About Jonathan Cilley


The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source | WIRED

The National Security Agency develops advanced hacking tools in-house for both offense and defense—which you could probably guess even if some notable examples hadn’t leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency chose for the first time demonstrated Ghidra, a refined internal tool that it has chosen to open source. And while NSA cybersecurity advisor Rob Joyce called the tool a “contribution to the nation’s cybersecurity community” in announcing it at RSA, it will no doubt be used far beyond the United States.

You can’t use Ghidra to hack devices; it’s instead a reverse engineering platform used to take “compiled,” deployed software and “decompile” it. In other words, it transforms the ones and zeros that computers understand back into a human-readable structure, logic, and set of commands that reveals what the software you churn through it does. Reverse engineering is a crucial process for malware analysts and threat intelligence researchers, because it allows them to work backward from software they discover in the wild—like malware being used to carry out attacks—to understand how it works, what its capabilities are, and who wrote it or where it came from. Reverse engineering is also an important way for defenders to check their own code for weaknesses, and confirm that it works as intended.

“If you’ve done software reverse engineering what you’ve found out is it’s both art and science, there’s not a hard path from the beginning to the end,” Joyce said. “Ghidra is a software reverse engineering tool built for our internal use at NSA. We’re not claiming that this is the one that’s going to be replacing everything out there—it’s not. But it helped us address some things in our work flow.”

“There’s really no downside.”

Former NSA Hacker Dave Aitel

Similar reverse engineering products already exist on the market, including a popular disassembler and debugger called IDA. But Joyce emphasized that the NSA has been developing Ghidra for years, with its own real-world priorities and needs in mind, which makes it a powerful and particularly usable tool. Products like IDA also cost money, whereas making Ghidra open source marks the first time that a tool of its caliber will be available for free—a major contribution in training the next generation of cybersecurity defenders. (Like other open source code, though, expect it to have some bugs.) Joyce also noted that the NSA views the release of Ghidra as a sort of recruiting strategy, making it easier for new hires to enter the NSA at a higher level, or for cleared contractors to lend their expertise without needing to first come up to speed on the tool.

The NSA announced Joyce’s RSA talk, and Ghidra’s imminent release, in early January. But knowledge of the tool was already public thanks to WikiLeaks’ March 2017 “Vault 7” release, which discussed a number of hacking tools used by the CIA and repeatedly referenced Ghidra as a reverse engineering tool created by the NSA. The actual code hadn’t seen the light of day, though, until Tuesday—all 1.2 million lines of it. Ghidra runs on Windows, macOS, and Linux, and has all the components security researchers would expect. But Joyce emphasized the tool’s customizability. And it is also designed to facilitate collaborative work among multiple people on the same reversing project—a concept that isn’t as much of a priority in other platforms.

Ghidra also has user interface touches and features meant to make reversing as easy as possible, given how tedious and generally challenging it can be. Joyce’s personal favorite? An undo/redo mechanism. It allows users to try out theories about how the code they are analyzing may work, with an easy way to go back a few steps if the idea doesn’t pan out.

The NSA has made other code open source over the years, like its Security-Enhanced Linux and Security-Enhanced Android initiatives. But Ghidra seems to speak more directly to the discourse and tension at the heart of cybersecurity right now. By being free and readily available, it will likely proliferate, and could inform both defense and offense in unforeseen ways. If it seems like releasing the tool could give malicious hackers an advantage in figuring out how to evade the NSA, though, Dave Aitel, a former NSA researcher who is now chief security technology officer at the secure infrastructure firm Cyxtera, says that that isn’t a concern.

“Malware authors already know how to make it annoying to reverse their code,” says Aitel. “There’s really no downside” to releasing Ghidra.

No matter what comes next for the NSA’s powerful reversing tool, Joyce emphasized on Tuesday that it is an earnest contribution to the community of cybersecurity defenders—and that conspiracy theorists can rest easy. “There’s no backdoor in Ghidra,” he said. “Come on, no backdoor. On the record. Scout’s honor.”

More Great WIRED Stories

This content was originally published here.



Global Software Testing Market Report forecast to 2025 by Applications – Artificial Intelligence Testing, Cybersecurity Testing – Chronicle India


Software testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation.

Overview of Software Testing Market

The fundamental purpose of Software Testing Market report is to provide a correct and strategic analysis of the Software Testing industry. The report scrutinizes each segment and sub-segments presents before you a 360-degree view of the said market.

A primary purpose of testing is to detect software failures so that defects may be discovered and corrected. Testing cannot establish that a product functions properly under all conditions, but only that it does not function properly under specific conditions. In the current culture of software development, a testing organization may be separate from the development team. There are various roles for testing team members.

Get Sample report of Software Testing Market @ https://www.reportsmonitor.com/request_sample/27510

The report offers an entire evaluation of the marketplace. It does so through in-intensity qualitative insights, recorded insights, and future projections. The projections included in the report had been founded employing established research assumptions and methodologies.

Market share of global Software Testing industry is dominate by companies like Capgemini, Wipro, Cognizant, HP, Infosys, TCS, Hexaware, Katalon Studio, IBM, Tricentis Tosca Testsuite, Worksoft Certify, TestPlant eggPlant Functional.

Industry Insight:

This report studies the Software Testing market, Software testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include the process of executing a program or application with the intent of finding software bugs (errors or other defects), and verifying that the software product is fit for use.

Check discount for this report @ https://www.reportsmonitor.com/check_discount/27510

The Software Testing Market report is a compilation of first-hand information, qualitative and quantitative assessment by industry analysts, inputs from industry experts and industry participants across the value chain. The report provides in-depth analysis of parent market trends, macro-economic indicators and governing factors along with market attractiveness as per segments. The report also maps the qualitative impact of various market factors on market segments and geographies.

Product Type Coverage (Market Size & Forecast, Major Company of Product Type etc.): Test Consulting And Compliance, Quality Assurance Testing, Application And Software Testing, Risk And Compliance Testing Covering, Others.

Application Coverage (Market Size & Forecast, Different Demand Market by Region, Main Consumer Profile etc.): Artificial Intelligence Testing, Cybersecurity Testing, Blockchain Testing, IoT Testing, Others.

Market segment by Regions/Countries, this report covers: North America, Europe, China, Japan, Southeast Asia, India.

Key Stakeholders

Software Testing Manufacturers, Software Testing Distributors/Traders/Wholesalers, Software Testing Subcomponent Manufacturers, Industry Association, Downstream Vendors

Report Highlights:

– Detailed overview of Software Testing market

– Changing market dynamics of the industry

– In-depth market segmentation

– Historical, current and projected market size in terms of volume and value

– Recent industry trends and developments

– Competitive landscape of Software Testing market

– Strategies of key players and product offerings

– Potential and niche segments/regions exhibiting promising growth

– A neutral perspective towards Software Testing market performance

– Must-have information for market players to sustain and enhance their market footprint

In the end Software Testing Market Report delivers conclusion which includes Research Findings, Market Size Estimation, Breakdown and Data Triangulation, Consumer Needs/Customer Preference Change, Data Source. These factors will increase business overall.

This content was originally published here.



5 Ways to Prioritize Cybersecurity for Your Business

Image credit: Michael Traitov/Shutterstock

Cybersecurity isn’t just a small IT function — it’s a key part of the business foundation.

Until now, cybersecurity has mostly been an afterthought for small business. It’s been something that tends to fall within the domain of the IT team—they might set up a firewall, download some antivirus software, and call it a day.

Today, smart business leaders are learning quickly that cybersecurity isn’t just a small function of IT — it’s a key part of the foundation that holds up the entire business. In recent years, we’ve seen significant breaches from large companies like Equifax. But now more than ever, we’re hearing about it at the local level: For example, a school system in Maine being hit with ransomware, or manufacturers being targeted nationwide. In order to protect your proprietary data, your customers, and your reputation, it’s critical to build a strong cybersecurity posture for your company.

So what can you do to make cybersecurity a priority throughout the company?

It’s not simply about deploying the right technology — it’s about creating processes and educating your team to ensure that cybersecurity is thought about in everything you do. As a business owner or manager, you have the freedom to lead the way and set the tone. It all begins with a proactive approach to cybersecurity that runs top down and throughout the organization.

1. Lead by example, make it your culture

Cybersecurity isn’t a project; it’s a posture. Just like your health, it’s something that needs to be continuously monitored and improved. The best way to imbue that mindset is to lead by example. Make cybersecurity a company priority, talk about it throughout the organization at all levels, and practice what you preach so everyone understands its importance and how to participate themselves.

2. Educate your team

It’s not enough to simply be aware of best practices yourself—you need to be sure that everyone adopts and follows your policies. Leverage cybersecurity training content and sessions to help your employees stay up to speed, and give them the opportunity to ask questions.

3. Get the right technology in place

You most likely already have a firewall and antivirus software, but are those up to date and being patched regularly? And what about the other tools such as regularly monitoring and protecting your company website, having a password vault to simplify password management and ensure everyone creates strong passwords or secure email to encrypt sensitive messages? Mobile device management, encryption, etc., the list goes on and on. Look for software and tools that are easy to use, for administrators and employees.

Editor’s note: Need a mobile device management solution? Fill out the below questionnaire to be connected with vendors that can help.

4. Pressure-test your process

It’s critical to ensure that what you have in place is actually working. After all, most data breaches are the result of human error. It’s a problem, even for the large organizations. For example, in the Equifax case, an IT employee neglected to install a security patch for a software vulnerability, even though the company had made it available. In the case of a Yahoo breach, an employee was “spear fished” and unwittingly provided authentication details that led to the exposure of over 500,000 Yahoo accounts.

5. Gauge and engage

To ensure your cybersecurity efforts and guidelines are working to protect your company, you’ll need to regularly test and monitor employee awareness. This might include sending fake phishing emails to employees to see if they are prone to clicking on bad links or opening files they shouldn’t and adopting a monthly routine of short awareness videos to continuously educate everyone in the organization. It can also include “ethical hacking”—in which a third-party is hired to attempt to break-in to company networks and computers then report back on how far they got and if they found their way to the crown jewels.

Getting these insights will help you determine whether additional training is needed, or whether a manager should check in with specific employees to help them remember the policies and improve their own posture. It’s important to find any weak links in your people, processes, or technology now instead of after an attack.

Leading the way to strong cybersecurity

As the business leader, you have the most at stake to lose in the event of an attack. So rather than put off a cybersecurity plan for another day, make it a top priority to build a strategy for proactively defending your company.

Bring together the foundation, culture, and technology that will make your effort a success. Whether you have a cybersecurity background yourself isn’t the point; what matters is that you’re aware of its importance to your organization and can bring together the right approach and solutions to ensure success on this mission. You have the freedom and ability to set the goals for your company to work towards. If you haven’t already, remember to make cybersecurity one of them.

This content was originally published here.



Bitcoin price news: BTC price SLUMP after CipherTrace cybersecurity hacking report

Bitcoin price news: Bitcoin has had another slow 24 hours of trading (Image: GETTY)

Ethereum’s (ETH) price has fallen 1.5 percent to US$203.60 (£156), reducing ETH’s market capitalisation to $20.9billion (£15billion).

Meanwhile, Ripple’s price has tumbled 2.7 percent to 45.44 US cents, which leaves the altcoin with a market capitalisation of just under $18.2billion ($14billion).

And EOS is down 0.5 percent to US$5.37 (£4.12), leaving it with a market capitalisation of just under US$4.9 billion (£3.8billion).

The decline across the board can be partly explained by a Reuters report into crypto theft, which may have spooked traders.

The news story cited a report from US-based cyber security firm CipherTrace released last week.

It stated theft of cryptocurrencies through hacking of exchanges and trading platforms soared to $927million (£712million) in the first nine months of 2018.

A previous report from CipherTrace revealed digital currencies stolen from exchanges in 2017 totalled just $266million (£204million).

The alarming figures were up almost 250 percent from the levels seen in 2017 according to the report, which looked at criminal activity and money laundering in the digital currency space.

The cryptocurrency markets have experienced a downward turn over the last few hours (Image: GETTY)
A Graph shows the price slump over the past 24 hours (Image: Coin Market Cap )

Bitcoin’s surge in popularity and the appearance of more than 1,600 other digital coins or token have attracted an abundance of hackers into the digital currency market, the report stated.

Dave Jevans, chief executive officer of CipherTrace, told Reuters: “The regulators are still a couple of years behind because there are only a few countries that have really applied strong anti-money laundering laws.”

Mr Jevans, who is also the chairman of the Anti-Phishing Working Group, a global organisation aimed at combatting cybercrime, said there were likely 50 percent more criminal transactions than those featured in his report.

The news raises questions over whether stricter regulation needs to be enforced in the cryptocurrency sphere.

Blockbid COO, David Sapper, told Express.co.uk: “Regulation will more than likely be beneficial to cryptocurrency prices because it creates the boundaries in which cryptocurrencies can operate and therefore flourish.

“I believe a big part of the ‘problem’ or major reason for market volatility is because of the cryptocurrency space being like the Wild West.

“Regulation might have a negative impact on cryptocurrency prices in the short-term but are necessary for sustainability and growth in the long-term.”

Bitcoin price latest: a report on hacking may have influenced the slump (Image: GETTY)

Mr Sapper also highlighted the typically precarious nature of crypto investment, due to the digital currencies being highly volatile and unpredictable.

The cryptocurrency expert said: “It is still too early on for Bitcoin to have properly reached the point of having a stable price.

“There will continue to be fluctuations until more widespread commercial adoption occurs – as well as further regulation and implementation by financial institutions.”

This content was originally published here.




Columbus State Ranked as Top Online Cybersecurity Master’s Program

Columbus State University was recently recognized by TheBestSchools.org as offering one of the best online master’s in cyber crime programs. Upon reviewing all accredited online master’s in cybercrime degree programs, TheBestSchools.org ranked CSU as No. 38 in the country.

CSU’s online master’s of applied science with a concentration in cybersecurity is a 30 to 34 credit hour program with coursework in computer network and management, software testing and quality assurance, and applied crytography.

To learn more about CSU’s online master’s of applied science with a concentration in cybersecurity, click here. To read the review from TheBestSchools.org, click here.

This content was originally published here.




Cybersecurity – It’s Just One Piece of a Comprehensive Information Security Program

Written by John Remsey, IMEC Senior Technical Specialist

Cybersecurity has become a hot topic within manufacturing over the past months, especially for the Defense supply chain with the federal government increasing their emphasis on addressing threats to the security of information.  In December 2015, the U.S. Department of Defense (DOD) released a rule to the Defense Acquisition Federal Regulation Supplement (DAFRS) that requires government contractors to implement the requirements of National Institutes of Standards and Technology (NIST) Special Publication (SP) 800-171 by December 31, 2017.  With this deadline fast approaching, conversation, and urgency, to become compliant is increasing.

The requirements of NIST SP 800-171 are intended to protect the confidentiality of Controlled Unclassified Information (CUI) in non-federal organizations and their supply chains.  A failure to meet these requirements may result in the loss of supply contracts and liability for the organization should an escape of CUI occur internally or their suppliers and service providers.  While organization doing business with the federal government should expect these types of requirements to increase over time, it is good practice for all organizations (manufacturers included) to protect information they have been provided during business activities.

While Cybersecurity, and the external threats commonly associated with it such as Hacking, Spyware, Ransomware and Malware, is very important, it’s also important to realize that it is just ONE PIECE of an effective Information Security Program.  An organization’s exposure to information vulnerabilities extends well beyond the interconnected world.  A comprehensive Information Security program also includes:

•  Privacy: Adequately protecting the information and identity of your Employees, Customers, Suppliers and other Resource Providers.  Ensuring that controls, systems and procedures are in place to restrict access to this information to only those who absolutely need it and include procedures for the archiving and purging of excess, expired or unnecessary information.

•  Physical Security: Protecting, limiting and monitoring access to information stores and access points.  Securing data storage, access points and other means of physical access.

•  Contingency Planning & Disaster Recovery: Developing, testing and deploying the tools and processes needed to quickly and effectively recover information in event of a catastrophe.  Speed to recovery from an information event can be the difference between recovery and loss of operations.

•  Operational Security: Protecting private business intentions, processes and Media response channels.  Limiting the access to strategic and market differentiating information.  Developing an informational response plan to quickly and effectively address any potentially adverse information regarding the organization.

•  Personnel Security: Implementing background checks for staff and service providers with access to information as well as behavior monitoring to proactively detect exposure risks.  Implement the tools and procedure necessary to have confidence that those invited to access information are focused on using it for the good of the organization and its stakeholders.  Monitor activity at all levels and implement triggers and warnings should information flow or user behaviors vary beyond normal expectations.

Manufacturers have a variety of tools available to help pursue comprehensive organizational security, starting with cybersecurity.  The first step is to determine one’s existing cybersecurity protections and tools and identify easy gaps to fill.  Taking protective steps can decrease the time and resources spent on a security breach.  Contact IMEC at info@imec.org or 888.806.4632 to learn more about existing self-assessments to get your company started.






South Africa’s information security challenges

South Africa is one country that has been struggling to come to terms with the huge cyber security problem it faces. According to the Global Fraud Report, an annual publication that ranks regions according to the number of incidents of cybercrime, sub-Saharan Africa has the third highest exposure to incidents of cyber fraud of any region in the world. And, according to the research, incidences of cybercrime and cyber security breaches are rising.

South Africa is one of the leading targets for cybercriminals on the African continent due to its relatively high rate of internet connectivity in relation to other African countries. This opens it up to all kinds of threats, many of which businesses and private individuals are ill-equipped to deal with.

What type of risks does it face?

As with other countries around the world, South Africa faces and an ever-evolving range of threats. However, the Global Fraud Report ranks data deletion due to system issues as the most prevalent form of attack. After that, wire transfer accounted for 26 percent of cybercrime in the country, which was far above the global average of 14 percent.

Other prevalent forms of attack include viruses and email-based phishing scams, which cause such problems that short-term South African lender Wonga has recently produced a guide to help its customers identify genuine and fake emails.

The report also looked at the numerous threats to South African businesses, with unlawful acquisition or interference with sensitive data the most common. In fact, data breaches were found to have a total organisational cost of R20,6 million.

The introduction of the Cybercrimes and Cyber Security Bill

Until very recently, South Africa did not have any legislation in place to combat cybercrimes. On 21 February 2017, all that changed with the introduction of the Cybercrimes and Cyber Security Bill. That criminalised a number of activities that includes but is not limited to:

  • Unlawful acquisition of data

  • Unlawful acts in respect of software or hardware tools

  • Unlawful interference with a computer programme

  • Unlawful acquisition, possession, provision, receipt or use of password, access codes or similar data or devices

  • Unlawful interference with a computer data storage medium or computer system

The Bill also imposes a range of penalties for offenders which includes fines and custodial sentences of up to 15 years.

The first line of defence

Although the new legislation will make it easier to prosecute those involved in cybercrime, it will not help to protect businesses and private individuals in the first instance. When it comes to your personal finances, the onus is on you to protect yourself.

This can be done by:

  • Updating your operating system, software and internet browser

  • Regularly running up-to-date antivirus software

  • Keeping a backup of important files

  • Regularly changing your passwords

  • Learning to recognise the signs of phishing scams

Do you think the government is doing enough to combat cybercrime?

Perhaps you’ve been a victim?

Please share your experiences in the comments below.

Partner Content: This article is brought to you by Wonga.