Gartner has released a report on the future of global information security. This special report will explore the major tectonic forces at play that will change how business use of technology will be dramatically changed by rapid escalations in threat, defense and societal demands. The report can be accessed here.
Information security for non-technical managers by Dr Eduardo Gelbstein
This book presents a non-technical overview of the main elements of managing information security, where everyone, not just technical people, has a role to play.
Modern economies are highly dependent on information systems and networks connected to “cyberspace” a virtual world with a population of several billion and growing.
Cyberspace is inherently insecure. Achieving acceptable information security requires building awareness of what it takes to achieve it, mitigating vulnerabilities in people, processes and technologies and constant adaptation to a rapidly changing environment.
A download of the e-book is available.
Multiple vulnerabilities have been discovered in Google Chrome that could allow remote code execution, bypass of security restrictions, or cause denial-of-service conditions. Google Chrome is a web browser used to access the Internet. Details are not currently available that depict accurate attack scenarios, but it is believed that some of the vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page.
Successful exploitation of these vulnerabilities may result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
- Google Chrome Prior to 28.0.1500.71
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: High
Multiple vulnerabilities have been discovered in Google Chrome. Details of these vulnerabilities are as follows:
- A security vulnerability exists in Block pop-unders in various scenarios. [CVE-2013-2867]
- A security vulnerability occurs due to confusion setting up sign-in and sync. [CVE-2013-2879]
- A security vulnerability occurs due to the incorrect synchronization of the NPAPI extension component. [CVE-2013-2868]
- An out-of-bounds-read condition exists when handling JPEG2000. [CVE-2013-2869]
- A use-after-free vulnerability occurs when handling network sockets. [CVE-2013-2870]
- A security-bypass vulnerability, which allows attackers to perform man-in-the-middle attacks against HTTP in SSL. [CVE-2013-2853]
- A use-after-free vulnerability exists in input handling. [CVE-2013-2871]
- A security vulnerability exists due to a possible lack of entropy in renderers. [CVE-2013-2872]
- A use-after-free vulnerability exists in resource loading. [CVE-2013-2873]
- An information disclosure vulnerability that allows screen data leak with GL textures. [CVE-2013-2874]
- An out-of-bounds read condition exists in SVG. [CVE-2013-2875]
- A security-bypass vulnerability due to Extensions permissions confusion with interstitials. [CVE-2013-2876]
- An out-of-bounds read in XML parsing. [CVE-2013-2877]
- A security vulnerability affects the ‘viewsource’ attribute on iframes.
- An out-of-bounds read condition exists in text handling. [CVE-2013-2878]
- Various fixes from internal audits, fuzzing and other initiatives (Chrome 28) [CVE-2013-2880]
Successful exploitation of some of the above vulnerabilities could result in an attacker gaining the same privileges as the user. Depending on the privileges associated with the user, an attacker could install programs; view, change, delete data; or create new accounts with full user rights. Failed exploit attempts will likely cause denial-of-service conditions.
We reccomend the following actions be taken:
- Update vulnerable Google Chrome products immediately after appropriate testing by following the steps outlined by Google.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Do not open email attachments or click on URLs from unknown or un-trusted sources.