IntraLinks VIA introduces the “UNshare” for information security

If there’s one thing the internet has taught the business universe over its relatively short lifetime, it’s that information is valuable – so valuable, in fact, that there’s an industry built around securing digital information of all types. This week we’ve had the opportunity to speak with a company with a 16-year history in this market: IntraLinks. They’ve let us know what they do to provide a forward-thinking model for file and information sharing and collaboration in the future, complete with the ability to kick out what they call the “oops moment” when you’ve shared something by mistake – or if a file goes rogue.

viago

IntraLinks was founded by security specialists in the banking world and created for the security of investment banking, strategic transactions, and large multi-million deals. The Company’s platform was created to secure – and continue to secure – the sharing of non-public information. IntraLinks’s SVP of Product Marketing Wade Callison let us know the extent of their business in basic terms: “$19 trillion dollars in financial transactions and services have floated across our cloud over the course of the existence of the company.” 

That’s one whole heck of a lot of cash.

The company makes it their business to be the trusted third party between companies that want to connect securely. They do this with a scalable technology that has handled everything from Life Sciences clinical trials to investor reports. They’ve done so well that Gartner has rated IntraLinks as the leading vendor in the Team Platforms and Social Software Suites category based on revenue for the 6th year in a row.

“How does one “UNshare” a file?”

The Company’s newest product, IntraLinks VIA, launched last month and includes two major features that’ll allow it to be future ready and secure for the next generation. One of these features is a “Snapchat for the Enterprise”, the other – the ability to “UNshare” Your Files.

The “Snapchat for the Enterprise” function will allow you to set a self-destruct expiration date for your files, thus allowing you to keep a close eye on what’s visible to who and for how long. This as well as the UNshare feature work hand-in-hand to keep your files under your control.

UNshare is a feature that’s relatively new to the digital universe, appearing at first to be impossible due to the extremely fluid nature of the web and computers in general. However, IntraLinks VIA employs Information Rights Management with every document you share, allowing you to remotely revoke access to files at any time. 

““If it’s something I’d rather you not forward, I’ll make it more difficult for you to forward.””

As Callison made clear: “The key is that the amount of control you need to put in place should reflect the sensitivity of the transaction. If it’s something I’d rather you not forward, I’ll make it more difficult for you to forward.” Digital watermarks in files shared with IntraLinks VIA apply themselves based on the location of the file, the name of the computer, the name of the person downloading the file, the time, the date, and more.

You’ll be able to set multiple passwords for the same file that only work on single machines. You’ll be able to block printing, block screen capture, block copy and paste – with many more controls on the way soon. 

securitadfas

IntraLinks is currently looking at integration with a few vendors and a few key partners right this minute, aiming in the end to erase that crucial step between product availability and customers actually using the product. Taking away barriers for adoption for new users is a key point in getting them to proactively use the product’s features. Callison let us know that VIA’s mix of intuitive user interfaces and the deep security features under the hood are tackling this challenge. He said, “If you try to be another service that people need to think about to use, they’re not going to. Making the product an organic part of a user’s workflow is important.”

IntraLinks also aims to be a vendor that’s able to work with any company, pushing past the struggles that technology and security compliance present across the globe (and even inside companies themselves). With IntraLinks VIA, professional groups will be able to work with an extra layer of guidance and expertise that enterprise companies wouldn’t otherwise have. And with that, we’ll be share-friendly safe once more – and sooner rather than later!


IntraLinks VIA introduces the “UNshare” for information security is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Oracle rolls out patch for Java vulnerabilities, Apple responds with update

Another day, another Java security alert. In this case, Oracle has released Security Alert CVE-2013-1493, which highlights two vulnerabilities that are particular to Java in browsers. The patch for these issues was originally slated for release in April as part of Oracle’s Critical Patch Update for Java SE. Because the vulnerabilities are being exploited in the wild, however, the company has elected to push out the updates now.

java

According to Oracle, the two vulnerabilities do not pertain to Java on servers, standalone desktops applications, or embedded Java apps. One of the two issues is being actively exploited in the wild, however, used to install McRat on the victim’s computer. McRat is a trojan that downloads and executes other files.

Oracle urges users to download the update asap, which can be done most easily via auto-update, or by heading over to Java.com and grabbing it manually. In addition, the company reminds users that it recently changed Java’s security level to “High” to help fight against malicious activity. As such, users will need to give an applet permission to run, and need to use judgement when doing so.

In addition, Apple has rolled out an update for OS X 2013-002 that improves security, among other things. The update works by uninstalling the Java applet plug-in Apple provided across all browsers. When the user needs the applets, they’ll need to click “Missing plug-in,” which will take them to the latest Java applet plug-in version to download and install.

[via Oracle]


Oracle rolls out patch for Java vulnerabilities, Apple responds with update is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Anonymous releases 14GB of data on the spying habits of Bank of America and more

Anonymous has released 14GB of data it acquired about Bank of America, Thomson Reuters, ClearForest, Bloomberg, and TEKSystems, an intelligence firm. It did this via a press release on the website Par-AnoIA, including a link to the hacked data and a rundown of the relevant details for those who don’t have the time to look at 14 gigs of info. The data concerns the spying habits of Bank of America and other corporations, which are said to include a log of data on hundreds of thousands of employees and executives at various corporations around the world.

guy fawkes

According to Anonymous, it considered this information to be newsworthy for several reasons, including the insecure way it is stored and the rather disconcerting fact that it contains information about “hundred [sic] of thousands” of both employees and executives of many corporations globally, with that information including data about the individuals’ salaries. The data on individuals was named “Bloomberg” and tagged as “reuterscompanycontent,” and comprised a total of 4.8 gigabytes.

The point about the data being stored insecurely is underscored not just by the fact that the hackers accessed it, but also by how they did it – without hacking. The amassed data is reportedly stored in Tel Aviv, where ClearForest is based, on an open server that is misconfigured, meaning that just about anyone can get it with a little bit of elbow grease.

Says the hackers, the information gathered is of a poorly researched nature, meaning that portions of it may not even be correct. The information being gathered is coming from IRC channels, social media, forums, and other such Internet locations, and has a focus on targeting activist movements and Anonymous. The spying utilizes an apparent keyword list with in excess of 10,000 entries used to find content on Twitter, IRC, and other Internet locations. Most of the entries are Wikipedia references, with 1,125 believed to be actual, relevant keywords.

Says Anonymous, it has released the data it found to raise awareness and make a point.

[via Paranoia]


Anonymous releases 14GB of data on the spying habits of Bank of America and more is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google’s “war against account hijackers” results in a 99.7% reduction

We’ve all heard about the travel money scam – a friend contacts you via IM or email frantic, saying they are overseas and have lost all their money and need some to get help. Many other variations exist, as well as other scams altogether. The hijacking attempts reached their peek in the summer of 2011, prompting Google to declare a “war against account hijackers.” Earlier today, the company announced that Google account hacking has been reduced by 99.7-percent since then.

google gmail security

Initially, spammers were forced to change how they went about scamming individuals due to security measures implemented with the accounts. To get around them, the scammers were forced to hijack email accounts, as well as any other account they can get into using the same login information. According to Google, it has observed individual hijackers attempting to infiltrate a million Gmail accounts for weeks on end using stolen passwords.

To help protect against these issues, Google implemented security measures that looked beyond the simple email/password combination. A series of variables are looked at when checking whether the account is being accessed by its owner; there are in excess of 120 variables that can be used. If the login looks too risky, other security measures are kicked into gear.

Questions are posed to the person logging into the account, such as the phone number associated with it or the security question that was created when the account was made. As Google states, because of the nature of these questions, it is difficult for a hijacker who has the email/password combo to know these answers. As a result, Google has seen a drop in account hijacking of 99.7-percent since 2011.

Still, as Google points out, the best security involves help from the account owner. Gmail users can help foil attackers by using a complex, unique password, by turning on 2-step verification, and by ensuring that the recovery options in the account are set up with correct information, such as a secondary email address and phone number.

[via Google Public Policy Blogspot]


Google’s “war against account hijackers” results in a 99.7% reduction is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Adobe says Acrobat and Reader vulnerabilities exploited with malicious PDF

Adobe has announced that two vulnerabilities with its Acrobat and Reader applications are being exploited in the wild via a malicious PDF file attached to an email. If a user attempts to open the PDF file, their system will be attacked via the critical vulnerabilities, as well as the potential for the application to crash. Adobe is working on a rolling out a fix for the vulnerabilities, but until then users should exercise caution when downloading attachments.

adobe-reader-logo

The PDF attack targets Windows users, but all three major operating system – Windows, Mac OS X, and Linux – are affected by the vulnerabilities CVE-2013-0640 and CVE-2013-0641. Until the company gets a patch pushed out, it recommends that users update their anti-malware software to the latest definitions, and ensures that it is running at all times when using the applications.

Adobe Reader and Adobe Acrobat XI versions 11.0.0.1 and earlier for Windows and OS X, Reader X 10.1.5 and earlier for Windows and OS X, and Reader 9.5.3 and earlier 9.x versions for all Windows, Mac OS X, and Linux are all affected by the two vulnerabilities. Windows users running Reader XI and Acrobat XI can both take steps to protect themselves until the fix is released, however.

Within the applications, Windows users running the above mentioned versions of either XI application should enable “Protected View,” which can be found under Edit > Preferences > Security (Enhanced). From that menu, select “Files from potentially unsafe locations,” which will help guard against malicious PDF files. Admins can enable Protected View in the registry for enterprises with security concerns.

[via Adobe]


Adobe says Acrobat and Reader vulnerabilities exploited with malicious PDF is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Motorola Solutions launches Android-based AME 2000 for the spies among us

Motorola Solutions has announced its AME 2000 device, an Android-based system designed for government and enterprise users who require data security. The Assured Mobile Environment solution utilizes a COTS (commercial-off-the-shelf) device to provide end-to-end data and voice encryption. The handset has officially been launched, but needless you say, it’s not something you can pick up at your local tech store.

Motorola-Solutions-Makes-A-Device-For-Federal-Agencies-312x540

AME 2000 offers a variety of features, the most important of which is its end-to-end encryption. Users will benefit from its AES 256 and NSA Suite B encryption for both voice and messages sent between two or more AME devices. To ensure that data is secure in transit over both private and public networks, the device also offers a Suite B IPSec VPN for encryption over wifi, 3G/4G and GSM.

The handset utilizes the Motorola CRYPTR micro in the device’s microSD card for secure session tokens, security certificates, and keys. Users can install their own applications in addition to the on-board browser and messaging applications. All installed applications are updated over-the-air, and to make sure everything stays safe, the encryption keys can be wiped from a remote location if the handset is stolen or misplaced.

Motorola’s Vice President of its US Federal Government Markets Division, Paul Mueller, offered this statement. “Secure mobility is among the U.S. government’s top technology priorities. The AME 2000 features a familiar Android-based OS experience with layered security, device management and applications that comply with federal guidelines. It’s an affordable mobile solution for civilian and defense agencies to better execute their missions that serve and protect our nation.”

[via Android Community]


Motorola Solutions launches Android-based AME 2000 for the spies among us is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google celebrates Data Privacy Day with Government data clarity

Today is Data Privacy Day 2013 and Google has decided to make it official with a set of clarifications on how they deal with government requests for data. This is a topic that Google has made a point to be as clear as possible about in the past, just recently having released a new report on how many requests for data they’d received (and how many they’d filled) in 2012. Google is also letting the world know today that they’re continuing efforts to uphold such laws as the U.S. Electronic Communications Privacy Act in their deeds and through their membership in the Digital Due Process coalition as well.

investigatinggoogle

In their celebratory news burst today, Google has listed several points on how they make it their mission to have a strict process for working with all government agency requests for the personal information of users that work, on, and around Google. It’s more than a few times a year that the U.S. government sends a request to Google for the information you’ve provided to Google for a variety of reasons. When this happens, Google goes through a set of steps that starts with checks, checks, and more checks.

Google makes sure first that what they’re about to do – or refrain from doing – abides by both the law and their own set of strict policies. The Google team requires that all requests for information by “in writing” as well as signed by an authorized official of the requesting agency. They also check that the agency making the request is abiding by the law and that the request they’re making is issued under the appropriate law – no willy-nilly action here!

When a request is made and is found to be legal, Google evaluates the scope of the request. If the request is too broad, Google notes that they’ll ask that the information request be narrowed – Google says that they do this sort of thing “frequently.” After the request is made, if Google is able to notify the users whose information is being requested of that request, they’ll notify them of the situation. If Google is not able to notify the parties in question (if they’re legally prohibited, that is), they’ll try to “lift gag orders or unseal search warrants” to move forward in notifying all parties involved.

Google also makes clear here today that they require a search warrant for all government agencies conducting criminal investigations if they’re seeking to “provide a user’s search query information private content stored in a Google Account.” This information includes, but is not limited to, Gmail messages, photos and documents in your Google Drive account, and YouTube videos (public and private).

This week Google has also added a new section to their Transparency Report that’ll answer any other questions you might have – or so they hope: Transparency Report Legal Process (Q and A). Make sure you’re aware of your rights and keep in mind the golden rule of the internet: if you post it, someone has it. Assume nothing when it comes to privacy on the world wide web, and if you want to keep something a secret, just don’t say it!

[via Google]


Google celebrates Data Privacy Day with Government data clarity is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Lookout security app for Android can now photograph thief, email the image

Lookout has updated its security and antivirus app for Android to include a new feature called Lock Cam. If the user’s phone is stolen or an incorrect passcode or pattern is entered too many times, the app will take a picture of the assailant using the front-facing camera. The picture will then be emailed to the phone’s owner.

lookout android

The app accompanies an account with the company’s website, Lookout.com, where information about the attempted intrusion is documented. When the phone owner receives an email notification and photograph, he or she can log into the online account to see the additional information, which includes the phone’s present location and where it was before that.

The downside is that only Premium subscribers can use it, with a premium subscription costing $30 annually. The price isn’t terribly high, however, and those with a high-end smartphone or who use it in a location where it is likely to be swiped, the feature just might help get it returned. Other features include the ability to display your own message when the phone is being accessed with your contact information for a good samaritan to return it.

The app can be nabbed from the Google Play Store, with the app’s description saying that the supported OS versions vary based on the handset used. If it sounds like something you’re interested in but you don’t want to shell out the money upfront, Lookout offers a free two-week premium trial when you download it.

[via PC World]


Lookout security app for Android can now photograph thief, email the image is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Silent Circle launches Android app offering full call and text encryption

Data security is important to every mobile user, but some need a bit of extra encryption on top of normal security measures. For those users, Silent Circle has launched the Silence Phone app, which allows Android users to call and message each other with full encryption over talk and text. The app can be nabbed from the Google Play store, and requires a corresponding Silent Circle account.

silent-circle-silent-phone-540-482x540

The app utilizes TLS and ZRTP to encrypt packets, and requires both users to swap device keys when calling each other. The keys are not stored on a server, adding to the level of security, providing complete end-to-end encryption. Secure calls can be placed to both other Silent Circle users and non-members, depending on the subscription package used.

For those only interested in calling other Silent Circle members (the “Inside the Circle” plan), the monthly subscription runs $20, and includes a silent phone number. For those who need to place encrypted calls to non-Silent Circle members, the subscription plan is slightly more expensive at $29 per month. The encryption is only provided for calls placed in the U.S., Canada, and Puerto Rico, however.

The app is currently at version 1.1.2, and requires Android 2.3.3 or higher, meaning that it will run on most Android handsets. The app is a mere 2.5MB in size. New users have to subscribe at SilentCircle.com, and will score a 30-day free trial for another user to try out the service upon enrolling.

[via Android Community]


Silent Circle launches Android app offering full call and text encryption is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google taps Yubico for password USB rings of the future

This week it’s been revealed that Google is getting pumped up about working with the company known as Yubico with intentions of creating a sort of “Password Key” that exists in a USB plug around your finger. The report that’s about to be published in IEEE Security & Privacy Magazine is bringing word from Google Vice President of Security Eric Grosse and Engineer Mayank Upadhyay on not just the key, but a variety of ways they see online account security working in the future. Are you ready to trust your online life to the ring around your finger?

key

The paper outlines the way in which Google’s privacy warriors intend to change the online world, starting with passwords and security tokens. “Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe,” note Grosse and Upadhyay, launching into talk about what Yubico has to offer. The group’s cryptographic card is currently working to connect with your account via USB interface, attaching itself to your accounts with a single click.

Think of it as a car key for the automobile that is your online life.

“Others have tried similar approaches but achieved little success in the consumer world. Although we recognize that our initiative will likewise remain speculative until we’ve proven large scale acceptance, we’re eager to test it with other websites. …

We’d like your smartphone or smartcard-embedded finger ring to authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity. ” – Grosse and Upadhyay

For those of you thinking about how Google is getting involved in this fabulous security for the future, know this: they’ve developed a protocol for device-based authentication that “they say”, as Wired puts it, “is independent of Google [and] requires no special software to work.” The web browser you’re working with will of course need to be able to support the device authentication you’re using, but that’s about it.

Think about using a USB stick to start up your online life whenever you want to log in, wherever you go. Can you imagine anything going wrong with this type of situation? Let us know your concerns or excitement – or both!


Google taps Yubico for password USB rings of the future is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.