Wednesday, December 17, 2008
Cybercrime
Spam accounts for 90% of e-mail.
There are now businesses in China and India whose employees are tasked with typing in those text picture tests that you have to fill out to open some accounts online.
E-mail attachment attacks have decreased significantly over the years.
It is hard to believe that so much of the world's email is spam, but I suppose we should not be surprised. The majority of e-mail I get on my regular G-Mail account is spam. It should also be disheartening that even the picture tests are not enough to stop spammers from getting new accounts. At least we can be consoled by the fact that there are less attachment attacks, although it is possible they have just been replaced with more sinister types of attacks.
Cisco: Cybercriminals more savvy than ever in 2008
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1342560,00.html
Tuesday, December 16, 2008
Security Review: Xbox and Playstation.
With the new advancement in gaming systems and numerous uses of the new Xbox or playstation, can these devices be another tool for hackers to use to violate our lives and gain personal information. Within the last two or three years both the Xbox 360 and the Playstation 3 have been hacked into. In January of 2006 “Sources say that a group calling themselves Team Pi have discovered a vulnerability in the Xbox 360, or more specifically in the kiosk CD being used in retailers displays. It seems that though the executable on the disk is signed, the other media on the disk is not signed allowing someone to swap the Project Gotham Racing 3 demo video with a WMV-HD rip of a full length movie. This is far from being a complete hack of the Xbox 360 but it is one little step closer to a full hack.”
This month “PlayStation Home, a 3D social gaming community available on PS3 that allows users to interact communicate and share gaming experiences, launched last Thursday and over the weekend it was hacked multiple times. Hackers found several vulnerabilities that allowed them to run some code to bypass advertisement, replace content originally placed by Sony with the user's own images. Another hack allows uploading files to hack the Home server or deleting any file from the Home server.”
Although these events were both of the minor variety, this leaves a lot to be questioned. On Both consoles people can purchase movies, games, and music by using their online accounts. On these online accounts people provide very sensitive information to be granted access to the following features. Internet access, Movie download center, and music download center. Although not necessary all the features are desired by every user. My question is can these devices, which are operated over the web, be possible hacking opportunities?
Articles : http://news.teamxbox.com/xbox/18394/PlayStation-Home-Hacked-Already/
http://theconsolewars.blogspot.com/2006/01/impossible-to-hack-xbox-360.htmlMonday, December 15, 2008
Adobe PDF and Flash are source of web attacks
"In its Q4 Web Security Trends Report, Finjan Inc. says its Malicious Code Research Center (MCRC) has found that millions of PCs have been compromised by either Flash- or PDF-borne Web exploits, as crimeware writers widen their attack vectors and find new ways to evade detection and snare user machines." Flash is an application that allows animations in webpages. Flash is a specific type of webpage coding. The Flash exploits rely on basic Adobe ActionScript functionality to exploit browser vulnerabilities. Flash malware can be delivered through malicious banner ads. "Although most networks inspect the ads for security risks, their efforts are often insufficient." Adobe advises uses to set a parameter, "AllowScriptAccess," to "never," but is more typically set to "always." "This allows ActionScript to inject an IFRAME, which can then pull in malicious content and infect the end-user machine."
PDF a mistakenly considered as a safe file format to many. However they can be exploited through a pair of buffer overflow vulnerabilities. Adobe has patches for these flaws, but many machines aren't up to date. Starting with version 1.4, the PDF format includes JavaScript capabilities. The problem grew by the emergence of simply crimeware toolkits, such as Neosploit and Fiesta, which include PDF components that "enable attackers to obfuscate scripts within PDF files to execute Web exploits. Signature-based detection is not generally effective against these attacks, so antimalware engines must rely on real-time detection."
The best way to prevent these attacks seem to be by simply updating these programs since there are patches available. Perhaps Adobe should come up with an automatic software update, like Microsoft uses. This article is interesting to me because I use Flash coding all the time and I always felt like it was safer, even though I had nothing to support this reasoning. I also think this is interesting since we recently learned about web based attacks. It would be interesting to see if these programs are exploited in ways similar to cross-site scripting. I think it is also important that antivirus and spyware detection programs update their software to protect users against these attacks.
Sources:
Flash, PDF are growing malware targets
By Neil Roiter, Senior Technology Editor, Information Security magazine09 Dec 2008 SearchSecurity.com
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1341749,00.html
Web Security Notes
Web Security slides
Sunday, December 14, 2008
Oooops they did it again
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1342278,00.html
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1342135,00.html
Sunday, December 7, 2008
Facebook revisited
As for the virus attack i am constantly bombared with these phishing attacks. Some of them come as wall posts from friends who have "zombie computers". Recently facebook added a new feature called "facebook chat". This is the faceboook equivalent of instant messaging. Many of the most recent phishing attacks I have receiver have come via facebook chat. Facebook needs to come up with a way to prevent this virys from spreading further. Most of the attacks are extremely obvious such as "click here to reduce your debt". None of my friends would care about debt nor would they advise me on how to lower it. The other attacks about tagging and adding photos etc is much more harmful because it could seem legitimate and could end up being malicious.
Saturday, December 6, 2008
Security Review: Off-Campus Housing Door Security
What happens, then, when students live outside of the Notre Dame bubble in the neighborhoods surrounding campus? What measures are used on doors to maintain the security of off campus houses? In this security review, I will assess some common methods of securing the doors and overall safety of an off campus house.
Exterior doors can be equipped with different types of locks (handle locks, single-cylinder deadbolts, double-cylinder deadbolts), construction materials (metal, solid-wood, composites), and sensors (surface door contacts, recessed contacts). Not all methods provide the optimal security condition as the integrity of the physical barrier can be compromised. Ideally for the home owner or resident, the door will of course prohibit unauthorized entry and will not readily expose to view (disclose) the contents of the house. This also addresses the integrity of the house and its residents and associated property. In addition, the door should allow authorized individuals entry.
Would-be attackers would be interested in knowing what methods are used to secure the door. Do the residents make actually use the installed deadbolt lock when leaving? An underutilized deadbolt is pointless in keeping attackers out. Is the deadbolt a single cylinder (key used only on exterior), or a double cylinder (key needed on inside and outside) lock? A single cylinder lock located right next to a large glass window would provide easy entry after breaking the glass (alteration). Is there an associated alarm system that is actually activated? The presence of alarm equipment does not guarantee that residents turn on the system. Furthermore, some alarms are disconnected and only emit a loud noise. While this may scare an intruder away, he or she still has time to grab property before fleeing.
The overall construction of the door is something that most tenants can do little about. This vulnerability of really only a small piece of the puzzle. The quality of door design is null if users fail to adequately lock the door using the deadbolt. Seemingly the largest vulnerability in this case is human action. For instance, even if a door is well protected, there may be other means of entry. An open window (or a closed,yet unlocked window) or secondary door could prove the main door security measures unimportant. It would be like beefing up security on HTTP ports while ignoring the POP3 port in a computer system.
Attempts to secure the door through multiple and sometimes extreme ways must be tempered by sensitivity to the ease of entry by authorized individuals. Ultimately some risk acceptance is inherent in a system that literally opens doors. Nevertheless, the amount of risk can be reduced and transferred. Installing double-cylinder deadbolts (especially when doors are adjacent to windows or glass panels) and always making use of the deadbolt clearly demonstrate good protocol. By making a home doorway harder to breach homeowners can deter would-be attackers. Risk transference can be achieved by obtaining homeowner's or renter's insurance for property potentially lost to burglary.
alarmsystemreviews.com
homesecurityguru.com
Security Review: Credit Card Security
With the addition of various types of Card Verification Codes (CVC), the security of transactions has improved. For transactions at physical stores, CVC1 is used for verification. This is a code that is in the magnetic strip on the back of the credit card. On the other hand, CVC2, a three or four digit number on the card, is used for many online, mail order, and over the phone transactions to help prevent fraud. The CVC is created using a key that only the bank knows that includes using a hash function on the expiration date and the card number. The information in the magnetic strip is very valuable because it allows fraudulent credit cards to be made. Therefore, credit card companies are making a greater effort to make sure merchants are not storing this information.
However, CVC2 is still vulnerable to phishing scams. This can be done by either using a typical phishing scam (developing a fake website requesting sensitive information) or by already having the credit card number, giving it back to the cardholder, and requesting the CVC2. In addition to phishing attacks, there are countless other ways to obtain credit card information. A store’s employee could very easily write down a customer’s credit card information and copy the signature, especially at the type of place where they take your card out of sight for a short time (such as a restaurant). With the name of the person, it would be easy to obtain their address and then make online transactions using the stolen card information.
Because credit card information is so valuable (the cardholder’s money is a risk), it is essential to protect the information. In order to mitigate the risk of information being stolen and fraudulent transactions made, I think that a few steps should be taken. First of all, all online merchants should be required to ask for the CVC2 when a transaction is being made. For in person transactions, merchants should not be allowed to store the information on the magnetic strip. They should also be required to ask for another form of ID to make sure it matches the name on the card as well as get a signature. The Luhn Algorithm that we discussed in class helps to verify the integrity of credit card numbers while CVC is used to verify integrity of the user of the credit card information. When credit card fraud is committed, the confidentiality of the cardholders’ information is lost and their money may no longer be available when they need it. The physical card will always be at risk for theft, especially in a situation like the dorms where the mail is left in a pile in the lobby. Despite the numerous ways to commit credit card fraud, I think that the actions card companies are taking will help to decrease the risk. However, there is no way to completely ensure the security of information.
http://news.cnet.com/Putting-the-squeeze-on-credit-card-fraud/2100-7349_3-5856625.html
http://www.creditorweb.com/articles/credit-card-security.html
Friday, December 5, 2008
Facebook Virus
The virus is being spread through Facebook messages with bizarre titles like "Hey, I have this hilarious video of you dancing" and "You look awesome in this new movie." When users click on the link to the 'video' they are prompted by a Flash Player update download. The download, while something most people would routinely click, actually has a malicious file embedded.
Although this tactic seems obvious and ridiculous, the rate of success is alarming not only with regard to security, but also when the gullibility of internet users is concerned.
Thursday, December 4, 2008
Apple posts, then removes, suggestion for use of anti-virus software
Apple's initial recommendation was surprising to many Mac enthusiasts, who, for years had been told their systems were not threatened by malicious software. The advice was given in Apple's "Knowledge Base" collection of articles. The original post advocated the use of "multiple antivirus utilities so that virus programmers have more than one application to circumvent." (Although the article was removed, you can still read excerpts).
Clearly the author of the article was advocating defense in depth; however, it seems that the PR machine at Apple was concerned about the implication that encouraging the use of anti-virus software on Macs was an admission of system vulnerability.
One observer states, "The benefit of Apple's tight control over its operating system and hardware is the ability it gives the company to implementing effective, reliable security measures." And until Apple's market share increases significantly, it is unlikely that hackers will target the Mac platform.
While this may well be the case, I certainly wouldn't want to play guinea pig for the security team.
Wednesday, December 3, 2008
Security Review: Facebook
Depending on the privacy settings of a particular user, other users can see the user profile that user. Facebook accounts contain information that would be useful to potential employers, coworkers, friends, family members, and “romantic interests”. As a result, Facebook users and administrators require a high-level of integrity—if the information contained within Facebook cannot be mostly accurate, the appeal of the social networking site would markedly diminish. In addition, there would also be information, pictures, or notes that Facebook users want to keep away from potential employers, nosy coworkers, and family members. As such, confidentiality is also important. Facebook administrators also want authorized users to be able to access the information stored on Facebook as easily as possible without jeopardizing security.
However, cyber-attackers may want to achieve alteration or disclosure of important Facebook information, because the hackers could use that information for personal financial gain—for instance, they could sell other users’ e-mail addresses and phone numbers—or to make other job applicants appear less favorable, etc. Furthermore, if hackers gain access to a Facebook account, they can easily “spam” the friends of the compromised user with links to phishing scams, pornography, or the like. Also, if a denial of service attack was implemented, there would be an uproar from millions of Facebook users.
As a Facebook user for the past two and a half years, I have not once been asked to change my password. Therefore, I run the risk of hackers determining my password, which would lead to my account being compromised. In addition to that, another vulnerability that Facebook cannot easily address is the very nature of social networking systems. If one account becomes compromised, that account could enable other accounts to be compromised. Furthermore, since Facebook has no method for ensuring that passwords are “strong” as opposed to “weak,” it is vulnerable to a brute force attack. Facebook is even vulnerable to XSS attacks that infect users with spyware, adware, and other types of malware.
In the end, Facebook is prone to the various vulnerabilities, risks, and threats to which all large social networks are prone. However, the Facebook network complicates these vulnerabilities by allowing so many users easy access to the account information of other users. The networking and information-sharing capabilities of Facebook users are necessary for a successful social networking site, though, and should not be truly avoided or transferred. In fact, I believe a combination of risk mitigation and risk acceptance would be more proper. Facebook must simply accept that it will be prone to the security vulnerabilities and threats common to social networking sites. However, Facebook can take preventative measures to make itself less vulnerable to brute force attacks and XSS attacks. For example, it can mandate that passwords be “strong” and be updated regularly.
Infrared Communications - Utility and Security
Reportedly, Infrared technology allows computing devices to communicate via short-range wireless signals (approximately 5 meter range limit). The infrared transmission technology used in computers is similar to that used in consumer product remote control units. In comparison with about 100Mbps maximum communication speed in wireless communications, there is a possibility of 1Gbps with infrared communications (due to its much shorter wavelength than wireless communications, broadband communications are available). In this way, infrared communications are suitable for transmitting large amounts of data such as animations. The most common use for infrared ports is to transfer files between devices. For example, you can transfer files between a Windows CE device and a desktop PC or between two notebook PCs.
The two main problems with Infrared are the sun and line-of-sight (similar to a TV remote, devices must be point directly at eachother to communicate). The sun gives off a lot of infrared light. In direct sunlight, the IR receiver can be "flooded" and won't be able to see any incoming messages (best used indoors).
Now onto security issues - Because infrared operates at such a short distance (and a narrow angle), it is relatively difficult for an attacker to intercept data that is being transmitted. Infrared communication is secure with high concealment in its ability to specify its receivers, based on the strong directivity of infrared communication. However, infrared does not provide data encryption. Because data is sent in plaintext, it is vulnerable to packet sniffing attacks.
There is a plethora of communication options available; Infrared's lack of data encryption is certainly a major downfall, but I believe that there are viable uses for this technology (a quick exchange of contact information/virtual business cards, for example). I am uncertain as to its popularity in the professional world, but would bet it has its place.
Sources:
http://compnetworking.about.com/od/homenetworking/g/bldef_infrared.htm
http://www.contrib.andrew.cmu.edu/~rgockley/legos/ir.html
http://technet.microsoft.com/en-us/library/cc775941.aspx
http://linkevolution.e-globaledge.com/english/infrared/aboutir.html
Tuesday, December 2, 2008
Empire State Building Stolen
Sunday, November 30, 2008
Obama Trojan
here is the website with more news
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212000783&cid=nl_DR_WEEKLY_H
With every big event there are huge malware attacks reported. So my question is why aren't there more arrest made or more of an attempt to catch these people and have them made an example of. And on the other side of things, what are some techniques that are being used to hide the identity of the hackers sending out these viruses. How have these people hide their foot prints
Virus attack on London hospitals hits patient care
No patient data was at risk of disclosure, said William Mach, an NHS spokesman. As a precaution, computers were shut down at St Bartholomew's, the Royal London Hospital and The London Chest Hospital.
When the infection became known, ambulances were diverted to other hospitals, as it was easier to admit patients using unaffected computer systems rather than revert to a paper-based admission systems, Mach said.
The hospitals are now taking emergency patients again, he said.
Official are investigating how the infection occurred, although it did not appear to be malicious, Mach said.
Here is a site with more information:
Question:
If there are Malware infection with no threat what are some other reasons for malware to be put in place if there not negative effects?
Monday, November 24, 2008
ND Stadium Security - A Unique Case Study
A friend of mine and I wore chicken and gorilla suits to the game this weekend against Syracuse. Maybe you saw us... As you can see below, we were fully masked. You may be surprised to learn that we wore the masks all the way from his room in Morrissey up to around the end of the first quarter. We were able to walk past a number of ushers, many of whom acknowledged us, without removing the masks on our way into the stadium and our seating section. We could have been anybody. Our photo IDs certainly did not match our gameday appearance. I'm not particularly serious or worried about threats from criminals in animal costumes, but I do think it's something to think about and, if nothing else, pretty funny.
Final Exam
The Registrar's Office has not yet announced our room assignment. Please pay careful attention to this announcement when it is made. I have had semesters where the final exam room was different from my normal classroom.
I've posted a review sheet that outlines the material covered by the exam. We will also use the last class meeting to review any questions that you may have, so please take some time to prepare in advance.
Sunday, November 23, 2008
Pentagon Hit By Cyberattack
According to two news articles from Foxnews.com, the Department of Defense--specifcally, the Pentagon--has been the target of a serious cyberattack. The cyberattack has, reportedly, affected some of the 17 million computers that store sensitive information on the Global Information Grid. According to the articles, the cyberattack came in "the form of a global virus or worm that is spreading rapidly through a number of military networks." As a result of this attack by commercial malware, use of external hardware devices such as flash drives, external hard drives, and DVD's has been banned.
As to the cause of this cyberattack, not many specifics are known. A rear admiral in the United States Navy has reportedly attributed the introduction of the global worm "to a service member with access to classified information [that] inadvertently loaded the virus onto his computer via a flash drive." This also explains why external devices such as flash drives have been banned. The authors of the malware--and the architects of the cyberattack--are as yet unknown. In fact, the cyberattack could have come "from a number of foreign countries, possibly Russia, though the military is dismissing earlier reports that China was the source of the threat."
Now that the Department of Defense has detected the virus, the next thing they need to do is follow the incident handling process described in class. Namely, they should contain the virus by removing the ways in which the virus is thought to have entered the network. I believe that the Department of Defense has done that very thing by prohibiting the use of external drives. They then must restore their systems to a "known good state," but the details of that may be difficult since we do not know the extent to which the network has been damaged by this cyberattack. In restoring their systems to a "known good state," they may have to rebuild their systems entirely or they may just have to redesign their information security environment. Finally, they must analyze how to prevent further such cyberattacks. That may require further restricting access to sensitive information, or permanently enforcing the ban on all external devices.
Thursday, November 20, 2008
Assignment 6
Tuesday, November 18, 2008
So Long, Blackberry
I don't personally own a portable e-mail device, however many will attest to how addicting (and convenient) it can become to regularly check and manage one's e-mail: "Definitely he's going to feel an electronic detoxing," said Reed Dickens, former assistant press secretary to President George W. Bush. Users have even been referred to as "crackberry addicts". Obama's attachment to his PDA is illustrated by the following: "This past summer, news cameras recorded him checking his BlackBerry while watching his daughter's soccer game, only to have Michelle Obama slap at his hands, prompting him to return the device to its holster."
The other issue, less relevant to this course, is the possibility of a president's e-mail being subpoenaed and made public record: "The president's e-mail can be subpoenaed by Congress and courts and may be subject to public records laws, so if a president doesn't want his e-mail public, he shouldn't e-mail, experts said." E-mailing is just another channel for his words and personal communications to become public record; this must be taken into consideration. On this note, Presidents Bush and Clinton set a precedent by not e-mailing in office and it will ultimately be up to Obama to follow it or not.
I find it comforting to hear that PDA security is a priority for Obama and his officials. It may be a less-pressing concern, but definitely an important one.
http://www.google.com/hostednews/ap/article/ALeqM5iw25dERohJoJUYwISzNoOsSd1VCwD94GBFTO0
Monday, November 17, 2008
Bluetooth
Definition: Bluetooth is a specification for the use of low-power radio communications to wirelessly link phones, computers and other network devices over short distances. The name Bluetooth is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago.
Bluetooth technology was designed primarily to support simple wireless networking of personal consumer devices and peripherals, including cell phones, PDAs, and wireless headsets. Wireless signals transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters). Bluetooth devices generally communicate at less than 1 Mbps.
Bluetooth networks feature a dynamic topology called a piconet or PAN. Piconets contain a minimum of two and a maximum of eight Bluetooth peer devices. Devices communicate using protocols that are part of the Bluetooth Specification. Definitions for multiple versions of the Bluetooth specification exist including versions 1.1, 1.2 and 2.0.
Although the Bluetooth standard utilizes the same 2.4 Ghz range as 802.11b and 802.11g, Bluetooth technology is not a suitable Wi-Fi replacement. Compared to Wi-Fi, Bluetooth networking is much slower, a bit more limited in range, and supports many fewer devices.
As is true for Wi-Fi and other wireless technologies today, concerns with Bluetooth technology include security and interoperability with other networking standards. Bluetooth was ratified as IEEE 802.15.1.
I thought it was interesting that it uses a standard similar to the one we learned in class (IEEE...) and that concerns with Bluetooth include security and interoperability. So I looked up the standards and if you want to check out this super long document here it is.
http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
After doing this I went to youtube... and oh buddy is it easy to hack bluetooth phones. There are a million videos and programs available to download so that you can hack someone's phone. You can make calls, send texts, and turn off their phone.
Here are two videos I found interesting:
http://www.youtube.com/watch?v=5WRLtBl-lqo
http://www.youtube.com/watch?v=XlTEIYGk3Ro
What do you guys think? I don't have bluetooth on my phone but I do have it on my computer. I never use it for anything, so I wonder if people can connect to my computer in the same way the phones are being hacked.
-Cassie
Saturday, November 15, 2008
Club Security
"The scanner catches fake IDs and records a person's driver's license number, birth date, address, height, weight, eye and hair colors. It also saves a photo of what the patron was wearing that night." This information is easily downloaded to the club's computer.
If necessary, the machine can then search for people by name, gender, description or number of visits. Furthermore, it can provide statistics regarding the number of patrons the club has each night, their age and gender (which can then be used to influence marketing strategy).
A major benefit of this device is to deter unruly and violent behavior. "One of the main reasons people will misbehave is because they have anonymity," Carpenter said. "But when you can record their name and take their photo, they no longer have that anonymity. When problems do occur, suspects can be easily identified in the device; their personal information can then be sent to the police. Bouncers can also place a message next to the person's name in the computer, allowing for a reminder the next time they try to enter.
However it is important to remember that this is sensitive information and should be treated as such. As we have seen in class, when in the wrong hands, data as innocent as e-mail addresses can lead to finicanial woes. I believe that if this information was downloaded to a computer, access to it would have to be limited to one or two people; if necessary read-only access could be granted to others. Additionally, there should only be one bouncer with this device per club. A thorough background check would be required for the position. The club would also have to determine how long these personal records should be stored in their database, or if it is only necessary to keep information on their most active customers (defined as one who visits once a month minimum). And as with all technology, one must determine if the benefits outweigh the risks.
http://gazettextra.com/news/2008/sep/09/high-tech-gadgets-new-security-feature-bars/
"In Era of Blog Sniping, Companies Shoot First"
Last week, The New York Times published an article regarding the use of blogs by companies for announcing layoffs. With the market crisis that has been developing in the past several weeks, a number of companies have been forced to let part of their workforce go. However, information is getting leaked to the public faster and faster. Many of these layoffs reach the public before the company even has a chance to inform their employees of the layoff. Some employees are learning that they are being laid-off through reading blogs about their companies. As a result, many companies are beginning to post stories such as layoffs on company blogs so that their employees and the public are informed by the company rather than by somebody outside the company who managed to get the story.
This article clearly addresses the confidentiality and integrity of information. Many blog posts by people outside these companies are not completely accurate and accuse companies of poor management. This in turn is creating a negative image for these companies who are clearly already struggling. So, do you think that companies are addressing this problem in the best way possible? What else could they do to protect both their employees and reputation?
http://www.nytimes.com/2008/11/05/technology/start-ups/05blog.html?_r=3&ref=technology&oref=slogin&oref=slogin&oref=slogin
Thursday, November 13, 2008
Security Review: ID Scanners
On the other hand, bars could use this information for 'good' by collecting information on visitors in order to market their bar towards the target customer. For example, if a bar realizes a lot of 21-one-year olds are attending the bar, they might look into having an 18+ night since 21-year-olds likely have many 20-year-old friends. The bars should though, make it voluntary to give this information, rather than just taking it without telling anyone.
There really isn't a way to stop these types of data theft, except by refusing to allow your ID to be swiped (which will most likely mean not getting into a bar or buying beer). Businesses should be responsible for ensuring employees are not misusing ID information. One way to do this would be to ensure at least 2 people are checking IDs or selling alcohol, so that 1 malicious employee couldn't take advantage of this skimming.
Sunday, November 9, 2008
Vista Security is Looking Up
Source article:
Microsoft sees OS flaws drop, application breaches rise
By Robert Westervelt, SearchSecurity.com
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1337532,00.html
New Comprehensive Information Security Laws
Thursday, November 6, 2008
Risk Management in the Digital Age
Brendan
Election Hacking
Report: Obama, McCain campaign computers were hacked by 'foreign entity'
Hackers leverage Obama win for massive malware campaign
Wednesday, November 5, 2008
Countries Debate Proposals for National Firewalls
A few days ago, an article appeared in the New York Times regarding national firewalls, so I thought it fit in well with our recent class discussions. There is currently a controversy in
It’s been several years since
http://www.nytimes.com/2008/11/05/technology/start-ups/05blog.html?_r=1&ref=technology&oref=slogin
Assignment 4 Extension
Friday, October 31, 2008
IBM Sticking it to Hackers
In the past similar devices such as smart cards have provided banks and customers with a form of external validation before conducting secure transfers. These devices however are very expensive and sometimes not easy to use. IBM's device is different its easy to use, just plug and play, and a secure internet connection is set up to conduct transactions. Given the huge drop in the price of memory space over the years IBM could produce a production model for a relatively cheap price that will provide security to bankers and their customers in the future.
http://searchfinancialsecurity.techtarget.com/news/article/0,289142,sid185_gci1337090,00.html
Wednesday, October 29, 2008
Networking Slides
Also, if you want more information on using Wireshark, you may wish to read an article I wrote for SearchSecurity: WireShark tutorial: How to sniff network traffic.
As a reminder, it is illegal in many jurisdictions to monitor traffic on a network that does not belong to you. I am providing this tool to you for educational purposes only and suggest that you run it only to capture traffic on a local network that belongs to you.
Hackers breach World Bank servers
The hackers had access to servers that contained "scanned images of staff documents" as well as one that included contract procurement data, according to the FOXNews.com story. The World Bank has been attempting to downplay the situation as well as reassure its staff that no sensitive information had been accessed and that their personal information was not at risk. However, after the breach was discovered, the Bank's senior technology manager was quoted as calling the situation an "unprecedented crisis." Another senior Bank staffer revealed that the FBI had become involved and that the hackers had "access to everything," particularly all of the worldwide information of the International Finance Corporation (IFC), the private sector arm of the World Bank"
The Rest of the Article is here
:http://www.bicusa.org/en/Article.3915.aspx
Security Review Virtual Private Networks
Since we have been talking about networking I found this new form of networking called Virtual Private Networks (VPN). They are made mainly for businesses and provide remote access to other computers/servers through a web browser, instead of a remote access program. This is important for businesses because many business people are constantly traveling. VPN are secured with a firewall and it integrates with your system which will allow you to have remote access to your business computers/ corporate networks via a web browser. It also allows your customers to access your network. The security goals I would have for the technology is that all the information sent through the VPN is secure and cannot be hacked into. Also I would want to make sure that only people who have permission to access the network are the only ones granted access. And I would want the network to be reliable so that it is not down. According to the video it allows up to 25 people to connect to the network using VPN. One problem with this is what if you have more than just 25 people traveling who need access? Will the system crash and not be able to handle everyone’s requests. Threats that may exist could be people gaining access to sensitive business information if they can crack your user name and password, or if they can monitor the computer you use to access the corporate network using VPN. Since it is all web browser based, if someone hacks onto your computer network they may be able to steal/view information from the corporate network. VPN are relatively cheap for businesses to use and seem to be more efficient. So the risk of people hacking into the system can be managed by implementing other security measures on the VPN, such as a timed logout. If you are a business person and are at a coffee shop and you have to get up to go to the bathroom or something, there could be a set amount of idle time before the browser automatically logs you out so that other people can no jump on you computer and view your business information. VPN are also helpful since it can be accessed using PDAs so in meetings or other places where you only have a phone/PDA available, it would be very convenient. As far as the risks, the company would need to secure the network and encrypt the information sent. Also monitoring the VPN networks to see who is actually using it would help keep hackers at bay. I think this product is worth the risk acceptance because it seems to be very helpful to people who travel constantly for business and need access to the company’s network. I don’t know how many companies actually use this but for the article and the video, VPN seem like an efficient safe technology.
Sunday, October 26, 2008
Security Flaw in New Google Phone
There is also some controversy as to whether or not this flaw should have been revealed, as companies are generally given some time to fix flaws before the are publicized. I believe that it is best that this flaw was pointed out, especially since now people are able to avoid entering sensitive information into the web browser. If it was kept quiet, people could have been attacked without even knowing there was a risk. I believe that this could be a huge security threat if it is not fixed. People buy the phones, in large part, because of the ability to connect to the Internet, and many could be at risk.
Take a look at the article: http://www.nytimes.com/2008/10/25/technology/internet/25phone.html?_r=1&ref=technology&oref=slogin
New Wave of "Zombies" Intensifies Web Attacks
I recently read this article regarding “botnets” and “zombies” and found it pretty disturbing. It discusses the vulnerability of any computer connected to the internet. Although network security professionals constantly insist on the use of detection programs and firewalls to protect your computer, it is not always enough. In a matter of minutes an unprotected computer can be turned into a “zombie” by automated programs that hide in the internet waiting to take over computers. A “botnet” is formed by taking multiple “zombie” computers and linking them together. This chain is then used to search for sensitive information, send spam e-mail, and turn other computers into “zombies”.
While none of this surprised me, some of the statistics did. Although security professionals such as Microsoft have drastically decreased the number of detected botnets from about 500,000 to 300,000 in 2008, they are still causing a large amount of damage. A single botnet is capable of controlling millions of computers. A study by a computer security firm called Secunia found that detection programs have limited effectiveness. The most effective program they test only caught 64 of 300 ways in which the computer was vulnerable to malware. I found that to be an unsettling number. I knew that detection software didn’t catch everything, but I’m surprised that even the best program only detects a little over 20 percent of the vulnerabilities.
Some of the new “features” of botnets are even more intriguing. One particular botnet actually activated Microsoft Windows Update on computers that took over in order to wipe out competing malware. Other botnets even install anti-spyware software on the computers they infect in order to ensure their sole control of the machine. With more advanced features such as this, botnets are becoming increasingly difficult to find and therefore destroy. Although there are organizations such as the International botnet Task Force that are attempting to fight against these attackers, they face a number of challenges. For example, depending on the source of the botnet, it may be outside the legal jurisdiction of the United States. However, Microsoft teams, among others, are doing everything that they can to prosecute the people creating these botnets.
http://www.toptechnews.com/story.xhtml?story_id=1200044YU4Y0&page=1
Tuesday, October 21, 2008
French President's Bank Account Hacked
"Cyberthieves have stolen money from the personal bank account of France's president, Nicolas Sarkozy.
The criminals reportedly managed to obtain Sarkozy's online username and password, and removed several small sums of money from the account.
Reports state Sarkozy noticed that small amounts of money had disappeared from his account last month, and informed the police of the losses."
The full article is available at: French President Sarkozy's bank account hacked
Monday, October 20, 2008
Assignments 4 and 5 Available
Assignment 4 covers the networking material we began before break and will finish when we return.
Assignment 5 covers the Boss, I Think Someone Stole Our Customer Data case study.
For Assignment 5, you need to read the case study, which was published in the Harvard Business Review. Due to copyright restrictions, I cannot give you the file just yet. I am working on getting electronic copies for you. In the meantime, if you want to get a head start, you can read and/or copy it in the periodicals room at the library. There is an electronic database containing the article available through the library website, but the copyright conditions on that article state that those copies cannot be used as "assigned course material."
The case appears in the September 2007 issue of Harvard Business Review on pages 37-50.
Sunday, October 12, 2008
Security and Keyless Entry
I'm aware of earlier models of cars (particularly on Ford vehicles) that provide an entry touchpad similar to that found on garage doors. Thus, I don't imagine the concept provides any new security risk. I am, however, curious about any new possible risks in light of the design change. The new design houses touch-sensitive controls under a weatherproof acrylic panel. A five digit code is entered into the panel. It seems to me that consistent use of the particular buttons would lead to excessive smudging or weathering on a given section of the cover. Would this theoretically make it easier for would-be thieves to figure out the entry code? Furthermore, does the use of keyless-start make it even easier to steal the car after gaining entry?
Security concerns regarding keyless entry have been documented for many years now. I am curious to see if the combination of these technologies (keypad-entry and keyless start) will have any detrimental effects.
If anyone has experience using keypad-entry, I'd enjoy hearing how reliable the system is, how easy it is to change the code, and how often the code is changed.
Saturday, October 11, 2008
IT Security & The Law
World Bank Victim of Numerous Cyberattacks
The computer network of the World Bank--"one of the largest repositories of sensitive data about the economies of every nation"--has been the target of an unspecified amount of successful cyberattacks. In fact, recent e-mails from a senior technology advisor state that these cyberattacks have put the World Bank's computer network into an 'unprecedented crisis.'
While the type and amount of stolen information are not yet known--or, at least, have not yet been made public--"sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July."
Memos also indicate that anywhere between eighteen and forty servers have been hacked, including some which contained "scanned images of staff documents" and sensitive information on contract-procurement data.
Beyond such memos and a few announcements by World Bank officials, the World Bank has tried very hard to classify the details of these cyberattakcs. The World Bank has tried especially hard to calm the thousands of employees who are now worried about the security of their personal and professional information.
The identities of the hackers, and the cause of the cyberattacks, are also obscure. According to FOXnews, however, "at least six major intrusions--two of them using the same group of IP addresses originating from China-—have been detected at the World Bank since the summer of 2007."
Since information on these cyberattacks is so limited, I can only recommend that the World Bank discover how hackers gained access to the network and determine how to prevent future intrusions. While the article mentions various attempts by the World Bank to do just that, it is, of course, far easier said than done.
Tuesday, October 7, 2008
Ford to Introduce MyKey
- maximum speed of 80mph
- maximum audio of 44% of the volume
- audio system won't work when seat belts are not buckled
- warning when the gas tank gets to 75 miles remaining
- cannot floor the accelerator over 45mph
- warning sounds when speed hits 45mph, 55mph, & 65mph (optional)
However, if there was an emergency and a teenager needed to get to the hospital or something quickly, they wouldn't be able to go above 80mph. Related to this, a teenage driver could be driving 80mph and need to speed up in order to avoid an accident, but they wouldn't be able to.
http://afp.google.com/article/ALeqM5g-u0NJvY16BTLrFTI38fWkVU6Vnw
Sunday, October 5, 2008
Interest in Cyber-crime treaty growing
Searching the web some time last week, I stumbled along some updated news on the cyber-crime treaty. For those who don’t know the cyber-crime treaty is. It's an agreement between different countries that when ratified “will bind countries to creating a minimum set of laws to deal with high-tech crimes, including unauthorized access to a network, data interference, computer-related fraud and forgery, child pornography, and digital copyright infringement. The treaty will also have provisions that will ensure surveillance powers for governments and bind nations to helping each other gather evidence and enforce laws. The treaty also helps the pursuing of criminals on an international scale” Although the treaty’s last draft was signed off on
With that said the information I found was that the treaty was actually getting more interest from the rest of the world. Many other countries are beginning to follow suit and sign this treaty stating that they will conform to the agreement. Making it harder for people to commit crimes over seas without fear of being prosecuted. here are some more articles I found on the matter.
Friday, October 3, 2008
"Xerox Selects VeriSign Managed Security Services to Help Protect Their Corporate Network"
Xerox Corp. has chosen VeriSign Inc. to provide Managed Security Services to help maximize the value of its information and network security investments, while minimizing its security risks. VeriSign will use a number of tools to help protect Xerox's network security, such as Firewall Monitoring, Network and Host-Based Intrusion Prevention Systems (IPS) Management and Log Management Services. Xerox will also use VeriSign's iDefense Security Intelligence Services to look for and manage vulnerabilities, malicious code, and other threats facing the network.
The Director of Information Security and Risk Management at Xerox said, "Teaming with VeriSign Enterprise Security Services allows us to work with a trusted security partner, enabling our IT security teams to focus on only critical and actionable events." VeriSign is a well-known name in helping organizations more effectively manage risk, monitor compliance and identify and mitigate evolving security threats.
**I just thought this article was interesting because we had just talked about VeriSign in class and I had mentioned them in my presentation. After our class discussions, I find that I pick up on a lot more security news now that I am more knowledgable on such issues.
Wednesday, October 1, 2008
PDA Security
When considering such security threats, one could take Blackberry for example. I have seen many students with these devices on campus and e-mail security is definitely a concern. The threat comes from the user downloading certain files - for example opening an e-mail which contains a trojan horse - allowing a hacker to monitor/access the e-mails that the recipient is receiving (and therefore gaining complete access to the information incoming and outgoing).
On a corporate level, there is the risk of espionage between companies; trade secrets and future deals being leaked. Senior executives use these devices and in their calendar alone there may be fragile company information such as key customer information and merger/acquisition info which could lead to humiliation or a drop in the material value of the organization.
On a more severe level, government and military employees use these devices; a leak of vital information could result in the loss of life.
Third party programs are the cause of many of these viruses. When using Blackberries and the like at work, security directly relates to the level of protection/restriction the corporation is administrating. Blackhats love trying to penetrate new devices (such as the iPhone) while exploiting their flaws/vulnerabilities.
Some tips to stay safe when using PDAs: don't keep any information on your PDA that you can't afford to lose, utilize the "power on" password setting (a prompt to input your password disallowing access to those who are without it), take advantage of firewall and security packages (such as those offered by BlueFire), consider encrypting your data.
Since users have the option of multiple operating systems when using PDAs, combined with the fact that hackers typically have access to more data via victims' computers, PDAs haven't been targeted so heavily yet. But as their capabilities advance, so will their draw from blackhats.
Hacking Passports
Sources:
http://www.schneier.com/blog/
http://blog.thc.org/index.php?/archives/4-The-Risk-of-ePassports-and-RFID.html
http://freeworld.thc.org/thc-epassport/
http://travel.state.gov/passport/eppt/eppt_2498.html
What do you think about this? I know it slightly scares me.
-Cassie
Tuesday, September 30, 2008
Information security around the world
Source articles:
http://news.cnet.com/8301-1009_3-10054314-83.html
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332760,00.html#
http://www.forbes.com/technology/2008/09/29/outsourcing-data-breaches-security-tech-cx_ag_0930outsource.html
Midterm and Assignment 3 Updates
The website we used in class today to create a MD5 hash may be useful to you for assignment 3.
Finally, you should take a look at the review sheet and practice test for the midterm. The actual exam will consist of between 8-10 questions similar in style to those on the review sheet. Assignment 3 is also a good source of sample material that you should review.
Sunday, September 28, 2008
Hacking For Fun?
One specific group of these hackers call themselves g00ns. I have fallen victim to one of their attacks on a popular lacrosse forum that rerouted all requests to the forum homepage to a Bob Marley fan site. Although I was frustrated and inconvenienced by what they did I also realized the comic value of what they did and moved on without giving what had happened a second thought. They did eventually restore the url so that the site could be located, so no harm no foul in my opinion.
There are petitions that want to bring legal actions against these mischievous little punks such as http://www.petitiononline.com/ccd0722/petition.html. It seems that they don't attack large organizations and for the most part they are just around to bother people and have what they consider fun. My question for everyone is what would you consider these hackers to be and why most people find them so offensive.
Malware Grabs Personal Banking Data
The particular malware program referenced in this online article is called Limbo. Limbo has dropped in price to $350, “down from about $1,000 a year ago and $5,000 two years ago.” As a result of this decrease in cost, Limbo and similar malware programs have become available to a wider variety of fraudsters, and there concerns about an increased number of online bank frauds.
Specifically, Limbo “integrates itself into a Web browser using a technique called HTML injection,” and operates when users access online banking sites. Since Limbo is so closely integrated into the web browser, “it can operate even while the user is at the real bank site and can actually change the layout of that site.”
Unfortunately—other than that they are asked for personal information which has never been requested before—there are no clues to users that they are under attack. So, Limbo can easily trick users into releasing personal information such as credit card numbers, bank account numbers, social security numbers, and PINs.
Even more unfortunate is how easy it is for such malware to get onto users’ computers. According to the article, Limbo can get onto your computer through “many paths, including both pop-up messages that ask you to download an add-on program and methods that are invisible to the user.” To combat this new security threat, software programmers are working on ways for anti-malware programs to screen for malware that use HTML injection and block said malware from running.
Until such updates are available, I suggest being vigilant. If you are banking online and your bank suddenly asks for new personal information that it has never requested before, you should be cautious. I would also suggest not downloading any software programs that you aren’t certain are safe. I realize that this kind of vigilance should be practiced regardless, but I thought I’d mention it anyway.
Tuesday, September 23, 2008
Blog Spammers
First and foremost, how do they build the programs that produce all of this spam? What do they actually look like? How long do they take to make? I'm presuming that all of these spammers, especially those who post only jumbled words and websites, can't reproduce these messages manually over and over again on blogs like ours day after day. Second, I'm having a hard time trying to get inside these spammers' heads. Why do they do this? Does history show that the main goal of blog spam is to find additional clicks for their sites or to acquire sensitive information from blog administrators? I can't imagine that the marginal difference of a few misguided clicks every day could substantially improve a site's authority or advertising bottom line, so for now I'm betting on the attacking reasoning. Third, whatever the aims behind these efforts are, how successful has blog spam been in achieving them? Given the amount of spam that I have seen every single day, it seems that they have, unfortunately, been very worthwhile. Finally, what is the best way to protect against these annoying and threatening messages? It seems like these guys walk through the provided blog spam protectors (on WordPress, at least) and I have no idea how to set up anything else.
What does everyone think?
Brendan
Wednesday, September 17, 2008
Sarah Palin's E-mail Hacked?
That's certainly an interesting twist in the election. I couldn't get the WikiLeaks site to load this afternoon. I'm guessing the sudden rush of interest overwhelmed their servers.
Friday, September 12, 2008
E-Voting Security
Some US jurisdictions have opted to return to the paper ballot method due to the fact that it is more accountable. Without paper trails, how can one verify the accuracy of such machines?
Another concern deals with voting machines with wireless communications. Theoretically, a hacker could infect the system with a virus or alter the software all from a remote location. Voter fraud is a very serious issue and one which some states are trying to alleviate the issue by banning machines with wireless capabilities completely.
What Canadian Banks Are Doing That U.S. Banks Should Be
An article recently appeared in the
With the ever increasing number of clients making transactions online, Canadian Banks are taking greater precautions to protect the sensitive financial and personal information of their clients. In 2006, CIBC, TD Bank, BMO Bank of
In addition to the precautions that the banks are taking, they also warn their customers about protecting themselves. Banks stress that they will never ask their customers for things such as a password since they already have the information. Clients should also make sure that a sight is valid by verifying the SSL certificate. This is a good way to avoid Phishing attacks as well as searching for the bank’s URL instead following a link sent in an email.
Protecting the confidentiality of sensitive financial and personal information is becoming a major concern. Knowing that some banks are taking greater cautions to protect our information breeds confidence in those banks, but what about all the others? It makes me wonder why they are not taking the same measures to protect their clients. According to another article in The Business Journal, the U.S. Government has established laws that will require banks to protect their costumers from identity theft. However, a study found that only a third of banks meet these standards. One can only hope the government will enforce these laws and protect our valuable information. It may be difficult to find a balance between protecting clients’ information and maintaining online banking as a convenient way to making transactions, but I think most people would be willing to have to go through a few additional security measures if it meant they could be more confident in the confidentiality of their information.