Categories
Computing

Sockstress: A new and effective DoS attack

Michael Kassner of TechRepublic reports on a new and effective DoS attack.

Security researchers Jack C. Louis and Robert E. Lee of Outpost 24 stumbled onto a relatively simple way to implement a Denial of Service (DoS) attack that does not require massive SYN floods. The researchers aren’t releasing many details about the attack, except for those provided in a very interesting interview with Brenno de Winter.

Steve Gibson as part of the Security Now series did a podcast about Sockstress and then talked to Jack & Robert off the record about their exploit and the issue of releasing the knowledge of it into the public domain where it may be used maliciously.

The Security Now show notes include further details and links to all the coverage of Sockstress.

Categories
Computing

Usable solves the password problem?

Categories
Computing

Gaping hole opened in Internet’s trust-based BGP protocol

Dan Kaminsky revealed his discovery of a DNS flaw that could be exploited to direct unwitting users to malicious web addresses,Now, practically on the heels of that announcement, a hacker team that presented at DEFCON has demonstrated how a fundamental design error in the Internet’s border gateway protocol can be used to invisibly eavesdrop.

read more | digg story

Categories
Computing

That password-protected site of yours – it ain’t

The Register exposes a neat hack using Google’s cache that enables access to password protected parts of websites.

The hack was posted on Hack Forums which ironically is itself password protected so using the Google cache hack here is a version you can read.

Categories
Computing Security

Social Engineering 101

Social Engineering 101: Mitnick and other hackers show how it’s done

Categories
Computing

The rising tide of Apple Mac Malware

A big selling point for Apple Macs has been the much reduced risk from viruses compared with Windows, however this may not be true for very much longer.

Set aside for now that since Apple switched to Intel processors that increasing numbers of users are using Windows operating systems and are thus as vulnerable as their PC Windows brethren.

Apple’s advertising campaign has worked and their market share is rising globally and has increased to 8.5% in the US which is nearing the 10% point that ArsTechnica believes will be tipping point and will see the malware authors begin to target MacOS X in earnest.

The malware authors may in fact start before the magic 10% barrier is passed as in some sectors two-thirds of retail sales of computers in the $1000 dollars and above bracket are now Macs.

As malware authors are increasingly more motivated by money than the fame that script-kiddies in the past sought the MacOs is now a lucrative market that is currently underexploited. Also given the blasĂ© attitude that many Mac users have towards the threat of viruses and malware due to Apple’s marketingthis spoof of their famous advert may become the norm.

Categories
Computing

The 10 worst security breaches of all time from unencrypted data

Laptop Losers Hall of Shame: The 10 worst security breaches of all time from unencrypted data.

Slideshow of the ten worst incidents of a security breach caused by the loss or theft of a laptop computer.

Categories
Computing Surveillance

ISP Content Filtering Might be a ‘Five Year Felony’

In stark contrast with the UK a former federal computer crimes prosecutor believes that ISP Content Filtering Might be a ‘Five Year Felony’

University of Colorado law professor Paul Ohm, argues that ISPs such as Comcast, AT&T and Charter Communications that are or are contemplating ways to throttle bandwidth, police for copyright violations and serve targeted ads by examining their customers’ internet packets are putting themselves in criminal and civil jeopardy by breaking federal wiretapping laws.

In spite of this I’m sure that there will be a push by the US government as there has been here in the UK for ISPs to start doing this.

Categories
Computing Surveillance

UK goverment want email and phone database

The Times: ‘Big Brother’ database for phones and e-mails

A massive government database holding details of every phone call, e-mail and time spent on the internet by the public is being planned as part of the fight against crime and terrorism. Internet service providers (ISPs) and telecoms companies would hand over the records to the Home Office under plans put forward by officials.

This seems very much par for the course with this Labour government put absolutely everyone under surveillance in order to catch the criminals and terrorists. I think ministers are being lobbied by technology companies that promise more than they can deliver because the government seeks technological solutions to problems that might otherwise be solved in better ways or in ways that at least do not have a negative impact on British citizens as a whole.

This will be just a step towards a future where they keep a permanent database of every single email you receive, every website you visit and everything you download.

Categories
Computing Security

Security Engineering book – 1st edition available to download for free

Ross Anderson, Professor of Security Engineering at the Computer Laboratory of The University of Cambridge has just published the second edition of his book Security Engineering, the preface and six chapters of which is available to download.

Purchase from Amazon.co.uk

To quote Bruce Schneier “This is the best book on the topic there is, and I recommend it to everyone working in this field — and not just because I wrote the foreword.”

Professor Anderson has made the first edition of his fantastic book available to download for free as a 17MB pdf.