Harmonisation of Turn Around Time (TAT) and customer compensation for failed transactions using authorised Payment Systems

The principle behind the TAT is based on the following:

(a). If the transaction is a ‘credit-push’ funds transfer and the beneficiary account is not credited while the debit to originator has been effected, then credit is to be effected within the prescribed time period failing which the penalty has to be paid to the beneficiary;

(b). If there is delay in the initiation of a transaction at the originator bank’s end beyond the TAT, then penalty has to be paid to the originator.

(c). A ‘failed transaction’ is a transaction which has not been fully completed due to any reason not attributable to the customer such as failure in communication links, non-availability of cash in an ATM, time-out of sessions, etc. Failed transactions shall also include the credits which could not be effected to the beneficiary account on account of lack of full information or lack of proper information and delay in initiating a reversal transaction.

Here is the link to RBI circular 20-sep-19Harmonisation of TAT using authorised Payment Systems.PDF

Network Security – How To Secure Wi-Fi Networks Effectively From Hackers – A Complete Guide

Wireless security is specifically created to keep unauthorized users from accessing your Wireless Network and stealing sensitive information. The type of Wireless security that an individual uses is identified by its wireless protocol. Today, numerous homes and companies operate and rely on Wireless Networking. Wi-Fi is incredibly efficient in keeping users connected to the internet.

For more details refer https://gbhackers.com/wireless-security/

 

Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

linux sudo hacking

Attention Linux Users!

A vulnerability has been discovered in

Sudo

—one of the most important, powerful, and commonly used utilities that comes as a core command installed on almost every UNIX and Linux-based operating system.

The vulnerability in question is a sudo security policy bypass issue that could allow a malicious user or a program to execute arbitrary commands as root on a targeted Linux system even when the “sudoers configuration” explicitly disallows the root access.

Sudo, stands for “superuser do,” is a system command that allows a user to run applications or commands with the privileges of a different user without switching environments—most often, for running commands as the root user.

By default on most Linux distributions, the ALL keyword in RunAs specification in /etc/sudoers file, as shown in the screenshot, allows all users in the admin or sudo groups to run any command as any valid user on the system.

However, since privilege separation is one of the fundamental security paradigms in Linux, administrators can configure a sudoers file to define which users can run what commands as to which users.

So, even if a user has been restricted to run a specific, or any, command as root, the vulnerability could allow the user to bypass this security policy and take complete control over the system.

“This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification,” the Sudo developers say.

How to Exploit this Bug? Just Sudo User ID -1 or 4294967295

The vulnerability, tracked as CVE-2019-14287 and discovered by Joe Vennix of Apple Information Security, is more concerning because the sudo utility has been designed to let users use their own login password to execute commands as a different user without requiring their password.

What’s more interesting is that this flaw can be exploited by an attacker to run commands as root just by specifying the user ID “-1” or “4294967295.”

That’s because the

function which converts

user id into its username incorrectly treats -1, or its unsigned equivalent 4294967295, as 0, which is always the user ID of root user.

“Additionally, because the user ID specified via the -u option does not exist in the password database, no PAM session modules will be run.”

The vulnerability affects all Sudo versions prior to the latest released version 1.8.28, which has been released today, a few hours ago and would soon be rolled out as an update by various Linux distributions to their users.

So, if you use Linux, you are highly recommended to update sudo package manually to the latest version as soon as it is available.

Read the Full Article here: >The Hacker News [ THN ]

First look at CCleaner’s Health Check feature

Piriform, maker of the popular temporary file cleaner CCleaner, started to integrate a new Health Check feature in the latest version of the client.

The release notes of CCleaner 5.62.7538 reveal that Health Check is the "next iteration" of the recently introduced Easy Clean feature of the client. The company plans to roll out the feature to all clients in the coming weeks.

Easy Clean’s main purpose was to make CCleaner easier to use for non-technical users. Easy Clean ran automatically for the most part and offered less functionality than the program’s full mode. The mode lacked customization options and focused on trackers and temporary files (called junk) only.

We concluded back then that it had nothing to offer for technical users but could be an option non-technical users.

CCleaner’s Health Check feature

checking pc health

Health Check replaces Easy Clean in the CCleaner interface. The feature is available in all versions of the application but the free version is somewhat limited; that’s one of the differences between Health Check and Easy Clean.

CCleaner displays a number of intro pages on first run that claim that the feature may improve PC security and privacy, free up disk space, and boost performance. Some of these claims may sound like snake oil at first as they may remind of the promise of game boosters to improve PC performance.

Health Check scans analyze the PC in four different areas (two of which are limited to commercial versions):

  1. Privacy — checks for trackers, e.g. cookies.
  2. Space — checks for temporary files that can be removed to free up space.
  3. Speed — checks for startup items and suggests items that you may disable to speed up system start.
  4. Security — checks for application updates.

All Health Check does is combine several of the tools of CCleaner in a new Health Check component. Security seems to use the built-in software updater of the professional version to highlight programs for which updates are available.

health check result

CCleaner displays a health status after the scan, e.g. "your PC feels under the weather". The status is only displayed if the program is allowed to connect to the Internet. Likewise, Speed and Security results are only available if the program is connected to the Internet; an "unavailable when offline" message is displayed otherwise.

Closing Words

CCleaner’s Health Check has not improved all that much for free users as it limits cleaning to trackers and junk files on the system. Pro users benefit from the added startup programs and program version checks. All of these options are also available under custom clean or tools, and experienced users may prefer these over running Health Check.

The new module may be useful to users who want results fasts and without having to dig deeper into program mechanics.

Now You: Would you run something like Health Check? (via Techdows)

Thank you for being a Ghacks reader. The post First look at CCleaner’s Health Check feature appeared first on gHacks Technology News.

Read the Full Article here: >Top 100 Network Security Tools

11 steps organizations should take to improve their incident response strategy

As the year draws to a close, it is time for businesses across all industries and sectors to reflect and prepare for the upcoming new year. With this in mind, FIRST has produced 11 vital steps that organizations should take to improve their incident response strategy.

organizations incident response strategy

It is highly likely that an organization will face a cybersecurity incident of some sort at some point in its lifetime, regardless of the level of cybersecurity defense in place.

According to a global survey undertaken by Marsh in partnership with Microsoft, two-thirds of respondents ranked cybersecurity as a top five risk management priority, but only 19% expressed high confidence in their organization’s ability to manage and respond to a cyber event, and only 30% have developed a plan to do so.

Below are 11 steps that an organization should take to become more resilient against an incident.

Planning for a security incident

Assign a clear incident leader: During a response, coordination is needed across many teams, including Security, IT, Engineering, Operations, Legal, Human Resources and Public Relations. In most cases, technical response work will not all be conducted by a single team.

However, organizations benefit by having one clear authority within the organization who defines the process that will be followed and focuses on planning those interactions ahead of an incident.

Manage the information gap: Plan ahead to have a communications lead, who works closely with the incident leader, and works to satisfy third party information requests from across the organization. During an incident, there will be a large set of requests for information, with a small team actually investigating and developing the deliverables.

An often-overlooked piece is to record details of each decision as it happens. When you look to perform a post-mortem after the event it can be extremely difficult to recall the exact timeline of the incident. Multiply this with the complexity of many of the incidents we see today and it can become almost impossible.

Your team needs to build relationships with the incident response community. Effective cooperation during an incident is about trust. When an incident strikes, it’s too late to build it. Have your team engage with business partners, national Computer Security Incident Response Teams (CSIRTs) and service providers before you need the relationship.

Join relevant organizations in the field, meet their security teams at conferences and industry working groups, or use existing mechanisms such as a vendor review process to determine and track the right points of contact early on.

Retain external legal, PR and technical support: There will be technical skills not available to your team. These may include legal, public relations and technical support, such as crisis management or disk forensics. Find a provider for these services and sign a retainer, before the incident strikes.

Study applicable reporting requirements: You may have made commitments to your customers on how quickly you’ll inform them when data is breached.

Even if you haven’t, various legal reporting regulations are now in effect, such as the GDPR, where organizations typically have up to 72 hours to gather relevant information and report to the appropriate regulator – or the European Union NIS Directive, according to which specific Digital Service Providers must report “with no undue delay”.

Work with your legal team to understand each requirement ahead of time, so your incident response process takes them into account.

Exercise, exercise, exercise: It’s a common misunderstanding that security exercises are only important once you’ve achieved a certain level of maturity. In fact, exercises pay off from the very beginning.

Take a scenario that affected another organization and perform a table-top walkthrough of how your organization would deal with that same incident. At the very least you’ll identify gaps you still have to address.

Exercises should be regular and involve a range of participants. It’s important that the senior members of an organization (right up to senior executive management) as well as the technology and other staff participate. The “muscle memory” this will build is invaluable when a real incident occurs.

Responding effectively and managing risk

Communicate often and early: When a security incident is known to the public, it’s important to acknowledge it early, even if you can only state you are investigating. This helps ensure that affected parties understand you are aware and working on it and will be a source of information in the future.

Providing regular updates helps ensure a cadence, so they will come back at regular intervals and will feel less inclined to go look for information from other sources, which may be inaccurate.

Be truthful and straightforward: End users lose trust when communication isn’t clear and understandable, or if they feel you are not expressing what truly happened. Be clear and write to the technical level of your users, but don’t make things sound better than they truly are. When end users are exposed to risk as a result of your breach, say it.

Don’t lose track of the basics: “What would have happened if this took place on another system?” is valuable information, but you should first focus on the key questions you need your team to pursue early on.

Higher priority questions typically include: “How did the breach take place?” and “What customer data is affected?”. Failing to reach basic agreement on the impact of an incident can cause delays and confusion later.

After the incident

Study and document your response: The most important phase when handling a security incident is the “post-mortem”. It’s almost impossible to prevent all incidents from happening, so this is a chance to review why this one took place and identify ways to improve your program.

Ask the “Five Why’s”: every time you believe you have an answer to why the incident took place, ask for a deeper, underlying cause, until you hit at least five levels of “Why.” Address all levels, and focus on the deeper, underlying ones, as they will lead to other, future incidents if left unaddressed.

Never let a good incident go to waste: There are two positive benefits from an incident: The first is that as it so clearly illustrates both needs and impacts; an incident is often the best time to get additional investment to prevent the next one.

Make sure to clearly communicate what your security program needs to be more effective and create follow up plans to get buy-in from senior leadership in your organization. Secondly, every incident you work helps you learn more about your process and your organization; how your systems interact but more importantly, how your people interact.

Share your learnings: As a community, we can only become better if we actively share information on the cybersecurity issues we experience. Airlines are so safe exactly because every failure is scrutinized and shared in detail with others, and action plans are made by airlines regardless of who was originally affected.

By sharing your learnings, other community members have an opportunity to learn, and the internet becomes a safer place to socialize and do business.

By taking these steps, organizations will be in a better place to effectively respond to a security incident. Finally, think of organizations in the context of a supply chain. Most organizations care about a breach of customer information. But even more persistent and concerning can be the effect of products and deliverables on other organizations.

In this position, for instance as a B2B provider selling hardware and software, or providing a service that when interrupted, would impact critical infrastructure, the narrow definition of a data breach may not be the biggest concern and other risks will need to be addressed and analyzed.

Read the Full Article here: >Help Net Security – News