Category Archives: cybersecurity
Cybersecurity Awareness Month – Cybersecurity Tip #3
Cybersecurity Awareness Month – Cybersecurity Tip #2
Apple App Store Suffers First Malware Infiltration
I would like to start today’s post with a question to my fellow iPhone-owning students, faculty and staff. How many apps do you have installed on your device? For comparison’s sake, I’ll limit this example to just iPhones. At the time of this post I counted 47 installed on my own device. Now that you have that number for your own device, stop and ask yourself, how many of these apps do I know were written and published using trusted code sets and verified publishers? Would I have installed these apps if I knew that they were not trusted and potentially malicious?
In order to thwart the publication of malicious apps Apple, Inc. has developed stringent policies and review processes around application development for their OS X and iOS platforms. To complement these processes, developers are required to use a specific software development package called Xcode.
Earlier this week Apple News announced that it had found that an unprecedented number of apps had made it past the review process and were published to the App Store, subsequently downloaded. To put this in perspective, “Prior to this attack, a total of just 5 malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks, Inc.”, says Jim Finkle from Reuters. To be more precise, 344 apps have been discovered by Chinese security firm Qihoo360 Technology Co. to be potentially affected by this attack.
This begs the question, how could this have happened? How could an organization with such strict requirements on app development inadvertently release apps infected with malicious code? The answer to this question lies with the software that we discussed earlier. Essentially a malicious copy of Xcode was created, also known as XcodeGhost. This framework almost identically mimics Xcode, with the exception that it can be modified to contain malicious code. While this may appear to be a rather simple concept the underlying logic of XcodeGhost is far more complex, a discussion which deserves its own white paper.
The fundamental issue with XcodeGhost is that it could potentially be used by legitimate app developers without their knowledge. Therefore we can assume that legitimate applications that leverage this malicious framework could be susceptible to SQL injection, XSS, or other client-based security flaws that could result in data leakage from a mobile device. Considering the types of apps that are available for banking, location tracking and social media, the problem of data leakage poses a very large and very real problem.
With that in mind, I think back to the 47 apps I have installed on my iPhone and wonder which apps I have installed that could potentially be vulnerable. Should there be a more strict verification process for app development that evaluates even the underlying development software that is being used? While we could leverage peer review methods or even the use of trusted certificates to avoid these situations we may continue to see these types of threats at a high frequency in the very near future. What do you think? Any discussion is welcome in the comments on how an organization might be able to avoid these situations.
National Cyber Security Awareness Month
Thursday, October 1st begins National Cyber Security Awareness Month (NCSAM). It is sponsored by the National Cyber Security Division and the National Cyber Security Alliance. NCSAM is designed to immerse and inform the public and private sector through events and initiatives with the goal of raising awareness about cybersecurity and enhancing the resiliency of the nation in the case of a cyber incident.
Dr. Paullet and members of the Top Secret Colonials will be posting tips on cyber security throughout the month of October to educate and inform members of our university. Please stay tuned for more information.
World Affairs Council of Pittsburgh hosts Cybersecurity Speaker P.W. Singer on September 24

On Thursday, September 24, the World Affairs Council of Pittsburgh kicks off its three-part fall series on cybersecurity with an illuminating look at cyber warfare in a program entitled: Will the Next World War Start in Cyber Space? P. W. Singer, recently named one of the 10 most influential voices in the world on cybersecurity, will explore the hot button issue of state-sponsored cyber attacks.
Singer, a Strategist and Senior Fellow at the New America Foundation, was recently described by The Wall Street Journal as “one of Washington’s pre-eminent futurists.” His book, Cybersecurity and Cyberwar: What Everyone Needs to Know, has been added to the U.S. Navy and U.S. Army professional reading lists, and his first work of fiction, Ghost Fleet: A Novel of the Next World War, debuted to rave reviews this summer.
The attached flyer provides more information about the event. Students with ID can register for this event at the discounted rate of $20.
Cyber Warfare Flyer
Federated Investors seeking an Information Security Intern
Federated Investors, Inc. is looking for an Information Security Intern at their Warrendale, PA location.
MAJOR DUTIES:
Work in cooperation with Federated’s BISD Information Security team to:
- Conduct analysis of the departmental Product Position Documents (PPDs). This includes reviewing for any known risks or security considerations.
- Review existing software to determine that Malware was not introduced in our environment via upgrades.
- Generate and analyze reports.
- Conduct research on security related items and topics.
HOURS/LOCATION:
- Up to twenty hours a week during semester
- 8:00 a.m. to 5:00 p.m. Monday – Friday (May – August)
- Warrendale Location – Warrendale, PA 15086
QUALIFICATIONS:
- Currently pursuing undergraduate or graduate degree in Information Systems, Information Security or comparable oriented program required
- IT experience or relevant coursework in information security required
- 3.2 or better QPA preferred
- Course work and hands-on exposure to Microsoft Access, SharePoint, Oracle and / or SQL Server preferred
- Experience with Microsoft Office applications, particularly Excel and Word, required
- Familiarity with Information Technology Infrastructure Library (ITIL) discipline or other IT best practice model is preferred
Application Instructions:
For consideration, go to https://careers.federatedinvestors.com/psp/PSEXT/EMPLOYEE/HRMS/c/HRS_HRAM.HRS_CE.GBL?Page=HRS_CE_JOB_DTL&Action=A&JobOpeningId=6789&SiteId=1&PostingSeq=1
Cybersecurity Positions at Duquesne Light
Several job opportunities in the field of cybersecurity are available at Duquesne Light. The individual job descriptions and requirements are linked below:
- Information Security Governance, Risk, & Compliance Manager
- Cybersecurity Architect
- Cybersecurity Analyst
- Cybersecurity Systems Engineer
If interested, apply online or forward your resume to Jeffrey Peters, Sr. Talent Acquisition Specialist.
RMU receives NSF Grant for Mobile Security Program
Robert Morris University recently received a $224,000 grant from the National Science Foundation (NSF) to aid in the development of a Mobile Forensics and Security certificate program at RMU that will focus on teaching students to analyze and secure mobile devices and networks against cybercrime. The grant will also fund a “train the trainer” initiative in order to train information systems faculty at other institutions. RMU will partner with Middle Georgia State University, the Community College of Beaver County, and the Southeastern Advanced Cybersecurity Education Consortium to train 40 faculty members to teach the mobile security certificate program to their own students.
Work on the mobile security grant project begins this fall. Dr. Karen Paullet, Assistant Professor of Computer and Information Systems, is directing the grant project at RMU assisted by Dr. Jamie Pinchot, Associate Professor of Computer and Information Systems, and Dr. Sushma Mishra, Associate Professor of Computer and Information Systems. Dr. Fred Kohun, University Professor of Computer and Information Systems, will also be consulting on the project.
Read the full news story from RMU News here:
http://www.rmu.edu/news_highlights.aspx?id=1118

