UK TROOPS TO TRAIN MODERATE SYRIAN OPPOSITION » THE Defence Secretary has announced today that the UK will provide further support to the internatio... Options secure new multi-million pound banking f... » London / New York: Options has announced that they have secured a new multi-million pound banking fa... £200,000 Tees Valley Catalyst Fund loan helps Co... » A Cramlington-based company has won a $6 million contract with Hyundai Engineering & Construction to... 2019: The danger that lies ahead, but what time is... » A SPECIAL ANALYSIS ON THE NIGERIAN POLITY FROM 1914 - TILL THE PRESENT “Justice is the constant... GOODLUCK EBELE JONATHAN & HIS ROCK STEADY BROTHEL:... » THE DUMBING DOWN OF VALUES IN THE AGE OF JONATHAN: STANDARDS IN PUBLIC LIFE BEGINNING AT THE PRESIDE... Becrypt announces publication of CESG approved gui... » London, UK: Becrypt has announced that CESG, the UK’s National Technical Authority on Information As... Semafone partners with AsiaPay to offer secure pay... » Guildford, Surrey, UK: AsiaPay has announced that Semafone®, the international provider of secure pa... Wick Hill named as one of ‘1000 companies to inspi... » Woking, Surrey: After an incredibly successful 2014, and being named Woking’s ‘Most Successful Compa... Trans-national terrorism and extremism in West Afr... » (A SPECIAL POLITICAL ANALYSIS FROM 1804 TILL THE PRESENT) BY JOHN ODEY ADUMA, PUBLISHER AND BRITIS... University’s unique deal to help modernise Malaysi... » Every police officer in Malaysia will have their training accredited by the University of Derby, in ...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

MANCHESTER, UNITED KINGDOM: Commenting on the active hacker exploitation of the latest Java zero-day vulnerability - which has already been included in the BlackHole and Cool Exploit kits - Avecto says this is an IT security disaster in progress, as there is currently no patch available for the problem.

 

According to Andrew Avanessian, VP of Global Professional Services with the Windows privilege management specialist, the vulnerability has also been added to the Nuclear Pack and Redkit exploit kits, strengthening the argument that Java should be carefully controlled on most endpoint systems.

"Whether or not Java is allowed to free reign on employee PCs, however, is actually secondary to the removal of admin rights from user accounts, as with standard user rights it is a relatively easy task to mitigate the effects of Java vulnerabilities on the Windows platform," he said.

"Put simply, without admin rights, it is difficult for cybercriminals to deploy malware capable of installing a root kit - or embedding itself in the operating system. The worst case scenario is where the malware runs in the user's profile - a problem that can be solved by removing the profile, rather than re-installing the operating system, with all the hassle this entails," he added.

Avecto’s VP of Professional Services went on to say that, once the admin rights have been removed, there is still a relatively small attack surface to deal with - and this issue can be remediated using a whitelisting security approach.

This, he says, is where the IT system only allows trusted `digitally signed' applications to run.

The good news, he adds, is that this approach also reduces the potential mis-configuration of endpoints by the user, which helps to strengthen the security model of the business IT platform in question.

Companies, says Avanessian, frequently underestimate the increases in security that can be derived through the removal of admin rights and whitelisting, despite the fact that processes can be easy to set up.

“Our observations suggest that many IT managers perceive these processes as being too hard to achieve, so they either avoid or simply don’t bother considering them. The reality is that, with the correct admin rights audit and allied requirements capture sessions in place, the right balance between security and flexibility is relatively easy to achieve,” he explained.

Avanessian says that adding a privilege management system to the security mix offers additional levels of flexibility and a positive user experience, especially against a backdrop of continuing security issues with Java, which appears to be caused by vulnerabilities in the platform.

“Simply removing Java from a computer system is not, sadly, the solution, owing to the wide variety of legacy applications that require its presence. The good news, however, is that with finer grained control over the code environment, IT professionals can mitigate most of the problems,” he said.

“One area worth noting is the issue of standard application installs and portable apps. There are several vendors developing applications, which do not need privileged accounts to run or install and, as a result, the endpoint build can become cluttered with unauthorised and unlicensed software. Application whitelisting goes a long way towards mitigating against this issue,” he added