INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
Reposted from Security Magazine
Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).
"100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” says ISE CEO Stephen Bono. “Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.”
In the new report titled “Under the Hood of Secrets Management,” ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass. ISE examined the underlying functionality of these products on Windows 10 to understand how users’ secrets are stored even when the password manager is locked. More than 60 million individuals 93,000 businesses worldwide rely on password managers.
Password managers are marketed as a solution to eliminate the security risks of storing passwords or secrets for applications and browsers in plain text documents. Having previously examined these and other password managers, ISE researchers expected an improved level of security standards preventing malicious credential extraction. Instead ISE found just the opposite.
Data Stored in Plaintext When Locked
One major finding was that, in certain instances, the master password was residing in the computer’s memory in a plaintext readable format -- no safer than storing it in a document or on the desktop as far as an adversary is concerned. Users are led to believe the information is secure when the password manager is locked. Though, once the master password is available to the attacker, they can decrypt the password manager database -- the stored secrets, usernames and passwords. ISE demonstrated it is possible to extract master passwords and other login credentials from memory while the password manager was locked.
Simple Forensics Can Extract Master Passwords
Using a proprietary, reverse engineering, tool, ISE analysts were able to quickly evaluate the password managers’ handling of secrets in its locked state. ISE found that standard memory forensics can be used to extract the master password and the secrets it’s supposed to guard.
“Given the huge user base of people already using password managers, these vulnerabilities will entice hackers to target and steal data from these computers via malware attacks,” says lead researcher, Adrian Bednarek. “Once they have your master password, it’s game over.”
“People believe using password managers makes their data safer and more secure on their computer,” says ISE Executive Partner Ted Harrington. “Our research provides a public service to vendors of these widely-adopted products who must now mitigate against attacks based the discovered security issues, as well as alert consumers who have a false sense of security about their effectiveness.”
ISE recommends that to keep secrets more secure until vendors fix the issues, password manager users should not leave a password manager running in the background, even in a locked state, and terminate the process completely if they are using one of the affected password managers.
Click here for a copy of the report.
See Original Post
Reposted from TribLive
February 26 marked 26 years since six people were killed and more than 1,000 were injured in the Feb. 26, 1993 attack on New York’s World Trade Center.
At 12:18 p.m., a small group of terrorists detonated about 1,200 pounds of explosives in the underground parking garage below the World Trade Center complex in lower Manhattan by driving a rental van into the space, according to an overview of the attack provided by the 9/11 Memorial and Museum in New York City.
Among those injured were 88 firefighters, 35 police officers and an emergency medical services worker, according to the 9/11 Memorial and Museum website.
It took more than four hours to evacuate about 50,000 people from the complex.
The North Tower lobby filled with smoke, and several areas within the North and South towers lost power. Hundreds of people were trapped in elevators as the emergency power generators, which were damaged in the explosion, failed.
Speaking with radio station WCBS, former New York City Police Department Commissioner Raymond Kelly recalled evaluating the damage with a Port Authority engineer.
“We were looking at the, sort of the base of the building, and he made a statement: ‘These buildings could never come down,’” Kelly said.
A five-story crater below the complex was created by the explosion.
Though several security measures were put in place following the attack, Kelly said more should have been learned.
“Vehicle checks were installed in so many places, the World Trade Center itself received security upgrades, probably over $1 million, but it was all pretty much on the ground,” Kelly told WCBS. “We simply didn’t anticipate attacks by aircrafts.”
Of the six men convicted for the bombing, five are serving their sentences at a maximum-security prison in Colorado, according to the 9/11 Memorial and Museum website. A sixth is serving his sentence at a facility in Indiana. The case remains open because a seventh alleged conspirator was never caught.
Reposted from Artnet News
Authorities evacuated the State Hermitage Museum in Saint Petersburg on Thursday after members of its staff received an anonymous bomb threat over email.
A museum spokeswoman tells Artnet News that the Hermitage was among a number of cultural institutions that received the threatening messages today. They include other museums, the Mariinsky Theatre, universities, schools, as well as shopping mall. The museum’s evacuation began at 1 p.m., she says; it remains closed.
The museum posted a brief notice on social media this afternoon stating that several members of staff had received an email informing them that the museum had been “mined.” While thousands of visitors and many members of staff filed out, its director-general and senior curators remained at their desks.
Press images from a Russian news agency show police on the scene and a crowd of people being turned away at the museum’s main entrance.
It is unclear whether the email was sent as a hoax. Last month, Russia was hit by a wave of fake bomb threats that caused a wave of disruption and forced evacuations at malls, schools, and government buildings.
Saint Petersburg has also suffered fatal terrorist attacks in the recent past. In 2017, a suicide bomber killed 16 people and injured 50 in a blast in the city’s metro. In the aftermath of the attack, the Hermitage stepped up its security, introducing screening of visitors’ bags and regular patrols of the building by the National Guard.
The museum has gone to great lengths to protect its collection before. Its director Mikhail Piotrovsky—who succeed his father, Boris, at the helm of the museum in 1990—grew up at a time when memories of the siege of what was then Leningrad during World War II were still fresh. Boris Piotrovsky worked with hundreds of volunteers to safeguard the collection during the war, putting more than one million artifacts and paintings on trains and evacuating them east, beyond the reach of Hitler’s advancing armies. A skeleton staff remained at the Hermitage to protect the building during the worst of the siege.
Reposted from The Voice
Violence in the workplace, unfortunately, is an issue that is not going away, with reports of incidents at businesses and even schools around the country continuing to lead to tragic results.
While the causes of these incidents may vary, one thing is consistent: A business can take the proper steps to secure the workplace to ensure such incidents are less likely to happen and to minimize damage. One key step on the path toward maximum employee safety is the continued emergence of new technology to improve security.
Long gone are the days when businesses had to review grainy video on a VHS tape to see what was happening at their workplace. It’s all digital now, and video feeds can be monitored and stored online, at all times.
Another innovative move is the trend toward pairing entry badges with the camera system, so you can see exactly who is coming and going at all times. If an employee badge is swiped, you’ll be able to see if a different person is using the badge just by monitoring your video. Alerts can also be set up to warn you of possible situations relating to building access.
These types of advances in technology eliminate some of the loopholes criminals may have been able to exploit in the past.
A stranger or disgruntled customer is not always the person who turns violent. While that may happen on occasion, the reality is that often the threat comes from someone you know and trust.
It could be a family member unhappy about a domestic situation, or an angry co-worker taking out their frustrations. These people would already have access to the building, so what can be done in that scenario to keep things as safe as possible?
The solution is to create safe zones internally. Remotely controlled systems can be set up to close and lock office doors, or remotely close off parts of an office building.
While you never want to have to use them, these internal safe zones can potentially save lives in the most serious circumstances, and should be considered by businesses committed to employee safety.
Managed service providers like NTM offer multiple package options for access control and video surveillance to fit various-sized businesses, so keeping your employees adequately safe doesn’t need to be cost-prohibitive. In the end, whatever business you are in, nothing matters more than the safety of your employees. Having a strong, high-tech surveillance system is a critical part of an IT plan, and can keep you prepared for even a worst-case scenario in the workplace, especially with the advances in today’s technology.
Reposted from El Pais
Last August, two visitors accidentally damaged sculptures by Iranian artist Nairy Baghramian at her exhibition at the Palacio de Cristal in Madrid’s central El Retiro park. The first accident happened just two days after the exhibition opened, when a tourist tripped over one of the sculptures as she was taking a photo.
“The guard saw it happening and ran to stop her from falling on the work but did not get there in time,” explains Jorge García Gómez-Tejedor, head of art restoration at the Reina Sofía museum, the modern art gallery that organized the exhibition. A day later a report by the museum confirmed that the work had been damaged.
“The artist asked us to urgently fix it. She didn’t want the broken glass to be seen,” explains Gómez-Tejedor. “The works are made from very delicate material. We had to handle them with extreme care. I would not be surprised if this had happened to her before.”
Ten days later another glass sculpture, made of four parts and fixed to the floor to the left of the entrance, was damaged in another accident. “While the guard was talking to the head of security about a separate incident, a girl sat down on the piece, causing it to break and for pieces of it to shatter,” explains the second accident report, which has been seen by EL PAÍS. The child was not injured in the accident.
“It’s glass mesh and an aluminum structure. Everything is very delicate. We told [Baghramian] that this could happen. They are very delicate works and the artist played at blending [the works] with the space and camouflaging them within the space. This also didn’t help,” says Gómez-Tejedor. “I don’t like accidents happening like this – they’re serious, not just an anecdote. But an accident can always happen, no matter how much foresight we have,” he adds.
The damage to the works will cost the state coffers €13,700 because they weren’t insured. The artist’s workshop assistant will be responsible for reproducing them. The Reina Sofía Museum says that it signed a contract that covered the cost of producing the specific project for the space, but not for insuring the particulars of the exhibition space. All artworks featured in the other Reina Sofía Museum venues are insured – all except for pieces that appear in the Palacio de Cristal.
The Baghramian exhibition cost €94,000, including the almost €14,000 for the repairs
Given that the space is located in a park, with openings where birds can fly through and potentially stain the works, the insurance budget would be “extremely high.” “They would also impose a series of conditions on us (such as barriers, paths, etc.), which most artists and curators would not agree to. We make a contract with the artists that states that, if there is any damage, as in this case, the museum will be responsible, assuming a much lower cost,” the museum explains. In the case of the Baghramian exhibition, the project cost €94,000 in total, including the almost €14,000 for the repairs.
Baghramian’s sculptures play with the glass and metal materials of the Palacio de Cristal. The idea behind the camouflage is to open a debate on privacy and exhibition, the interior and the exterior. During her visit to Madrid, the Iranian artist said that the color of the works, which were inspired by the space, made them “invisible.” According to the Reina Sofía, “her sculptures create organic forms with bulges and cavities.”
The pieces are also fragile and poetic, like the Palacio de Cristal itself, which was built at the end of the 19th century as a greenhouse to display exotic species from the Philippines. Last year, more than 1.6 million people visited the space, which has no entry charge. The central site of the Reina Sofía Museum, the Sabatini Building near Atocha train station, received just 50,000 more visitors.
According to Gómez-Tejedor, days before the exhibition opened the site was reviewed by security to decide how many guards would be needed to handle the visitors. “As a minimum there are two guards and another two people in charge of providing information. But everything depends on the piece.”
The Palacio de Cristal has hosted other exhibitions that involved less risk, such as the piece by Danh Vo that was hung from the roof in 2016, a two-hour audio recording of the Hudson River by German sound artist Lothar Baumgarten, and more recently, an installation by Colombian artist Doris Salcedo, where the names of migrants who had died at sea disappeared and reappeared under water.
Reposted from Allied Universal
Many people who wouldn’t dream of leaving their computer or phone sitting in their unlocked car think nothing of leaving those items in an unattended cubicle at work. If you think your belongings are safe in your office, think again…technological advances have bred a whole new generation of criminals called “office creepers.”
These individuals are dressed like your coworkers or building service personnel and rely on the anonymity of busy office buildings to cover them during their crime. However, you CAN prevent an “office creeper” from becoming successful if you use the following tips as a guide:
Recognizing an Office Creeper
Try to become familiar with most of the coworkers in your immediate area. That way, you can easily identify an individual who may be out of place.
If you see someone wandering the halls or casually roaming about, ask if you can help her/him. Ask questions like, “May I help you find someone?”
If your building has an access control policy where visitors must wear a badge, you should notify security immediately if someone is walking around without proper identification.
If you believe an individual seems suspicious, notify security. Be sure to note details about the person’s appearance so that you can thoroughly describe her/him.
Never share keys or access codes with ANYONE.
Likewise, don’t leave your office keys unattended.
Keep personal keys and office keys on separate rings.
Don’t “hide” your wallets or purses in unlocked cabinet drawers or under your desk. This is the first place an “office creeper” may look!
Position coat racks and hangers away from doorways so that a thief can’t easily snatch items from the outside.
When leaving your office, make sure to lock the door and mute the telephone ringer. An unanswered phone is a clue to a thief that your office is empty.
Talk to management about purchasing a security cable for your laptop. This is an inexpensive locking device that secures your computer to the desk so it can’t be removed.
Keep an accurate inventory of all office equipment, furniture and devices in a locked, fireproof cabinet or in another location completely (like home).
Clearly mark all of your personal electronics, like PDAs and cell phones with identification. You can use non-removable tags or an inexpensive engraving pen.
Shared by IFCPP Member Allen Bohnert, CIPM
The Center for Collections Care at Beloit College (C3) provides one-of-a-kind opportunities for hands-on learning and practice for museum, library, archive, and conservation professionals and emerging professionals. Our distinctive resources—two campus museums (Logan Museum of Anthropology and Wright Museum of Art), a vibrant archive, historic costume and natural history collections—situated on the residential campus of a small, liberal arts college, provide unparalleled opportunities to gain new skills, network with other professionals, and better prepare for advancement.
The Center’s courses are taught by accomplished professionals who are committed to sharing their knowledge and expertise. The Center’s residential learning community of practice offers participants the opportunity to connect with and learn from one another. The real impact of Center for Collections Care at Beloit College training is realized when participants return to their home institutions equipped with the knowledge, skills, and confidence to effect positive change.
Reposted from the Huffington Post
Protests erupted inside New York’s Solomon R. Guggenheim Museum Saturday night as demonstrators demanded the museum ditch its ties with the Sackler family ― the owners of Purdue Pharma, manufacturer and marketer of prescription painkiller OxyContin.
The museum’s Sackler Center for Arts Education, which includes multimedia labs and lecture theatres sprawled out over 8,200-square feet, was a gift from the family and opened to the public in 2001.
Footage of the incident uploaded to Twitter show leaflets being thrown from one of the museum’s upper walkways as some protesters staged a die-in.
Designed to look like prescription slips, the leaflets were a response to allegations made in a court filing that a member of the Sackler family had predicted the launch of the opioid painkiller would be “followed by a blizzard of prescriptions that will bury the competition.”
Oxycodone, the drug’s active ingredient, is among the most common painkillers in prescription opioid deaths. Per the Associated Press, Purdue Pharma, its executives and members of the Sackler family were recently accused of deceiving patients and doctors about the risk of opioids and allegedly pushed prescribers of the drug to keep patients on it for longer.
The museum did not immediately respond to HuffPost’s request for comment on the protests.
The latest demonstration comes after protesters targeted the Metropolitan Museum of Art last year for its ties to the family, tossing mock pill bottles into the moat at the Temple of Dendur ― housed in the museum’s Sackler wing ― which were labeled: “Prescribed to you by the Sackler Family.”
The New York Times reports that after leaving the Guggenheim, several of the protesters marched down Fifth Avenue with a barrier that read “Shame on Sackler.”
Whether regional or national, business leaders face the impact of globalization. In today’s world, it is not a question of if a crisis will affect an enterprise, but when. Events, such as a terror attack, data breach, pandemic or travel ban, that happen on the other side of the world can affect business resilience and valuation just as much as those down the street or on premise.
Threat Intelligence—delivered to key decision makers in a timely manner—is crucial for the safety of everyone. And businesses want the ability to garner relevant threat intelligence from cyber chatter most critical to the organization and report it to internal stakeholders, who can quickly act upon it. A variety of sophisticated technology tools are gaining popularity for their ability to easily integrate with security programs. Such tools aggregate, analyze and report threat intelligence in real time—for proactive security response.
Via open source data channels, social media, the dark web and other publishing platforms, customers use these types of technologies to form common operating pictures to:
Act on real-time alerts of threats such as protest activity, suspicious package, or impending disaster within a radius of interest to facilities or assets.
Monitor personalized keywords or locations across multiple social media platforms.
Share a common operating picture dashboard of an incident across their organization for collaboration and response as was the case during Hurricane Harvey.
For example, during the 2018 Winter Olympics in South Korea, TX360, a situational awareness and threat intelligence platform, helped customers stay current with relevant information such as:
Official alerts and notices of events that could potentially affect transportation
Protest and boycott information and social media content
Emergency contact and Olympic information for local law enforcement, U.S. Government departments (Embassy, Department of State) and tourism links
Mapping of the locations, and photos and videos and games schedules
In another example of situational awareness, PlanetRisk ramped up its alerting and reporting dashboards during recent bombings in Austin, Texas, to support timely updates to local organizations the company serves. The platform:
Provided location accuracy, timeliness, and context to the threats that developed over a three-week period and
Consistently delivered incident notifications of each explosion faster than larger news conglomerates.
Combined with experienced analysts, these types of services provide relevant data required to identify and understand threats to properties and implement core situational awareness programs that reduce risk and improve ROI for any organization.
By integrating platforms like TX360 and ThreatMinder into their security operation centers, or through Allied Universal’s Global Security Operating Center as a Service (GSOCaaS), customers can leverage threat intelligence in a profound way.
Reposted from Securitas Security Services, USA, Inc.
Who Is an Active Shooter?
According to Department of Homeland Security (DHS) an active shooter uses firearms to kill or
attempt to kill people in crowded or confined areas. There may or may not be a logical pattern in which an active shooter finds his victim, and the incident evolves very quickly. Such incidents are unpredictable and can happen anywhere, at any time. The triggers for such incidents could be personal anger, ideology, revenge, mental illness or many other reasons.
Active Shooter: Survival Tips
It was just another day at the office for Alex. It was noon as he stepped out of a meeting with his manager. It was time for lunch, and he walked towards the cafeteria. Suddenly, he heard a loud sound. Before he could think clearly, he heard two similar sounds followed by painful cries of people whose voices he couldn’t recognize. Then he realized what has happening. He was too shocked to move. Could he be the next target? What should he do now?
Active shooting has become a common cause of occupational fatalities in recent times, with instances occurring in schools, offices, shopping malls and other public places. It is essential to know how to react when you face such an incident. Being aware of safety strategies can help you not just stay safe, but also help save the lives of many. An untrained person is likely to react with fear, helplessness and panic. A trained person on the other it hand, can make a big difference to himself or herself, to the people around, and to the situation.
How to Respond to an Active Shooting Incident The Department of Homeland Security (DHS) recommends that when an active shooter is nearby, the best course of action would be to RUN, HIDE or FIGHT.
· Be aware of your environment.
· Know the nearest exits and leave the building if possible. Take others along while you exit. If others disagree, evacuate alone and run/walk to a safe location.
Leave your bag and other belongings behind.
· Prevent people from entering the premise.
· Call 911 as soon as you think is safe.
· If the shooter is nearby, or if exiting is not an option, hide in a place where you are not visible. If you are in a hallway or lobby, run to a room.
· Secure your hiding place. If you are in a room, lock it from inside, switch off the lights and block the entrance with heavy furniture.
· Be Silent! Put your cell phone on and silent mode immediately. A ring or a vibration will give away your location.
· This should only be done as the last resort. If running or hiding is not possible or if your life is in imminent danger and you have no other option, you can use physical force to try to take down the shooter.
· Try to incapacitate the active shooter.
· Yell at the attacker and throw things. Use any physical force available/possible to stop the shooter and defend yourself or others.
What to Say When You Call 911
Dial 911 as soon as you think it is safe. Remain calm and give the following information:
· Location of the active shooting incident.
· Number of active shooters.
· Shooter’s physical description.
· Type of arms used in the incident.
· Number of victims or potential victims present.
What to Do When Law Enforcement Arrives
· Stay calm and follow the instructions given.
· Put down items that you are carrying.
· Raise your hands and spread your fingers.
· Keep your hands visible always.
· Do not make any quick movement towards officer for safety or other reasons.
· Do not shout or yell.
Additional Resources There are a number of e-learning courses available for Securitas USA employees on workplace safety. These courses help employees understand how to detect, deter and report violent people and incidents. Topics include how-tos on recognizing potentially violent individuals and situations; preventing incidents from escalating; and properly responding to and following up on incidents. Real-life scenarios test learners’ ability to spot “red flags” potential triggers. Titles in the LMS include:
· Workplace Violence
· Shots Fired – When Lightning Strikes
· NSI Suspicious Activity Reporting (SAR): Private Sector Security Training
The SCPD Library offers courses including:
· Workplace Violence: Recognizing the Warning Signs
· Make it Safe: Your Workplace, Your Job
· Shots Fired On Campus – When Lightning Strikes
· RUN. HIDE. FIGHT. Surviving an Active Shooter Event
For more information on this and other security related topics, visit the Securitas Safety Awareness Knowledge Center at:
ConferenceMembershipTraining & Certification
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection. All Rights Reserved