Informazioni personali

Cerca nel blog

Translate

mercoledì 24 agosto 2011

Anonymous vs BART (Simpson?) part2

Still I read a lot on Anonymous hacking group, even that they threaten children or declare war against UK for expenditure cuts, also Strauss khan seems to be threatened by Anonymous.

Reading news seems that they’re an unstoppable force of nature…
I left my thoughts last time on why internet and why now, and why  they’re so (in)famous.
So about the first point: why internet? 
If they’re a unstructured movement is natural that they choose, grow and move onto the media that makes communication most easier.
The relatively growing of importance of social media, messenger and other communication systems made very easy recruitment and association on the met.
We saw tons of example in our recent history, think about the spontaneous protest that have strike country with despotic government, but also the recent riots in UK where social network apparently played a major role into spreading voices (it’s a viral marketing technique at the end, sin’t it?)
Another aspect of internet is that it’s quite easy to make a lot of damage with a relatively low technical knowledge. I’m not saying that into the anonymous galaxy there are not real hackers, but mostly looks act and attack like script kiddies. alas on the internet security is still far away to be a solid reality, and most of the site and service that offer service are not design and protected (think about the Sony hacking affair).
We should also consider that we knows what happen only after the hacks, this means that could have been several try before a successful hack. And if the number of attacker grows it amplify the chance to obtain a result.
The second questions is why now?
Well this is the time of the internet, where media amplify every thing happened, and sometimes with a little dramatization instead of a serious analysis ðŸ™‚
So the great exposition, the easy of communication and aggregation, the poor status of security and the relatively anonymity that internet offer makes this time the perfect time for anonymous like activities.
The question so is how we manage something like this?
to be continued…
Related articles

martedì 23 agosto 2011

Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security ...

Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security
By Editor
The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He | Hakin9 StarterKit 2/2011 – DDOS Attacks | IT Security Magazine.
IT Security Magazine – Hakin9…

Related articles

Confessions of a hacker

Kevin Mitnick w Polsce 02 (ubt)Image via Wikipedia

Confessions of a hacker
Marketplace
By John Moe Marketplace Tech Report, Monday, August 22, 2011 Before there was Anonymous or LulzSec or any number of other contemporary computer hackers, there was Kevin Mitnick. After a prolific criminal career, time in prison, and a transition to a

Marketplace

Scot Finnie: This is no time to skimp on security
Computerworld
Who knows what groups like Anonymous, AntiSec and LulzSec will target next?
Who knows what other countries or nationally focused groups might target US interests — public or private — using cyber sabotage and warfare techniques, such as those

Louise Mensch MP claims Anonymous threatened her children
Naked Security
by Graham Cluley on August 22, 2011 | Leave a comment British MP Louise Mensch claims that members of the Anonymous and LulzSec hacktivist groups have threatened her children.
Had some morons from Anonymous /Lulzsec threaten my children via email.

The Ethical Hacker Network – Your Opinion of Anon/Lulzsec
The Ethical Hacker Network – Free Online Magazine for the Security Professional, Your Opinion of Anon/Lulzsec.
www.ethicalhacker.net/component/option…/topicseen,1/

Related articles
  • Apple hack latest in Anonymous AntiSec campaign (portadiferro2.blogspot.com)
  • The Weirdest Video Ever Made About Hacking Explained – Lulzsec (portadiferro2.blogspot.com)
  • Hackers Claim Small Breach on Apple Site (portadiferro2.blogspot.com)
  • Anonymous Antisec leaks Zimbabwe, Australia and Brazil governments … (portadiferro2.blogspot.com)
  • Hackers attack one another: LulzSec at war with Anonymous, 4Chan members (portadiferro2.blogspot.com)
  • It Wasn’t Us: LulzSec Denies Involvement With Scotland Yard Arrest … (portadiferro2.blogspot.com)
  • How Cisco Is Capitalizing On LulzSec Hackers’ Popularity (portadiferro2.blogspot.com)
  • Anonymous, LulzSec Dump Data from 70 Sheriffs’ Offices (portadiferro2.blogspot.com)
  • Hackers at war: Web Ninjas, Anonymous, LulzSec (portadiferro2.blogspot.com)
  • Anonymous hacks US defense contractor (portadiferro2.blogspot.com)

sabato 20 agosto 2011

Anonymous vs BART (Simpson?)

Bay Area Rapid Transit (BART) logoImage via WikipediaOK the latest are that group anonymous is attacking BART system in San Francisco. It’s a very funny target from my point of view, probably because thinking of an hacking attack to our Italian subway system would be ridiculous. Just because nobody would notice it of course 🙂

But the last Anonymous attack make me wonder what is really anonymous, and similar group like lulzsec or web-ninja and so on.

Are those a real groups? And what are the reasons behind their moves? Do they really have a defined  agenda? and a boss or a hierarchy?

Usually press and police try to consider those groups as organized crime or terrorist.  so we can read news on a new hacking group leader arrested, and even if this could sound a good info the truth is that those act does not stop, “ou contraire”, they rise up.

Like the Hydra once you cut a head other two grown up? Or this is a highly structured and efficient organization, able to act and replace the troops with military precision?

Alas I do not think they’re right. Considering the way they act and the target they choose it looks more like social networking environment.

It looks like more as an unstructured group, leader does not means boss, and links and groups does not identify a hierarchy. If we do not put this in mind we will have a few chance to understand this phenomena. With this in mind it’s easier to understand the aggregation model of those groups, underground culture, acktivism, emulation are all drivers. Of course in such environment is quite easy to have criminal infiltration and manipulation but those are not the main drivers.

A diffuse sense of eager for justice is the main vector, also a sense of revenge against official institutions. If we analyze the first targets, big corporations, police enforcement agencies, governments who are fighting civil rights looks like we have a sort of new “68”.

But why now and why internet? There are several good reason that are joining all together.

I will talk about this next time 🙂

Cookie Policy (US)

Bay Area Rapid Transit (BART) logoImage via WikipediaOK the latest are that group anonymous is attacking BART system in San Francisco. It’s a very funny target from my point of view, probably because thinking of an hacking attack to our Italian subway system would be ridiculous. Just because nobody would notice it of course 🙂

But the last Anonymous attack make me wonder what is really anonymous, and similar group like lulzsec or web-ninja and so on.

Are those a real groups? And what are the reasons behind their moves? Do they really have a defined  agenda? and a boss or a hierarchy?

Usually press and police try to consider those groups as organized crime or terrorist.  so we can read news on a new hacking group leader arrested, and even if this could sound a good info the truth is that those act does not stop, “ou contraire”, they rise up.

Like the Hydra once you cut a head other two grown up? Or this is a highly structured and efficient organization, able to act and replace the troops with military precision?

Alas I do not think they’re right. Considering the way they act and the target they choose it looks more like social networking environment.

It looks like more as an unstructured group, leader does not means boss, and links and groups does not identify a hierarchy. If we do not put this in mind we will have a few chance to understand this phenomena. With this in mind it’s easier to understand the aggregation model of those groups, underground culture, acktivism, emulation are all drivers. Of course in such environment is quite easy to have criminal infiltration and manipulation but those are not the main drivers.

A diffuse sense of eager for justice is the main vector, also a sense of revenge against official institutions. If we analyze the first targets, big corporations, police enforcement agencies, governments who are fighting civil rights looks like we have a sort of new “68”.

But why now and why internet? There are several good reason that are joining all together.

I will talk about this next time 🙂

venerdì 12 agosto 2011

cloud security

Cloud computing stack showing infrastructure, ...Image via Wikipedia

Dome9 Security Protects Access to WordPress Servers with Innovative Cloud
PR Newswire (press release)
236) – Dome9 Security™, the leading provider of cloud server security management service for public and private clouds, as well as for dedicated and virtual private servers (VPS), today at HostingCon 2011 announced new support for the WordPress.org

Lessons in security leadership: Andy Ellis
Network World
This was 10 years ago, when cloud wasn’t on anyone’s radar. Danny and I went back and forth deciding the minimal set of controls needed for security, and there were days I didn’t think we’d ever build it. Then, one morning at 8 am, I get a phone call.

Cloud Security Certification Not So Simple
Dark Reading (blog)
Craig has actually encouraged folks to set up accounts at cloud providers, spin up services, and give them a go. There are not a lot of excuses to avoid this when many offer free test drives. You may know that last September the Cloud Security Alliance

Kaspersky Launches New Antivirus Versions In India
VC Circle
Kaspersky, an IT security company has launched two new versions of its PC security products for the Indian market. The new versions, called the Kaspersky Antivirus 2012 and Kaspersky Internet Security 2012 have a new cloud integration feature that

The next step for home security: cloud and HD resolution cameras
Electronics News
Wai King Wong, country manager of Axis Communications, said the company’s Axis Video Hosting Solution, which also resides in the cloud, is one option for homeowners looking for better security systems. Axis’ platform provides a way for users to

The Mutual Fund Directors Forum Selects Cetrom IT Cloud-based IT Solutions for
Business Wire (press release)
The cloud model offers the flexibility we need as a growing organization with the security and customer support we can rely on. Cetrom IT has been exceptionally responsive, providing excellent communication and service during the whole process.

Google Announces SSAE-16 Compliance
ReadWriteWeb
By Joe Brockmeier / August 9, 2011 9:45 AM / 0 Comments This post is part of our ReadWriteCloud channel, which is dedicated to covering virtualization and cloud computing. The channel is sponsored by Intel and VMware. Read the white paper about how

Vyatta Virtual Firewall Addresses HIPAA Compliance for Thrasys
PR Newswire (press release)
the leader in software-based networking for physical, virtual and cloud infrastructures, today announced that the Vyatta virtual machine and virtual firewall solutions have been selected to provide HIPAA compliant network security for Thrasys,

Ping! Zine » Dome9 Security Adds Protection for CloudFlare
By Ping! Zine Editor
The Dome9 cloud and hosted security service will be available to CloudFlare customers through the CloudFlare Apps marketplace at the end of August. Customers can sign-up and provision Dome9 in minutes to secure access to their Web
Ping! Zine

Security, Compliance and the Cloud: A Proofpoint Video Overview
By Keith R. Crosley
In our latest Proofpoint CEO Series video, Gary Steele gives a general overview of Proofpoint’s business, the cloud-based enterprise security and compliance solutions we provide and offers some insights into some of the major trends
Proofpoint: Security, Compliance…

Related articles
  • Cloud Security Alliances launches registry: not a moment too soon (zdnet.com)
  • Kaspersky Internet Security and Antivirus 2012 Released (technologyreview.in)
  • Security and Privacy Challenges to Boom in 2012 (portadiferro2.blogspot.com)
  • Google App Engine now officially secure (portadiferro2.blogspot.com)
  • Cloud security will turn cyber criminals professional (portadiferro2.blogspot.com)
  • Cloud computing contracts and security’s role (portadiferro2.blogspot.com)
  • Microsoft’s public cloud app suite without the public cloud (go.theregister.com)
  • HP claims cloud security is no match for on-premise systems (portadiferro2.blogspot.com)
  • Gartner: New security demands arising for virtualization, cloud … (portadiferro2.blogspot.com)
  • With Cloud Computing, Security Is More Important to Brands (portadiferro2.blogspot.com)