News Arrow to Content

May 15, 2014

Pakistan forming a cyber security strategy

There is good news and bad news relating to cyber security in Pakistan. Good news is that it is on the government’s radar as something that needs guidance and action. Bad news is there are chances that the concept of a secure internet is one that is walled and in a silo from the greater internet. It will be interesting to see how the debate goes but the government’s initiative to put formal regulation around the subject and to create a specific cyber authority are good steps. More at:

Categories: Uncategorized ||

May 15, 2014

Assorted latest cloud security news

Cloudera secures massive 900M USD funding from Intel!


UK based Skyscape gets 4 million pounds from the Business Growth Fund proving that cloud startups focused on the public sector are becoming increasingly important.


OpenDNS raises 35M USD from the networking giant Cisco for its Network security as a service play.


Microsoft, Amazon and IBM give their views on securing government in the cloud. Consensus is that it’s a shared security model with the government. Well that’s good news for Fireye I guess!



Categories: Uncategorized ||

May 15, 2014

The cost of a cloud breach is significantly going up

Securing the cloud in a proactive manner has never been more important. The cost of fixing breaches is going up significantly. Cyber security not only is a critical initiative to protect brand equity but not investing in it now seriously dents the bottom line. A 2013 study from the Ponemon Institute pens the average cost of response at over 3 million dollars in its study participants. That’s over a 15% increase over last year. Costs vary my country with maturer markets like the United States and Germany reporting higher per record breach costs.

Over 1700 executives were quizzed for the study.

You can find this still extremely relevant study below. It’s informative and interesting throughout:

Categories: Uncategorized ||

May 15, 2014

An interesting round up of Cyber security tools in the cloud

Image Credit: Anastasios71/ShutterstockThe top 10 cloud-based security tools to protect your network in a hurry

To use on premise equipment for cloud security seems the antithesis of the cloud philosophy. Which is why this article on the top ten SAAS security tools caught our eye. And don’t think your customers don’t know it. I was with the CISO of a top 5 Pakistan bank the other day and some of the names on this list came up. The customers know how important security in the cloud is. They know they need it and they’re all receptive to the critical cloud security dialogue. Check it out at:

Categories: Uncategorized ||

March 22, 2013

The journey begins with the first step! CCSK certifications start in Pakistan.

Bilal Javed an IP expert with Alcatel-Lucent currently posted in Dubai is now the proud owner of a Certificate of Cloud Security Knowledge (CCSK) and one of the first Pakistanis to get this certification. Bilal reached out to CSA Pakistan Chapter on how to further his knowledge about Cloud Security and we guided him to the CCSK. Well done Bilal!

CSA Pakistan Chapter is currently exploring partnerships and sponsorships with various training institutes in Pakistan to create recognition for CCSK and increase its certification depth among the country’s professionals.


Categories: Uncategorized ||

March 22, 2013

As banks move into the clouds, malicious attacks keep increasing.

MP900386062Why are malicious attacks on banks increasing? Security professionals around the world are unified on the assessments that malicious attacks on banks are not just increasing but increasing exponentially. What’s going on? Are security attacks generally increasing? Have we just learned to detect attacks better? Or is there something genuinely singular going on?

The answer is ominous. Two related trends mean that targeted attacks on banks have not only increased at a terrifying rate but that such attacks will continue to spread and grow. The two trends that we are talking about are the lucrativeness of targeted attacks and the rapid fire spread of rootkits needed to launch malicious attacks.
It seems increasingly that 2011 was the tipping point for cyber crime. Cyber attacks grew 300-400% that year and saw a distinct branching out into two types of attacks. Mass attacks targeting hundreds of thousands of customers, and “spear phishing” attacks typically targeting a thousand people or so. While mass email attacks are of the standard variety type which just need an email address to launch, spear phishing attacks usually come from trusted sources, and use previously stolen information to seem authentic.

One study done a few years ago explained the economics of the two methods this way: “Say a mass attack sends about 1 million messages in a campaign, while a spear-phishing attack sends 1,000. Some 70 percent of the spear-phishing victims open their messages, while about 3 percent do so in the mass attacks; half of spear-phishing targets “click through” their messages, while the click-through rate for mass attacks is about 5 percent… A targeted attack would cost about $10,000 for a cybercriminal to pull off, versus a mass attack that costs the bad guy about $2,000. Mass-attack victims are worth about $2,000 a head, while targeted ones are valued at $80,000 each… The mass campaign nets eight victims, while the targeted one successfully dupes two, so in the end the targeted attack returns a $150,000 profit, versus $14,000 for the mass attack.”

Banks of course are a target because they store information that can be used to create spear phishing emails, and they have online banking that can allow stolen passwords to make withdrawals. How lucrative can this be? The recent “Gozi” Trojan story is highly instructive in this regard: Gozi first came on the scene in 2005 and largely targeted Europeans until 2010. Gozi was a sophisticated password stealing malware. In 2010 it evolved to be able to not only steal login data but other data straight from the bank that would have all information needed to quickly move funds. Gozi’s creator would steal the information and pass it to underground auction houses where cyber criminals would use the data to siphon money from the banking clients. Sums like USD 8000 to USD 200,000 started missing from US online banks as a result of Gozi. Gozi’s creator is now in jail but his total earnings from Gozi are expected to hit fifty million US dollars!

Another trend that dovetails into this alarming security situation making it much worse is the rootkit phenomena. Earlier hacking was done by hackers. Usually genius programmers like the creator of the Gozi virus who created the Trojan malware when he was eighteen would be behind hacking attacks. The barrier of entry for Cybercrime is no longer so high. Attack toolkits are increasingly now available to a black market eager to commit cybercrimes but without the programming skillsto do so. Recently Symantec noticed that 61% of observed web based threat activity directly happened because of rootkits. One of the most popular threat toolkit called Zeus is aimed solely at stealing bank account credentials. Just one gang of cyber criminals used Zeus to steal over USD 70 million in an eighteen month period! This level of payback has meant that rootkits are exploding in popularity.

New sophisticated rootkits not only evade detection from latest threats they can with a subscription based model give latest zero day exploit to their owners making the modern internet full of legions of sophisticated up to date rootkit wielders all aiming to steal your banking information. The average attack kit costs 900 US dolalrs but with options can go for upto 8000 dollars or more. That’s the only investment a criminal mind needs to come after a banking customer.

With such a lucrative underground economy for user information and targeted user attacks the preferred method of getting that information, and with unchecked rootkit proliferation malicious targeted attacks will only grow in number with banks squarely in the centre of such attacks.

As banks increasingly move towards cloud based solutions they need to keep pace with cloud based security postures in the arms race with hackers. More guidance can be found on 

– Habibullah Khan, General Secretary Cloud Security Alliance Pakistan

Categories: Uncategorized ||

Page Dividing Line