Informazioni personali

Cerca nel blog

Translate

Visualizzazione post con etichetta Computer crime. Mostra tutti i post
Visualizzazione post con etichetta Computer crime. Mostra tutti i post

venerdì 9 settembre 2011

A.I. Talking Points : Security Week Review

File:Icon announcer.svg

A.I. Talking Points : Security Week Review

Welcome back, after a short period of absence (but I posted anyway ) I’m back with the Weekly (more or less) Talking Points.
For the ones does not know what Talking Points is is just a short review of the salient news on Security of the last week. just to have a refresh and a short resume and being quickly updated. This is of course related to the long list of article I refer every weeks on PostOffice2 and sometimes to post on my other technical blog PostOffice.
Since it is a long time I’m not writing here is not easy to tell what happened since the last Talking Point Update (well you know vacation ) so I will do a general recap of the things that impressed me more.

A Summer review (with an eye on the last issues!)

While the world was moving summer hackers didn’t stop to enjoy their virtual environment so a lot of things happened under the sun.
Following security landscape has been quite interesting and amusing, I’ve learned new words (like Typosquatting ), discovered that an hacking group can start a fight vs.BART and I’m not referring to Bart Simpson.
Also found out that a botnet can strike from the sky. At the same time I saw a lot of things related to government Cyber activities, again Cina, US and Iran has been part of the play. But at least we should mention the recent hack to Russian Embassy website in London.

Cyber Acktivism vs CyberCrime vs. Cyber Espionage vs. Medical Equipment vs. xxxxxx

Has become clear and clear this summer that there are a lot of player under the cybersky moved by the most different reasons but sharing, most of the time, the same techniques.
So we have experienced a continuous rising of cyber acktivism, where Anonymous and Lulzsec are just 2 of the most notorious unstructured hacking group of activists who filled the news.
At the same times we discovered also that a growing cybercrime activity is hitting the new technology medias: from the “classic” attack on Social Network and Web 2.0 tools (from Facebook to twitter and so on) to the new Mobile computing world, where Android Tablets and Ipad are every day more under pressure by botnet and other bad stuffs.
Mapping cyber activities on a map is an interesting activity too, we will discover that rumors of cyber war and cyber espionage are widening, cyber warfare is not more something we read in books or science fiction movies. And sometimes the player are big corporations, sound like just a SF drama, isn’t it?

Scaring things, some returns and breaking security pillars

Above all there are a few things that disturbed me more.
First was  to realize that IT is so pervasive in our lives that even stuffs I would have hardly considered “IT security risky” needs to be put under security perspective. Have you ever thoughts of hacking a pacemaker or an insulin pump? No wonder that next predicted target are our always more cyber equipped cars.
Second things that disturbed me is that  two of the main pillars in security have suffered terrible strikes. I’m referring of course to the RSA hack witch consequences are still to be completely understood, and the recent diginotar affair that exposed once again the risks related to the certificate authority hack and relative certificate use.
Again and again people is using our feelings to scam us, and the recent Steve Jobs death scam or the ground zero twitter scam occurred yesterday made me very upset. I understand, of course, that those are the reasons and techniques of Social Engineering but I found that playing this way is very disturbing (ok I’m naïve, I agree).
Have you ever read “Sometimes they come back?”. would be a perfect title for the recent botnet news, form bitcoin to stuxnet everything turns back, even firesheep has been updated.

Well as you’ve seen lot of things happened during the quite days of summer, but now is time to get back to work and believe me I can easily predict a lot of new stuffs will come along with the rain and cold weather. so stay in touch and I’ll keep you updated.
thanks for following
Antonio Ierano

Related articles
  • Cyber-Scammers Exploit Typing Errors to Intercept Email, Phish Details (portadiferro2.blogspot.com)
  • Hacker gets 6-year sentence for ‘sextortion’ case (portadiferro2.blogspot.com)
  • Anonymous vs BART (Simpson?) (portadiferro.blogspot.com)
  • Demonstrators Fail to Appear at Anonymous’s Latest #OpBART … (portadiferro2.blogspot.com)
  • Anonymous BART Protest Shuts Down Several Underground Stations (portadiferro2.blogspot.com)
  • Talking Points – Security week review (portadiferro2.blogspot.com)
  • SpyEye Hacking Tool Now Accessible To The Criminal Masses (portadiferro2.blogspot.com)
  • The Growth of Cyber Terror (portadiferro2.blogspot.com)
  • Botnets And Google Dorks: A New Recipe For Hacking (portadiferro2.blogspot.com)
  • Cyber crime ‘costs £27bn a year’ (premierlinedirect.co.uk)
  • Cyber war between Jester and Anonymous hackers in operation payback (portadiferro2.blogspot.com)
  • Who is bart simpsons enemy (wiki.answers.com)
  • Biggest-ever criminal botnet links computers in more than 172 countries (portadiferro2.blogspot.com)
  • Talking Points – Security week review (portadiferro2.blogspot.com)
  • Naval Academy Expands on Cyber Security (portadiferro2.blogspot.com)
  • Amid social networking security issues, companies block Web 2.0 apps (portadiferro2.blogspot.com)
  • Chinese Government Beefs-up Anti Cyber Hacking Laws (portadiferro2.blogspot.com)
  • Expect More Botnets like the one that downed Twitter (portadiferro2.blogspot.com)
  • There is no Geneva Convention online (portadiferro2.blogspot.com)
  • What SMBs Can Learn from Operation Shady RAT (portadiferro2.blogspot.com)
  • Canadian Hacker Arrested for Creating Zombie Botnet (portadiferro2.blogspot.com)
  • Missile and submarine secrets ‘may have been stolen’ in cyber attack on … (portadiferro2.blogspot.com)
  • Clarke: Outdated cyber defense leaves US open to attack (portadiferro2.blogspot.com)
  • Japan’s defence industry hit by its first cyber attack (portadiferro2.blogspot.com)
  • Cyber Bandits Attack Mexican Government Sites, Closing Down Defense Websites (portadiferro2.blogspot.com)
  • Aussie war alliance extends to cyberspace (portadiferro2.blogspot.com)
  • Cyber-espionage hits defence companies (portadiferro2.blogspot.com)
  • Google Hacking: How Hackers Automate Google Hacking with Botnets (portadiferro2.blogspot.com)
  • US, China bicker over Cyber terrorism (portadiferro2.blogspot.com)
  • (Cyber) Rebels with a cause (portadiferro2.blogspot.com)
  • Corporate America Top Threat (portadiferro2.blogspot.com)
  • Comedic Mayhem: LulzSec’s Pranks Highlight Cyber Security Flaws (portadiferro2.blogspot.com)
  • What SMBs Can Learn from Operation Shady RAT (portadiferro2.blogspot.com)
  • Canadian Hacker Arrested for Creating Zombie Botnet (portadiferro2.blogspot.com)
  • Missile and submarine secrets ‘may have been stolen’ in cyber attack on … (portadiferro2.blogspot.com)
  • Clarke: Outdated cyber defense leaves US open to attack (portadiferro2.blogspot.com)
  • Japan’s defence industry hit by its first cyber attack (portadiferro2.blogspot.com)
  • Cyber Bandits Attack Mexican Government Sites, Closing Down Defense Websites (portadiferro2.blogspot.com)
  • Aussie war alliance extends to cyberspace (portadiferro2.blogspot.com)
  • Cyber-espionage hits defence companies (portadiferro2.blogspot.com)

sabato 2 luglio 2011

Talking Points - Security week review


File:Icon announcer.svg
 

Talking Points

Security week review

The end of an era? Or, may be, just the beginning?
Good morning my friends as we all all aware Lulzsec closed its operation after 50 days of astonishing activities.
Is that really the end? or just the beginning?
While a group seems to fade, another one revamp, Anonymous taken the Lulzec legacy and both Operation Payback and AntiSec seems to strikes again and again. Brazil, USA, Italy, Spain Greece, Americas and Europe, Asia and Africa seems there is no border for Cyber Aktivists and Cyberwarfare.
So if LulzSec closed operations (but it is really what happened?) nothing has really changed in the CyberSpace.
Cybercrime is here to stay!
But if the Age of Lulzsec turns to be History we finally find again on our news the good old Cyber-crime. May be someone was thinking that the only problem was Cyber terrorism, but, come on, you still think that cyber-criminal are not a constant presence in our world? if so Think twice 🙂
It comes out that researcher found the biggest botnet ever TDL-4; so my friend, the bad guys are still there.
And was not only botnet to generate headache in our IT departments, A recent Cisco Report showed how Phishers and spammers are shifting their activities from mass distribution to more specific and more remunerative targeted attacks.
Mixing Mail, as a main vector, and malware, mostly deployed with a “drive by download” methodology starting from the Mail itself, those targeted attacks are becoming more insidious and more evil.
But anyone can be fooled, if RSA did you think you’re better?
But those targeted attacks are delivered not only by ususal E-mail but also using the newest communication media, like social networks and portals. So if google deleted 93000 fake advertisements the King, Facebook, is always the preferred target. Malware campaign using the Facebook messages are spreading all days long. and do no think you do not need protection, there have been reported infected apps as well. Speaking of which we cannot avoid to remember that application world is still a very difficult area for security, so not only Facebook suffer security issues, but I have to say also mobile applications developed for the always more used so called smartphone and smart devices (tablets).
Mobile or not Mobile, this is the question….
it is not the fact Google is still fighting to clean up android market, but the use we do of mobile devices is spreading concerns among experts. we use it for work and access sensitive data, we use it for leisure and access personal data. those devices are full of useful information for cybercrooks and can be also used as a trojan horse to reach our networks from the inside. And do not even think that someone is immune, both major OS have dangerous flaws, and “he’s worse than me” apologeting does not stop the bad guys.
As i read once: “the good news is that there is only the 0.01% of chances to be targeted, the bad is that I’m in those 0.01%”
Lot of reports so also on mobile security, that does not means we do not have to use them, but just we have to learn how to use them.
besides I’m doing a little survey here to understand how we feel about mobile, you’re more than welcome to partecipate 🙂
June ending a new month start
It has been a long roller coaster ride this month, that certified a lot of changes in our perceptin of what is moving outside there.
We started to learn that Acktivism and hackers are back, Data are the preferred target for cybercrooks, cyber criminality work for money and live for money, any device can be source of risk, and the jailbreaking and hacking are not just geek activities but things we have to face every day.
So let’s us remember the June month protagonists.
Special mention to:
Anonymous and LulzSec
but we should remember the other guys with colored names like The Jester, Web ninjas, Chinga la migra …. 
The Hacks to remember
Some of the Hacks this month signed deeply the perception of what our world is becoming so let start mention
Google Mail Hack: China Vs a Private company, Mail always important (even more), Politicians and public officials using a private account to exchange private info…wow a lot of amazing stuffs here
Sony: From PSN to Picture, how to not do security, not to understand what it is happening, and how not to assume responsibility for it’s own mistakes, looks like life (or a soap opera)
Citi: yes we’ve been hacked, credit card data stolen but we do not tell to anyone, may be if nobody knows nothing happened… seems the Citi group justification. alas it comes out…
IMF: Damn it, i was trying to ask a 12 billion dollar loan for myself, geez if the most important financial entity can be hacked we should really be cautious. can you imagine what kind of sensitive data they handle? and just to wonder, you do knows hacker started the journey with spear phishing?
Acer: This case we can honestly ask Why the”Pakistan cyber army” group needed to attack them?
Sega: Why games company? may be because of their database are full of interesting data, like usernames, email, passwords, credit cards numbers (wait, that was Sony PSN).. Sega has not been the only one of course, seems games company are a preferred target. Funny enough, LulzSec deny any involvement and promise revenge against Sega Hackers.
Arizona Deparment of Public Safety: LulzSec, Anonimous? Both? can you feel the irony of the Antisec operations here?
Infragard, CIA, FBI: yes the more the better, also what should be the temple of  security can be hacked by some motivated teenagers…. we should really think about it, what would happen when well motivated professionals play the game?
i could continue of course but then you would think I’m here to scare you, well partially right 🙂
All this should make us think: if the security landscape is changed why our security activities are still the same?
all for this week
have a great time and enjoy your weekend
cheers
Antonio