Archive
Anatomy of a basic attack…
I was hoping to find a way that the average reader would understand about the process that ensues when a target is identified and eventually pwned. ‘Pwned’ is a term whose etymology is attributed to a typo because the keys ‘o’ and ‘p’ are so close to each other on a qwerty style keyboard. Its history dating back to the early 21rst century when first person shooters were popular video games. It is meant to indicate the ability to conquer and gain ownership.
Today ownership isn’t just in the video game area – it is being waged in the computer world to control information, bandwidth and overall control of a computer and it’s network. If you loose control of your electronic devices you may or may not ever know it. Individuals, competitors or even nation states have been doing this for many years and everyone is a potential victim.
If you buy electronics and want to be hooked up to the internet you may want to read about the methods that can be used to gain access to your computers. Whether it is for fun, to prove a point or as a launching point to another site anyone can suffer from an orchestrated attack.
I recently reviewed a website who managed to sum up the essence of an attack. You can read more about the process from his link (here) but please pay heed – this could happen to you if you don’t take steps to prevent it from happening. Contact us for a consultation and to learn more.
Do you know your rights when it comes to your security?
We recently began a debate here in Canada over our rights when a fellow countryman returned back over the border and found that he was arrested as a result of denying a request to give up his mobile passphrase.
We hear a lot of grumblings from our neighbours to the south and most of us assume that we have similar rights while this is not the case. The Electronic Frontier Foundation is basically a collection of lawyers in the US who have fought tirelessly to maintain certain rights and freedoms and their work is needed now more than ever before.
Recently the US law makers came under pressure to renew portions of the Patriot Act after the Supreme court overturned the Nation Security Agency’s ability to unilaterally tap every call in and out of the country. Under the guise that if it doesn’t get renewed this could result in ‘failing to keep the American people safe and secure’. I mean we are talking about stopping the government from keeping a complete record of every call in and out of the country – is that really such a bad thing? The phone companies have had this for years – just get a court order and ask them.
Back in Canada we have the Canadian Security Intelligence Service (CSIS) along with the Canadian Border Service Agency (CBSA) and the Supreme court of Canada all rewriting section 8 of our Charter of Rights and Freedoms. In what is clearly a divided decision by everyone, the court has ruled in favour of law enforcement ability to obtain access to your electronic devices without a warrant.
For more information regarding your Canadian rights or any other portion of this story see our links below.
http://www.criminaltriallawyers.ca/?q=know-your-rights
http://www.huffingtonpost.ca/2014/12/11/cellphone-searches-canada-police_n_6308208.html
mSpy debacle keeps on giving…
In keeping with the NSA theme this year, Brian Krebs broke a story about a company that sells tracking software but, get this, they were hacked and now all of your tracking info is available for anyone to see! The software was designed to capture and upload key data points from home computers and mobile devices and the data is now available for some creative people to pilfer.
I think the worst part is that now the company has being outed, they started to claim that there was no breach and now they try to minimize the scale of the event. This event and others like it, should serve as a reminder to any individuals or businesses that ‘O, what a tangled web we weave when first we practise to deceive’.
SQLi – still number 2 on the hackers list…
I came across reference to a cartoon that I thought was some of the funniest I have seen regarding technology these days and I thought I would share it for everyone here in case you haven’t seen it. Has hacking become so mainstream these days that we are making jokes about it – seems so…enjoy!
Using Putty for remote ssh – maybe you should check it…
Symantec has reported that there is a rogue version of putty.exe (a remote connection tool used by many techs to connect over ssh, serial ports, etc.) This version is designed to send a specific User Agent when connecting ‘home’ so you could use something like snort to make sure no people are using the rogue version. See more about this report from Symantec – here (http://www.symantec.com/connect/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information).
(Ed. This has been maintstream in ‘free’ versions of mobile software and it works so well attackers are resorting to computer users although I would have thought targeting techs may not have been such a good idea but without the proper monitoring and management equipment, this type of activity will go unnoticed by a lot of sysadmins)
Another large scale breach…
I hope nobody actually has any personally identifiable information with this company. Forget about your daughters, you should lock up your credit cards and pay cash for everything!
Carefirst Blue Cross Breach Hits 1.1M http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/