metasploit" href="https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day" target="_blank"> working update to exploit the vulnerability</a>.</p>
<p>It seems that Oracle <a title="Oracle knew about critical Java flaws since April" href="http://www.theregister.co.uk/2012/08/30/oracle_knew_about_flaws/" target="_blank" data-bitly-type="bitly_hover_card">knew of the vulnerabilities since April</a> of this year and as of today, they remain unpatched. A lot of developers believe that Oracle has not been friendly to software projects of Sun, such as Java, MySQL and Open Office, and this is just one piece of evidence to suggest that. We would not be surprised, as Oracle acquired Sun for their hardware business.</p>
<p>We suggest disabling Java in your browsers until the vulnerabilities are patched and run it only on trusted, signed sites. Mozilla Firefox’s latest update is already <a title="Protecting Users Against Java Security Vulnerability" href="https://blog.mozilla.org/security/2012/08/28/protecting-users-against-java-security-vulnerability/" target="_blank" data-bitly-type="bitly_hover_card">blocking the unsafe versions of Java by default</a>.</p>
<p>Be safe out there.</p>
<p><span style="text-decoration: underline;"><strong>Update:</strong></span> Oracle has fixed the critical vulnerabilities. We recommend that you apply the patch as soon as possible. You can read more about the fix <a title="Security Alert for CVE-2012-4681 Released" href="https://blogs.oracle.com/security/entry/security_alert_for_cve_20121" target="_blank">here</a>.</p>
<p>It doesn&#8217;t appear that all the vulnerabilities identified by researchers have been addressed and we hope that those fixes will be forthcoming before the next proof-of-concept exploit is released.</p>
<div class="zemanta-pixie"><img decoding="async" class="zemanta-pixie-img" alt="" src="http://img.zemanta.com/pixy.gif?x-id=0349ed0e-6f3a-4687-82c2-0c8ee4affef2" /></div>
<p>Original article: <a href="https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/" rel="bookmark" title="Permanent link to 'Java 7 Update 6 0-Day Exploit in the Wild'">Java 7 Update 6 0-Day Exploit in the Wild</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">390</post-id>	</item>
		<item>
		<title>MySQL Vulnerability Allows Attackers to Bypass Password Verification</title>
		<link>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/</link>
					<comments>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 03:51:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[Joomla]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=299</guid>

					<description><![CDATA[Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png"><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-361" title="mysql" src="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png" alt="" width="300" height="155" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png 489w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Security researchers have released details about a <a title="MySQL vulnerability allows attackers to bypass password verification" href="http://www.computerworld.com/s/article/9227965/MySQL_vulnerability_allows_attackers_to_bypass_password_verification" target="_blank">vulnerability in the MySQL server</a> that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.</p>
<p>The vulnerability occurs only on *NIX based systems and Microsoft Windows systems are not affected by this vulnerability.</p>
<p><span id="more-299"></span>No official patch is available for MySQL 5.0.x, because that version of thedatabase server is no longer supported by Oracle. However, some Linux vendors might backport the patch from MySQL 5.1 or 5.5. This also affects people with personal blogs on private Linux hosts that use MySQL back-ends for web applications such as WordPress, Joomla and Drupal.</p>
<p>Any Internet accessible MySQL database is extremely vulnerable, and those in <a title="Expect A Surge In Breaches Following MySQL Vulnerability" href="http://www.darkreading.com/database-security/167901020/security/vulnerabilities/240001958/expect-a-surge-in-breaches-following-mysql-vulnerability.html" target="_blank">security circles are warning of a wave of attacks</a>. To reduce the risk, configure your MySQL databases to accept connections from only authorised IP addresses and try not to allow any public IPs access to the databases.</p>
<p>Original article: <a href="https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/" rel="bookmark" title="Permanent link to 'MySQL Vulnerability Allows Attackers to Bypass Password Verification'">MySQL Vulnerability Allows Attackers to Bypass Password Verification</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">299</post-id>	</item>
		<item>
		<title>CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</title>
		<link>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/</link>
					<comments>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 02:31:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Advanced Micro Devices]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[CERT-US]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=292</guid>

					<description><![CDATA[The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png"><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-363" title="US-CERT" src="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png" alt="" width="300" height="82" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png 691w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>The <a title="United States Computer Emergency Readiness Team" href="http://www.us-cert.gov/" target="_blank">US Computer Emergency Response Team (US-CERT)</a> has advised that <a title="SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware" href="http://www.kb.cert.org/vuls/id/649219" target="_blank">some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable</a> to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.</p>
<p>The vulnerability is identified as CVE-2012-0217 and stems from the way Intel 64 CPUs have implemented the SYSRET instruction. The vulnerability can only be exploited on Intel CPUs when the Intel 64 extension is in use, that is, using a 64-bit OS; 32-bit OSes are not affected.</p>
<p><span id="more-292"></span>AMD does not implement the SYSRET instruction the same way and is not similarly affected. However, systems running on AMD64 chips may lock up under an attack and may therefore pose a Denial of Service (DoS) vulnerability.</p>
<p>A list of vendors and their vulnerability status is shown below. Note that this list may not be updated and you should check the CERT-US website for updates.</p>
<table id="vendor-info2" border="1px">
<tbody>
<tr>
<th width="120px">Vendor</th>
<th width="80px">Status</th>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FNG" data-bitly-type="bitly_hover_card">Citrix</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPR" data-bitly-type="bitly_hover_card">FreeBSD Project</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ2" data-bitly-type="bitly_hover_card">Intel Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FQC" data-bitly-type="bitly_hover_card">Joyent</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ5" data-bitly-type="bitly_hover_card">Microsoft Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ8" data-bitly-type="bitly_hover_card">NetBSD</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQB" data-bitly-type="bitly_hover_card">Oracle Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQE" data-bitly-type="bitly_hover_card">Red Hat, Inc.</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHYB" data-bitly-type="bitly_hover_card">SUSE Linux</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWQ9S" data-bitly-type="bitly_hover_card">Xen</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/JALR-8V8LFS" data-bitly-type="bitly_hover_card">AMD</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPN" data-bitly-type="bitly_hover_card">Apple Inc.</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQL" data-bitly-type="bitly_hover_card">VMware</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHXX" data-bitly-type="bitly_hover_card">Debian GNU/Linux</a></td>
<td>Unknown</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWPX7" data-bitly-type="bitly_hover_card">Fedora Project</a></td>
<td>Unknown</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Interxect Services advises customers to update your systems with vendor approved patches as they become available.</p>
<p>Original article: <a href="https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/" rel="bookmark" title="Permanent link to 'CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks'">CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">292</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 2/60 queries in 0.041 seconds using Disk (Request-wide modification query)

Served from: www.interxect.com @ 2025-05-26 11:11:24 by W3 Total Cache
-->