This site has been created to log references to
spam and related technology issues. If you have any
suggested additions, please contact
me.
From New York Times, October 23, 2005
Colleges Protest Call to Upgrade Online Systems
By Sam Dillon And Stephen Labaton
- A U.S. order aimed at facilitating court-ordered monitoring of Internet activity could cost billions, opponents say.
Read the article
From ACM's TechNews, October 21, 2005
"Sue Companies, Not Coders"
Wired News (10/20/05); Schneier, Bruce
- While some have called for holding individual programmers accountable for security vulnerabilities in the codes they write, a more sensible approach would place the responsibility on their employers, writes Counterpane Internet Security CTO Bruce Schneier. The reason for this is incentive, the same engine that drives all economic activity. If businesses see a financial disincentive for taking the time to ensure that their programs are of the highest quality, they are unlikely to do so. The preponderance of poor software speaks to the decision they have made, namely, that it is more profitable to suffer an occasional spate of bad publicity and short-term loss of sales than it is to invest in the extra programmers and extend the time-to-market to ensure consistently secure software. For consumers, proprietary formats, compatibility issues, and software monopolies make it difficult to exercise a conscious preference for secure software, thereby perpetuating the cycle of insecure products of poor quality foisted on them. Opening up software manufacturers to liability for insecure products would quickly reverse that trend, as they would have to shoulder the entire cost of a poor design, which clearly would be to their economic disadvantage. While some of the higher production costs of more secure software would inevitably pass on to the consumer, they would be no higher than the costs associated with using software rife with vulnerabilities.
Click Here to View Full Article
"Mother Nature's Storms Postpone DHS' Cyber Storm"
Washington Technology (10/19/05); Dizard III, Wilson P.
- Originally scheduled for November 2005, the Homeland Security Department's (DHS) virtual cyberattack on the United States exercise, known as Cyber Storm, will occur in February 2006 due to resource demands and infrastructure damage related to recent hurricanes in the Gulf Coast region, according to DHS' Michelle Petrovich. The delay of Cyber Storm was requested by the electric utility industry in order to provide them with more time to repair their infrastructure networks, said University of Southern California computer scientist Terry Benzel, whose DETER Internet test bed project is part of Cyber Storm. The inter-agency exercise will test the response to a combined attack involving an Internet-based assault on both the financial sector and the power grid as well as physical attacks.
Click Here to View Full Article
From ACM's TechNews, October 17, 2005
"At Microsoft, Interlopers Sound off on Security"
New York Times (10/17/05) P. C1; Markoff, John
- Microsoft recently held its second Blue Hat conference, where a small group of independent security researchers are invited to the company's Redmond, Wash., headquarters to share details of their work exposing vulnerabilities in Microsoft's programs. The conference, held last week, comes after a year of intense focus on security that has signaled a clear shift in Microsoft's priorities. The hackers in attendance identified the manner in which Windows operating systems address peripherals, and its forthcoming Xbox 360, as specific targets for hackers. The Blue Hat gathering marks an about-face in the way Microsoft views the hacker community. The Blaster and Slammer worms fundamentally altered Microsoft's position toward security, as they began to compromise the company's stature in the eyes of customers. The white hat hacker community has taken notice of Microsoft's efforts to improve security, and has been largely receptive to the software giant's overtures, though many warn that security could be just entering a new era with the growing use of mobile devices. The widespread, scattershot attacks such as Blaster will also likely become a thing of the past, as profit is now the motive for more precise, targeted attacks, rather than Web-wide assaults designed solely to create chaos. Microsoft has been using a technique known as fuzzing in the development of its software, where tens of thousands of combinations are tested automatically in the search for flaws. According to company officials, Microsoft has significantly reduced the number of security bulletins it has issued in the last few years.
Click Here to View Full Article
"US Still World's Top Spammer"
IDG News Service (10/13/05); McMillan, Robert
- In a recent report, security vendor Sophos determined that about 26 percent of worldwide spam originated within the United States, which is down from 42 percent in 2004. The reason for the drop, according to Sophos senior technology consultant Graham Cluley, is more effective prevention methods by ISPs and the work of antispam task forces. Meanwhile, spammers are focusing on the growing broadband connections in South Korea and China with the amount of spam originating in South Korea up 8 percent from 2004 to 2005 and the amount in China up 7 percent, according to Cluley, who points to the total amount of spam remaining the same between the two years. Spamhaus Project volunteer John Reid asserts that one way to significantly decrease spam is for ISPs to prohibit almost all of their users from establishing servers running the Internet standard port 25. Reid believes the policy would not affect the vast majority of non-spammers and points to previous attempts in Canada proving the method successful.
Click Here to View Full Article
From ACM's TechNews, October 14, 2005
"Developers 'Should Be Accountable' for Security Holes"
ZDNet UK (10/12/05); Espiner, Tom
- Former White House cybersecurity advisor Howard Schmidt and the British Computing Society disagreed at Secure London 2005 on who should be accountable for the security of code. Schmidt said software developers should be held accountable for the code they write, while the BCS said companies should be responsible rather than their developers. "I know a lot of developers who would be very uncomfortable with that level of accountability, especially if that were legal accountability," says a spokesperson for the BCS. The spokesperson also noted that code is not static and it can be altered after it has been purchased, security attacks often occur because the latest patch or system has not been installed, and buyers need to make sure their vendor uses their own security product. Schmidt, currently president and chief executive of R&H Security Consulting, believes many software developers lack skills in writing secure code and need better training. "Most university courses traditionally focused on usability, scalability, and manageability, not security," he said. He also cited a Microsoft survey that said 64 percent of software developers lacked confidence in their ability to write secure applications.
Click Here to View Full Article
From ACM's TechNews, October 7, 2005
"Nematodes: The Making of 'Beneficial' Network Worms"
eWeek (10/05/05); Naraine, Ryan
- At the recent Hack In the Box event in Malaysia, security researcher Dave Aitel showed off a demo of a "Nematode" framework for creating a benign computer worm that he believes organizations will employ to reduce the costs of network security. "With this [Nematode] concept, you can take advantage of automating technologies to get protection for pennies on the dollar," he said. Aitel said the nematodes or nonmalicious worms can be automatically generated from available vulnerability data, and he envisions a time when ISPs, large companies, and government organizations deploy "strictly controlled" nematodes to make security more cost-efficient. Aitel's concept involves the employment of servers or "Nematokens" that only respond to requests from networks cleared for assaults, and the Nematode Intermediate Language (NIL), a programming language for creating the worms. Exploits can be rapidly and simply converted into nematodes through use of the NIL. Prior to his current stint at the Immunity security firm, Aitel worked as a computer scientist at the National Security Agency and then as a code-breaker for @Stake. The commercial technology that enables networks to protect themselves automatically with automated technologies will be available within five years, Aitel reckons.
"The Sky Really Is Falling"
CIO (10/01/05) Vol. 19, No. 1, P. 80; Worthen, Ben
- Co-chairman of the President's Information Technology Advisory Committee (PITAC) Ed Lazowska says inaction is the order of the day among government, CIOs, and vendors as far as cybersecurity is concerned. He accuses the Bush administration of undervaluing science, engineering, education, and research, which means that CIOs will be prevented from purchasing desperately needed cybersecurity products unless they pressure the government as well as pay for cutting-edge products as a demonstration of their commitment to cybersecurity. Lazowska says an attack on the nation's IT infrastructure could have serious ramifications for its critical infrastructure, while the military's dependence on commercial vendors for most of its hardware and software makes it highly vulnerable to cyberattacks as well. He cites a PITAC study that singles out three federal agencies as particularly deplorable in terms of cybersecurity funding: The Homeland Security Department, which currently commits a mere $18 million of its approximately $1 billion annual science and technology budget to cybersecurity; the Defense Advanced Research Projects Agency, whose investment in mainly classified cybersecurity programs shuts the door to premier academic researchers and yields products of little immediate value to commercial IT systems; and the National Science Foundation, which could only fund a small portion of its Cyber Trust program. Lazowska says current cybersecurity efforts are all about "Band-Aid" solutions, when what should be developed are new system architectures with long-term applications, static and dynamic vulnerability detection tools, programming languages with basic security functionality, and methods for building trusted software systems from diverse elements.
Click Here to View Full Article
From EduPage, October 5, 2005
Research Project Will Track Network Attacks
Chronicle of Higher Education, 4 October 2005 (sub. req'd)
- A research project will collect regular snapshots of computer networks from as many as 10 colleges and universities in an effort to improve protections from and responses to Internet attacks. The Information Security in Academic Institutions project, an initiative of the Columbia University Teachers College, uses monitoring technology called DShield and has already been tested at three institutions. The other institutions in the project have yet to be named, and the system may eventually be widely available. The system will give network administrators data about the state of networks, allowing them to gain a better understanding of Internet attacks by comparing data from before, during, and after an attack. Steffani A. Burd, executive director of the project, described it as "a 360-degree view of what's going on." The system will also pool data collected from participating institutions and make it available anonymously on the Web. This aggregation of data will allow a comparison between activity on the Internet generally and what's happening at campuses.
http://chronicle.com/daily/2005/10/2005100401t.htm
California Passes Anti-Phishing Law
InformationWeek, 3 October 2005
- A tough new anti-phishing law makes California the first state to pass legislation targeting that particular brand of online scam. The Anti-Phishing Act of 2005 makes it a crime to use "the Internet or other electronic means, to solicit, request, or take any action to induce another person to provide identifying information by representing itself to be a business without the approval or authority of the business." Identifying information includes Social Security numbers, credit card numbers, passwords, PINs, and other information that can be used to steal from individuals. Those found guilty of phishing are subject to fines of $2,500 per violation, as well as damages to victims of either actual losses or $500,000, whichever is greater.
http://informationweek.com/story/showArticle.jhtml?articleID=171202672
FTC Sues For Alleged Spyware
MSNBC, 5 October 2005
- The Federal Trade Commission (FTC) has sued Odysseus Marketing, accusing the company of engaging in distributing spyware. Odysseus distributed an application called Kazanon, which supposedly allowed users to trade files anonymously, without fear of being identified by record companies. According to the FTC, users who downloaded the application also got a range of adware programs that fed advertisements to those users' computers and added items to the search results pages of popular search engines, including Google and Yahoo. The added items, which were indistinguishable from those supplied by the search engine, directed users to companies that paid Odysseus for the placement. Further, the software did not offer users a simple option to uninstall it. Walter Rines, owner of Odysseus, disputed all of the FTC's claims. He noted that the user agreement informs consumers of what will be installed when they download the Kazanon program. He also said an uninstall tool is available and that his company's software did not remove any search results but merely added to the list. Rines also said the lawsuit was "moot" because his company stopped distributing adware several weeks ago.
http://msnbc.msn.com/id/9598897/
From ACM's TechNews, October 5, 2005
"Text Hackers Could Jam Cellphones, a Study Says"
New York Times (10/05/05) P. C1; Schwartz, John
- Metropolitan cell phone networks could be crippled by hackers who launch denial-of-service attacks against the phones' Internet-accessible text-messaging services, according to a study from Pennsylvania State University researchers. The study's lead researcher, computer science and engineering professor Patrick McDaniel, says hackers could hinder voice calls by clogging the control channel for cell phone calls with text messages. McDaniel and colleagues say they validated the feasibility of this scenario by demonstrating it on a small scale with their own cell phones, and their findings were corroborated by government regulators and phone company engineers. Cellular companies insist they have established deterrents to address the threat, though experts such as Cigital CTO Gary McGraw believe the solutions will likely be inelegant. The Penn State researchers' report cites the impracticality of severing the link between the phones' short messaging services and the Internet gateways, but suggests security could be added by restricting the message traffic that is fed into the network. Fencing in voice and data in next-generation cell phones to prevent traffic jams from blocking voice calls is another recommendation of the paper, which will be posted online and presented at the 12th ACM Conference on Computer and Communications Security (CCS'05) in November. Aviel D. Rubin, technical director of Johns Hopkins University's Information Security Institute, says, "Anytime a vulnerability in the physical world exists that can be exploited via computer programs running on the Internet, we have a recipe for disaster."
Click Here to View Full Article
"Fortifying DOD's Network Defenses"
Federal Computer Week (09/26/05) Vol. 19, No. 33, P. 60; Tiboni, Frank
- As attacks on Defense Department (DOD) computer networks increase, Purdue University computer science professor Eugene Spafford calls for the creation of a new generation of computer systems and security tools. However, such a project will require long-term research. Meanwhile, Spafford recommends six steps to better protect DOD computer networks: Basing security purchases on effectiveness rather than cost; severely limiting access to computer systems; removing all unnecessary systems; narrowing the number of users that can add hardware and software to the networks; requiring training and supervision of all network users; and implementing network-monitoring practices. Spafford laments that the government is not currently funding long-term cybersecurity research that is key to designing a new and highly effective network security system for federal agencies. Most security used to protect federal agency networks is designed for commercial use and not to protect highly sensitive data. SANS Institute research director Alan Paller says network security is not about implementing the latest security methods but more about preventing attacks up to 18 months in advance. An anonymous Defense Information Systems Agency official reports a change in DOD security that involves moving to a service-oriented architecture to facilitate data sharing among agencies as well as more effective IT services. Also, the new structure makes the Joint Task Force-Global Network Operations in charge of defending, operating, and maintaining the DOD's information infrastructure, according to the official who says, "We have many challenges in synchronizing the many IT efforts and security for [networks] across [the DOD's] vast infrastructure."
Click Here to View Full Article
"Are Attackers Winning the Arms Race?"
InfoWorld (09/26/05) Vol. 27, No. 39, P. 22; Grimes, Roger
- The severity and speed of malware attacks as well the skill of those who orchestrate them is increasing as hacking becomes more professional and profit-oriented. Forty-nine percent of 474 individuals surveyed in this year's InfoWorld Security Research Report said increasingly sophisticated cyberattacks represented the most serious security challenge their companies will face in the next 12 months, while 57% listed viruses as the top network security threat. Respondents noted that each had thwarted an average of 368 intrusions in the preceding 12 months, but an average of 44% of those attacks were successful. Malware's formerly stagnant nature is shifting toward a "mothership approach" in which a malicious program, once it has infected a computer, links to outside servers and downloads new instructions or programs. Hackers are designing worms to configure into bot networks that hijack thousands of PCs, which are "rented out" to criminal businesses or organizations. A lot of present-day malware exploits patched and unpatched vulnerabilities in Internet browsers, while the interim between the announcement of a vulnerability and the emergence of an exploit is shrinking. The InfoWorld poll found that anti-spyware software and appliances will experience the biggest purchasing increases in the next year. Strong adoption continues for intrusion detection and intrusion protection systems, but a greater number of administrators are enabling those products' blocking functionality.
Click Here to View Full Article
From ACM's TechNews, October 3, 2005
"Microrobots Show Promise in IT, Security"
Dartmouth Online (NH) (09/28/05); Beale, Matt
- Dartmouth researchers have developed the smallest mobile, untethered robot in the world after seven years of effort. The microrobot is a mere one-tenth the thickness of a single human hair, and can crawl like an inchworm and be steered without being connected to a power source. The device walks on a grid of electrodes that serve as both power supply and control mechanism, and it lacks wheels or joints because they are unworkable at such a tiny scale. The research team was awarded a grant by the Department of Homeland Security's Office of Domestic Preparedness to develop the microrobot for possible security applications such as identity verification and information protection. Dartmouth computer science graduate Igor Paprotny envisions a group of people who each carry a vial of microrobots as a means of identification. "They each spread some on a substrate and enter a PIN or something," he explains. "If we're all who we say we are, the microrobots assemble into a key, or message that, say, gives you the code to activate a nuclear weapon." The microrobot was created through cooperation between Dartmouth's computer science and engineering departments.
Click Here to View Full Article
"The Global State of Information Security 2005"
CIO (09/15/05) Vol. 18, No. 23, P. 60; Berinato, Scott; Ware, Lorraine Cosgrove
- Even as preventative security measures grow more sophisticated, the security industry remains loosely coordinated and decentralized, and struggles continually to keep up with the steady proliferation of threats. A recent study found that many security administrators are indifferent to government compliance regulations, and are often lax about risk management, as only 37 percent responded that they had in place an active security strategy. Much of the problem with cybersecurity is that the daily occurrence of multiple threats has administrators constantly scrambling to put out fires, leaving them with little time to formulate long-term strategies. Though information security remains overwhelmingly reactive, organizations are beginning to pay it more attention, as witnessed by the growing number of executive positions created to deal expressly with security. The results are tangible, as the higher up in the organization the security executive position is, the better the organization's security rating. Having high level security executives in place also tends to align security more closely with the direction of the business. Still, companies with high-level security positions are outnumbered by those that have yet to elevate the role. Larger companies have very recently stepped up their monitoring of employees to rein in risky activities, such as instant messaging. There is also a widespread disregard for the Department of Homeland Security as a leader in cybersecurity. In dealing with government regulations, there is a pervasive ignorance about their scope and intention, as an alarmingly high number of respondents reported either that regulations do not apply to them, or that they are knowingly non-compliant. Though the number of incidents reported held steady, many of those surveyed were unsure of the extent of the damage. Similar uncertainty was reported when respondents were asked about the budgetary allotment reserved for security, and 16 percent were unsure if their security budgets would increase or decrease in the future.
Click Here to View Full Article
From ACM's TechNews, September 26, 2005
"Basic Training for Anti-Hackers"
Chronicle of Higher Education (09/23/05) Vol. 52, No. 5, P. A41; Carnevale, Dan
- The threat of terrorists penetrating computer networks and wreaking havoc prompted the creation of the Cyber Security Boot Camp, an intense 10-week summer program hosted by the U.S. Air Force and Syracuse University in which participating college students study and practice hacking so that they may learn how to defend against cyberattacks. Air Force Research Laboratory computer engineer Kamal Jabbour says the goal of the program goes far beyond making these cyber-defenders technically proficient: He wants them to become sensitive to the urgency of the threat in order to be decisive in action. Participants take cybersecurity courses that cover cryptography, steganography, network security, wireless security, and digital forensics. Students are required to analyze a security problem and present a solution in a detailed report each week, all the while conforming to a strict writing style. Participants also serve as interns with local companies and organizations in order to be exposed to real-world cybersecurity applications. The boot camp's high-pressure course load is complemented by adherence to stringent rules concerning housing, appearance, and physical fitness, which are laid out in a military regimen. The program climaxes with a hacking contest in which student teams penetrate their opponents' computers to capture virtual flags. Each team is divided into two groups--one dedicated to attack rivals' systems and the other committed to defending their own system.
From EduPage, September 23, 2005
Congressmen To Ask For Review Of Higher Ed Antipiracy Efforts
Chronicle of Higher Education, 23 September 2005 (sub. req'd)
- At a U.S. House of Representatives subcommittee meeting this week, lawmakers, campus officials, and representatives of the movie industry and of a provider of legal download services discussed efforts by U.S. colleges and universities to curtail copyright violations on their networks. Reps. Lamar Smith (R-Tex.) and Howard Berman (D-Calif.) said they will ask the Government Accountability Office to issue a formal report on what effects those efforts have had on student file-trading habits. According to Smith, "We will ask for the report so we can increase the scrutiny and increase the public attention to piracy." Also at the hearing, Norbert Dunkel, director of housing at the University of Florida, described his institution's use of an application called Icarus, which automatically restricts usage of the network for students who connect to P2P services. Dunkel said the tool, which the university developed, has led to a 95 percent reduction in outgoing traffic from the university's network and virtually eliminated notices of copyright infringement. Smith applauded the application, but Daniel Updegrove, vice president for information technology at the University of Texas at Austin, expressed concerns that such a blanket approach to the problem could limit the academic freedom and privacy of students.
http://chronicle.com/daily/2005/09/2005092301t.htm
From ACM's TechNews, September 30, 2005
"Brazilians Blazing Trails With Internet Technology"
Knight-Ridder Wire Services (09/26/05); Chang, Jack
- Despite crippling levels of poverty and violence, Brazil is home to some of the world's most innovative technology, and plays host to some of the most sophisticated hackers. Brazil often finds itself the locus of international debates over intellectual property rights and private media controls, and though it does not have in place the infrastructure that other developing nations do, Brazil has made significant advances in open access technology that place it at the forefront of the Third World. Brazil received a major economic boost when Google acquired the native firm Akwan Information Technologies and established an office in Sao Paolo. There is still a wide gulf between rich and poor in Brazil, and while its 22 million-plus residents with Internet access rank it in the top 10 worldwide, that number still only represents 12 percent of the population. Piracy is also a major issue, as roughly 60 percent of the software and 70 percent of the hardware in use in Brazil infringes on copyright laws; Brazil is also a notorious haven for cyber criminals, as it is estimated that approximately 80 percent of the world's hackers are based in Brazil. The country's emerging IT industry has reached the $10 billion mark in annual sales. The spirit of unfettered access has led to the widespread implementation of the Linux platform in government and private industry, along with a host of other open-source applications. Throughout Brazil, open access movements are seeking to provide free Internet capability to computer users, and its vibrant open-source community draws on innovation from all over the country to maintain Web sites, provide tech support, and develop new technologies.
Click Here to View Full Article
"Anti-Spyware Gets HIP"
IT Architect (09/05) Vol. 20, No. 9, P. 61; Conry-Murray, Andrew
- Anti-spyware software is expected to transition from threat-specific technologies to Host-based Intrusion Prevention Systems (HIPS) as vendors deploy proactive solutions that block new and unknown spyware programs from PCs. Such solutions are likely to be increasingly compelling for security architects as the development of spyware continues without respite and end users continue to install spyware-laden programs despite repeated warnings. Most anti-spyware programs use signatures and are only effective against programs that are already defined in the threat database, while the increasing difficulty of removing spyware once installed makes proactive prevention all the more urgent. Some vendors offer behavior-based spyware detection technologies that can thwart the installation of spyware on enterprise desktops without the use of signatures, although such solutions carry with them the risk of false positives. "The market is warming up to the notion that existing signature-based solutions aren't providing adequate malware prevention," says Finjan's Nick Sears. "Customers are looking to alternative solutions." Other anti-spyware options deliver protection at the network gateway by scanning incoming Web traffic for spyware and adware, preventing spyware on a PC from linking to a remote server on the Internet, and stopping end users from surfing to established sites for spyware or adware. However, none of the gateway products can protect mobile users outside the corporate environment.
Click Here to View Full Article
"Destructive Power of Mobile Viruses Could Rise Fast, Experts Say"
IDG News Service (09/28/05); Nystedt, Dan
- As the interconnectedness central to the dream of the digital home rapidly becomes a reality, a host of security and privacy concerns arises. The same Web cams that alert users to suspicious activity within their homes can also be used by hackers seeking to break in to determine if anyone is home. Internet connectivity is being incorporated into a growing number of devices that have not yet evolved to carry the same level of security as PCs and desktops. As attacks on traditional hardware become more sparse, the added functionality in mobile phones makes them a more popular target. The number of reported malware threats menacing mobile devices has grown to 87, up from fewer than 10 at the beginning of last year. Symbian is the most popular operating system for mobile phones in the world, and its series 60 was the target of 82 of the reported viruses, though analysts are quick to point out that that proportion speaks more to the system's popularity than its vulnerability. Faster download speeds elevate the risk of a virus infecting and spreading throughout a mobile phone. It is projected that the threat against mobile devices will increase as more hackers recognize the potential vulnerabilities and turn their attention away from traditional attacks.
Click Here to View Full Article
From ACM's TechNews, September 28, 2005
"Lawmaker Doesn't Rule Out Cybersecurity Regulation"
IDG News Service (09/27/05); Gross, Grant
- The U.S. government and the private sector have not given cybersecurity adequate emphasis, said Rep. Dan Lungren (R-Calif.), speaking at a Sept. 26 cybersecurity policy forum hosted by Nortel Networks. Although his preference is for companies to voluntarily patch vulnerabilities, Lungren, chairman of the House Economic Security, Infrastructure Protection, and Cybersecurity Subcommittee, did not dismiss the possibility of the government imposing cybersecurity regulations, which he fears would "stifle the kind of innovation that's available to the private sector to come up with their own fixes." Lungren also said the government must gain a better comprehension of cybersecurity risk, especially as it pertains to Internet-powered supervisory control and data acquisition (SCADA) systems responsible for much of the country's critical infrastructure. He urged the government to make a stronger effort to anticipate cyberattacks, particularly those that threaten to cause the worst damage, and channel its resources into preventing such incidents. Nortel CEO Bill Owens noted at the same forum that the likelihood of cyberattacks will rise as increasing numbers of devices transmit information via Internet Protocol. Acting director of the Homeland Security Department's National Cybersecurity Division Andy Purdy claimed his agency is attempting to raise the profile of the cybersecurity issue, citing the creation of a new assistant secretary for cybersecurity as a step in the right direction. But he agreed with Lungren that private companies bear a significant measure of responsibility in the assurance of Internet safety.
Click Here to View Full Article
"New Security Proposed for Do-it-All Phones"
CNet (09/27/05); Evers, Joris
- The increasing consolidation of functions into mobile phones has placed a premium on safeguarding their security. The Trusted Computing Group (TCG) has developed a hardware-based standard for securing mobile phones that has been backed by industry heavyweights such as Nokia, Motorola, Intel, and Samsung. Addressing security on the hardware level will give users greater confidence in their phones, and the TCG standard would protect data and offer copyright protection for exclusive content. The TCG's plans would support similar features to those offered by the Trusted Platform Module, the chip geared for PCs and servers that enables authentication, secure storage, and protected email. The proposal also contains operational restrictions that would prohibit users from running certain applications on their devices. Mobile phones will become an increasingly tempting target for hackers as their functionality expands, particularly as they start to include credit card payment information, which the TCG standard is expected to address in a future iteration. Meanwhile, the incorporation of digital rights management into a mobile phone security platform has raised the ire of user-rights advocates, who claim that it is an unnecessary restriction of a user's freedom. Despite broad support from major cell phone companies, the fractured nature of the industry makes it unlikely that the new security features will see widespread adoption before 2008.
Click Here to View Full Article
From ACM's TechNews, September 23, 2005
"Name That Worm--Plan Looks to Cut Through Chaos"
CNet (09/22/05); Evers, Joris
- Last month, a worm with various names wreaked havoc on Windows 2000 operating systems, abetted by the chaotic and fractured attempts to identify it. To address that issue the CME naming system has emerged, which tags a given piece of malware with a unique identifier. The United States Computer Emergency Readiness Team (US-CERT) says its product will provide a common identifier to help users identify which threat is attacking their system, and notify them if they are protected or not. CME promises to fulfill the longstanding goal of the security industry to agree on a unified system to name viruses and worms; industry participation in CME is voluntary, and will be a key factor in the initiative's success. When multiple security companies create different names for the same outbreak, there is often widespread confusion as to whether or not there is one threat or multiple, related threats. Organizations that use multiple security products from different vendors are often confounded by multiple alerts of the same virus or worm with different names. At first, CME will only issue numbers to major threats, though US-CERT plans eventually to cover all attacks. Regardless of the names security vendors produce, CME will assign an attack with a random number within hours of its discovery, and tag it with its associated characteristics; then security companies are urged to include the CME tag with whatever semantic description they produce, so as to create a commonality that helps users understand the actual scope of the threat.
Click Here to View Full Article
"The Next 50 Years of Computer Security: An Interview With Alan Cox"
O'Reilly Network (09/12/05); Dumbill, Edd
- EuroOSCON keynote speaker and Linux kernel developer Alan Cox describes computer security as "basic" and "reactive," but starting to show signs of improvement. He says the interim between the discovery of bugs and the launch of exploits has shrunk, and exploits will improve in tandem with software tools; because Linux offers greater security than many competitors, it is less vulnerable to exploits, but Cox says no system--Linux included--provides enough protection. Promising developments Cox points to include a significant uptake in code verification and analysis tools, which helps prevent the introduction of errors within production, and a movement toward in-depth defense through the use of SELinux, no-execute flags in processors and software emulation, and randomization of where objects are located in memory. He notes that SELinux can also be employed to make users more security-conscious by turning behavioral advisories into policy. Cox believes the incorporation of security into software development tools can be done without hindering developers' productivity because many improvements automate tedious chores. Cox says the cost of cleaning up the mess caused by system breaches is the current driver of secure software implementation, while the bad publicity this entails as well as statutory duties with data protection are further incentives. He reasons that lawsuits from the government or users harmed by poorly run systems might also encourage security deployments. "In theory as we get better at security the expected standard rises and those who fail to keep up would become more and more exposed to negligence claims," Cox says.
Click Here to View Full Article
From ACM's Tech News, September 19, 2005
"Now, Every Keystroke Can Betray You"
Los Angeles Times (09/18/05) P. A1; Menn, Joseph
- Cybercriminals have begun to prey on online banking customers, using sophisticated software to record individual keystrokes and obtain passwords and PIN numbers. From June to July, the number of reported phishing attacks dropped, while the number of programs designed to steal passwords, known as crimeware, more than doubled. Though many consumers report that fears of cybercrime will lead them to modify their shopping habits, many banks encourage the use of online transactions because they entail far less cost than a visit to a branch. Crimeware can be installed inadvertently by opening an attachment or an advertising link, after which it can record all keystrokes or only those made at selected financial sites; the information is then relayed back to the hackers, who thus far have largely been using it to access accounts one at a time, though efforts at automating the process have recently emerged. One particularly malicious program, known as Grams, cuts out the step of relaying the information to the hacker and automatically cleans out the account once the information is recorded. In response, the FDIC has implored banks to investigate new security measures, though they respond with the fear that too much security could become a nuisance and cost them customers. As security measures become more sophisticated, criminals are keeping the pace, as efforts to select passwords with a mouse instead of using keystrokes have been met with programs that can take a picture of a computer screen to intercept the mouse clicks; some banks have even taken to calling customers when irregular activity is observed on their accounts. Liability remains a pressing issue, as the FDIC and many banks disagree on the extent to which consumers are covered in the event that their data are compromised.
Click Here to View Full Article
"False Protection"
Software Development (09/05) Vol. 13, No. 9, P. 34; O'Connell, Laurie
- The software designed to bolster enterprise systems against malware and other cyberthreats has itself become a ripe target for hackers, and analysts such as Cigital CTO and author Gary McGraw say security software providers' failure to be software security practitioners is chiefly to blame. "Vendors have to engineer security into the development application lifecycle, get developers to have core responsibility, and give them the tools to do it," says Yankee Group analyst Andrew Jaquith. He suggests that security software developers perform design reviews early and regularly; run nightly regression tests and frequent code base reviews; maintain focus on privilege levels and authorization management; study component authentication; unearth buffer overflows; and conduct checkpoint reviews with security-savvy personnel. Jaquith also recommends that developers test for functions the application is not supposed to carry out. Furthermore, he advises developers to base their choice of vendor or software security system on hard evidence of best practices and an exhaustive technique for spotting and fixing problems encountered by staff, clients, or third parties. Another way to boost security is to fortify the patching infrastructure and analyze security products' auto-update components. An organization's general security can also be shored up by deploying a diverse assortment of anti-virus products from multiple vendors, as well as multisourced solutions from varying code bases.
Click Here to View Full Article
From ACM's Tech News, September 16, 2005
"Hacking's a Snap in Legoland"
CNet (09/15/05); Terdiman, Daniel
- Lego executives responded with surprising enthusiasm when adult Lego aficionados hacked and modified one of its development tools for digital designers. Lego's Ronny Scherer says the company welcomes and encourages modifications that show them how to adapt their software to users' needs. The software in question is a free 3D modeling program that fans can download and use to design their own customized Lego models out of digital collections, or palettes, of bricks; Lego then manufactures the bricks and sends them to users. Members of the adult Lego modeling community complained that the design and purchase of these customized models was too expensive because the available palettes usually contained far more bricks than were needed to build the models, and also failed to include important components. Each palette is comprised of several bags of bricks, and software engineer Dan Malec and other Lego enthusiasts believed they could purchase less bricks and reduce their overall costs by lowering the number of bricks in a palette. They compiled a database listing what bags must be bought in order to collect specific bricks, and then tweaked the digital files listing the palettes users would see in the modeling program so they would be listed by bag rather than by palette. Analyst Anita Frazier reasons that Lego welcomed this hack because "it doesn't ultimately hurt the intellectual property, and [the users] aren't modifying the trademark or the core property at all."
Click Here to View Full Article
"A Human Connection to Intrusion Detection"
SearchSecurity.com (09/14/05); McKay, Niall
- Researchers at the University of Nottingham want to use the human body's immune system as a model for protecting computer systems. Computer science professor Uwe Aickelin and his colleagues are collaborating with immunologists at the University of the West of England in Bristol to build a computer intrusion detection system that has an artificial immune system. "The University of the West of England is carrying out 'wet' experiments to look at various aspects of cell behavior and passing on their findings to us," explains Jamie Twycross, research associate with the Automated Scheduling Optimization and Planning Lab at the University of Nottingham. "We use the results to try and build a computational model." The immunologists are employing the controversial "danger theory," which holds that a complex system that accesses the origin, seriousness, and frequency of the danger signals the human immune system. Twycross is working to recreate, for an artificial immune system, the process in which garbage-collecting dendric cells that roam the body transform into fighter cells to battle an infection. Similarly, the software would be able to assess threats to computer systems by gathering information from a number of sources.
Click Here to View Full Article
"Fleet-Footed Worm Blocker"
Computerworld (09/12/05) P. 36; Anthes, Gary
- Microsoft Research is developing software designed to defend networks from fast-replicating computer worms. Vigilante can spot even unknown worms in network traffic, erect "filters" against them, and notify other machines on the network so quickly that the worms can be impeded before humans are even conscious of them, according to research software design engineer Manuel Costa. He says the two biggest hurdles his research team had to overcome was to develop algorithms that could identify previously unseen worms, and to generate no false positives that would result in the blockage of legitimate traffic. Costa says further research is required for Vigilante to fully meet the first challenge, but the false positive challenge has been effectively tackled. Once computers running the software detect an attack, they produce "self-certifying alerts" and distribute them to other machines, which can confirm the alerts before taking defensive action. Costa says the computationally intensive algorithms responsible for spotting worms and issuing alerts would usually run on several nonproduction "honeypot" servers, while the protection mechanisms that reply to the alerts would operate on every network-connected machine. BT Group scientist Robert Ghanea-Hercock sees Vigilante as a potentially useful safeguard in large enterprise or government networks, but cautions that the software "is less valuable in the open network or broadband sector due to the lack of cooperation between the security vendors."
Click Here to View Full Article
From EduPage, September 14, 2005
Sound Of Keyboard Clicks Reveals What Is Typed
ZDNet, 14 September 2005
- Researchers at the University of California at Berkeley have demonstrated that an audio recording of someone typing on a computer keyboard can reveal with surprising accuracy exactly what they have typed. Using commercially available recording equipment, the researchers captured audio of typing and analyzed the sounds using an algorithm they developed. Because keys make different sounds, the system is able to make educated guesses about what key was pressed in what order. The application then applies some linguistic logic, including spelling and grammar checks, to refine the results. After three rounds of revisions, the application was able to identify 96 percent of the individual characters typed and 88 percent of the words. The application was effective even with background noise, such as music or cell phones ringing. Doug Tygar, UC Berkeley professor of computer science and information management and a principal investigator of the study, said the project should raise concerns about the security risks of such a technology. "If we were able to figure this out," he said, "it's likely that people with less honorable intentions can--or have--as well."
http://news.zdnet.com/2100-1009_22-5865318.html
From EduPage, September 12, 2005
"Google Hacking"
Network World (09/05/05) Vol. 22, No. 35, P. 1; McMillan, Robert
- The practice of Google hacking--the penetration of computer networks through Google search queries--owes its start to Computer Sciences researcher and author Johnny Long, who created the Google Hacking Database initially as a joke. The database now serves as a repository for about 1,500 queries, while the Google hacking community is composed of approximately 60,000 members. The search engine is used to not only to unearth credit card numbers, passwords, and unguarded Web interfaces to Web sites, routers, and other things, but also to perform hacker reconnaissance. "Nowadays, pretty much any hacking incident most likely begins with Google," says F-Secure chief research officer Mikko Hypponen. One method is for a hacker to await a security bulletin and then employ Google to find Web sites that use the vulnerable software. Google's database can also be employed to map out computer networks and thwart network administrators' attempts to hinder eavesdroppers. Long reasons that Google's greater involvement in the security community could present new business opportunities. Google could, for instance, create a Google Security Alerts system that notifies customers when their Web sites harbor bugs discovered by Long and other Google hackers.
Click Here to View Full Article
From EduPage, September 7, 2005
UT Hacker Gets Fine, Probation
Houston Chronicle, 7 September 2005
- A former student at the University of Texas at Austin has been sentenced for hacking into the university computer system, a charge on which a federal jury convicted him in June. Christopher Andrew Phillips has been ordered to pay $170,000 in restitution for his crimes and to serve five years of probation. Phillips was found guilty of damaging the university's computers and of illegally possessing close to 40,000 Social Security numbers. The jury acquitted him of intending to profit from the personal information he obtained. In addition to the fine and probation, Phillips is forbidden from using the Internet for five years except for school or for work and only under the supervision of his parole officer. In a statement, U.S. Attorney Johnny Sutton said, "[Phillips] found out the hard way that breaking into someone else's computer is not a joke."
http://www.chron.com/cs/CDA/ssistory.mpl/metropolitan/3342919
From ACM's TechNews, September 7, 2005
"Bug Hunters, Software Firms in Uneasy Alliance"
CNet (09/06/05); Reardon, Marguerite
- The "responsible disclosure" of security flaws can be a contentious issue between software firms and security researchers. Researchers who do not comply with Microsoft's disclosure guidelines and publicly expose a bug in detail before it is fixed can get into trouble, but independent security researcher Tom Ferris argues that Microsoft takes so long to release patches that full disclosure is warranted; critics also say full disclosure puts pressure on software makers to improve the security of their products faster. IDefense Labs director Michael Sutton says relationships between security researchers and software makers have generally improved over the last several years, and Microsoft, for one, is attempting to get into hackers' good graces through "Blue Hat" conferences and other outreach efforts. Cisco and Oracle, on the other hand, have earned researchers' enmity by failing to expeditiously fix bugs after researchers report them, as well as not updating researchers on their progress, in keeping with responsible disclosure guidelines. Director of Germany's Red Database Security Alexander Kornbrust publicly revealed a half-dozen security vulnerabilities in Oracle software when the software maker failed to issue fixes some two years after he first reported them, and he says Oracle only gave him feedback immediately after he alerted the company to the bugs' existence. Former White House cybersecurity adviser Howard Schmidt says responsible disclosure of software bugs is critical, given America's reliance on IT systems. He suggests that technology companies' lack of responsiveness to security researchers' warnings could be addressed through an intermediate government agency, namely the U.S. Computer Emergency Readiness Team.
Click Here to View Full Article
From EduPage, September 2, 2005
Colleges Dealing With Computer Security Concerns
Christian Science Monitor, 1 September 2005
- As the number of computers on college campuses rises, and as IT becomes increasingly rooted in campus activities, higher education officials find themselves facing expanding numbers and kinds of threats to vulnerabilities in computer security. According to the Privacy Rights Clearinghouse (PRC), 50 million people have been involved in data breaches over the past seven months, including more than 30 incidents on U.S. college and university campuses. Complicating the challenge to IT security staff is the historically open nature of academic settings, a characteristic often at odds with strong computer security. Another factor making life difficult for IT staff are the computers that students bring to campus with them, often with inadequate or poorly configured security features. Jack Suess, vice president of information technology at the University of Maryland Baltimore County, however, noted that of the 11,000 to 12,000 computers on his campus this year, "there's probably only 200 or 250 I'm really worried about."
http://www.csmonitor.com/2005/0901/p12s02-legn.html
From ACM's TechNews, September 2, 2005
"The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them)"
Time (09/05/05) Vol. 166, No. 10, P. 34; Thornburgh, Nathan; Forney, Matthew; Bennett, Brian
- The revelation that a ring of Chinese hackers, collectively known as Titan Rain, has been launching coordinated attacks on sensitive and seemingly secure U.S. networks to steal data for some time has unsettling implications for U.S. security. The Department of Defense issued a warning that Titan Rain could not only be a coalition of data thieves but also a patrol point for more critical attacks that could hijack or cripple certain U.S. military networks. Such threats are compounded by the fact that federal investigators must jump through bureaucratic hoops to gain authorization to track down and neutralize foreign cyberspies, while concerns of potential international incidents as a result of such probes only add to the delicacy investigators must practice. There is also a lack of experienced investigators, prompting the intelligence community to encourage or at least unofficially sanction freelancers, such as former Sandia National Laboratories computer network security analyst Shawn Carpenter, who traced the Titan Rain intrusions to a trio of Chinese routers in the province of Guangdong, and dutifully informed the FBI. Sandia dismissed Carpenter because his activities constituted hacking into foreign computers, which is unlawful. Carpenter justifies his actions by saying his case shows the need for reforms if the U.S. is to more effectively respond to cyberthreats. Although Washington has no official position on the power behind Titan Rain, Carpenter and other network-security analysts are convinced that the Chinese government masterminded the attacks.
Click Here to View Full Article
"The Threats Get Nastier"
InformationWeek (08/29/05) No. 1053, P. 34; Claburn, Thomas; Garvey, Martin J.
- Business technology and security professionals are confident their IT systems are adequately protected against cyberthreats, according to InformationWeek Research's U.S. Information Security Survey 2005, but this attitude belies the fact that worms, viruses, and other forms of malware are more insidious and dangerous than ever. The recent Zotob worm epidemic shows that such threats have not gone away, while the motivation behind such attacks has shifted from bragging rights to financial gain. The most common types of security threats and espionage during the past year were viruses and worms, phishing, denial of service, and Web-scripting language violations, while suspected culprits have included hackers, virus writers, unauthorized and former workers, and organized crime. Seventy-eight percent of survey respondents who believe their vulnerability to cyberthreats has increased or remained steady over the past year say the growing sophistication of such threats is their chief concern, while other anxiety-provoking factors include more ways to attack corporate networks, increased volume of attacks, and more malicious intent. Fifty-one percent of businesses plan to boost their IT security budget this year, while 56 percent of respondents say they are approaching IT security in a more structured way due to the need to conform to government regulations. Enhanced application security, secure remote access, and improved access controls are among the top priorities for these companies. Not only are cyberattacks being launched across multiple modes, but virus writers are taking a cue from hackers and using rootkits to conceal their activities from detection systems. Six percent of companies admit hackers gained access to their customer records, but the actual percentage may be higher if one assumes that some companies are hiding the truth or have been compromised without their knowledge.
From ACM's TechNews, August 31, 2005
"The Future of Computer Worms"
IT Observer (08/30/05); Sancho, David
- Trend Micro research engineer David Sancho outlines possible future attack strategies of bot worms and what steps can be taken to counter them. He says the modular design of bot worms enables them to exploit vulnerabilities faster, which means the interim between the disclosure of a vulnerability and its exploitation will shrink in the very near future; countermeasures Sancho suggests include the immediate patching of home systems as soon as updates are available, and the deployment of software and hardware designed as protective measures against malware in corporate environments. The author thinks future worms could employ polymorphic shellcode exploit attacks, a method in which bot authors create a module that alters the exploit code so that it always varies, which could thwart vulnerability and intrusion detection systems whose effectiveness hinges on the exploit code never changing. A solution to this threat would be a tool that detects the unique compression methods used by each worm variant, and Trend Micro has a scan engine in the works that promises to spot different compression techniques before isolating specific detection patterns. Sancho also expects future worms to perform RSS feed hijacking, in which worms commandeer the existing configured RSS-feed clients to automatically download new worms and other kinds of malware. The author believes the release of Internet Explorer 7 could make RSS feed hijacking a legitimate threat, and recommends that companies implement a method to scan HTTP traffic as a protective measure.
Click Here to View Full Article
From EduPage, August 26, 2005
Cyberscam Continues Apace
BBC, 26 August 2005
- A recently discovered identity-theft scam continues to cause problems for Internet users, despite efforts by security firms and the FBI to stop it. Security firm Sunbelt Software uncovered the scam accidentally while investigating spyware. Sunbelt located an Internet server whose log files contained personal information harvested by keylogging from many thousands of users. The company notified the FBI, and the server was shut down soon afterwards, only to resurface later. Each time the servers are taken down, more of them appear elsewhere. The keylogging software, which is circulated by a computer virus, captures private information from users and transmits it to one of the rogue servers. The FBI is working to find out who is operating the servers. In the meantime, Sunbelt has developed a tool that searches for the malicious software, which is has named Srv.SSA-KeyLogger.
http://news.bbc.co.uk/2/hi/technology/4186972.stm
From ACM's TechNews, August 26, 2005
"Hackers Attack Via Chinese Web Sites"
Washington Post (08/25/05) P. A1; Graham, Bradley; Eggen, Dan
- Hackers have been focusing attacks on hundreds of unclassified U.S. government systems through Chinese Web sites for several years, reported anonymous government officials. Analysts are split on whether these intrusions are the work of a coordinated Chinese government initiative to breach U.S. networks and monitor government databanks, or other hackers using Chinese networks to mask the attacks' point of origin. "This is an ongoing, organized attempt to siphon off information from our unclassified systems," said one official, who noted that State, Energy, Defense, and Homeland Security Department networks are among those targeted. With roughly 5 million computers spread across the globe, the Pentagon has more computers than any other agency, making its network the most vulnerable target to both foreign and domestic hackers, the officials said. The Pentagon estimates that China is the No. 1 source of Defense Department hacks, though Lt. Col. Mike VanPutte of the U.S. Strategic Command's Joint Task Force for Global Network Operations said this only proves that China is the probes' "last hop" before they strike their targets. One anonymous government official downplayed the severity of the attacks, while another said an FBI investigation has yet to yield any definitive proof of who is orchestrating the intrusions. U.S. concerns about Chinese military initiatives in general are fueling worries about China-based cyberattacks, and the spate of attacks on unclassified systems has added urgency to the Pentagon's effort to acquire new detection software programs and better train computer security specialists, according to several officials.
Click Here to View Full Article
From ACM's TechNews, August 24, 2005
"Hacker Underground Erupts in Virtual Turf Wars"
Christian Science Monitor (08/22/05); Spotts, Peter N.
- Hacker turf wars sparked by the increasing strategic and monetary value of compromised computers have usually simmered out of the public eye, but such skirmishes were in plain view last week when the Zotob worm infected computers at a major airport, media outlets, and industrial companies, and prompted an all-out battle between competing malware. Zotob appeared a mere six days after Microsoft announced a patch for the security flaw the worm was crafted to take advantage of, and Curtis Franklin Jr. of Secure Enterprise Magazine reports that the average time between the disclosure of a vulnerability and the release of an exploit has shrunk from 21 days to eight days in the last 24 months. Experts say this shorter timeframe can be partially explained by the apparent use of prewritten program "shells" by malware authors, while the patching process can be held up by negotiations between corporate network managers and other parts of the corporation. "Zero-day exploits" in which malware appears on the same day a flaw is announced are generating the most concern, and Franklin says the Zotob turf war illustrates a convergence among the various forms of malware in terms of function. Intelguardians Network Intelligence security consultant Tom Liston says hacker turf wars have increased significantly over the last three years. University of Southern California at Los Angeles professor Peter Reiher adds that such battles used to be primarily over bragging rights, whereas today they indicate a greater interest in controlling infected systems.
Click Here to View Full Article
From ACM's TechNews, August 19, 2005
"Can a Simple Password Stop Domain Name Hijacking?"
Tom's Hardware Guide (08/17/05); Gruener, Wolfgang
- Using a password at the time of a domain transfer between registrars could safeguard against identity fraud targeting Internet domain names, which has emerged as one of the most significant threats to networks today. Securing the domain name transfer process has been slow, due partially to the lackluster implementation of Extensible Provisioning Protocol (EPP), an XML-based transfer program. VeriSign is moving toward adopting EPP for the .com and .net domains at an unspecified time frame, which will ultimately reduce the vulnerability of top-level domains. Since 2000, Registry Registrar Protocol has been steering the exchange of domain name services, but that program, adopted by VeriSign in 2003, contains no built-in security features. EPP potentially offers greater security through database management systems, whereby the acquiring registrar verifies the customer's identity from the losing registrar through an authInfo code. The key to authInfo's success will be its application to create unique codes for each domain name, rather than registrar-wide generic codes that are easy targets for hackers. ICANN SSAC Fellow Dave Piscitello describes EEP authInfo essentially as a password, as no one other than the receiving registrar could view the transmission in an unencrypted form. The .com and .net domains have been slow to implement EPP, though its use is common in other domains, such as .org, .biz, and .info. It is estimated that .com and .net will not be fully converted to EEP for another year. EEP may not be a universal panacea, however, as the transfer process still depends on WHOIS data of questionable reliability. Ultimately, SSAC says registrants themselves must be accountable for securing domain names, ensuring their information is current, and choosing an appropriate registrar, as well as utilizing EEP authInfo to its full extent.
Click Here to View Full Article
"Computer Characters Mugged in Virtual Crime Spree"
New Scientist (08/18/05); Knight, Will
- The increasingly porous boundary between the real and virtual worlds is illustrated by the arrest of a Chinese exchange student in Japan on suspicion of controlling software "bots" to assault and rob game characters of virtual possessions, which were then fenced for real money through an auction Web site. Bots can easily best virtual characters controlled by people because they perform tasks in a game very swiftly or repetitively, and such activities can be spotted by countermeasures used by many games companies. Computer games consultant Ren Reynolds comments that bot authors and games firms are locked in an arms race, while the practice of turning virtual worlds into a cash cow is expanding. Computer security expert Bruce Schneier says the line is blurring between real and virtual crime as well, citing recent reports of criminals trying to penetrate games or steal players' account data for money. "I regularly say that every form of theft and fraud in the real world will eventually be duplicated in cyberspace," Schneier writes on his blog. "Perhaps every method of stealing real money will eventually be used to steal imaginary money, too." Reynolds concludes that the rising online game player population will fuel crooks' desire for exploitation even further.
Click Here to View Full Article
From ACM's TechNews, August 19, 2005
"Al-Qaida Recruiting Target: Skilled Hackers"
Investor's Business Daily (08/19/05) P. A4; Tsuruoka, Doug
- Mark Rasch, chief security counsel for Solutionary, Inc. and former head of the Justice Department's computer crime unit, reports that foreign governments and terrorist organizations such as al-Qaida are attempting to hire Internet hackers to break into commercial and federal computer networks, with an eye toward sabotage or information theft. He says a massive assault against our cyberinfrastructure would disrupt services but not inspire terror; much more effective would be a combination cyberattack and physical attack, which would spread fear as well as hinder response strategies. Rasch says al-Qaida has formulated plans to attack U.S. networks controlling the supervisory control and data acquisition (SCADA) systems underlying the country's utility infrastructure. Terrorists can contact hackers in a variety of ways, including through Internet relay chat channels, anonymous outsourcing, and anonymous remailers that hide the original source of messages. Rasch suggests a number of precautions to defend against cyberterror attacks, such as the installation of disaster recovery and business continuation technology and redundant systems. So that people can understand and identify attack precursors, he recommends an exchange of information. Rasch also suggests improving information sharing networks following an attack.
"'War of the Worms' Spurs Latest Cyber-Attack"
ABC News (08/17/05); James, Michael S.
- The attack earlier this week that slowed systems at The New York Times, The Associated Press, and other media outlets may have been an example of battling worms competing for control of major computer networks. The culprit was identified as different strains of the Zotob worm, which targets computers running Windows 2000, though if unprotected, Windows 2003 and XP are also vulnerable. In the latest attacks, the hackers were attempting to seize control of the computers to create botnets, and posted death threats aimed at antivirus companies. The pursuit of unlawful computer armies has led to a virtual turf war, where rival hackers delete each other's worms to clear the way for their own in an effort to build the largest botnet. The recent trend in hacking has been toward personal greed, as simply defacing a Web site or launching a denial of service attack no longer motivates hackers: "Destroying the Internet is not really useful if the Internet is the means to your financial goals," noted Art Manion of the U.S. CERT center at Carnegie Mellon. Botnet operators use the expropriated computers to send out torrents of spam or access personal information, though there is also an underground economy that pays to rent botnets for various purposes, most commonly to send out spam. The use of multiple third-party computers makes it difficult to track the originator of botnet spam. Cybertrust's David Kennedy believes poor laptop security may have facilitated the recent attacks, and cautions businesses to keep security patches updated, and use a special router to manage the connection between the notebook and the providing pipeline; he adds that users should power their notebooks down completely before connecting to the network.
Click Here to View Full Article
"Computer Virus Writers Moving Faster with Attacks"
Reuters (08/17/05); Swartz, Spencer
- A flood of malware-based attacks against U.S. media companies and other corporations this week has prompted security analysts to warn that the window between the disclosure of vulnerabilities and their exploitation by hackers is shrinking. "These guys have gotten a lot faster...they are doing it faster than managers can keep up with," stated F-Secure virus researcher Eno Carrera. Analysts said the interim between advisories of flaws in Microsoft's Windows operating system and the release of exploitative viruses was several weeks or months a few years ago. However, hackers authored and released exploits of three Windows security vulnerabilities mere days after Microsoft notified users of their existence last week. The malware caused thousands of vulnerable machines to restart repeatedly, and potentially exposed computers to hackers who could hijack a system as a launch-pad for future virus attacks and steal personal data while the user is unaware. Also troubling is the fact that virus writers often release malicious code faster than computer system safeguards can be updated. Hackers have additionally started exploiting instant messaging's popularity among office workers as a vehicle for delivering viruses.
Click Here to View Full Article
From Microsoft -- "School is in: 7 computer security tips for students".
From the Chicago Tribune, Now, Every Keystroke Can Betray You.
From New York Times, August 17, 2005
Virus Attacks Windows Computers at Companies
By Matt Richtel
- A handful of digital worms that exploit vulnerabilities in some Microsoft Windows computers spread on Tuesday. Read the article.
From New York Times, August 15, 2005
Spyware Heats Up the Debate Over Cookies
By Bob Tedeschi
- Internet users now routinely delete cookies, leaving marketers scrambling to find another tool to measure their effectiveness. Read the article.
From EduPage, August 17, 2005
Former AOL Employee Sentenced For Data Theft
Reuters, 17 August 2005
- A judge in New York has sentenced a former employee of America Online to 15 months in prison for stealing 92 million screen names from AOL and selling them to a spammer. Jason Smathers, who pleaded guilty earlier this year and cooperated with prosecutors, expressed remorse for his actions and asked the judge for leniency. Indeed, the judge could have given Smathers 24 months in prison for his crimes, which included conspiracy and interstate trafficking of stolen property. AOL has said it suffered monetary losses of $300,000 as a result of Smathers's actions. The judge in the case has given the company 10 days to prove those losses, after which he said he will impose a fine, hinting that he is leaning toward a fine of $84,000.
http://today.reuters.com/business/newsarticle.aspx?storyID=nN17251689
From ACM's TechNews, August 17, 2005
"'Spear Phishing' Tests Educate People About Online Scams"
Wall Street Journal (08/17/05) P. B1; Bank, David
- To raise user awareness of online scams designed to trick them into revealing sensitive information to data thieves and other miscreants, organizations such as the U.S. Military Academy are conducting exercises in which people are sent phony emails disguised as official requests to link to Web pages and enter confidential data, and then upbraided if they do so. Through this strategy, defenders hope to teach users to be more cognizant of "spear phishing" scams in which attackers craft email messages that would seem to originate from the recipient's company or organization. Last June, over 500 West Point cadets were sent mock emails from a fictitious colonel instructing them to click on a link to confirm that their grades were correct, and more than 80 percent of recipients complied; the cadets were gently reprimanded via email and advised to be more cautious in the future. In recent months, almost 10,000 employees of New York state were sent emails that were supposedly official notices asking them to access sites and enter their passwords and other personal details, and those who did were sent a note explaining the purpose of the exercise. "The bottom line lesson was: Even if the request comes from legitimate individuals, never give out personal information," said New York CIO William Pelgrin. However, such methods could potentially erode employees' trust for their organizations' information-security personnel. Still, SANS Institute research director Alan Paller called such exercises "a key defense against large-scale theft of confidential information."
From EduPage, August 15, 2005
E-Mail Marketer Convicted Of Stealing 1.6 Billion Names
Wall Street Journal, 15 August 2005
- A jury in Arkansas has convicted Scott Levine of stealing 1.6 billion computer records from Little Rock-based data vendor Acxiom Corp. The records included names, addresses, phone numbers, and other personal information that Levine's company, Snipermail.com, sought to use in direct e-mail marketing campaigns. In the case, the government presented evidence that Levine had used illegally obtained passwords of about 300 legitimate Acxiom customers to fraudulently access the records. Levine was convicted of 120 counts of unauthorized access to a computer, two counts of fraud for cracking passwords, and one count of obstruction of justice for trying to destroy evidence stored on Snipermail computers. Levine will be sentenced in January. Acxiom said that since the intrusion, it has improved security procedures for protecting data, including strengthening encryption systems and the company's ability to detect when unauthorized access takes place.
(sub. req'd) http://online.wsj.com/article/0,,SB112406416615412935,00.html
From ACM's TechNews, August 15, 2005
"NIST Creates Online Treasure Trove of Security Woes"
Federal Computer Week (08/15/05); Yasin, Rutrell
- The National Institute of Standards and Technology's (NIST) National Vulnerability Database (NVD) is a comprehensive repository of cybersecurity data culled from all publicly available vulnerability resources that also supplies references to industry resources. NVD creator and NIST computer scientist Peter Mell says about 12,000 vulnerability entries have been posted on the NVD Web site, with roughly 10 new postings added daily. The public will be able to use NVD to gain detailed information on flaws in specific products and trends in industry segments, while developers who must import vulnerability data into their security offerings could benefit as well, according to Mell. The database is constructed wholly on the Common Vulnerabilities and Exposures (CVE) naming standard maintained by Mitre, and which is used by some 300 security products to spot vulnerabilities and expedite interoperability between those products; Mell says NVD will further assist in the facilitation of compatibility by augmenting the CVE standard with detailed vulnerability data. The public can freely avail themselves of NVD's vulnerability information as an XML feed, and Mell says the database can also produce statistics that extrapolate vulnerability-discovery trends. Unlike the Homeland Security Department's Technical Cyber Security Alerts and Vulnerability Notes, which only notify the public about the most critical flaws, NVD offers "an encyclopedia of everything," reports Mell. SANS Institute research director Alan Paller notes that users can employ NVD to answer difficult queries such as whether software from specific vendors is flawed. NVD is sponsored by the DHS' National Cyber Security Division as a complement to the department's suite of vulnerability management products, Mell says.
Click Here to View Full Article
"Instant Messaging: A New Target For Hackers"
Computer (07/05) Vol. 38, No. 7, P. 20; Leavitt, Neal
- The growing popularity of instant messaging (IM), especially among businesses, has made it an increasingly attractive target to phishers, malware authors, and other attackers. IMlogic CTO Jon Sakoda says IM attacks can propagate rapidly thanks to IM's real-time capabilities. Other factors encouraging IM attackers include a lack of safe computing practice among users; the false sense of security users feel due to IM's immediacy and informality; growing functionality and complexity of IM systems; and an absence of corporate IM-use policies. Messaging providers and security companies are attempting to thwart or mitigate IM attacks by monitoring and analyzing IM security risks through the IMlogic Threat Center and similar efforts, and are also educating consumers about safe computing practices. Many IM virus outbreaks cannot be halted by traditional antivirus technology, which fails to keep up with the rapid spread of IM communications. However, virus throttling shows promise as a method for slowing down and limiting the damage of messaging worm propagation. Furthermore, major IM networks are amending their clients to combat buffer overflow attacks enabled by substandard programming and memory management.
From EduPage, August 12, 2005
New York Adds Disclosure Law
The Register, 12 August 2005
- New York State has enacted a law requiring corporate or public organizations to notify individuals in the event that personal information about them has been compromised. Similar in concept to a California law that went into effect two years ago, the New York law compels organizations that store sensitive information to contact consumers as quickly as is practical if there is evidence or suspicion that data including Social Security numbers or credit card numbers have been unlawfully accessed. At least 15 other states have passed similar legislation since California did. New York State Assembly member James Brennan, sponsor of the legislation, said, "If a person is not aware that he or she has been a victim of identity theft, then the damage done could be severe and irreversible," noting that the sooner people are made aware of security breaches involving sensitive data, the better their chances are of avoiding the worst repercussions.
http://www.theregister.com/2005/08/12/ny_security_breaches_disclosure/
From ACM's TechNews, August 12, 2005
"PluggedIn: Wireless Networks--Easy Hacker Pickings"
Reuters (08/05/05); Sullivan, Andy
- Wireless networks are highly vulnerable to exploitation, so much so that hackers regularly compete to find open Wi-Fi connections. Mapping out wireless access points, a practice known as wardriving, is very popular, as demonstrated by wardriving contests hosted at the recent Defcon hacker conference. Inexpensive wireless routers let consumers surf the Web from home, while a Wi-Fi signal's radius of several hundred feet allows neighbors to access the Internet as well. Very few wireless hotspot owners avail themselves of encryption, password protection, and computer-specific network access features. Wardrivers say the WEP encryption standard employed by many access points is easy to break, while others blame manufacturers such as Linksys for failing to make security a default setting in their products because they are more interested in ease of use. Mike Wagner with Linksys claims new routers enable computers to securely link with other Linksys devices through the simple push of a button, but admits his company cannot ship its products with the security settings activated because most users will not go to the trouble of changing the default password. Numerous laws criminalize accessing computer networks without authorization, but few have been put to the test in court. Wardrivers claim not to approve of unauthorized network use, insisting that the goal of their activities is to raise awareness of wireless security's vulnerability among consumers and manufacturers in the hope of spurring them to make improvements.
Click Here to View Full Article
From EduPage, August 10, 2005
Hackers Hit Another University
San Francisco Chronicle, 9 August 2005
- Sonoma State University, an hour north of San Francisco, has become the latest in a growing list of universities to suffer a hacker attack that put personal information of students and staff at risk. At Sonoma State, hackers in July gained access to several computer workstations, which allowed them to access a number of other computers before university staff detected and put an end to the intrusion. In all, the hackers had access to names and Social Security numbers of nearly 62,000 students, applicants, or employees of the university between 1995 and 2002. A spokesperson for the university said the hackers did not have access to financial information and noted that there is currently no evidence that any of the information has been misused. Nevertheless, the university is required by state law to contact individuals whose personal information has been compromised, and the university is working to do just that. The university has set up a Web site with information and is advising affected individuals to contact credit-reporting agencies to be on the lookout for possible identity fraud.
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2005/08/09/BAGLJE50C81.DTL
Students Face Punishment For Computer Tampering
Wired News, 9 August 2005
- Thirteen high school students in the Kutztown Area School District in Pennsylvania face felony charges of tampering with computers after defeating security measures on laptops issued to them by the school district. The laptops included Internet filters and an application that allowed district administrators to see what students did with the computers. The 13 used administrator passwords--which, for unknown reasons, were taped to the backs of the computers--to override the filters and download software such as iChat that the district policy forbids. The students also modified the monitoring program so that they could see what the administrators did with their computers. The students and their parents argued that the felony charges are unwarranted, but, according to the district, students and parents signed acceptable use policies that clearly state what activities are not allowed and that warn of legal consequences if the policy is violated. The students continued to violate district policies for use of the computers even after detentions, suspensions, and other punishments, according to the district. Only then did school officials contact the police.
http://www.wired.com/news/technology/0,1282,68480,00.html
Spammer Settles With Microsoft
New York Times, 10 August 2005
- Microsoft has reached a settlement with Scott Richter, a man once described as one of the top three spammers in the world. Efforts by Microsoft and New York Attorney General Eliot Spitzer in 2003 resulted in the collection of 8,000 e-mail messages containing 40,000 fraudulent statements sent by Richter's company, OptInRealBig. Richter earlier agreed to pay New York State $50,000; under the new settlement, Richter will pay Microsoft $7 million. According to Bradford L. Smith, chief counsel for the software giant, $5 million would be used to "increase our Internet enforcement efforts and expand technical and investigative support to help law enforcement address computer-related crimes," while another $1 million will be spent on improving computer access for the poor in New York State. The settlement also requires Richter to comply with state and federal laws governing e-mail and to submit to oversight of his company's operations for three years.
(registration req'd) http://www.nytimes.com/2005/08/10/technology/10spam.html
From ACM's TechNews, August 10, 2005
"Critics Say Security Still Lags"
Investor's Business Daily (08/09/05) P. A4; Howell, Donna
- Internet and computer security continues to face heavy criticism four years after Sept. 11, with industry organizations and the Government Accountability Office (GAO) urging the allocation of more federal resources to tech security. A CSO magazine poll of 389 security professionals finds that roughly 59 percent of respondents doubt the government can secure the U.S. information infrastructure, while 45 percent expect hackers or terrorists to launch the digital equivalent of a Pearl Harbor-style attack against the nation's critical infrastructure. The GAO has issued several studies finding fault with federal cybersecurity efforts, and Ron Ross with the National Institute of Standards and Technology says his organization has been developing a set of standards and guidelines designed to help agencies construct improved information systems and safeguards. "There's no long-term vision for what we ought to be doing in cybersecurity research and development," notes Cyber Security Industry Alliance (CSIA) executive director Paul Kurtz. "In the long term, we need to think about our information systems constantly being under attack...And the need to transfer over to other systems." In July, CSIA recommended the development of a 10-year federal plan to enhance the security, reliability, and resiliency of information technology, as well as additional funding for the issue. A recent restructuring of the Homeland Security Department resulted in the creation of an assistant secretary for cybersecurity and telecommunications; both CSIA and the ITAA praised this maneuver, though ITAA President Harris Miller still laments that some federal IT agencies' budgets remain flat. Unisys' Greg Baroni points to increased security audits encouraged by security guidelines mandated by the Federal Information Security Management Act, which will soon obtain a "compliance component."
"Annual Hacking Game Teaches Security Lessons"
SecurityFocus (08/04/05); Lemos, Robert
- The annual DEF CON conference hosts a hacker version of Capture the Flag, and this year's bout emphasized more real-world skills, according to University of California at Santa Barbara computer science professor Giovanni Vigna, whose Shellphish team was the victor. "The game required skills that are also required by both security researchers and hackers, such as ability to analyze attack vectors, understanding and automating attacks, finding new, unpredictable ways to exploit things," Vigna explained. "It's about analyzing the security posture of a system that is given to you and about which you initially know nothing." This year the organizers courted controversy by running a central server on which each team's virtual server operated, whereas in past tournaments each team was permitted to run their own server; Crispin Cowan with Novell's SUSE division said this meant there was very little defense that could be implemented, and he doubted that anyone with a substantial interest in defense will participate in future tournaments if exclusive concentration on code auditing becomes the norm. One of the organizers defended his year's game with the argument that the bout was a hacking contest. He said finding and exploiting security flaws in custom software via reverse engineering, not just code auditing, is key to being a top hacker. The organizer insisted that defense was not sidelined, noting that some teams successfully deployed Tripwire, a data-integrity checker that can pinpoint altered files, and used an intrusion detection system to monitor traffic. Vigna said the winning team's strategy kept the discovery of flaws and the toughening up of systems services in balance.
Click Here to View Full Article
"Car Computer Systems at Risk as Viruses Go Mobile"
Reuters (07/29/05); Virki, Tarmo; Shields, Michael
- In-vehicle computer systems could be threatened by malware as hackers' interest in authoring viruses for wireless devices grows, according to automotive industry officials and analysts. Automakers' tweaking of on-board computers to allow consumers to transfer data with mobile phones and MP3 players also increases the cars' vulnerability to mobile viruses that hop between devices through the connective Bluetooth technology, which is employed in car electronics interfaces for service and monitoring. The worst-case scenario is that the computer would no longer be able to control engine performance, emissions, navigation, and entertainment systems, and Symantec mobile virus specialist Guido Sanchidrian says this should not prevent motorists from driving their cars on their own. Thus far there have been no reports of viruses in auto systems, but carmakers say they are giving the matter serious consideration, even though research shows transplanting a virus into a car is not a simple proposition. A BMW representative says such transplants are a possibility, and addressing this problem has been an area of concentration for many years. A Siemens representative claims her company uses systems that screen out unwanted programs and data via encryption. Automakers' growing emphasis on computer security could be a windfall for antivirus firms, and IDC projects that the mobile security software market will skyrocket from $70 million in 2003 to $993 million in 2008.
Click Here to View Full Article
From EduPage, August 5, 2005
Court Upholds University Block On Spammer
Inside Higher Ed, 4 August 2005
- A federal appeals court ruled in favor of the University of Texas (UT) in its dispute with White Buffalo Ventures over thousands of spam e-mails sent by the company to students of the institution. In 2003, White Buffalo, which operates an online dating service geared toward UT students, began sending thousands of messages to student e-mail addresses it had obtained through public records. After receiving many complaints from students, the university blocked White Buffalo's e-mails, a move the company said infringed on its First Amendment rights and its rights under the CAN-SPAM Act. A federal judge disagreed with White Buffalo, and the current ruling supports that decision. The three-judge panel of the appeals court found that the institution is within its rights to place restrictions on commercial speech if such restrictions can be shown to legitimately benefit constituents--in this case, UT's students. Observers noted that the court's rejection of White Buffalo's CAN-SPAM argument is important in that it presents a significant roadblock to organizations that would try to use the law to make it easier, rather than more difficult, to send unsolicited e-mail.
http://insidehighered.com/news/2005/08/04/ut
From EduPage, August 3, 2005
CU Suffers Another Hack
The Denver Post, 3 August 2005
- Hackers broke into a server at the University of Colorado (CU), marking the third security breach in the past six weeks. The latest attack targeted servers that held information for the school's ID card, known as the Buff OneCard. Those servers included names, Social Security numbers, and photographs but not financial information. Potentially exposed in the attack is personal information for 29,000 students, some former students, and 7,000 staff members. Students who will be entering the university in the fall were not affected. Dan Jones, IT security coordinator, said it was not clear whether this attack was perpetrated by the same people who compromised two other servers recently. In April, CU had decided to move away from using Social Security numbers as identifiers for students, based on security problems at other institutions and the risk of identity theft. Some systems on campus, however, still use Social Security numbers to track students, according to Jones. Officials at the university said they will hire an independent auditing firm to assess the institution's security measures and will also evaluate some 26,000 computers to determine which could be placed behind a firewall.
http://www.denverpost.com/news/ci_2909173
Researcher Says Dns Servers Vulnerable
CNET, 3 August 2005
- In a presentation at the Black Hat conference last week, security researcher Dan Kaminsky argued that domain name system (DNS) servers represent a broad vulnerability in the Internet. Kaminsky said that of 2.5 million DNS servers he tested, nearly 10 percent could be susceptible to so-called DNS cache poisoning. In total, about 9 million DNS servers are operating globally. DNS servers translate typed URLs into numbers necessary to locate Web sites. In cache poisoning, legitimate numeric Web addresses are replaced, causing users to be redirected to sites of the hacker's choosing. Often, users are sent to Web sites that install malware or that deceive users into disclosing personal information, which can then be used in identity theft. Incidents of cache poisoning have disrupted Internet service in the past, including this March, when users trying to access CNN.com and MSN.com were sent to sites that installed spyware. Security experts advise operators of DNS servers to audit their machines and make sure they configure them in the safest manner possible.
http://news.com.com/2100-7349_3-5816061.html
From New York Times, August 7, 2005
Europe Zips Lips; U.S. Sells ZIPs
By Eric Dash, August 7, 2005
- The U.S. looks at privacy largely as a consumer and an economic issue; in the rest of the developed world, it is regarded as a fundamental right. Read the article.
The Rise of the Digital Thugs
By Timothy L. O'brien, August 5, 2005
- The newest big corporate menace: disgruntled techies, who find company secrets and will keep them, for a price.
Read the article.
From ACM's TechNews, August 3, 2005
"The Sniffer vs. the Cybercrooks"
New York Times (07/31/05) P. 3-1; Rivlin, Gary
- As the motivation for hackers shifts from the pursuit of bragging rights to high-stakes economic plundering, many corporations are enlisting the services of sniffers, security analysts who peer through the eyes of a hacker to exploit a system's vulnerabilities in the name of improving its security. A recent survey found that over 87 percent of the companies polled conduct penetration tests, up from 82 percent a year ago; up 14 percent from 2003, companies in North America spent more than $2 billion on security consulting last year, says Gartner analyst Kelly Kavanagh. Sniffers such as independent consultant Mark Seiden often resort to unorthodox techniques to expose a system's vulnerabilities. While he is a former programmer with considerable technical expertise, Seiden may be best known for his innovative methods for gaining access to companies' most sensitive information, such as using disguises to infiltrate restricted places. Once inside, Seiden is an expert at figuring out where a data center is housed, and by blending in, picking locks, and shimmying through air ducts to drop through a ceiling into an otherwise secure room, he has exposed weaknesses in many high-profile companies. The most porous security is most likely to be found in a physical building, where file cabinets with cheap locks and unsecured backup tapes offer a wealth of sensitive information to someone such as Seiden. Though his creativity and uncanny ability to think like a cyber-criminal have kept him in high demand, he acknowledges that "you can't prevent a determined adversary who has unlimited resources from breaching security." But as Gartner analyst Richard Mogull points out, even though 100 percent security will forever be an illusion, sniffers such as Seiden can help companies protect against the vast majority of would-be hackers who "have only rudimentary skills."
Click Here to View Full Article
Solutions to many of our security problems already exist, so why are we still so vulnerable? Read the article
from Queue.
From New York Times, July 31, 2005
The Sniffer vs. the Cybercrooks
By Gary Rivlin
- Sniffers, or professionals who test a computer network's security, must do their best to think like an enterprising cyberthief. Read the article.
From EduPage, July 29, 2005
Congress Gets Serious About Data Privacy
CNET, 28 July 2005
- Ahead of its August recess, Congress moved data-security measures to the top of its agenda, with various House and Senate committees considering three different bills dealing with the protection of sensitive information. The broadest legislation being considered is the Personal Data Privacy and Security Act, which would place new restrictions on how personal information may be used and imposes criminal penalties for those found to have violated it. The bill would limit the sale and publication of Social Security numbers, require notification of consumers in the event their personal data is compromised, and restrict the authority of the states in writing their own regulations for data protection. Other bills working their way through the Senate include similar requirements that consumers be notified of data breaches, but they only include civil penalties. The other measures, including one passed by the Senate Commerce Committee, place oversight and enforcement authority with the Federal Trade Commission (FTC). Critics of the proposed legislation argue that it is being rushed through without proper discussion.
http://news.com.com/2100-7348_3-5808894.html.
From ACM's TechNews, July 27, 2005
"Two Professors Go Fishing for Phishers"
San Francisco Chronicle (07/25/05) P. E1; Kirby, Carrie
- Stanford computer science professors John Mitchell and Dan Boneh are leading a team developing anti-phishing tools designed to help email users avoid bogus Web sites and prevent crooks from stealing other peoples' passwords. The SpoofGuard software plug-in the team created last year examines each site visited by users for signs of phoniness, and alerts them if it spots anything suspicious. A second plug-in, PwdHash (password hash), scrambles the password typed into a site and creates a unique sign-on for each visited site; should a user sign on to a spoofed version of a legitimate site and be fooled into typing in his password, PwdHash will prevent the phishers from acquiring the same password the authentic site got. In addition, PwdHash addresses users' tendency to employ the same password at many different sites, which means thieves' attempts to log on to as many sites as they can with a PwdHash-scrambled password will fail. PwdHash will be unveiled at a Baltimore security conference next week, while Boneh expects to release a third tool, the SpyBlock Trojan horse key-logging software deterrent, in six months. The tools are freely available as browser plug-ins on the Stanford Web site, although the researchers would prefer that such solutions are embedded within the major browsers.
Click Here to View Full Article
From EduPage, July 25, 2005
Software Hides Passwords From Phishers
San Jose Mercury News, 25 July 2005
- Two professors at Stanford University are set to unveil software designed to foil phishers by scrambling passwords entered into Web sites. John Mitchell and Dan Boneh developed the software, called PwdHash, to deal with the growing problem of Web sites that lure computer users into disclosing personal information. The software creates a unique password for each Web site a user visits. If the user goes to a bogus version of a legitimate Web site, the software creates a separate password, leaving the operator of the bogus site with a password that will not work at the real site. Previously, the pair of professors have written software that tries to identify fraudulent Web sites and notifies the user when such a site is suspected.
http://www.siliconvalley.com/mld/siliconvalley/12218576.htm
CU Computers Hacked
The Denver Channel, 22 July 2005
- Officials at the University of Colorado said hackers gained access to two servers at the university, possibly exposing personal information on nearly 43,000 students and employees of the institution. One server, at the College of Architecture, contained data on 900 individuals; the other, at the university's health center, included information for another 42,000 people. The servers included names, Social Security numbers, addresses, and dates of birth, according to the university, but neither included credit card information. Still, university officials are advising those affected to monitor their credit reports for suspicious activity, and the university has set up a Web site and a hot line to answer questions. Investigators looking into the situation said that one hacker came through a server in France, while the other came through a server in Eastern Europe. University officials have no information so far that any of the personal data on the servers has been misused.
http://www.thedenverchannel.com/technology/4757407/detail.html
Paying Hackers For Bugs
CNET, 24 July 2005
- Computer-security firm TippingPoint has begun a program to pay rewards to individuals who report computer vulnerabilities. Not unlike similar programs from other companies, the TippingPoint deal offers a variable amount of money if a reported bug proves valid. The company will use the information to update its own protection software and will notify the maker of the vulnerable product about the problem. David Endler, director of security research at TippingPoint, said the reward program is intended to "reward and encourage independent security research" and to "ensure responsible disclosure of vulnerabilities." Not all security companies believe in bounties. Internet Security Systems, for one, said that paying for such bug reports amounts to having hackers do a company's research for it. An official from Internet Security Systems also noted that the bugs reported in such programs are typically very low-level problems, saying that the more extreme vulnerabilities are worth much more when used for hacking than if turned in to security companies.
http://news.com.com/2100-7350_3-5802411.html
Hackers Finding New Targets
Wall Street Journal, 25 July 2005
- According to a new report from the SANS Institute, the number of computer hacking incidents is rising, and the targets of such hacks are increasingly software applications rather than operating systems. The organization found that the number of vulnerabilities reported was up 11 percent from the first quarter of the year to the second, and up nearly 20 percent from a year earlier. Alan Paller, SANS's research director, said the situation is getting worse. As operating systems become more secure, hackers are turning to applications, such as Apple's iTunes and RealNetworks's RealPlayer. Hackers are also focusing efforts on backup systems, particularly those of Computer Associates and Veritas Software. Because backup systems typically contain vast amounts of confidential corporate data, they represent an attractive target. SANS noted that the best way to avoid such hacking threats is to install all software patches, keep antivirus tools up to date, and be prudent in opening e-mail attachments.
(sub. req'd) http://online.wsj.com/article/0,,SB112224497897894400,00.html
From ACM's TechNews, July 25, 2005
"Retracing Spam Steps Could Halt Mass Emails"
New Scientist (07/22/05); Knight, Will
- A team of researchers from IBM and Cornell University have devised SMTP Path Analysis, a method that traces an email's Internet route by examining Simple Mail Transfer Protocol (SMTP) data embedded within the message's concealed "header," and determines from this information whether the message is spam or authentic. The algorithm at the heart of SMTP Analysis "learns" by studying the chain of Internet Protocol addresses in both spam and legitimate email headers, which enables it to ascertain fairly accurately whether a new incoming email is genuine or junk. Barry Leiba with IBM's Thomas J. Watson Research Center says the algorithm cannot efficiently identify spam by itself, but is effective when it operates in conjunction with content filters; moreover, it can spot material that content filters cannot. The researchers developed a second algorithm to assess the plausibility of the route an email claims to have followed as a countermeasure to spammers' ability to forge the address of the mail server used to send the message out. Microsoft anti-spam researcher Joshua Goodman says spammers should have a hard time inventing a workaround to SMTP Path Analysis, since the technique uses IP information derived from multiple sources. The SMTP Path Analysis software was unveiled at the Second Conference on Email and Anti-Spam on July 22. Other anti-spam proposals suggested by industry groups include having email servers furnish cryptographic keys so that messages can be confirmed upon their arrival in an in-box.
Click Here to View Full Article
"May I Have Your Identification, Please?"
SiliconValley.com (07/25/05); Lee, Dan
- Several email authentication technologies will go before the Internet Engineering Task Force as candidates for an industry standard. DomainKeys Identified Mail (DKIM) is a joint venture between Yahoo! and Cisco Systems that marries the former's DomainKeys and the latter's Internet Identified Mail into a technology that enables a sender's company or service provider's mail service to assign scrambled digital signatures to outgoing emails that verify the address; the recipient confirms the address by checking that the sender has been registered as genuine through the domain name system. Meanwhile, the Microsoft-backed Sender ID specification checks the numerical IP address of the server sending the email against a published list of servers authorized to send messages by the domain owner. DKIM has experienced difficulty in recognizing messages that are part of email lists employed in discussion groups that may modify a message, while Sender ID cannot always identify email forwarded from one address to another. Experts classify an effective email authentication standard as one that is adopted by a large portion of the world's email senders, and Gartner analyst Arabella Hallawell believes DKIM will emerge as the leading standard because it faces fewer technical problems than Sender ID. However, Yahoo!, Cisco, and Microsoft each expect both technologies to find use. EarthLink's Tripp Cox says the level of industry collaboration surrounding these technologies is "unprecedented." "If we're going to make an impact on spam, it's crucial that the vast majority of Internet senders and receivers implement the technology," he argues.
Click Here to View Full Article
From EduPage, July 22, 2005
National Cybersecurity Test Scheduled
ZDNet, 22 July 2005
- The Department of Homeland Security's National Cyber Security division plans a test of the nation's cybersecurity incident response capabilities with an exercise scheduled for November 2005 called Cyber Storm. The announcement came in written testimony by Acting Director Andy Purdy before a Senate subcommittee earlier this week.
http://news.zdnet.com/2100-1009_22-5799876.html
"Information Security With Colin Percival"
O'Reilly ONLamp (07/21/2005); Lucas, Michael W.
- Simon Fraser University visiting researcher Colin Percival described his research on information security in a recent interview, which deals with the security threat posed by hyperthreading. He demonstrated how this technique can be used to exploit vulnerabilities in a system by a hacker who simply needs to run code concurrent to the running of the program he is trying to spy on. Percival found a fundamental vulnerability in Intel's design that allowed him to penetrate the system, raising considerable concern in the security community; in response, Microsoft and Intel were reluctant to acknowledge the security breach, and have been slow to develop patches. Some critics maintain that Percival's exploitation is largely theoretical, though he claims that it is a very real threat. Percival believes that in the future, the task of sifting through source code in search of security errors will be handled by programs, instead of people. Percival's research, published in a paper entitled "Cache Missing for Fun and Profit," proved the existence of a covert channel running between threads on the same processor core, and demonstrated how it could be used as a side channel, as well as offering solutions on how to guard against it. Percival developed his research while working on his doctoral degree and serving as a deputy security officer for FreeBSD. He has also written an open-source, downloadable security tool called FreeBSD Update that enables users to download and install security updates with little complication, addressing what he believes to be the central obstacle to the adoption of new security tools.
Click Here to View Full Article
"Call for Homeland Security Cybersecurity Improvements"
IDG News Service (07/19/05); Gross, Grant
- The U.S. Department of Homeland Security (DHS) does not have recovery plans in case of a widespread Internet attack, Government Accountability Office IT management director David Powner said yesterday, speaking before the Senate Homeland Security and Governmental Affairs Committee. Powner told lawmakers that DHS must implement an Internet recovery plan and a national cybersecurity threat assessment to better protect U.S. cybersecurity. Powner also said the GAO believes DHS must develop better relationships with state and local governments, private industry, and other federal agencies to counter cyber threats. Powner said that although DHS is making progress, "large portions of our critical infrastructure are unprepared to effectively handle a cybersecurity attack." Sen. Tom Coburn (R-Okla.) agreed with Powner and called for better coordinated cybersecurity prevention and recovery techniques. Meanwhile, DHS National Cyber Security Division acting director Andy Purdy asserted that the agency is implementing several plans to boost cybersecurity and decrease vulnerability. Sen. Thomas Carper (D-Del.) said DHS must put a higher priority on cyber security issues, cautioning that a joint physical and cyber attack could cripple response efforts. He said, "Cybersecurity plays an important role in the protection of our critical infrastructure."
Click Here to View Full Article
From ACM's TechNews, July 20, 2005
"Corrupted PC's Discover a Home: The Dumpster"
New York Times (07/17/05) P. 13; Richtel, Matt; Markoff, John
- When faced with the contamination of their PCs by malware and other unwanted programs, many owners are opting to toss their infected machines and replace them with uncorrupted models, rather than go to the trouble of repairing them. Pew Internet and American Life Project director Lee Rainie characterizes such a response as entirely reasonable, given the incessant flood of malicious software, adware, spyware, defective programs, diminishing performance, and system crashes. In addition, Rainie says the threat of system corruption is escalating, and that "the arms race seems to have tilted toward the bad guys." Symantec's Vincent Weafer estimates that the ranks of computer viruses have swelled by more than 100 percent in the last six months alone, while adware and spyware programs have increased by approximately 400 percent; Symantec executives partly attribute this development to the growth of high-speed Internet access. Especially worrying is malware that can conceal itself from cleansing and removal programs, which makes the scrubbing of corrupted PCs a more complicated and often manual task, according to Weafer. Yale computer science professor David Gelernter says the software industry is chiefly responsible for this lamentable state of affairs, and points out that people are less and less willing to clean their PCs. Meanwhile, anti-infection tools such as firewalls, antivirus programs, and spyware-removal software are far from 100 percent effective. Some users, after acquiring new systems, are modifying their behavior to lessen the chances of PC corruption; for instance, San Francisco physician Terrelea Wong refuses to loan her computer out to friends, because she suspects her old system became infected through indiscriminate use of the Internet by her and her friends.
Click Here to View Full Article
"Between Phishers and the Deep Blue Sea"
CNet (07/18/05); Kawamoto, Dawn
- Hackers are often based in India, Korea, or China, with differing time zones and language barriers increasing the difficulty facing security enforcement agencies in the United States. The most prevalent cyberattacks are carried out by a network of zombies, or compromised computers that are remotely controlled without notification to the computer's owner. Currently, China is home to 21 percent of new zombies with the United States at 17 percent and South Korea at 6.8 percent, according to CipherTrust. Hackers overseas are carrying out attacks due to a high prevalence of broadband in China and South Korea but a lack of proper security software, according to Anti-Phishing Working Group Chairman David Jevans. Another factor boosting the prevalence of overseas attackers is the fact that even small amounts of money provide significant incentive to a hacker in a developing country than to a hacker in the United States. The Forum of Incident Response & Security Teams, an international clearinghouse for response to security incidents among government agencies, universities, and organizations, recommends companies implement a computer security incident response team, keep security patches and antivirus software updated, monitor network traffic for strange behavior, and join security groups in order to share valuable security information among members. Meanwhile, a broad, international coalition of trade groups, companies, and law enforcement organizations are working to stem cyberattacks from abroad by tightening global cooperation and establishing automatic filtering systems to block email traffic from specific regions. HoneyNet Project President Lance Spitzner says today's hackers are in it for the money not fame. He says, "It's not so much a security issue. It's a crime issue now."
Click Here to View Full Article
From New York Times, July 17, 2005
A Pass on Privacy?
by Christopher Caldwell
- E-ZPass is one of many innovations that give you the option of trading a bit of privacy for a load of convenience. Read the article.
From New York Times, July 16, 2005
What to Do After Your Data Is Stolen
by M.P. Dunleavey
- Another kind of headache started with some of the advice given to me as an identity theft victim - advice that sounds solid and sensible, but does nothing or may even make matters worse.
Someone should really test-drive this stuff, so allow me .... Read the article.
From EduPage, July 18, 2005
University Charges Cybersquatting
Detroit News, 18 July 2005
- A Minnesota-based company has raised the ire of a number of colleges and universities after registering more than 23,000 URLs, many of which imply a connection to the schools that does not exist. BDC Capital Inc. has registered such URLs as www.universityofmichiganwolverines.com,
which is not affiliated with the University of Michigan at all, and www.uofmgophers.com, which has no connection with the University of Minnesota. Marvin Krislov, general counsel at the University of Michigan, which has sent the company a cease-and-desist order, called the URLs a "pretty clear violation of trademark," noting that reasonable people would likely assume a connection between the site and the institution. A spokesperson from BDC said the company does not believe it has violated any trademarks. He said the company believes that the URLs "represent a significant asset to both BDC and the schools," saying that BDC anticipates a "partnership" with the schools to sell souvenirs and other items.
http://www.detnews.com/2005/technology/0507/18/0tech-250797.htm
Study Shows Drop In Damages From Cyber Attacks
The Register, 18 July 2005
A new study shows a significant drop in the amount of damage caused by cyber attacks as well as a shift in the kinds of attacks that are most commonly reported. Researchers from the University of Maryland conducted the Computer Crime and Security Survey on behalf of the Computer Security Institute (CSI), with consultation from security experts at the FBI. The survey questioned IT security officials at 700 private companies, governmental agencies, and universities and found that the average cost per security incident was $204,000, down from $526,000 a year earlier. Viruses remain the most frequent type of attack (32 percent), but unauthorized access rose to second on the list at 24 percent. Chris Keating, director of CSI, noted that schemes to steal individuals' identities are a growing concern. The survey, he said, indicates "more financial damage due to theft of sensitive company data," a trend that should press network managers to ensure the security of enterprise systems.
http://www.theregister.com/2005/07/18/csi_fbi_security_survey/
While Computer Attack Costs are Down, Data Theft Costs Increase
Computerworld 18 July 2005
- A survey from the Computer Security Institute (CSI) and the FBI found that the average losses due to computer attacks dropped 61% in 2004. The 700 companies and government agencies who responded to the survey reported an average cost for cyber attacks of US$204,000 in 2004 compared to an average of US$526,000 in 2003. This is the fourth consecutive year in which the cost has dropped. However, the cost associated with information theft has increased more than US$51,000 from last year. Theft of proprietary information cost the respondents an average of US$355,000 in 2004, compared to US$169,000 in 2003. http://www.computerworld.com/printthis/2005/0,4814,103301,00.html
From ACM's TechNews, July 18, 2005
"How to Make Safer Software"
Wall Street Journal (07/18/05) P. R4; Guth, Robert A.
- As software has filtered down to virtually every aspect of our lives, developers have begun to realize that the bells and whistles that used to drive sales of their products must take a backseat to fundamental security and quality provisions. In a recent interview, Cigital CTO Gary McGraw highlights the shift toward accountability that is defining today's software industry, as evidenced by the Sarbanes-Oxley Act and other standards of security-driven compliance. The trend is to knit security measures into the fabric of the software, rather than to address it after implementation through firewalls and antivirus programs whose vulnerabilities have already been exposed. Also, more companies in non-software industries are starting to look at software development in house, such as banks, credit card companies, and automobile manufacturers. McGraw cites Microsoft as having emerged from its earlier practice of relying on features to drive software sales to a more responsible, quality-focused approach that has enhanced the security of their software and further solidified their dominance in the market, even if the company is still not perfect. McGraw recommends that developers incorporate software assurance throughout the design of every package, which entails considering the end requirements of a system as well as the potential threats hackers may pose to it. To fully integrate software with the business community, developers must also overcome the language barrier and speak in terms that have instant relevance to bottom line, instead of burying themselves in impenetrable technical rhetoric. In the face of foreign competition, McGraw believes U.S. software companies can retain their preeminence through forward-looking risk management and needs assessment, even if India and China can offer coders who work for lower wages.
From EduPage, July 13, 2005
Coalition To Release Spyware Definition
CNET, 12 July 2005
- The recently created Anti-Spyware Coalition is set to release a definition of spyware. According to officials from the group, the first step toward dealing with the growing problem of spyware and adware is to define very clearly what it is. The group's proposed definition, which the public can comment on until August 12, identifies spyware as software that is installed without adequate notification and that monitors computer users' activities. The group also proposes a broader definition that would include software that interferes with users' abilities to properly control their systems. Critics of the group's definitions argue that makers of spyware and adware stand to benefit the most from such a definition because it clearly delineates what they could do and get away with. After the comment period is closed, officials of the Anti-Spyware Coalition will incorporate the best suggestions into the final definitions.
http://news.com.com/2100-1029_3-5783926.html
From EduPage, June 29, 2005
Security Community Bemoans Loss Of Hacker Magazine
Silicon.com, 11 July 2005
- Long-time hacker magazine "Phrack" will stop being published this year after nearly 20 years as an information exchange for computer mischief, and at least some computer security experts believe computer users will be less safe after it is gone. Hackers have routinely undermined their own efforts by revealing their successes at compromising systems or causing other damage. Pete Simpson of computer security firm Clearswift noted that although the magazine makes computer exploits available to those who would use them to cause harm, by definition it also makes them available to the community of users working to protect computers from hackers. Simon Perry, vice president of security strategy at Computer Associates, said that security experts will still be able to find information about new exploits but that "Phrack was great as a one-stop shop" for such information. Simpson commented that after Phrack shuts down, younger hackers are likely to develop new vehicles to tell the world about their triumphs, once again leveling the playing field.
http://software.silicon.com/security/0,39024655,39150241,00.htm
From Queue, June 25, 2005
The Answer is 42 of Course
- If we want our networks to be sufficiently difficult to penetrate, we've got to ask the right questions. Read the Article.
From ACM's TechNews, July 8, 2005
"Schools Looking for Ways to Lure More Minorities"
Triangle Business Journal (07/01/05); Sutker, Colin
- Undergraduate enrollments in computer science programs, which have tended to lean toward the white male demographic, are shrinking. This is spurring computer science departments to study their student populations in order to ascertain the reasons why they are failing to lure minorities, so that they can take action. University of Virginia professor Joanne Cohoon believes white males' attraction to computer science and the erosion of the white male majority in the United States are draining the pool from which the U.S. IT workforce is drawn from. Auburn University computer science professor Juan Gilbert says innovation in computer science programs is suffering because diversity is lacking, since students with common backgrounds follow a common problem-solving model that limits their creativity. He adds that minorities are often discouraged from pursuing computer science because they have few peers or role models, which perpetuates the stereotype that their mathematical skills are sub-par. Getting more minorities interested in computer science by providing role models to young students is the mission of organizations such as the Coalition to Diversify Computing and the Institute for African-American E-Culture. Meanwhile, the National Science Foundation has taken a leading role in national initiatives to boost minority enrollment by establishing the Broadening Participation in Computing program, which apportions grants to colleges for programs designed to increase minority participation from a $14 million fund.
Click Here to View Full Article
From ACM's TechNews, July 8, 2005
"How Secure Is Federal 'Cybersecurity'?"
Fox News (07/07/05); Vlahos, Kelley Beaucar
- Although the protection of America's cyber-infrastructure has been of primary concern since 9-11, official reports and industry experts concur that the U.S. government's cybersecurity effort comes up drastically short, focusing on short-term "band-aid" solutions instead of a long-term strategy. Observers blame a dearth of leadership and a failure to keep pace with the rapid appearance of new dangers. A February report from the President's Information Technology Advisory Committee (PITAC) attributed America's cybersecurity woes to inadequate R&D funding, refusal to share Federally developed technologies with the private sector, and general apathy in Washington; critics and PITAC co-chairman Edward Lazowska say little has been done to address these issues in the five months since the report was submitted. A May report from the Government Accountability Office (GAO) concluded that the 13 critical security protocol implementation objectives the GAO recommended to the Department of Homeland Security remain unrealized, citing the continued lack of national cyberthreat and vulnerability evaluations or government-industry contingency recovery strategies. Beefing up the cybersecurity of America's critical infrastructure will remain an elusive goal until DHS tackles the challenges of organizational stability, information-sharing between government agencies as well as the government and the private sector, and the demonstration of effective cyberattack prevention, according to the GAO. Also in May, DHS took issue with an earlier DHS Inspector General's report that spotlighted security problems in several DHS agencies, arguing that significant improvement to U.S. cybersecurity has been made.
Click Here to View Full Article
From ACM's TechNews, July 1, 2005
"Antispam Proposals Advance"
CNet (06/29/05); Festa, Paul
- The Internet Engineering Steering Group (IESG) announced that it has adopted two competing antispam technologies, citing both as still "experimental." Microsoft, AOL, and others have been competing for control of the antispam market, which now appears to be divided between the Sender Policy Framework (SPF) and Sender ID. Microsoft backs Sender ID, which it sees as a more sophisticated version of SPF. Microsoft's Samantha McManus says, "We're glad to see Sender ID's experimental status, and we think email authentication is very important for addressing spam and phishing. That said, we definitely have more to do." Both technologies have been accepted by email providers, though the IESG, a division of the Internet Engineering Task Force (IETF), believes the experimental trial is necessary to solidify standards. As an alternative, Cisco backs Yahoo's DomainKeys as its authentication and antispam application. The IESG said, "Given the importance of the worldwide email and DNS systems, it is critical that future standards support their continued stability and smooth operation."
Click Here to View Full Article
"The Answer Is 42 of Course"
Queue (06/05) Vol. 3, No. 5, P. 34; Wadlow, Thomas
- Independent security consultant Thomas Wadlow writes that the role people play in online security makes absolutes irrelevant, and he advises companies to base the defense of their security systems on the fundamental question of how the network can be designed so that is it "safe enough." Many cases of successful network intrusions stem from either lax design or highly motivated hackers, leading Wadlow to formulate a two-pronged strategy to defend against intruders with sufficient skill, motivation, and opportunity: The first goal is to design the network to require a very high level of skill and motivation for an attacker and present as little opportunity as possible for successful attacks, while the second goal is to determine where and how much effort to devote to the process. In the category of skill, questions to be asked include how hackers build their skills with off-the-shelf software; how companies can maximize the amount of skill hackers need to breach networks and minimize the amount of skill needed to operate network defenses; how the acquisition of network knowledge by attackers can be prevented; and how to tell that a network is under attack. Questions to be raised on the subject of motivation include how or why people are provoked to attack the network; whether the company's defensive actions encourage or discourage an attacker's motivation; and what would motivate people not to attempt intrusions. To keep a hacker's opportunities to attempt a break-in as low as possible, the company should clearly identify opportunities, and determine if all network entrances and exits are known and that the network is built in accordance with company assumptions through constant measurement. Because the most skilled, motivated, and opportunistic hackers often work for the company, care must be taken to establish who are trustworthy and untrustworthy employees or ex-employees, the most potentially dangerous insiders, and how to keep the people who can cause a security problem happy, engaged, and mindful of the potential for trouble as well as the fallout from an intrusion.
From EduPage, June 29, 2005
Phishers Locked Up
CNET, 29 June 2005
Two men have been sentenced to prison in Britain for orchestrating a phishing scheme that used stolen identities to pilfer as much as 6.5 million pounds over two years. Douglas Harvard and Lee Elwood were sentenced to six and four years respectively for their parts in the phishing ring, which authorities said garnered at least 750,000 pounds during one 10-month period. The men allegedly worked with individuals in Russia to traffic in personal information and the money stolen using that information. Mick Deat, deputy head of Britain's National Hi-Tech Crime Unit, issued a statement thanking the U.S. Secret Service and the FBI for their assistance in the investigation. The statement also expressed Deat's hope that the convictions will discourage others who might consider such scams.
http://news.com.com/2100-7348_3-5766860.html
From ACM's TechNews, June 29, 2005
"Cybersecurity Group Looks to Europe for Help"
IDG News Service (06/27/05); Pruitt, Scarlet
- Former White House security director and current Cyber Security Industry Alliance (CSIA) executive director Paul Kurtz on Friday called the global information systems security threat "high risk," and warned that federal agencies are "taking information security for granted." Kurtz left his position at the White House because he disagreed with the emphasis on physical security over information security. At CSIA, Kurtz is working along with CEOs from security companies on global cybersecurity issues, such as developing policies with cooperation from a variety of concerned players and improving prevention standards. Kurtz laments the U.S. government's reduced spending on cybersecurity research and development, and says some in government wrongly believe that most cyber mischief is the work of geek teenagers instead of professional criminals. Kurtz says CSIA is pushing the private sector to develop strategies to mitigate cyberthreats, focusing on a holistic approach that involves many affected parties. CSIA is already working with the European Union's Article 29 working group on data protection, and plans to eventually extend their work into Asia. In the U.S., Kurtz hopes CSIA's efforts will push the U.S. government to take more action. He says, "We need to raise these issues, but at the same time, we need to make sure that the government doesn't overreact."
Click Here to View Full Article
From ACM's TechNews, June 27, 2005
"Microsoft Pushing Spam-Fighting System"
Associated Press (06/22/05); Jesdanun, Anick
- Despite the fact that Microsoft's spam-fighting technology Sender ID delivers about 10 percent of legitimate email messages to junk folders, the company announced plans to become more aggressive at rejecting mail sent through company or service providers not registered with the Sender ID system by the end of this year. The system requires that ISPs, companies, and other domain name holders submit their mail servers' unique IP addresses, so the Sender ID system can verify emails were sent from those particular IP addresses, but only about 25 percent of email currently has the necessary Sender ID data. The Internet Engineering Task Force disbanded its Sender ID task force last September amid patent disputes, but nevertheless encouraged Microsoft and others to continue developing their spam-fighting systems. The Direct Marketing Association's Jerry Cerasale believes Microsoft's move is "a necessary step to protect both corporate brands and consumer confidence." Microsoft's Craig Spiezle acknowledged that some critics of the Sender ID system are concerned about disruption of mail-forwarding services or "send to a friend" links. Spiezle asserts that Microsoft is monitoring the situation to prevent any such disruptions.
Click Here to View Full Article
From ACM's TechNews, June 27, 2005
"Viruses, Security Issues Undermine Internet"
Washington Post (06/26/05) P. A1; Cha, Ariana Eunjung
- The Internet is falling prey to a growing body of security threats, as the network with a billion users but no owner still relies essentially on a global honor system. "The Internet is stuck in the flower-power days of the '60s during which people thought the world would be beautiful if you are just nice," says Karl Auerbach, a computer scientist working actively to improve the security of the Internet. Increased security concerns and the growing feeling that the current Internet will never realize its promise are leading many to advocate a second look at the network, a so-called Internet 2.0. As the Carnegie Mellon CERT Coordination Center reported an increase in the number of vulnerabilities from 1,090 in 2000 to 3,780 in 2004, a unified response has been hindered by disputes over property ownership and profits. The Internet's architects never spent much time thinking of defenses to internal attacks, focusing instead on external threats, such as natural disasters, while ignoring the central threat the network now faces. As the number of users proliferates and hackers develop increasingly devious ways to attack Web sites and compromise security, some have speculated that instead of applying temporary patches, portions of the Internet will need to be rebuilt from the ground up. As current governing bodies exert only a tenuous regulatory authority over the Internet, there have been calls for turning control over to an established central organization, such as the United Nations. Amidst the scramble to define the next generation of the Internet, security remains the prime mover in a field of diffuse visions. Some companies are heralding "return addresses" for emails that would remove the mystery of a sender's identity, and others, such as the small academic coalition Internet2, advocate a compartmentalized Internet where users would convene in small groups created for very specific purposes, such as a chat room for parents of children on the same soccer team or some other easily-defined group that would deny access to anyone not of that community.
Click Here to View Full Article
From ACM's TechNews, June 24, 2005
"Better PC Security Years Away"
TechNewsWorld (06/22/05); Mello, John P.
- The immediate future of secure computing will more closely resemble a mainframe than a PC, until an enhanced operating system and better hardware are developed. In the meantime, researchers are working on technologies to improve PC security, such as the Trusted Platform Module (TPM), which establishes a secure hardware zone inside a PC to confidently support security programs. Intel, AMD, and Microsoft are also jumping on board with their own PC security applications. Intel's Chad Taggard said, "What we're doing with this hardware and the Trusted Platform Module is taking best known security methods and putting them where people can't tamper with them." AMD's technology solves the "warm boot hole" problem that opened the door to hackers accessing data in a computer that had just been restarted, with its power still on, by wiping the immediate memory. Microsoft's next Windows version, code-named Longhorn, will be vital to their own Next-Generation Security Base (NGSCB), as well as the future of the secure PC in general, though by some estimates the technology will not be fully actualized until 2009 or 2010. Computer Associates' John Bedrick cautioned, "These aren't going to be a panacea for everything." He adds that while there are no sure bets, "what we all try to do is improve what we have and try to get ahead of the curve as much as possible," allowing that hackers will evolve just as security technologies do.
Click Here to View Full Article
From ACM's TechNews, June 22, 2005
"Snoozing About Security"
CNet (06/17/05); Cooper, Charles
- The two-year-old Department of Homeland Security (DHS) cybersecurity division has gone through three cyberczars and millions of taxpayer dollars with no progress in the quest to control the increasing number of worm and virus attacks, writes CNet executive editor Charles Cooper. In an Internet poll, most Americans doubt the U.S. government is doing enough in terms of cybersecurity with just 28 percent reporting that the government is doing a good job. Pending legislation establishing an Assistant Secretary for Cybersecurity and the DHS Cybersecurity Enhancement Act of 2005 increasing funding and authority are both meant to help improve cybersecurity. A report from the Government Accountability Office (GAO) determined significant structural and cultural problems among federal agencies. The GAO suggests creation of security milestones to help improve progress in cybersecurity, but the DHS rejected the recommendations and called for more "clarifications." GAO report author David Powner and other security experts fear a combined cybersecurity and physical terrorist attack due to ongoing vulnerabilities. Powner says, "If you look at the recovery plans (DHS has in place), more work needs to be done. If you look at reconstituting the Internet if there were an event that took down the network, there's still not a plan in place."
Click Here to View Full Article
"Common Criteria or Common Confusion?"
SD Times (06/01/05) No. 127, P. 5; de Jong, Jennifer
- The process of certifying the security of commercial software is not necessarily flawed, but the two dimensions of the Common Criteria results in some confusion, according to Mike Wolf, general manager of the advanced products engineering group at software vendor Green Hills. Common Criteria, which consists of a process for evaluating technical remedies to security threats and a set of standards for specifying the threats, is confusing because it has two dimensions to its rankings, says Wolf. While the first dimension, the Protection Profile, refers to the specific security requirements that were tested, the second dimension, the Evaluation Assurance Level, ranges from EAL1 (low) to EAL7 (high) to indicate how confident evaluators are about the product's ability to deliver on its security claims. People often focus on the second dimension, but it must be considered in relation to the first dimension. For example, Microsoft received a Common Criteria certification for Windows 2004 at the competitive EAL4 ranking, but its first dimension Controlled Access Protection Profile (CAPP) represents a minimal level of security functions. As IBM's Dan Frye explains, "you can have a high level of confidence about a minimal set of security functions." CC became an international standard in 1993 as the introduction of country-specific security initiatives fell out of favor in the United States, Canada, and European countries.
Click Here to View Full Article
From EduPage, June 27, 2005
University Of Connecticut Discovers Security Breach
New York Times, 24 June 2005
- Officials at the University of Connecticut have discovered a breach of one of the university's servers, which contained personal information for about 72,000 individuals. According to Michael Kerntke, a spokesperson for the school, the university found a program on the server that could have given a hacker access to the information on that computer, which included names, addresses, phone numbers, Social Security numbers, and dates of birth. Although the program has evidently been on the server since October 2003, officials said there was no evidence that any of the data had actually been taken. Kerntke noted that the program seems to have been part of a broad Internet attack rather than one specifically directed at the university. As a result, he said, "the attacker most likely had no knowledge of the kind of data stored on the server."
(registration req'd) http://www.nytimes.com/2005/06/25/technology/25conn.html
From EduPage, June 24, 2005
Choicepoint Changes Practices To Avoid Repeat Disclosure
Wall Street Journal, 24 June 2005
- Following the high-profile loss of personal information on nearly 145,000 individuals, data broker ChoicePoint said it will make significant changes to its business procedures to prevent future security breaches. In its reports, the company will begin masking Social Security numbers, and it will limit the amount of business it conducts with certain customers, including private investigators, collection agencies, and small financial companies. ChoicePoint has also begun offering access to individuals--at no charge--to the information that the company keeps on them. Though not widely advertised, the new service provides one annual report of "personal public records" searches. ChoicePoint currently maintains a vast database of information culled from public and business records on nearly every adult in the United States. After the security breach that exposed so many individuals to identity theft, Congress held hearings on ChoicePoint and other data brokers and is considering tightening regulation of the data industry.
(sub. req'd) http://online.wsj.com/article/0,,SB111957007176668246,00.html
From EduPage, June 15, 2005
Spyware Charges Result In $7.5 Million Settlement
Reuters, 15 June 2005
- California-based Intermix Media will pay New York State $7.5 million over three years to settle a spyware lawsuit. In the suit, New York Attorney General Eliot Spitzer had charged the company with violating state false-advertising and deceptive-practices laws. Intermix acknowledged that it formerly distributed software that was surreptitiously installed on users' computers, though as part of the settlement the company admitted no wrongdoing. Intermix had previously suspended the distribution of the software at issue; with the settlement, the company will permanently discontinue the practice.
Intermix has also created a position of chief privacy officer since the lawsuit was originally filed, and officials from the company said they have cooperated with federal regulators.
Read the article
Survey Shows More Bad Guys Turning To Browser Attacks
CNET, 14 June 2005
- According to a new survey by the Computing Technology Industry Association (CompTIA), the incidence of browser-based attacks rose sharply last year, while that of viruses and worms fell slightly.
Browser-based attacks exploit the naivety of computer users, as in the case of phishing attacks, or technical vulnerabilities in browser or operating system software. Phishing scams work by fooling users into disclosing private information; other attacks attempt to download malicious code to the computers of visitors to a Web site to steal information or take control of the computer. According to CompTIA's survey of nearly 500 organizations, 56.6 percent have been targets of browser-based attacks, up from 36.8 percent one year ago. Viruses and worms continue to head the list of computer security threats, at 66 percent, which is just down from last year's number of 68.6 percent.
Read the article
From EduPage, June 13, 2005
Former Student Convicted Of Stealing Data
Chronicle of Higher Education, 13 June 2005
- A former student of The University of Texas at Austin has been found guilty of writing a computer program that stole names and Social Security numbers from about 37,000 students, faculty, and others associated with the university. The jury found Christopher Andrews Phillips not guilty, however, of intending to profit from the data he stole. Phillips, who is now a senior at the University of Houston, said he wrote the program as part of his computer training and never had any intention of using the information. The theft took place in 2002 and 2003, when Phillips's program made more than 600,000 inquiries to a UT database, trying to match names with Social Security numbers. UT officials detected the activity and traced it to Phillips, whose computer was seized with the program he wrote and the data it had harvested. Phillips faces up to six years in prison; had he been convicted of the other charges, he would have faced close to 30 years.
(sub. req'd) http://chronicle.com/prm/daily/2005/06/2005061301t.htm
Liberty Alliance Addresses Id Theft
CNET, 13 June 2005
- The Liberty Alliance has announced the formation of an Identity Theft Protection Group, intended to address the problem of identity theft.
The alliance was created in 2001 to establish standards for online authentication and now has a membership of more than 150 companies, nonprofits, and government organizations. Michael Barrett, co-chairman of the new group and a security executive at American Express, said he believes the problem of identity theft will continue to worsen such that "it is no longer a question if your identity gets stolen, but when." The new group will initially work to clearly define the problem and its parameters and later will try to develop solutions, which, according to Barrett, might include technical specifications, best practices, or business guidelines. James Van Dyke of Javelin Strategy and Research, which covers identity fraud, noted that despite perceptions otherwise, the incidence of identity theft has been decreasing over the past few years.
Read the article
From EduPage, June 6, 2005
Spam Fighters Form New Coalition
Silicon.com, 3 June 2005
- A new group tentatively called the Anti-Spyware Coalition plans to publish guidelines to define spyware, best practices for software development, and a lexicon of common terms by the end of the summer.
The guidelines will be open to public comment. The Center for Democracy and Technology, a public advocacy group based in Washington, is running the new initiative. The coalition formed two months after the collapse of the Consortium of Anti-Spyware Technology Vendors, which admitted a company suspected of making adware. According to David Fewer, staff counsel at the Ottawa-based Canadian Internet Policy and Public Interest Clinic, which is affiliated with the new consortium, judging whether software is spyware comes down to notice, consent, and control.
Many adware and spyware products fail to meet all three requirements.
Read the article
From ACM's TechNews, June 13, 2005
"Internet Security...Writ Very Small"
Network World (06/06/05) Vol. 22, No. 22, P. 1; Messmer, Ellen
- Iowa State University researchers have developed a version of the Internet in microcosm to be used as a cyber-defense test bed, according to computing professor and project leader Doug Jacobson. The Internet-Simulation Event and Attack Generation Environment (Iseage) was funded primarily by a $500,000 grant from the Justice Department, which has promised an additional $700,000 for this summer. Iseage, which resides on a high-speed LAN, was used by students engaged in Iowa State's Cyber Defense Competition last month. The contest involved teams who defended Web sites running on Windows, Unix, and open source operating systems against security professionals representing hackers. Iowa State student and winning team member Sean Howard says the battle waged on Iseage imparted the experience of defending a corporate network. Jacobson says simulating the complexities of real-life cyberattacks is commercially desirable; "Our goal is to have [Iseage] as a point where organizations can test security paradigms," he explains. Iowa State will permit organizations to use Iseage to model their networks with defense in mind, for an as-yet undisclosed fee. It is also expected that the state of Iowa will employ Iseage to assess its network's resiliency against various cyberattack scenarios.
Click Here to View Full Article
"The Looming Threat of Pharming"
InfoWorld (06/06/05) Vol. 27, No. 23, P. 39; Leon, Mark
- Pharming exploits the requirement that all URLs must be converted into IP addresses via the domain name system (DNS), and the hacker who successfully "poisons" a DNS server will cause that server to respond to an authentic URL request with a bogus IP address. Upon arriving at the phony site, the victim enters an ID, password, and personal identification number, only to receive a pop-up window that claims the password is invalid; the victim then re-enters the data, by which time he has been sent back to the real site, unaware that his account is now open to the hacker. Security experts and analysts agree that the most effective deterrent against DNS poisoning is to ensure that one has the latest DNS software and security patch updates, and they recommend that users running Berkeley Internet Name Domain (BIND) should upgrade to Version 9, which is more or less immune to poisoning compared to earlier iterations. "If you lock down all your servers and make sure they are only pulling off root cache servers, it is going to be very difficult for a hacker to pharm you," says TraceSecurity CTO Jim Stickley. SANS Institute analyst Johannes Ullrich cautions that this do-it-yourself strategy entails a lot of work, given the complexity of maintaining the DNS. The IETF's decade-old DNS Security (DNSSEC) protocol is acknowledged by many experts to be the ultimate defense against pharming, because it facilitates the encryption and signing of DNS data. However, Ullrich says this solution is impractical, a conclusion echoed by Burton Group analyst Dan Golding, who describes DNSSEC as "horrendously complex." He also notes that the inherent difficulty and cost of pharming is such that the number of pharming hackers should be relatively small, though Stickley says the presence of vulnerable DNS servers ensures that pharming will explode, sooner or later.
Click Here to View Full Article
From ACM's TechNews, June 10, 2005
"Computer Viruses Become Hacker Informants"
New Scientist (06/09/05); Marks, Paul
- Security experts have discovered an emerging class of malware called vulnerability assessment worms that keep hackers apprised of the latest computer-network vulnerabilities so they can refine their cyberattack strategies or even target individual machines. Once the worms contaminate a network, they scan for security holes and report back to hackers via an Internet chatroom; scores of computers compromised by "bot" viruses are frequently directed through a chatroom link, and are often used to distribute spam or knock out Web sites with a denial of service attack. Symantec's Kevin Hogan says new viruses are coming out of the woodwork in ever-increasing numbers because the source code for many programs is freely available online. Computer security expert Bruce Schneier notes in the June 2005 edition of the ACM's Queue magazine that over 1,000 new viruses and worms were uncovered in just the last six months, and points to the SpyBot.KEG worm as one of the most advanced forms of vulnerability assessment malware. The program informs its creator about vulnerabilities through an Internet Relay Chat (IRC) channel, and Schneier anticipates the emergence of even more complex IRC worms of a similar nature, as well as the use of peer-to-peer file-trading networks as launching platforms for new viruses. Hogan says the bot-hacker communication channel can be blocked with strong firewalls, while the IRC these hackers use can also be their undoing, since a hacker can be easily tracked once the authentic IP address of the IRC channel host is learned.
Click Here to View Full Article
From ACM's TechNews, June 6, 2005
"Device Drivers Filled With Flaws, Threaten Security"
Security Focus (05/26/05); Lemos, Robert
- Although operating system code has improved in recent years, device drivers still have numerous flaws that threaten operating system security. The responsibility of securing device driver code lies primarily with the third-party hardware vendors that create the drivers, but also with Microsoft and the Linux development community. Automated code-checking firm Coverity said an audit of the Linux 2.6.9 kernel code revealed that over 50 percent of the discovered flaws existed in device drivers. Though those flaws may not have been exploitable, they do reflect on the overall quality of code, says Coverity CEO Seth Hallem. Microsoft's Windows software development process includes provisions for checking third-party code shipped with the operating system and the company has an initiative to improve device driver development. The Linux kernel has been consistently audited for security, but the kernel source tree contains huge numbers of outdated device drivers, says Novell software engineering director Crispin Cowan. Of particular concern are drivers with direct memory access such as USB drivers, graphics drivers, and sound drivers, since code launched from those can overwrite system memory. Networking, wireless, and Bluetooth drivers are the only ones that are vulnerable to remote access, however. Open Source Development Labs Linux evangelist Bill Weinberg says driver exploits are also limited by the fact that many of them will simply crash the system.
From New York Times, June 9, 2005
The Scramble to Protect Personal Data
by Tom Zeller Jr.
- The problem of data security goes well beyond couriers and data tapes. And improving things takes time and money.
Read the article.
From ACM's TechNews, June 3, 2005
"Has Ransomware Learned From Cryptovirology?"
NewsFactor Network (06/02/05); Young, Adam L.
- The Trojan recently reported in the media to hold victims' data hostage is probably not a true cryptovirus, writes infosec researcher Adam Young, who pioneered cryptovirology research along with his Columbia University professor Moti Yung. But the news shows criminal hackers are likely to begin wielding cryptographic tools more frequently in their activities, especially public-key cryptography. According to the Associated Press and F-Secure, the so-called "Ransomware" attack was actually easily foiled--F-Secure said its anti-virus product was able to detect the Trojan and decrypt the hostage files; however, cryptoviruses such as those demonstrated in Young's research promise to be much more powerful because they leverage pubic-key cryptography instead of symmetric encryption alone. With true cryptoviruses, victims would necessarily have to cooperate with the hacker to decrypt the symmetric key using the hacker's private key. Young wrote his thesis on cryptovirus attacks in 1995 and published a paper together with Yung at the 1996 IEEE Symposium on Security & Privacy, and over the next decade they gathered more research and evidence of cryptovirus attacks and documented attempts to hold data hostage. In February 2004, the researchers published their compiled work in the book "Malicious Cryptography: Exposing Cryptovirology." Because of his experience in the field, Young warns that it is only a matter of time before an attacker develops and releases a true cryptovirus or cryptoworm that could affect thousands of users. He urges the IT industry to take previously collected research seriously and begin building in defenses against such attacks.
Click Here to View Full Article
"'Silent Horizon' War Games Wrap Up for the CIA"
Associated Press (05/26/05); Bridis, Ted
- The CIA's Information Operations Center is conducting a three-day exercise dubbed "Silent Horizon" that simulates a prolonged cyberterrorist attack that could potentially cause as much damage and disruption as the Sept. 11, 2001, attacks, say exercise participants who want to remain anonymous. Although the government seems more concerned about biological attacks and physical threats from terrorists, FBI director Robert Mueller admits terrorists are actively recruiting computer scientists. Mueller says terrorists currently lack the resources for such a large-scale electronic attack on the United States. A previous cyberterrorism exercise, known as Livewire, determined government agencies may remain unaware of early-stage cyberterrorist attacks without the support of private technology companies. Dennis McGrath, who helped coordinate similar exercises for Dartmouth College's Institute for Security Technology Studies, says, "You hear less and less about the digital Pearl Harbor...It's just not at the top of the list." About 75 people took part in Silent Horizon at the secretive Information Operations Center, which studies cyber threats to the U.S.'s computer networks.
Click Here to View Full Article
From ACM's TechNews, June 1, 2005
"Privacy Matters"
Washington Technology (05/23/05) Vol. 20, No. 10, P. 1; Lipowicz, Alice
- Privacy proponents' increased emphasis on enhancing the collection, storage, and sharing of personal information with more protective measures has sparked expectations of a legislative mandate for more rigorous controls over personal information. However, it remains uncertain as to how the government plans to balance out the often antagonistic goals of privacy rights and national security. "The question is: How do you do what you need to do while minimizing the damage to civil liberties and rights?" says consultant Ramon Barquin. Better data security alone does not adequately address privacy concerns, which have been key factors in the delay, reassessment, or cancellation of high-profile anti-terrorism projects such as the Transportation Security Administration's CAPPS II airline passenger screening initiative, the Pentagon's Total Information Awareness data mining program, and the Justice Department's Terrorist Information and Prevention System. Homeland Security officials insist that their department's privacy office has stepped up efforts to address privacy issues earlier; DHS Privacy Officer Nuala Kelly earned some credibility with a report on certain improprieties of TSA staff during the early development of CAPPS II that probably helped hasten the program's termination, yet many say her office does not carry sufficient clout. "The chief privacy officer needs the independence and adequate authority to properly evaluate the privacy concerns of the department, outside political pressures," noted the House Homeland Security Committee's Rep. Bennie Thompson (D-Miss.) last month. Congress is mulling a batch of proposals to reduce ID theft while strengthening privacy protections, including the establishment of a national privacy and civil rights oversight board.
Click Here to View Full Article
"Hacker Hunters"
BusinessWeek (05/30/05) No. 3935, P. 74; Grow, Brian; Bush, Jason
- To counter the growing threat of professional, profit-driven cyber-criminals, enforcement agents or "hacker hunters" are combining the latest cybercrime deterrents with traditional tactics such as infiltration and the Internet equivalent of wire-tapping to topple and successfully prosecute online crime rings. The need to prevent cybercrime has never been more crucial, as the damage caused by hackers is growing steadily worse, while enforcement agencies are underfunded and underequipped. The urgency of the situation has not only helped cultivate smarter federal, state, and local agencies, but greater collaboration between them; in addition, cybercrime legislation is being pursued more aggressively. The highly publicized takedown of the ShadowCrew hacker gang by the Secret Service is a case study in how both the nature of cybercrime and anti-cybercrime strategy is changing. ShadowCrew's suspected ringleaders allegedly ran shadowcrew.com as an international clearinghouse for stolen credit cards and identity documents, and the gang reportedly had 4,000 members worldwide: Two people administered the Web site and recruited members; "moderators" hosted online forums where members could share tips on hacking and ID theft; "reviewers" obtained and tested merchandise; and "vendors" bought and sold on the site, mostly through online auctions. The Secret Service enlisted an insider to act as an informant, created and used a gateway to locate gang members, and coordinated an international crackdown on ShadowCrew by state and local police and authorities in six foreign countries. The biggest obstacle law enforcement faces in curbing cybercrime is its worldwide scope. Countries with weak hacking laws and flimsy enforcement are havens for cyber-criminals, who can also tangle up the trail for investigators by keeping servers in a separate country.
Click Here to View Full Article
From EduPage, June 1, 2005
Colleges Learn About Identity Theft From An Identity Thief
New York Times, 29 May 2005
- As part of its efforts to increase awareness about student loan fraud, the Department of Education is distributing a DVD to colleges and universities of an interview with a convicted identity thief. As part of his plea agreement, John E. Christensen was interviewed by authorities to create the DVD, in which he describes how, over a period of three and a half years, he used the identities of more than 50 individuals to defraud the government of more than $300,000 in federal student grants and loans. Each year, the Department of Education disburses about $65 billion in financial aid. In the interview, Christensen, who is serving his prison sentence in Arizona, explains how he fraudulently obtained personal information and used it to register for classes and apply for financial aid. Because financial aid processes take place largely online, defrauding the government is "becoming easier and easier all the time," said Christensen. "You never have to see anybody."
(registration req'd) http://www.nytimes.com/2005/05/30/national/30fraud.html The DOE website is at http://www.ed.gov/about/offices/list/oig/misused/index.html.
From EduPage, May 27, 2005
Hackers Hit Stanford
Silicon.com, 26 May 2005
- Officials at Stanford University and the FBI are investigating a computer breach at the university's Career Development Center (CDC) earlier this month that may have exposed personal information on as many as 10,000 individuals. Most of those affected are students, though a small number are recruiters who had registered with the CDC. Information that might have been improperly accessed includes names, Social Security numbers, financial information, and, in some cases, credit card numbers. The university is notifying those possibly affected by the breach, in compliance with the 2003 Security Breach Information Act. That law requires organizations to inform California residents any time their personal information might have been accessed without authorization. http://software.silicon.com/security/0,39024655,39130758,00.htm
Gao Says Dhs Unprepared For Cybersecurity
CNET, 26 May 2005
- The Government Accountability Office (GAO) has issued a report strongly critical of the readiness of the Department of Homeland Security (DHS) to deal with threats to the nation's cybersecurity. According to the report, DHS "has not fully addressed any" of 13 areas of cybersecurity, including bot networks, criminal gangs, foreign intelligence services, spammers, and spyware. "DHS cannot effectively function as the cybersecurity focal point intended by law and national policy," said the authors of the report. During the past year, DHS has seen the departure of a number of high-level officials, including the director and deputy director of Homeland Security's National Cyber Security Division, the undersecretary for infrastructure protection, and the assistant secretary responsible for information protection. A representative of DHS refuted the GAO's findings, saying that DHS has made improvements to the "nation's cybersecurity posture." He noted that DHS, as a new federal agency, measures progress in nonquantitative, less formal ways. http://news.com.com/2100-7348_3-5722227.html
From ACM's TechNews, May 27, 2005
"Collaboration Is a Necessity for a Secure Infrastructure"
Computing (05/26/05); Nash, Emma
- Now that IT is considered an integral part of the business, it is time for collaboration between industry users and vendors to establish best practices, says Oracle chief security officer Mary Ann Davidson. As one of the 10 charter members of the Global CSO Council, Davidson is taking a lead role in fostering collaboration between industry users, vendors, and government; other Global CSO Council members including New York cybersecurity head William Pelgrin, eBay CSO Howard Schmidt, and Bank of America information security director Rhonda MacLean. Davidson is working with the National Institute of Standards and Technology to create secure software development auditing standards that could be applied to commercial software, and is representing the industry on Capitol Hill to push for funding of such efforts. Software development auditing standards are an essential building block to better overall security, she says. Another important critical issue for improving IT security is improved software development education at universities. Currently, hiring companies are left with the burden of training new programmers in secure development practices; university programs should be certified, so that software developers create stable products similar to how architects and civil engineers also focus on stability and security. Finally, Davidson points out that IT security awareness is starting to increase due to issues such as regulatory compliance, and that new security products are preventative in nature.
Click Here to View Full Article
"House Approves Spyware Penalties"
TechNews.com (05/24/05); McGuire, David
- The House of Representatives voted overwhelmingly in favor of Rep. Mary Bono's (R-Calif.) Spy Act and Rep. Bob Goodlatte's (R-Va.) Internet Spyware Prevention Act on May 23. The anti-spyware proposals are nearly identical, although Bono's bill requires businesses to use an "opt-in" policy in which they must ask people's permission to install spyware on their computers. Goodlatte's measure offers no such provision, and it has garnered much more industry support as a result. Bono's bill bans some of the more egregious spyware tactics, and sets a maximum penalty of $3 million for each violation; Goodlatte's legislation would send some spyware distributors to prison for up to five years. An inability to reach a compromise on the "opt-in" issue scuttled the hopes of merging the two proposals, according to Bono. She says, "I believe it's one of the most important parts of the bill. I think we own the computer and we ought to have a say about who installs what on your computer." The Information Technology Association of America has been a frequent adversary of anti-spyware legislation, but President Harris Miller acknowledges the need for a national standard, since several states have started promoting their own anti-spyware measures that could lead to balkanization if left unchecked. America Online and the National Cyber Security Alliance found spyware installed in 85 percent of 329 randomly selected Internet users' computers last October, with the average "infected" computer hosting over 90 spyware and adware programs; last year IDC predicted that annual anti-spyware software expenditures will skyrocket from $12 million in 2003 to $305 million in 2008. Sen. Conrad Burns (R-Mont.) has sponsored anti-spyware legislation in the Senate, and says passage of the House bills shows progress on the issue.
Click Here to View Full Article
From EduPage, May 2, 2005
Spreading Spyware Through An Affiliate Program
TechWeb, 24 May 2005
- A business based in Russia is adopting the affiliate-program approach to spreading spyware around the globe. Called iframeDOLLARS, the company is offering Web site operators 6.1 cents for every computer on which the Web site installs code that exploits vulnerabilities in Windows and Internet Explorer. Microsoft has issued patches for the weaknesses, but unpatched computers remain at risk. The malicious code includes backdoors, Trojans, spyware, and adware. Operators of the iframeDOLLARS site claim to have paid out nearly $12,000 last week alone, which would translate to nearly 200,000 infected computers.
Although spyware expert Richard Stiennon called the tactic "brazen" and said iframeDOLLARS might be making quite a bit of money from its scheme, Dan Hubbard, the head of security at Websense, gave iframeDOLLARS less credit. He noted that the company has been around for a while, trying various methods to install malicious code, and he said a number of others have tried similar affiliate programs to accomplish the same thing.
http://www.techweb.com/wire/security/163700705
House Takes Two Steps Against Spyware
CNET, 23 May 2005
- The House of Representatives overwhelmingly passed two separate bills this week designed to address the growing problem of spyware. HR 29, introduced by Mary Bono (R-Calif.), would impose stiff fines on anyone found guilty of distributing computer code that results in browser hijacking, modifying bookmarks, collecting personal information without permission, and disabling security mechanisms. Violators can be fined as much as $3 million per incident. One of only four Representatives who voted against Bono's bill, Zoe Lofgren (D-Calif.) had introduced another bill, HR 744, that also prohibits installing spyware.
Lofgren's bill, which passed 395 to 1, would impose fines and jail time to anyone found guilty. Both bills now go to the Senate, which failed to act on a spyware bill sent by the House last year. Senators have said they will not allow a similar situation this year.
http://news.com.com/2100-1028_3-5717658.html
From ACM's TechNews, May 25, 2005
"Database Hackers Reveal Tactics"
Wired News (05/25/05); Zetter, Kim
- Three young hackers suspected of breaking into the LexisNexis database claim the intrusion was done to make a name for themselves rather than to commit identity theft. One of the suspects is also a member of the Defonic Crew hacking group, and says his hack of America Online encouraged him and other Defonic members to take on bigger hacking challenges; "Shasta," a hacker who is not a suspect in the LexisNexis case, says the successful AOL intrusions bred carelessness among Defonic Crew when it came to not leaving a trail. Last March, LexisNexis admitted that intruders penetrated a database belonging to its Seisint subsidiary and used name searches to appropriate the personal data of up to 310,000 people, but the hacker suspects claim they were unaware of this until a friend of one of them, pretending to be a teenaged girl, engaged in an online chat session with a Florida policeman with a Seisint account. The suspect coaxed the officer to click on an attachment containing a Trojan horse with promises of erotic content, and the program downloaded to his computer and gave the hacker total access to his files, including one linking to Seisint's Accurint service. Another suspect in the LexisNexis breach used a Java script to find other active Accurint accounts, and uncovered an account belonging to a Texas police department; he then contacted Seisint posing as a LexisNexis tech administrator and coaxed an employee to reset the account's password so he could create new accounts in the police department's name. A separate investigation that may be related to the LexisNexis case led to several arrests in California, and Santa Clara County Deputy District Attorney Jim Sibley theorizes that more than one hacker group may have breached LexisNexis, given its shoddy security.
Click Here to View Full Article
"Scientist Blames Web Security Issues on Repeated Mistakes"
E-Commerce Times (05/24/05); Germain, Jack M.
- BBN Technologies researcher Peiter Zatko believes the Internet's vulnerability to catastrophic failure is rooted in scientists and engineers repeatedly committing the same mistakes, but he does think this situation can be remedied and is heartened by industry's growing awareness of the problem. His view is that programmers must stop coding programs riddled with access holes that stem from calls within a program for certain convenience actions. Zatko says the abuse of the Internet's critical infrastructure makes an all-in-one security solution impossible, and partially attributes the infrastructure's weakness to engineers overworking the Internet's intended use. He says the addition of utilities and telephone service to the Internet puts further strain on the network. Zatko recommends that scientists cross-field their knowledge in order to find effective solutions to the Internet's security flaws, insisting that "We need to break up the old boy network." He sees the technology industry's reversion to dedicated services instead of multipurpose devices as a positive step, and advises the continuation of this trend. Zatko expects the repeated abuse of the Internet to halt once it becomes too dangerous, too complicated, and too costly to use safely. Once that point is reached, people will start clamoring for government regulation, he predicts.
Click Here to View Full Article
From SAN's NewsBites, 7(21), May 25, 2005.
Hackers Holding Computer Files 'Hostage'
(23 May 2005)
- A new type of extortion plot has been identified, unlike any other cyber extortion, according to the FBI. Hackers used an infected website to infect computers with a program that encrypts the users file. Then the criminal demanded money for the key to decrypt the files. Enhanced versions of this attack threaten large numbers of users with loss of important data, loss of money, or both.
http://news.yahoo.com/s/ap/20050524/ap_on_hi_te/internet_ransom
[Editors' Note (Paller and Dhamankar): This is a substantial expansion of the extortion threat. Previously large organizations were targeted.
Now because infection is indiscriminant, everyone is at risk. To protect your systems: (1) ensure your back ups are current and retrievable, (2) ensure your operating system and browser are fully patched (through automated patching), (3) refrain from opening *any* attachments unless you are expecting them.]
GAO Report Finds Wireless Security Lacking at Federal Agencies
(17 May 2005)
- A Government Accountability Office study found that federal agencies lack adequate wireless network security. In its report, GAO recommends that the Office of Management and Budget require agencies to incorporate wireless security into their information security programs under the Federal Information Security Management Act. This would include policies in wireless network implementation and use, configuration requirements for wireless security tools and training employees and contractors on wireless policies. Of 24 executive branch agencies, nine had no wireless network policies and 13 had no wireless equipment security configuration requirements. At six agency headquarters in downtown Washington, DC, the GAO found wireless signals leaking outside of buildings, unsecured wireless equipment configuration and unauthorized wireless devices operating on the network.
http://appserv.gcn.com/cgi-bin/udt/im.display.printable?client.id=ndaily2&story.id5827
http://www.gao.gov/new.items/d05383.pdf
[Editor's Note (Schultz): What amazes me is that so many organizations continue to have cleartext wireless communications despite the inherent danger of eavesdropping and the availability of suitable encryption solutions.
(Shpantzer): Most places have either a 'no wireless' policy or a 'wireless with XYZ security' policy. Both require monitoring and enforcement. If you have no policy at all, you're virtually guaranteed to have insecure wireless in place, set up for convenience and mobility by enterprising employees. If you have no policy, what can you can do to those employees? Not much.]
Court Rules German ISPs Do Not Have to Provide Record Companies with Customer Data
(17 May 2005)
- The Higher Regional Court in Hamburg, Germany has ruled that German ISPs are not required to provide record companies with information about their customers' identities. The court argued that ISPs "merely provide access to the web," but are not themselves a part of copyright infringement acts. This overturns a District Court ruling, based on Germany's Copyright Act, which allowed record companies access to ISP customer information after the discovery of an FTP server where songs were available for free download.
http://www.theregister.co.uk/2005/05/17/hamburg_isp_ruling/print.html
From ACM's TechNews, May 18, 2005
"Instant Messaging Falls Prey to Worms"
New Scientist (05/14/05) Vol. 186, No. 2499, P. 26; Biever, Celeste
- Instant messaging (IM) technology is fertile new ground for hackers, according to experts. In 2001, 141 million people were using IM applications, but that number has since grown to 863 million people, making IM-based hacks more appealing. Security experts had hoped that limited approved contact lists would hinder IM-based attacks, but now worms are increasingly targeting linked email accounts. Compared to 2004, security company IMlogic reports a significant increase in IM-based worms in the first three months of this year. Attacks often use an application programming interface to detect Microsoft IM networks and spread malicious messages that look as if they are coming from a friend. However, clicking on the link automatically downloads a virus, giving hackers remote control over victims' computers. Some hacks are sophisticated, with code trained to chat with victims prior to sending the malicious link, though the chat is often fragmented and illogical. "It always shocks me how well these social engineering attacks end up working," says Nicholas Weaver, a security expert at the International Computer Science Institute in Berkeley, California. Hackers are also targeting IM applications via application vulnerabilities. Analysts say email viruses are still a bigger threat, but they that IM attacks continue to grow in popularity, and are potentially more dangerous since organizations are less prepared to fight them off. Although an estimated 80 percent of the U.S.'s 1,000 wealthiest companies maintain IM networks, just 10 percent use IM security safeguards.
Click Here to View Full Article
"School Studies Effects of Internet Attacks"
eWeek (05/09/05) Vol. 22, No. 19, P. 18; Roberts, Paul F.
- Iowa State University is using a new test laboratory to train students and local security professionals on cyberattacks and cyber-defense. The Internet Simulation Event and Attack Generation Environment (ISEAGE) is designed to recreate a cyberattack on any part of the Internet infrastructure, according to Doug Jacobson, director of information assurance at the university in Ames. Funded by a $500,000 grant from the Department of Justice, ISEAGE is comprised of a 64-processor cluster connected by high-speed switching gear and linked to a central disk storage system running Free BSD Unix; each processor can recreate 50 routing points. The processors give researchers the flexibility to reproduce network attacks, while ISEAGE's software tools also enable them to change traffic patterns, replay attacks in different configurations, and collect data. "We can make an attack look like it came from 1,000 computers, but we don't need 1,000 computers to do it," says Jacobson. ISEAGE will be used to model attacks on key infrastructure in cyberspace, and could help improve computer defense and forensics.
Click Here to View Full Article
From ACM's TechNews, May 18, 2005
"Personal Data for the Taking"
New York Times (05/18/05) P. C1; Zeller Jr., Tom
- Dozens of Johns Hopkins University students enrolled in a computer security course last semester learned how painfully cheap and easy it is to acquire personal data online when they were grouped into teams assigned to aggregate, clean, and link entire databases of dossiers on Baltimore citizens using only public data sources with a maximum budget of $50. Several teams collected upwards of 1 million records on hundreds of thousands of individuals. The project was the brainchild of Johns Hopkins computer science professor Aviel Rubin, who is also technical director of the university's Information Security Institute. Some participants obtained information by filing Freedom of Information Act requests at local government offices, while others tapped whole databases from online sources or free commercial address databases using special computer scripts. Profiled citizen David Albright was troubled by how effortlessly information such as his occupation, address, phone number, birth date, and party registration was gathered: "What would be disturbing is if by having all this information consolidated, it made stealing an identity easier," he said. Privacy proponents have similar concerns, especially in regards to how easy it is to access Social Security numbers. ACLU lawyer Jason Brandeis expressed the need to balance out the protection of individual privacy and the public interest in unfettered access to government data. Rubin concluded that "there are strong negative consequences to being able to collect and correlate all this information on people, but it is also possible that the consequences to personal freedom would be worse if it were outlawed."
Click Here to View Full Article
From ACM's TechNews, May 23, 2005
"How to Hook Worms"
IEEE Spectrum (05/05); Riordan, James; Wespi, Andreas; Zamboni, Diego
- IBM Zurich Research Laboratory research scientists James Riordan, Andreas Wespi, and Diego Zamboni detail an intrusion-detection system designed to specifically target computer worms, which Mi2g says were partly responsible for more than $68 billion in damages in February 2004 alone. The majority of intrusion-detection systems employ a dual-tier strategy in which "sentinel" programs are posted on both network-linked host computers and on the network itself, but this approach generates many false alarms and exhibits little resistance to both malicious attacks and accidental failures. The researchers' system, dubbed Billy Goat, runs on a network-connected dedicated machine and can identify worm-infected machines anywhere within the network. The genesis of Billy Goat was Riordan, Wespi, and Zamboni's realization that computers linked to the network frequently got automated requests from other machines that did not dovetail with their normal operation; worms were behind a large percentage of these requests, because they usually locate new computers to target by randomly searching through Internet addresses. Billy Goat is assigned to unused, unadvertised addresses where the illegitimacy of received requests is a given, and the system responds to requests by providing bogus virtual services, effectively fooling worms into disclosing their identity and making them easy for Billy Goat to reliably track. The system tries to attract many different kinds of worms by presenting multiple feigned services, while new fake services can be created by standard programming tools and interfaces supported by the virtualization infrastructure; Billy Goat also follows a distributed architecture that permits the coexistence of multiple Billy Goats on a network. The researchers claim Billy Goat can detect worm-infected machines within seconds of contamination, and provide their addresses as well.
Click Here to View Full Article
From EduPage, May 2, 2005
Latest Loss Of Personal Information: MCI
Wall Street Journal, 23 May 2005
- Officials from long-distance carrier MCI are investigating the loss of employee data after a laptop was stolen from the car of an MCI financial analyst. The laptop contained names and Social Security numbers for about 16,500 employees, whom the company has notified. A spokesperson for MCI said the machine was password-protected but did not say whether the employee data were encrypted. MCI is reviewing the incident to see whether the analyst violated any company policies, such as those concerning what types of information may be put on laptops and what information must be encrypted. MCI is also taking this opportunity to make sure employees who have access to sensitive information are clear on company policies. The company said that so far there have been no reports that any of the information on the laptop has been sold or misused. (sub. req'd) http://online.wsj.com/article/0,,SB111680003245940129,00.html
From EduPage, May 20, 2005
Feds Conduct Searches Related To Data Thefts
Wall Street Journal, 20 May 2005
- Federal authorities investigating the theft of personal information from LexisNexis this week conducted raids and searches at several locations around the country. LexisNexis, which collects and aggregates information on millions of people, recently reported that information on nearly 300,000 individuals had been stolen by hackers. Investigators from the Federal Bureau of Investigation and the Secret Service searched the homes and computers of close to one dozen people, resulting in at least three arrests. Spokespersons for the agencies conducting the raids as well as for LexisNexis declined to give many details other than that the investigations are ongoing. (sub. req'd) http://online.wsj.com/article/0,,SB111653162281238311,00.html
From ACM's TechNews, May 5, 2005
"Computing Officials Worry That Proposed Federal Database Could Be Hacked"
Chronicle of Higher Education (05/06/05) Vol. 51, No. 35, P. A37; Carnevale, Dan
- The U.S. Department of Education is considering a "unit record" database listing information on individual students, but technology experts are worried about the database's vulnerability to hacking, a pressing concern in light of recent intrusions into college and company servers. Purdue University computer sciences professor and USACM chair Eugene Spafford warns that a large database, constructed ostensibly to keep tabs on student retention and graduation rates, is an irresistible target, and susceptible to an attack from any point in the system because of its size. Grover Whitehurst, director of the Education Department's Institute of Educational Sciences, says the department has yet to submit the unit record database concept to Congress, and is currently receptive to any ideas for securing confidential student data. He says the database would probably be disconnected from the Internet, making it impossible for hackers to breach the server through public computer networks. Whitehurst also says no Social Security numbers would be listed in the database, and he strongly doubts the information in the database--student names, places of enrollment, classes students are taking, financial aid they are getting, etc.--would make a particularly attractive target. Former ACM President Barbara Simons says a government database that tracks information about individual students is cause for worry, and wonders how the people who access the data would be trustworthy in the Education Department's eyes. Whitehurst says the department will consult with computer security experts before moving ahead with any unit record database proposal.
From EduPage, May 2, 2005
Time Warner Reports Data Loss
Reuters, 2 May 2005
- A company that handles data storage for Time Warner lost tape backups containing personal information for about 600,000 employees. Iron Mountain Inc., based in Boston, reportedly lost the tapes during transport. Officials from Time Warner said the tapes did not contain customer information. In a statement, Larry Cockell, chief security officer at Time Warner, said that although no evidence exists that the data have been accessed or misused, "we are providing current and former employees with resources to monitor their credit reports while our investigation continues." Time Warner owns America Online, HBO, and Warner Brothers. Reuters, 2 May 2005 http://www.reuters.com/newsArticle.jhtml?storyID=8363208
From ACM's TechNews, May 2, 2005
"Skeletons on Your Hard Drive"
CNet (04/20/05); Hines, Matt
- Experts say it is inordinately difficult to completely erase data on unwanted hard drives, even using commercial wiping software to overwrite the data. The National Association for Information Destruction (NAID) said it could not endorse the use of wiping software alone because studies have shown such software is not enough to ensure data deletion. Instead, the group says users should use wiping software in addition to material destruction to make sure hackers cannot pull sensitive information off of the drives, such as login data. NAID executive director Bob Johnson also says professional services that claim to wipe large numbers of computer hard drives for organizations lack adequate testing measures to check if data is inaccessible. Studies have shown the majority of resold hard drives still contain some information. The U.S. Department of Defense requires seven passes with wiping software for hard drives that do not require physical destruction, says Acronis' director Stephen Lawton, whose company sells such software. Only one pass is not enough even for home users, he says. Stronger protection is afforded through crushing services or degaussing, which is a magnetic striping process usually applied to large collections of machines. Hewlett-Packard's John Frey says the reason PC data is difficult to erase is because hardware and software makers had to ensure users did not accidentally delete information during the DOS era.
Click Here to View Full Article
From EduPage, April 29, 2005
FIU Suffers Computer Hack
The Register, 29 April 2005
- Officials at Florida International University (FIU) are warning faculty and students about possible identity theft after it was discovered that a hacker had user names and passwords for 165 computers on campus. Although only a few of the computers contained personal information, and despite the fact that no evidence exists that anyone's information has been misused, school officials fear that the hacker may have had enough access to put the university's entire network in question. University staff have been instructed to inspect 3,000 computers on campus to determine if they have been compromised. FIU has recommended that faculty and students remove any personal information from their computers and that they monitor their credit cards for suspicious activity that could indicate fraud. http://www.theregister.com/2005/04/29/fiu_id_fraud_alert/
From ACM's TechNews, April 29, 2005
A Crisis of Prioritization"
Computerworld Australia (04/27/05); Bajkowski, Julian
- A new report from the President's Information Technology Advisory Committee (Pitac) warns that the emphasis on bolstering national security in the wake of the 2001 U.S. terrorist attacks has left a critical element--cybersecurity of civilian technological infrastructures--severely underfunded. The report concludes, "The information technology infrastructure of the U.S., which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to terrorist and criminal attacks." The Pitac study notes that in terms of research and development priorities, research emphasis is just as important as funding levels, if not more so. Pitac calls for the incorporation of holistic-level security within current and nascent architectures, which entails a change in thinking and IT design beliefs instead of pouring vast amounts of money into intermittent patches without addressing immediate problems. The committee says the federal government must guide the rehabilitation of the IT industry, asserting that "an expanded portfolio of U.S. federal cybersecurity R&D efforts is required because today we simply do not know how to model, design, and build systems incorporating integral security attributes." The Pitac report has many supporters in Australian government and industry, and AusCert director Grahame Ingram says vendors have started to make security a much more integral component of software and hardware design in the last few years. Professor Bill Caelli of Queensland University of Technology says the Pitac report was alarming and cites the need for a top-level reconsideration of embedding security within IT.
Click Here to View Full Article
"Does Trusted Computing Remedy Computer Security Problems?"
IEEE Security & Privacy (04/05) Vol. 3, No. 2, P. 16; Oppliger, Rolf; Rytz, Ruedi
- Rolf Oppliger and Ruedi Rytz with the Swiss Federal Strategy Unit for Information Technology weigh the benefits and drawbacks of trusted computing, and conclude that the technology is unlikely to completely inoculate PCs against the threat of malware. Trusted computing initiatives are consistent in their basic principle to convert software-open computer systems into software-closed or software-controlled systems, which cannot be done without a secure, reliable bootstrap framework. Software-open systems are key to the PC explosion because they allow the operating system and the application software to be easily modified, upgraded, and extended; they are also key to PCs' insecurity, which threatens users' personal data as well as the security and availability of the Internet. The authors point out that commercial antivirus software is ineffective against detecting and eliminating unknown malware, while the ability to introduce malicious code at any point in the software life cycle complicates testing and detection. Not only that, but typical computer memory architecture stores programs and data in the same place, which enables malware to alter data and programs simultaneously. The separation of programs and data--a prerequisite for a more secure architecture--is also difficult. Trusted computing allows software to be authenticated and authorized to confirm its genuineness and integrity before execution, but the technology cannot ensure that software running on a computer system does not contain exploitable programming errors or malware; this situation makes trusted computing effective against manual malware execution, but useless against malware that takes advantage of glitches, flaws, and vulnerabilities in authorized software for its own purposes. The authors write that trusted computing-enabled systems are more easily securable, but their degree of protection reflects how the systems are designed and implemented.
Click Here to View Full Article
From EduPage, April 27, 2005
Concerns Mount Over Software's Role In Data Breaches
Wall Street Journal, 27 April 2005
- A number of retailers are pointing to software used at store checkouts as the weak link in the rash of recent security breaches. Magnetic strips on credit cards include--along with the credit card number--a three-digit code. Knowing that code can allow criminals to create counterfeit cards with embossed names that do not match the name attached to the account number. With that, a crook could present a photo ID that matched the name on a card, while the charge goes against an entirely different account. Software that handles credit card purchases is supposed to delete card numbers and the three-digit codes after a transaction, but several retailers now say that the systems keep those numbers in memory. John Shaughnessy of Visa USA said that a computer system that retained those numbers would be extremely tempting for criminals. Some retailers have filed suits against the makers of the software, seeking compensation for losses resulting from recent hacks. At least one software company, Micros Systems, rejected retailers' contentions, saying its products do not store such information. (sub. req'd) http://online.wsj.com/article/0,,SB111455367943717582,00.html
From ACM's TechNews, April 27, 2005
"Encryption: The Key to Secure Data?"
Computer Weekly (04/26/05); Bradbury, Danny
- Data encryption technology is now a mature market with infrequent updates, but the failure of public key infrastructure (PKI) to take off in the commercial sector has left a gaping hole in the encryption framework. Encryption comes in two flavors: Traditional symmetric encryption and asymmetric encryption that uses public and private keys. Asymmetric encryption popularized by RSA Security protects traditional symmetric encryption by adding another encrypted piece of data, which dramatically increases the difficulty of code-breaking; elliptic curve cryptography is a niche application of asymmetric encryption that uses less resources and is more suitable for PDAs and smart phones, for instance. Digital signatures protected by hashing functions, which ensure the message package is unmolested while in transit, allow parties to authenticate one another. Recently, the SHA-1 hashing algorithm was shown to be vulnerable to certain methods of attack and could prompt the industry to move to another, more secure, standard. PKI was created in order to protect against the fraudulent creation of encryption keys and involved the top-down issuance of certificates through organizations such as VeriSign, but PKI was pushed too hard, too fast, says Capgemini global chief technical officer Andy Mulholland. When PKI was promoted heavily five years ago, the bulk of online transactions was done by consumers, not businesses. If PKI was launched today, its commercial success would be far greater, says Mulholland. Encryption also faces the problem of complexity where ordinary users find even PGP encryption difficult to use, while another challenge is government involvement, especially governments' ability to obtain and decrypt keys.
"Center Aims to Improve Cybersecurity in Higher Education"
Indiana University (04/25/05)
- Indiana University is a hub for higher education cybersecurity efforts: In addition to hosting the Indiana Higher Education Cybersecurity Summit this week, the school is home to the Center for Applied Cybersecurity Research (CACR), an expanding information assurance program committed to improving the integrity and security of information systems, technologies, and content via a variety of disciplines, including computer science, informatics, organizational behavior, criminal justice, law, and public policy. CACR is driving the development of an interdisciplinary cybersecurity curriculum. "The whole nation is talking about cybersecurity, especially in higher education," says CACR director and Indiana University School of Law-Bloomington law professor Fred Cate. Computer hacking and identity theft incidents are becoming more sophisticated, severe, and frequent across the government, nonprofit, business, and higher education sectors. No educational institution is completely cyberattack-proof given the complexity and highly distributed management of schools' IT infrastructures. But Cate thinks the impact of such attacks can be minimized through a "highly coordinated" initiative involving the top leadership echelons. "Engagement in the discussion is a critical step in developing strategies that will deter attacks, reduce vulnerabilities, and help to ensure that disruptions are infrequent, of minimal duration, and cause the least damage possible," he says. Cate says CACR not only has the improvement of cybersecurity in mind, but also the improvement of cybersecurity efficiency, cost, and its effects on individuals, the economy, and the public.
Click Here to View Full Article
From ACM's TechNews, April 25, 2005
"Cyber Security Has Its Limits"
Pittsburgh Tribune-Review (04/22/05); Bails, Jennifer
- The recent intrusion into Carnegie Mellon University (CMU) business school computers illustrates that not even top IT security institutions can completely guard themselves against cyberthreats and that an entirely new way of designing systems is needed, according to security and privacy experts. The CMU hack left personal information of about 20,000 applicants, graduate students, and staff open to misuse, though there is no evidence identity thieves have tried to use that data. The incident is similar to other high-profile cases at well-known organizations. University systems are especially vulnerable to hacking because of their interconnectivity and mission as providers of information. University of California, Berkeley, computer science professor and cybersecurity expert Doug Tygar called the CMU incident unlucky and did not think the problem was due to poor computer security practices. UC Berkeley suffered a serious privacy breach in March when an administrative laptop was stolen, and the school has launched an extensive audit of network and information security including policy and user access review. Cornell University computer science professor Kenneth Birman says news about major privacy breaches emerges every few hours nowadays, and notes that the recently funded TRUST center would join academic research groups to find a more permanent solution. "We can try to tackle problems when they happen and apply the latest patch, or we can design trustworthy computers from the get-go," he says. The new $19 million TRUST effort is funded by the National Science Foundation and will investigate ways to build fundamentally secure systems.
Click Here to View Full Article
From EduPage, April 25, 2005
Survey Shows Steep Rise In Web Site Defacements
BBC, 25 April 2005
- Attacks on Web sites jumped 36 percent in 2004, totaling nearly 400,000 incidents, according to Zone-H, an organization that tracks malicious Web activity. Of the attacks recorded by the organization, Web site defacements--in which a bogus Web page is substituted for a Web site's home page--constituted the vast majority of attacks. Roberto Preatoni of Zone-H pointed out, though, that "the techniques used by defacers are the same techniques used by serious criminals to cause more serious damage." According to the group's report, more than half of the successful hacks took advantage of a known weakness or careless administration, such as easily guessed passwords or unprotected systems. Zone-H reported that the frequency of attacks rises over the Christmas holidays and drops when schools reopen each year after summer break.
http://news.bbc.co.uk/2/hi/technology/4480689.stm
From Knowledge@Wharton, April 6, 2005
Do You Know Where Your Identity Is? Personal Data Theft Eludes Easy Remedies
- ChoicePoint, a consumer data vendor, hands over personal information on at least 145,000 people to criminals posing as small businesses. Hackers swipe the personal information of 32,000 people who use the database Lexis-Nexis. Bank of America loses backup tapes containing 1.2 million federal employee records. Every day, it seems, a new identify theft incident is reported followed by new rounds of questions: Should data vendors be regulated? Can identity theft hurt e-commerce? How do individuals protect themselves? Unfortunately, suggest Wharton faculty and others, no simple answers are available, especially when personal information is so easily available through search engines.
Read the article
From New York Times, April 9, 2005
Sentence in Spam Case
- LEESBURG, Va., April 8 -- A North Carolina man convicted in the nation's first felony prosecution for spamming was sentenced on Friday to nine years in prison, but the judge postponed the sentence while the case is appealed.
- A jury recommended the nine-year prison term after convicting Jeremy Jaynes of sending at least 10 million e-mail messages a day with the help of 16 high-speed lines.
- Mr. Jaynes, 30, of Raleigh, N.C., will be free on $1 million bond until the appeals process concludes.
- Mr. Jaynes was convicted in November for using false Internet addresses to send mass e-mail ads through a server in Virginia. Under Virginia law, sending unsolicited bulk e-mail itself is not a crime unless senders mask their identities.
- Published: 04 - 09 - 2005 , Late Edition - Final , Section C , Column 1 , Page 2
From ACM's TechNews, April 22, 2005
"U.S. Gets New Cyberterrorism Security Center"
Computerworld (04/21/05); Weiss, Todd R.
- April 21 marked the official unveiling of the Cyber Incident Detection Data Analysis Center (CIDDAC) at the University of Pennsylvania; CIDDAC is a private-sector facility set up to monitor America's business infrastructure for real-time detection of cyberthreats. CIDDAC executive director Charles Fleming says the center is designed to help victimized companies reticent to share information with the government, and eliminate the bureaucracy that can slow down federal agencies' response to threats. Critical industries are being offered intrusion-detection services by CIDDAC under the aegis of a pilot project supported by the FBI and the Department of Homeland Security's Science and Technology Directorate. The tools to facilitate these services are Remote Cyber Attack Detection Sensor (RCADS) appliances that will be implemented outside corporate networks. The appliances can automatically and instantly route any intrusion data to the CIDDAC center, where is it assessed immediately and then relayed to law enforcement agencies. The authorities can employ the data to collate attack signatures that government investigators can use to more rapidly identify, pinpoint, and subdue cyberthreats. Assistant special FBI agent Shawn Henry says the data compiled through CIDDAC will allow the FBI and other law enforcement entities to thwart future attacks instead of merely responding to intrusions. Fleming says CIDDAC users will enjoy better protection against cyberthreats while still maintaining the privacy of their sensitive corporate data, adding that "privacy, trust, and anonymity are absolute essentials for the private sector to participate, and without the private sector, there is no program."
Click Here to View Full Article
"Researchers Propose Early Warning System for Worms"
eWeek (04/20/05); Naraine, Ryan
- Professors Shigang Chen and Sanjay Ranka of the University of Florida's Computer and Information Science and Engineering department have written a paper proposing an early warning system for TCP-based Internet worms that promises to eliminate known vulnerabilities in current early warning systems. "The goal is to have a system to issue warnings at the very early stages of an attack and to provide information for security analysts to control the damage," the paper states. Chen says the plan combines a series of methods for automatically identifying the concentrated scan activity that signifies an ongoing worm assault, noting that the system monitors a "used" address space and pinpoints scan sources using outbound TCP RESET packets that indicate failed inbound linkage efforts, thus making localization more accurate and fortifying the system against anti-monitor measures. Chen says any existing distribution mechanisms--email, pagers, etc.--could be employed to post worm propagation advisories. Also included in Chen and Ranka's proposal is an anti-spoof protocol that can detect hosts potentially compromised by worms by winnowing out bogus scan sources, as well as a "system sensitivity" performance metric for gauging how responsive an early warning system is in broadcasting an ongoing worm attack. Chen says the system is designed for local deployment or co-deployment among enterprise networks. A distributed anti-worm system that defends against high-bandwidth distributed denial-of-service attacks has also been designed by Chen's team.
Click Here to View Full Article
"Stopping Spam"
Scientific American (04/05) Vol. 292, No. 4, P. 42; Goodman, Joshua; Heckerman, David; Rounthwaite, Robert
- Software programmers and purveyors of junk email are locked in an ever-escalating arms race as the spread of spam threatens to compromise the integrity of Internet communications, write anti-spam experts and research collaborators Joshua Goodman, David Heckerman, and Robert Rounthwaite. However, smart software filters, email sender authentication schemes, legal restrictions, and other anti-spam efforts could hold back the tide of spam through widespread usage or enforcement. The authors propose a combination of spam filters with machine-learning capabilities and proof systems designed to make spamming computationally and/or financially unaffordable. Machine-learning systems can be thwarted by spammers who obscure their output's wording, but such filters can be trained to recognize and adapt to these tactics; an important component of the researchers' work is the employment of n-gram techniques that use subsequences of words to identify key words frequently associated with spam. Among the proof system options Goodman, Heckerman, and Rounthwaite investigate are human interactive proofs, which are puzzles or problems that humans can easily solve but computers cannot; computational puzzles that senders' email systems must unravel; and micropayment schemes in which spammers pay a small amount of money for each email, so that the cumulative cost becomes prohibitive. The authors also see reputation services that certify legitimate senders playing an important role in anti-spam efforts, and give high marks to the Sender ID Framework as an sender authentication scheme designed to combat email "spoofing." Goodman, Heckerman, and Rounthwaite think federal legislation can complement technological defenses against spam.
Click Here to View Full Article
From Microsoft's TechFlash, April 12, 2005
- So-called phishing scams seem to be on the decrease since their peak last summer (http://go.microsoft.com/?linkid=2679334), but there are still good reasons to be wary. A fraudulent e-mail message that claimed to be a "Microsoft Inc." [sic] newsletter was circulated recently. In this particular instance, the subject line was "Download the new beta software from Microsoft today." The included link to an executable file was, of course, not from a legitimate Microsoft source. Ironically, the bogus file also claimed to be "our new anti-spyware software." Here's a quick review of how to avoid these look-alike scams (http://go.microsoft.com/?linkid=2679335).
(A less technical description (http://go.microsoft.com/?linkid=2679336 is also available.)
From ACM's Queue, April 18, 2005
- Organizations of all sizes are spending considerable efforts on getting patch management right--their businesses depend on it.
Read the article.
From ACM's TechNews, April 18, 2005
"Stanford Joins Multi-Institution Center on Research in Cybersecurity and Computer Trustworthiness"
Stanford Report (04/14/05); Yang, Sarah; Levy, Dawn
- Leading security experts from eight universities will join forces under the Team for Research in Ubiquitous Secure Technology (TRUST), funded for five years with about $19 million from the National Science Foundation (NSF). The University of California-Berkeley will lead the effort, joined by other institutions such as Stanford University, Carnegie Mellon University, and a number of industry and research groups. TRUST researchers note the growing importance of cybersecurity in the modern age, since so much critical infrastructure is dependent on computer systems. Researchers at Stanford's Computer Security Lab will bring expertise in a number fields, including applied cryptography, access control, data privacy, and network security; VMWare founder Mendel Rosenblum and automated methods expert David Dill are among the Stanford faculty joining the effort. The Stanford Computer Security Lab also leads the Privacy, Obligations, and Rights in Technologies of Information Assessment (PORTIA) program for the NSF, and lab co-directors John Mitchell and Dan Boneh are working on a Web phishing and identity theft project with the U.S. Secret Service. TRUST will focus on creating new technologies that enable organizations to build trustworthy control systems for critical infrastructure; besides protecting these systems from attack, TRUST technologies will also imbue them with resiliency so that they can keep operating even under attack. System design needs usability enhancements in order to strengthen the human element of computer security, which is often the weakest link, notes TRUST center director and UC-Berkeley professor S. Shankar Sastry.
Click Here to View Full Article
From ACM's TechNews, April 15, 2005
"Putting Teeth Into U.S. Cybercrime Policy"
CNet (04/14/05); Hines, Matt
- Cyber Security Industry Alliance (CSIA) executive director Paul Kurtz, a former member of the President's Critical Infrastructure Protection Board, explains in an interview that the CSIA's purpose is to give the federal government all the relevant information it needs when considering new cybersecurity legislation. He says a key goal of his organization "is to look across the scope from the simple awareness of cybersecurity as a safety issue to building up education in cybersecurity, to looking at the policy implications of what the executive and legislative branches are considering, to looking at criminal behavior and increasing penalties." Kurtz says the CSIA is pushing for Senate ratification of Europe's Convention on Cybercrime, which would help set up an international architecture for investigating and prosecuting cybercriminals. He says cyberfraud practices such as phishing could have a bearing on homeland security, when one weighs the possibility of a convergence between for-profit hacking, organized crime, and terrorism. The point where these various elements intersect must be established, and such considerations could drum up federal support for more stringent cybercrime policies. Kurtz says the CSIA is partnered with the Center for Democracy and Policy's working group to study spyware and adware in an effort to find a balance between consumer protection and the rights of companies that distribute spyware. "I think there is a need to look at this stuff in a comprehensive context," he remarks. Kurtz also notes that prior to the CSIA's formation, there was no organization fully devoted to cybersecurity policy issues.
Click Here to View Full Article
"Surveillance Works Both Ways"
Wired News (04/14/05); Zetter, Kim
- University of Toronto professor Steve Mann put his concept of "equiveillance through sousveillance" in action when he led about 24 attendees of ACM's Computers, Freedom, and Privacy (CFP) conference in Seattle to a local shopping mall to film or take pictures of surveillance cameras and gauge the reactions of shoppers, store managers, and security personnel. The principle behind equiveillance through sousveillance is the establishment of surveillance parity between the monitors and the monitored. Mann and his party filmed smoked-glass ceiling domes in stores that may or may not house surveillance cameras, and wirelessly sent their pictures to displays in the conference lobby. Companies have been known to install camera domes without cameras in an effort to save money while maintaining the illusion of surveillance, a concept that was in keeping with the CFP event's theme of the Panopticon. The Panopticon is philosopher Jeremy Bentham's model prison, which keeps inmates in line simply by maintaining the possibility that they are being monitored. The conference attendees at the mall wore conference bags with dark plastic domes, some of which were equipped with wireless Webcams. Mann says watching the watchers often involves an element of duplicity, and he has designed technologies that promote surveillance equality. One such product is a wallet equipped with a card reader that can only be opened if someone swipes their ID through the reader.
Click Here to View Full Article
"Prying Eyes Are Everywhere"
USA Today (04/14/05) P. 1D; Kornblum, Janet
- The commercial availability of high-tech spying tools such as hidden cameras, global positioning system devices, and software that monitors computer activity is allowing average citizens to conduct clandestine surveillance on their spouses, children, friends, and neighbors. And the wide expansion of free, easy-to-find personal information online makes background checking a simple matter as well. Howard Rheingold, author of "Smart Mobs: The Next Social Revolution," says these trends have put Orwellian technology into the hands of "your nosy neighbor, your ex-spouse, and people who want to spam you." Privacy Activism's Deborah Pierce, a speaker at this week's 15th annual Computers, Freedom & Privacy Conference, believes citizen snooping is widespread, as evidenced by increasing numbers of legal cases. Paul Saffo of the Institute of the Future warns that spying citizens run the risk of discovering knowledge they would come to regret knowing, and being found out by the people they are monitoring. One of the most common forms of citizen sleuthing is "soft surveillance," in which a curious person enters someone's name on a search engine. Many people use surveillance technologies such as spy software and hidden cameras to keep track of their children's whereabouts or activities, but UCLA psychology professor Gerald Goodman says excessive monitoring can create a feedback loop of distrust between parents and kids. There may be some value in monitoring for kids with serious behavioral problems, but experts recommend the judicious selection and use of tracking technologies.
Click Here to View Full Article
From ACM's TechNews, April 13, 2005
"UC Berkeley to Lead $19 Million NSF Center on Cybersecurity Research"
UC Berkeley News (04/11/05); Yang, Sarah
- The National Science Foundation has selected the University of California, Berkeley, to head its eight-university Team for Research in Ubiquitous Secure Technology (TRUST) center, and the facility is expected to receive a five-year grant of about $19 million, with the possibility of a $20 million extension for another five years afterwards. This comes at a time when the vulnerability of U.S. critical infrastructure makes increased support for fundamental cybersecurity research a matter of considerable urgency, according to a March report from the President's Information Technology Advisory Committee. UC Berkeley's academic partners include Carnegie Mellon University, Vanderbilt University, Smith College, San Jose State University, Stanford University, Mills College, and Cornell University, while industry and other participants include Oak Ridge National Laboratory, Intel, IBM, Hewlett-Packard, Symantec, and the ESCHER research consortium. "The cybersecurity community has long feared that it would take an electronic Pearl Harbor for people to realize the scale of disruptions possible from a concerted attack by terrorists," explains TRUST center director and UC Berkeley professor S. Shankar Sastry, who notes that system design has not adequately aligned with human users and systems' usability thus far. TRUST researchers will commit themselves to the development of novel technologies designed to make organizations more capable of designing, constructing, and operating trustworthy critical infrastructure information systems. TRUST will sponsor and manage education and outreach programs to help train the next generation of trustworthy systems engineers, with a special emphasis on minority and underrepresented populations. The center will be a interdisciplinary effort that brings together experts in public policy, economics, social science, and human-computer interface technology.
Click Here to View Full Article
"Diffie: Infrastructure a Disaster in the Making"
SearchSecurity.com (04/12/05); Brenner, Bill
- Whitfield Diffie, Sun Microsystems' chief security officer and co-creator of the Diffie-Hellman key exchange, says in an interview that his biggest concern is the proliferation of Windows systems into critical infrastructure, which could result in major failures in the event of an attack. He characterizes careful software coding as a more pressing need than tech diversity, explaining that "you probably shouldn't use Windows [for critical infrastructure] because of too little care to coding too deep in its guts." Diffie thinks censorship applications for controlling Web sites employees can visit are overhyped and distracting people from the much bigger problem of critical infrastructure vulnerabilities. He predicts that the next decade will see elliptical curve systems supplant modular arithmetic-based key systems and have a significant impact as smaller, integrated mobile devices become widespread. In addition to being more compact, elliptical curve is faster and more power-efficient, and scales down the size of register keys. Diffie says hand-held browsers and similar technologies will fuel people's hunger for more efficient, lower-power systems. He also foresees standard security technologies such as the Advanced Encryption Standard overthrowing competing products such as DES, 3DES, and RC4, and being incorporated into hardware and software worldwide. Diffie believes widespread Public Key Infrastructure (PKI) use is an inevitability, but acknowledges the existence of a standardization problem he primarily attributes to capital development difficulties.
Click Here to View Full Article
From ACM's TechNews, April 8, 2005
"Lessons in Cybersafety"
ITworldcanada.com (04/05/05); Parkins, Robert
- The current Internet structure makes security breaches inevitable since it assumes reasonable behavior, warned Harvard Law School Internet and society executive director Jonathan Zittrain. Because attackers use the same information avenue machines receive legitimate input from, there is always the chance that incoming data could be used to control computers. This situation is eroding privacy, Zittrain told attendees of the sixth annual privacy and security conference hosted by British Columbia's Ministry of Management Services. One way to solve the problem would be the creation of separate virtual networks that run atop the current infrastructure, but are controlled so as to ensure the identities of participants; these secure networks would probably be administered by software companies, but their development prodded by government agencies who use their purchasing clout to demand greater security. Government and industry are colluding to conduct surveillance on citizens, warned ACLU Technology and Liberty Project director Barry Steinhardt. Private data brokers and "policy laundering" practices by government effectively negate domestic review of controversial government activity; policy laundering refers to government use of international organizations to develop policies by proxy outside of normal domestic purview, such as how new passport standards are being developed by the International Civil Aviation Organization. Secured Services chief technical officer Michael Smith said many IT security problems could be traced to application-centric architectures that create redundant accounts and complicated authentication processes. Identity lifecycle management systems can help streamline IT security by centralizing the creation, maintenance, and audit of identities.
Click Here to View Full Article
"Bigger Phishes Ready to Spawn"
CNet (04/06/05); Hines, Matt
- Security researchers say the growth of phishing attacks has slowed dramatically, but they warn that online criminals are crafting more sophisticated attacks that employ pharming, instant messaging platforms, cross-site scripting, and DNS poisoning. Phishing attacks are also targeting smaller groups of people who hold valuable information, enabling the attacks to use more effective social engineering techniques. Salesforce.com customers, for example, were targeted with phishing messages offering free trials of new application features. Anti-Phishing Working Group Chairman Dave Jevans suspects the thieves used account names and passwords to steal corporate information that could be resold to marketers or used for industrial espionage. Phishers can use more effective social engineering with a smaller group of targets instead of general spam messages. An attack via the Yahoo! Messenger platform in March leveraged contacts in people's address books, and shows that phishers could also be targeting teenagers who might be more prone to divulge personal information. Another innovative social engineering attack mimicked antiphishing messages from eBay and other firms, warning users not to release personal information via email, said Mail-Filters' Dan Ashby. Among legitimate links included in those messages was a link to a fraudulent site. Phishers are also becoming more professional, changing their techniques in response to publicized security information. When warnings about cross-site scripting were published, some attackers began loading content into Web pages' internal frame rendering so that it would reach people who had turned off JavaScript applications.
Click Here to View Full Article
From ACM's Queue, April 4, 2005
- Understanding Software Patching:
Developing and deploying patches is an increasingly important part of the software development process.
Read the article.
From ACM's Queue, March 28, 2005
- An Update on Software Updates:
Editor Ed Grossman passed me the pen this month to tell you about our topical focus on software updates.
Read the article.
Kill the Bots!, an article at Technology Review.com, May, 2005.
From EduPage, April 11, 2005
Program Teaches Hacking To Raise Awareness
BBC, 8 April 2005
- The University of La Salle in Barcelona has begun a program to raise awareness of computer hacking and to teach teens how to protect themselves. Sponsored by the Institute for Security and Open Methodologies (ISECOM), the Hacker High School invites students from local high schools to the La Salle campus to expose them to the ins and outs of hacking. Pete Herzog, managing director of ISECOM, said the program shows participants how computer hacking is accomplished so that they can understand the concepts behind what computers do, how to clean them, how applications can compromise computers, and the implications for personal privacy. According to one official from the program, the goal is to provide experiences for students to learn how hacking happens so that they will become "ethical hackers, good hackers, knowing what they do and what the limits are." School officials believe having skills as an ethical hacker could be beneficial when students go looking for jobs later. http://news.bbc.co.uk/2/hi/programmes/click_online/4423351.stm
From EduPage, April 4, 2005
Higher Ed Fares Below Average For Computer Security
New York Times, 4 April 2005
- A recent spate of computer-security incidents at colleges and universities has drawn attention to the apparent tension between concerns over academic freedom and the need to protect sensitive information. Stanton S. Gatewood, chief information security officer at the University of Georgia, which suffered a security breach last year, noted that higher education is "built on the free flow of information and ideas," saying that college and university networks are designed based on that ideal. The result, however, is a tempting target for information thieves. According to the Office of Privacy Protection in California, colleges and universities in that state have accounted for more data incidents since 2003--close to 30 percent--than any other group. Although some states now prohibit using Social Security numbers as identifiers in many databases, their continued prevalence makes changing structures difficult. The University of Michigan, for example, spent seven years weaning itself off Social Security numbers. Because testing agencies and other organizations continue to use them, however, the university finds it still has to track them.
(registration req'd) http://www.nytimes.com/2005/04/04/technology/04data.html
From New York Times, April 4, 2005
Some Colleges Falling Short in Security of Computers
By Tom Zeller Jr.
- If the computer age is continually testing how well institutions protect personal information, the nation's colleges and universities may be earning a failing grade.
Read the article.
From ACM's TechNews, April 4, 2005
"Carnegie Mellon Unit Looks to Advance IT Security, Reliability"
Computerworld (03/28/05) P. 23; Thibodeau, Patrick
- Pradeep Khosla, dean of Carnegie Mellon University's Carnegie Institute of Technology and co-director of CyLab, explains in an interview that CyLab is focusing on next-generation IT systems that incorporate measurability, sustainability, security, and trustworthiness. He says that CyLab absorbed the Sustainable Computing Consortium, whose goal was to enhance the quality and reliability of software by reducing the number of bugs. Khosla says CyLab splits up its research into "thrusts:" Its resilient and self-healing systems thrust, for example, is not about security per se, although it does address some security issues. Other thrusts Khosla mentions cover user authentication and access control, data and information privacy, business economics, and threat detection modeling. The CyLab co-director notes that CyLab has the same goals as IBM's autonomic computing initiative, although their approaches differ--CyLab, for instance, usually concentrates on higher-risk problems. Khosla reports that CyLab has produced a practical secure storage demo system which is being expanded to include self-security, self-analysis, and self-repair. Such a system would enable users to trace data packets back to the source, and Khosla predicts that a lab-developed coding scheme for facilitating packet tracing will become commonplace in the next three to five years. He thinks CyLab's backers could put malicious code detection on the CyLab 2006 agenda at next month's meeting.
Click Here to View Full Article
From EduPage, April 1, 2005
Spammer Files For Bankruptcy Protection
BBC, 1 April 2005
- Scott Richter, proprietor of one of the world's best known spamming operations, said the company has been forced to file for bankruptcy protection. OptInRealBig.com has been the target of several lawsuits for violating antispam laws, including one lawsuit filed by Microsoft, which is seeking $46 million in damages. Spamhaus, an organization that monitors junk e-mail globally, ranks OptInRealBig.com third on its list of spam operations around the globe. The company is alleged to have sent billions of e-mail messages that appeared to come from hijacked return addresses, including those of the Kuwait Ministries of Communication and Finance, the Seoul Municipal Boramae Hospital, and the Virginia Community College System. In its announcement, OptInRealBig.com said that the ongoing lawsuits and possible damages have made it impossible for the company to "still run a viable business." An attorney for OptInRealBig.com said the company expects ultimately to prevail.
http://news.bbc.co.uk/2/hi/technology/4400335.stm
Lawsuits Target Phishers
Reuters, 31 March 2005
- Microsoft has filed 117 "John Doe" lawsuits against operators of Web sites involved in phishing scams. Phishers send e-mail messages that purport to be from a bank or other financial services institution. The e-mails tell recipients that they must visit a Web site and disclose personal information, typically under the pretense of updating account records or something similar. Disclosed information is then used for credit card fraud and other types of identity theft. Microsoft said it was filing the lawsuits in an effort to discover who is behind the largest phishing operations and put them out of business. Microsoft's Aaron Kornblum said, "We must work together to stop these con artists from misusing the Internet as a tool for fraud."
http://www.reuters.com/newsArticle.jhtml?storyID=8051350
From ACM's TechNews, March 30, 2005
"Secure Flight Faces Uphill Battle"
Wired News (03/29/05); Zetter, Kim
- The Transportation Security Administration (TSA) has only fulfilled one of 10 requirements set by Congress for the Secure Flight passenger screening system, set to launch in August. The Government Accountability Office (GAO) says the TSA has set up an oversight committee for the Secure Flight program, but has not yet formulated policies to guide that committee. In addition, the TSA has not yet tested the accuracy and efficacy of data nor chosen what commercial data, if any, it plans to use; also lacking are redress procedures for passengers to challenge the system's assessments or change incorrect information. Secure Flight improves on the previous CAPPS II system by placing passenger screening functions in the hands of the TSA instead of the airlines. The TSA will combine airline passenger data, government information including terrorist watch lists, and commercial data to identify possible terrorists. ACLU Technology and Liberty Project director Barry Steinhardt says airlines might have to begin collecting new information from passengers to pass on to the TSA and help verify matches against watch lists, and he doubts Secure Flight will be ready by the August deadline, when the TSA is expected to begin testing Secure Flight with two domestic carriers before rolling it out for all domestic air travel. But TSA's Yolanda Clark says the GAO report should be considered a progress report, not a final evaluation; Secure Flight is a 14-month project and was evaluated by the GAO at the eight-month point, she says. The TSA recently finished testing airline, government, and commercial data, and IT infrastructure and hardware are already in place.
Click Here to View Full Article
"Identity Theft Made Easier"
Wall Street Journal (03/29/05) P. B1; Delaney, Kevin J.
- Identity thieves made headlines with security breaches at ChoicePoint and LexisNexis, but common search engines provide a much easier route to obtaining illicit personal information. Google hacking, the practice of crafting specific search queries using special commands to find sensitive personal data, was demonstrated at an Agora security industry meeting in Seattle, where teams raced to accumulate the most identity information in an hour. The winning team found a directory with the Social Security numbers of more than 70 million deceased persons, while the second-place team uncovered hundreds of scanned passport documents and a Justice Department site listing employees and their work credit-card numbers. The contest rules limited teams to using only Google to turn up data, though real hackers would likely employ other means to burrow further into exposed systems. Google and other public search engines are not responsible for the privacy breaches since they only index publicly available Web data; instead Web site operators and negligent users are to blame for data left open to the public, says Seattle chief information security officer Kirk Bailey, who organized the Agora Google-hacking contest. Data exposed via Google is often left open by people who think the information is hidden. Organizations have a responsibility to perform audits of their own networks to ensure sensitive data is not left exposed, and to enable firewall software that blocks public access to sensitive areas of the network; Google also plays a cat-and-mouse game with hackers as it tries to disable the most effective Google hacks while keeping the service as accessible as possible, say Google-hacking experts. There are a number of books and Web sites that provide information on Google hacks, and non-technical people can make use of them.
"Cars Are Getting Computer-Jacked"
CNet (03/25/05); Spooner, John G.
- The presence of automotive electronics is expanding both in the dashboard and under the hood, reducing clutter and freeing up designers to experiment aesthetically. "Everything is blending into one unified theme," notes Ford Motors designer Anthony Pozzi, who designed the Meta One concept sports car displayed at the New York International Auto Show; the car boasts a fluent design that features recessed buttons rather than stalks for changing gears, and a trio of LCD screens for displaying speed, navigation data, and other traditional gauges that can be customized to the driver's preferences. Nearly all auto models are expected to offer some type of MP3 player link in the next several years, and demand for in-vehicle iPod connectors has spurred several manufacturers to plan such offerings, although embedded hard drives may eventually outdate such devices. Electronics are also permeating car safety systems, such as networked sensors for measuring the vehicle's wheel speed, steering wheel angle, and yaw, which can be used to support dynamic stability control and other fail-safes. Eventually, car computer systems will be imbued with predictive capabilities so that they can facilitate collision avoidance and other safety-enhancing operations. Such systems are currently offered in deluxe models only, but auto executives at the show predicted that they will be incorporated into cheaper vehicles, either as an option or as standard gear. Computer systems perhaps have the greatest penetration in hybrid cars that run on both gas and electricity. Hybrid vehicles from Toyota use such systems to control the switch between electric and gas, and make the transition imperceptible.
Click Here to View Full Article
From EduPage, March 30, 2005
Thief Grabs Laptop And 100,000 Identities
Inside Higher Ed, 29 March 2005
- Officials at the University of California at Berkeley said that a laptop stolen from the university's graduate division contained personal information for nearly 100,000 individuals. The computer included records for applicants to Berkeley's graduate programs from fall 2001 to spring 2004; students enrolled in the school's graduate programs from fall 1989 to fall 2003; and individuals who received doctorates from Berkeley between 1976 and 1999. Although no evidence exists that any of the stolen information has been used fraudulently, according to a statement from the university, the institution is required by a California law to disclose the breach to those affected. The statement said the university is making "every reasonable effort to notify by mail or e-mail all 98,369 individuals whose names and Social Security numbers were on the computer."
http://www.insidehighered.com/index.php/news/2005/03/29/theft
From ACM's TechNews, March 28, 2005
"Terror Plot to Cripple UK in Cyber Attack"
Scotsman (UK) (03/22/05); Kirkup, James
- Due to a growing dependence on electronic networks in Britain and throughout the world and increasing technological sophistication of terrorists, Britain's counter-terrorism coordinator David Omand issued an alert that both government and private sectors need to ramp up electronic anti-terrorism defenses. Omand says terrorists are working on launching a crippling cyberattack, warning that top al Qaeda operatives that have been arrested or are being tracked have shown significant technological sophistication. Former Metropolitan Police Authority Chairman Toby Harris warns of "significant vulnerability in the systems we all rely on," and Omand believes the defense against cyberterrorism will fail unless businesses in the private sector begin taking the threat seriously and upgrading their defenses. Attacks could come in the form of denial of service attacks, hacking into sensitive electronic systems, attacking electricity grids or systems controlling hydroelectric dam flood gates, or carrying out a coordinated physical and electronic attack on emergency systems. The global aspect of the Internet has Britain working with countries they often regard with hostility to prevent cyberattacks. Harris says, "Britain could be quickly reduced to large-scale disorder, including looting and rioting, in the event of a serious disruption of critical national infrastructure."
Click Here to View Full Article
"Security Counterattack"
Network World (03/21/05) Vol. 22, No. 11, P. S12; Gittlen, Sandra
- Experts warn that new data center technologies and Web services will increase security burdens because of the added complexity; instead of guarding a perimeter and managing internal application security, IT managers will have to be able to secure every node on their network and validate the security of Web services building blocks from outside sources. Complexity is not only an issue for IT managers, but for users as well: A Palo Alto Research Center (PARC) study showed laptop users spent an average of two hours configuring 802.1X security. PARC developed an enrollment station architecture for enterprises that would allow users to configure their system settings according to network policy in just two minutes using close-proximity communications such as infrared. Cornell University's Information Assurance Institute, meanwhile, is working on language-based security that builds security basics into programming in hopes of fostering more secure Web services in the future. Web services pose serious security risks because of their connectivity and the interdependence of various services' code, and Information Assurance Institute director Fred Schneider advocates safe systems languages for building Web services and other extensible applications. Internet2 researchers have created the Shibboleth Project for simplifying authentication in cross-organizational situations where users would otherwise have to register multiple times; by reducing the amount of personal information sent out by users, these systems would be less prone to identity theft and fraud. Grid computing organizations have accepted Shibboleth as an important security technology. ContentGuard, founded by former PARC researchers, offers technology to protect content after it has left the network; the group's Extensible Rights Markup Language (XrML) has been submitted to OASIS and offers a way to control content distribution and accessibility.
Click Here to View Full Article
From ACM's TechNews, March 25, 2005
"War of Words over Operating Systems' Safety"
New Scientist (03/23/05); Biever, Celeste
- Recent reports on Linux-based Web servers, the open-source Firefox Web browser, and Apple's Mac OSX operating system raise doubts about their security, which experts contend is still better than their Microsoft equivalents. Symantec's biannual Internet Security Threat report issued on March 21 indicates that 21 new programming errors were uncovered in Firefox between July and December 2004, compared to 13 in Internet Explorer. ScanIT also released on Monday a conflicting report that low patching rates made 98% of IE users exploitable in 2004, while just 15% of Linux users were vulnerable; ScanIT founder David Michaux also notes that Symantec found fewer severe errors in Firefox than in IE. The Symantec report lists 37 vulnerabilities in Mac OSX, and takes the Repeno worm discovered last October as a sign that the Mac operating system is increasingly being targeted for hacks usually associated with Microsoft and numerous Unix-based OSes. Independent security consultant Richard Forno counters that the Symantec report inflates the significance of the Mac OSX vulnerabilities, arguing that hackers "want to go after the low-hanging fruit and the Mac OSX is still not as bug-ridden as Windows." A March 22 report commissioned by Microsoft and released by Florida Institute of Technology computer scientist Richard Ford takes note of 174 vulnerabilities in an open-source Linux server, compared to 52 in a Microsoft counterpart. In addition, the interim between reporting a flaw and patching it was substantially shorter with the Microsoft server than the Linux server. Sophos security consultant Graham Cluley calls these findings immaterial since Linux users are far fewer in number and more likely to patch their systems than Windows users, which makes them less attractive to hackers.
Click Here to View Full Article
"Does IM Stand for Insecure Messaging?"
CNet (03/23/05); Hines, Matt
- The threat of instant messaging (IM) worms is growing, and a key factor in their spread is the obliviousness of users and IT administrators. "A person unaware of the IM threat is the biggest risk that exists for these viruses to have some success," warns McAfee research fellow Jimmy Kuo. Most IM worms are disguised as attachments to messages that appear to originate from trusted sources, so that the recipient opens them without ever realizing that he or she has downloaded malware that rapidly spreads to all the names on their IM buddy list. Aladdin Knowledge Systems technology VP Shimon Gruper reports that IM's scant built-in security has made it unnecessary for hackers to target the IM code, but some experts think such attacks are inevitable. Furthermore, IM's popularity as a communications medium between computers and smart phones could make mobile devices vulnerable to viruses sent from PCs. The workplace penetration of public IM applications is increasing corporate networks' susceptibility to IM-borne threats, although businesses are usually better fortified against malware than consumers. There is also evidence to suggest that recent IM worms are being employed as a way for hackers to communicate with one another. VeriSign principal scientist Phillip Hallam-Baker says that although there have been few IM attacks so far, that could change. He says "that as email systems are being secured, there's a displacement effect and people are moving their efforts over to IM." America Online's Andrew Weinstein feels that user awareness of the IM threat is the best defense, and recommends that users regard every IM they receive with caution, even if it appears to come from a familiar sender.
Click Here to View Full Article
"Cyberterrorism Isn't a Threat Yet, One Expert Says"
Fort Worth Star-Telegram (03/23/05); Batheja, Aman
- Cyberterrorism is a concept that has been overblown by the media and poses no threat, though someday it will evolve into a threat worth worrying about, according to longtime computer security expert Marcus Ranum, the inventor of the proxy firewall. Ranum made his comments at Texas Christian University on Tuesday during a lecture on computer hacking and terrorism. Cyberterrorism is an impractical means for terrorists to carry out their objective of striking fear into the hearts of their enemies, Ranum said. "Is it more cost effective to train yourself a cadre of cyber-ninjas or is it more effective to find idiots who will believe in your cause and wrap themselves in plastic explosives?" asked Ranum. Hackers have the capability of disrupting large parts of the Internet, but the Internet would be up and running again within 10 minutes, Ranum says. Despite his contention that cyberterrorism is not worth worrying about, Ranum does allow that the U.S. is vulnerable to cyberterrorism, pointing out that the vulnerability that produced the East Coast blackout of 2003 went undetected. Also, there is little security protecting the infrastructure that controls the nation's sewage systems, he says.
Click Here to View Full Article
(Access to this site is free; however, first-time visitors must register.)
From New York Times, March 19, 2005
Growth of Wireless Internet Opens New Path for Thieves
By Seth Schiesel
- The spread of the wireless data technology known as Wi-Fi has reshaped the way millions of Americans go online, letting them tap into high-speed Internet connections effortlessly at home and in many public places. ... But every convenience has its cost. Federal and state law enforcement officials say sophisticated criminals...
From ACM's TechNews, March 23, 2005
"IBM Embraces Bold Method to Trap Spam"
Wall Street Journal (03/22/05) P. B1; Forelle, Charles
- Efforts to block spam are getting more aggressive, as the fight moves from passive spam filters to counterattacking measures such as "teergrubing," where spammers are trapped by tying up their servers. Although open-source counterattacking software has been available for a while, new products from IBM and Symantec have made the practice less problematic for corporate users. A new service from IBM that sends junk email directly back to the machine identified as the spammer is scheduled to debut on March 22. The system, which is based on IBM's FairUCE technology, scans incoming data packets bearing email and checks their point of origin against a continually updated database of established spamming machines, routing the data back to the sender if the source is in the database. The zealousness of the response is proportional to the amount of spam received. The system can also delay rather than unequivocally reject data packets originating from a computer that is probably but not definitely spamming. Symantec, meanwhile, released a product in January that uses "traffic shaping" to slow links from suspected spamming machines: Data streams that appear to be coming from a spammer are throttled down so that data moves slowly; Symantec's Carlin Wiegner says the product is designed to "slow [spammers] down so much that it is more interesting for them to spam some small business or some other country." Both IBM and Symantec's products are geared toward large companies with sizable enough email traffic to realize significant profits from less spam. The products do not break anti-hacking laws that criminalize unauthorized entry to a remote system, even to protect another system; but they can boost network traffic, which is generally unwanted. "Yes, we are adding more traffic to the network, but it is in an effort to cut down the longer-term traffic," argues IBM corporate security strategy director Stuart McIrvine.
"Decrypting the Future of Security"
Globe and Mail (CAN) (03/18/05); Kirwan, Mary
- Lawyer, writer, and IT security expert Mary Kirwan notes that there was "universal agreement" among speakers and panelists at the recent RSA Security Conference that innovation is a fundamental component of IT, that security is important, and that something must be done to improve security; from there the debate over what to do devolved into a blame game where most fingers were pointed at software vendors. Vendors, most clearly represented by a panel of lawyers, warned that imposing liability and subjecting them to government regulation would choke innovation and lead to higher prices, arguing that the burden of security belongs to users. One panelist disagreed, noting that customers are demanding better software licensing terms, as well as input into the code development lifecycle, greater transparency, and code escrowing in the event vendors are unavailable when customers need them. In-house Microsoft lawyers dominating the panel implied that the legal concept of "intervening criminal act" would spare vendors from being found guilty of negligence, and raised the possibility that consumers would be charged with contributory negligence. Audiences, however, generally favored legislation mandating software quality assurance and liability for code development as long as it improved IT security and eliminated vaporware providers. Security guru Bruce Schneier, former U.S. cybersecurity czar Richard Clarke, one-time U.S. elected House representative Rick White, and ITAA President Harris Miller formed a panel debating software regulation. White and Miller, representing the industry, argued that government intervention is "highly undesirable," with Miller damning widely adopted European Union software security liability laws as globally out of touch. Clarke, meanwhile, reflected the attitude of many senior government officials who have lost patience with the IT industry.
Click Here to View Full Article
From ACM's TechNews, March 21, 2005
"Study Criticizes Government on Cybersecurity Research"
New York Times (03/19/05) P. B2; Markoff, John
- The federal government's cybersecurity research investments are woefully insufficient, concludes a report prepared by a subcommittee of the President's Information Technology Advisory Committee (PITAC). The report says the U.S. should give $148 million annually to the National Science Foundation to be channeled into Internet security research, as well as greater research investments by the Homeland Security Department and the Defense Advanced Research Projects Agency (DARPA). "The federal government is largely failing in its responsibility to protect the nation from cyberthreats," declared panel co-chair Edward Lazowska, who also chairs the University of Washington's computer science and engineering department. SRI International computer scientist Peter Neumann criticized both the White House and Congress for giving civilian cybersecurity research a low priority. Panelists were also concerned about DARPA and the National Security Agency's shift in focus from long-term academic research to short-term classified research, and noted a basic shortage of leadership and coordination in the federal cybersecurity research effort. They proposed the creation of a federal interagency group to address this shortage. The subcommittee argued that the cybersecurity research community lacks the numbers to fulfill a federal objective to at least double the population of civilian cybersecurity researchers by 2010. The report criticizes the commercial cybersecurity strategy of patching, and lists 10 cybersecurity research areas that should take precedence, including cyberforensics, authentication technologies, monitoring and detection tools, and secure protocols.
Click Here to View Full Article
"Cleaning Spam From Swapping Networks"
CNet (03/18/05); Borland, John
- Cornell University researchers led by assistant computer science professor Emin Gun Sirer have developed "Credence," a new open-source software program designed to clear peer-to-peer (P2P) networks of spam by allowing different computers to "gossip" with each other to determine which P2P files are trustworthy. Credence starts out in the manner of many contemporary P2P networks, in which users rate the legitimacy of files; but the gossiping function checks to see how users on other systems have rated the same files, looking for similar evaluations. During a file search, Credence gives priority to results that receive high ratings by this user community with matching ratings. Spammers who rate their own files as legitimate are thus segregated from these communities of well-reputed computers. "I believe in people; I think most people are honest," notes Sirer. "I think it will be people on the periphery who will be kept out." However, antipiracy companies plant decoys of popular digital content in file-swapping networks in an effort to curb copyright infringement, and the Credence software could filter out these decoys as well. Still, Overpeer general manager Marc Morgenstern is confident that antipiracy companies such as his will inevitably find a way to bypass such filters as part of the arms race between digital pirates and copyright holders.
Click Here to View Full Article
From ACM's TechNews, March 16, 2005
"Schneier: Secure Tokens Won't Stop Phishing"
IDG News Service (03/15/05); Roberts, Paul
- Strict government regulation is more important for e-commerce security than technology solutions, says Counterpane Internet Security founder Bruce Schneier in an interview. Schneier's article in the April issue of Communications of the ACM argued that two-factor authentication and other end-user technology solutions will not be enough to thwart determined hackers. He says online fraud is becoming more active and immediate; multi-factor authentication is useless when Trojan programs monitor plain text and keystrokes or when man-in-the-middle attacks dupe users into entering information on fake Web sites. Two-factor authentication is useful in some applications, such as securing internal access to company servers, but not for e-commerce. Schneier says a more effective solution to e-commerce fraud is to make banks liable for financial fraud in the same way credit card companies face most of the cost of credit card fraud. After regulations in the credit card industry, those companies began tightening down on fraud through detection technology in their own databases instead of focusing on how customers use their cards; Schneier believes the banking industry will similarly take steps to identify and stop online fraud if their bottom line is threatened. In the battle against online fraud, absolute security is impossible because security is a continuum--the aim is to manage risk enough so that commerce can continue. Security tokens issued by U.S. Bancorp, e-Trade, and America Online will provide improved security against some e-commerce threats, but eventually the benefits from multi-factor security will diminish as hackers shift tactics, says Schneier.
Click Here to View Full Article
"Crack in Computer Security Code Raises Red Flag"
Wall Street Journal (03/15/05) P. A1; Forelle, Charles
- A flaw in a "hash function" technique for encrypting online data has been uncovered by a team of Chinese researchers at Shandong University, and this has raised alarms in the computer security industry because it casts doubt on the so-called impenetrability of hash function-based cryptography. The researchers found the vulnerability using the SHA-1 hash algorithm, a federal standard circulated by the U.S. National Institute of Standards and Technology (NIST) that is also considered to be cutting edge as well as the most popularly employed hash function. The Shandong team learned that "collisions," in which two different chunks of data yield the same hash, can be uncovered in SHA-1 far faster than previously thought. Cryptographers say the exploitation of the flaw, though seemingly impractical, could affect applications involving authentication, theoretically enabling a hacker to erect a bogus Web site with convincing security credentials and steal data sent to it by unsuspecting users. Counterpane Internet Security CTO Bruce Schneier confirms the existence of the SHA-1 flaw, which the Chinese researchers have not publicized. NIST is advising federal agencies to keep SHA-1 out of any new applications, and urging them to devise plans to eliminate SHA-1 from existing applications. Recently demonstrated vulnerabilities in other hash functions such as MD4 and MD5--which SHA-1 is based on--have also made cryptographers nervous. Concerns about information security are at an all-time high even without revelations about hash functions' vulnerability, most recently thanks to break-ins at data aggregators LexisNexis and ChoicePoint.
From EduPage, March 28, 2005
GEORGIA UNCOVERS MISUSE OF ONLINE PORTFOLIOS
After discovering files containing personal information on its e-portfolio system, officials at the University of Georgia are reviewing the institution's policies for online portfolios. A student in the university's New Media Institute--part of the school's journalism program--had used the e-portfolio system to store a list of names and credit card numbers on a university-owned server. Officials at the school are not sure how the student obtained the list, which came from a North Carolina company that sells pharmaceutical products online, or what the student intended to do with it. The server where the file resided was immediately taken down, and officials are now combing through the rest of the files before re-posting them, looking for any other inappropriate information. According to Scott Shamp, director of the New Media Institute, the incident has raised questions about how long and under what terms the university will offer online portfolio services to its students. Shamp, who expressed support for online portfolios, pointed to the possibility of third-party options to address concerns over liability for the institution. Chronicle of Higher Education, 1 April 2005 (sub. req'd) http://chronicle.com/prm/weekly/v51/i30/30a04102.htm
Tech Companies Coordinate Efforts To Fight Hackers
CNET, 28 March 2005
- A group of leading technology companies has formed the Fingerprint Sharing Alliance to coordinate efforts to fight hackers. Members of the alliance include British Telecommunications, Cisco Systems, EarthLink, MCI, NTT Communications, and the University of Pennsylvania. When any member of the alliance experiences an attack by a hacker or notices evidence that would suggest an attack, all other members are notified, increasing the odds of limiting damage from the attack. Jim Slaby, senior analyst with the Yankee Group, expressed support for the new alliance and the kind of intercompany communication on which it is based. "Service providers that are cooperating by sharing attack fingerprints are helping mitigate these threats more quickly and closer to the source," he said, "thus making the Internet a more secure place." http://news.com.com/2100-7355_3-5642840.html
From EduPage, March 21, 2005
Dartmouth Decides To Penalize, But Not Eliminate, Hackers
Pittsburgh Post-Gazette, 18 March 2005
- Applicants to the Tuck School of Business at Dartmouth College who used a hacker's tips to try to access admissions records were not automatically disqualified, though their actions were considered by school officials in their admissions decisions. The decision to consider applications of those involved in the hacking was made after consultations with faculty and staff and with the appliants themselves. Unlike officials at Harvard University, Duke University, MIT, and Carnegie Mellon University, administrators at Dartmouth decided that the hacking, while serious, "did not reach the level that would necessarily bar a person from being a valued member of the Tuck community," according to Paul Danos, dean of the school. Attempting to access restricted records was viewed by the school as "a very important negative factor" in considering the applications, but ultimately the school's decision did not rest on that single factor. Of the 17 applicants involved, some were admitted, and those who enroll will be monitored and counseled. The incident will also become a part of their files. http://www.post-gazette.com/pg/05077/473361.stm
Applying Old Scams To New Technologies
Wired News, 20 March 2005
The emergence of voice over Internet protocol (VoIP) phone service has opened a new door for hackers and others to fool users. Using the Internet to transmit phone calls allows callers to spoof Caller ID systems, something that isn't possible with traditional phone service. Although telemarketers are required by the Federal Communications Commission to properly identify themselves, Caller ID spoofing is otherwise not prohibited. As a result, someone can, for example, call Western Union, which requires customers to call from their home phones to initiate money transfers, using a faked source number, and make a fraudulent transfer. In other instances, debt collectors and private investigators use Caller ID spoofing to trick people into answering their phones and possibly divulging information they otherwise would not. Scams similar to e-mail phishing rackets also take advantage of Caller ID spoofing, deceiving people into believing that a caller is at a bank or a financial institution and helping persuade them to reveal personal information to the caller. http://www.wired.com/news/privacy/0,1848,66954,00.html
From EduPage, March 18, 2005
Hackers Target Boston College Alumni Database
ZDNet, 17 March 2005
- A computer at Boston College with access to an alumni database has been found to be infected with a virus that may have exposed personal information on more than 100,000 individuals. According to officials at the college, the computer was operated not by the college but by a third-party IT service, which officials declined to name. Although no evidence has so far surfaced that any of the information in the database was in fact accessed by hackers, officials decided to notify anyone who might have been affected. Jack Dunn, spokesperson for Boston College, said, "We thought it was necessary to send out the precautionary advisory to alert the alumni and to offer them steps that they could take to ensure their privacy." Dunn also noted that Boston College will hereafter delete Social Security numbers from its records, despite their usefulness in maintaining accurate records. Social Security numbers have lately been highlighted as one of the pieces of personal information that pose the greatest risk for identity theft. Members of Congress have recently proposed strict restrictions for how and when Social Security numbers can be gathered and sold. http://news.zdnet.com/2100-1009_22-5623084.html
From EduPage, March 23, 2005
Study Blames Users For Encouraging Spam
BBC, 23 March 2005
- A new report lays much of the blame for the ongoing problem of spam at the feet of computer users who open spam messages and even buy products or services advertised in spam. According to the survey, conducted by Mirapoint and the Radicati Group, nearly one-third of users have opened such messages, and one in ten has made a purchase. The report calls such actions "bad e-mail behavior" and said it encourages not just marketers but con artists to continue sending vast amounts of spam. Many adult-themed e-mail messages lure computer users into visiting Web sites that then install spyware or other malicious code. Graham Cluley, senior technology consultant for security firm Sophos, agreed that users bear much of the responsibility for spam's continued presence. "If no one responded to junk e-mail and didn't buy products sold in this way," he said, "then spam would be as extinct as the dinosaurs."
http://news.bbc.co.uk/2/hi/technology/4375601.stm
From BBC News, March 22, 2005
Rise of zombie PCs 'threatens UK'
BBC News, March 22
- The UK leads the world in home computers that have been hijacked by malicious hackers, warns a report. Read the article.
From New York Times, March 13, 2005
Can a Virus Hitch a Ride in Your Car?
New York Times, By Tom Zeller Jr. And Norman Mayersohn
- What if viruses, worms or other forms of malware penetrated the computers that control ever more crucial functions in the car? Read the article.
From New York Times, March 12, 2005
What to Expect of 'Spamalot'? A Lot of Spam
New York Times, By David F. Gallagher
- A security glitch exposed the names and postal and e-mail addresses of more than 31,000 people who had signed up for newsletters for "Spamalot" and "Movin' Out." Read the article.
From Edupage, March 11, 2005
Schools Criticized Over Rejection Of Nosy Applicants
Chronicle of Higher Education, 11 March 2005
- A number of business-school applicants who were rejected due to their looking at university admissions records online without authorization have spoken out against the universities' decision to exclude them. Carnegie Mellon University, Harvard University, and MIT have rejected the applications of 153 individuals who used a hacker's instructions to try to find out if they had been accepted. Although some applicants involved acknowledged that accessing the records was wrong, they contended that the actions do not constitute hacking and that the institutions have overreacted. One rejected applicant wrote a letter to Harvard, admitting a "lapse in judgment" but noting that he "wasn't trying to harm anyone and wasn't trying to get an advantage over anyone." Len Metheny, CEO and president of ApplyYourself, the software that all the affected schools used for applications, said the procedure to access the records was sufficiently complicated that anyone doing so would have to have known it was unauthorized. (sub. req'd) http://chronicle.com/prm/daily/2005/03/2005031104n.htm
From ACM's Tech News, March 2, 2005
"'Perfect Storm' for New Privacy Laws?"
CNet (03/01/05); Lemos, Robert
- A spate of high-profile data security breaches has caught the attention of a number of U.S. senators who are advocating more unified privacy laws. Just 10 days following the announcement of ChoicePoint's loss of more than 145,000 individuals' information to fraud, Bank of America said it lost backup tapes containing customer records of 1.2 million federal employees. Sen. Ron Wyden (D-Ore.) five years ago warned colleagues against an "Exxon Valdez of privacy," and Electronic Privacy Information Center executive director Marc Rotenberg says recent events will likely be the trigger for serious congressional action. Sen. Bill Nelson (D-Fla.) is preparing to revise the Fair Credit Reporting Act to treat data aggregators such as ChoicePoint and Acxiom like credit-reporting agencies. Another possibility is a federal version of California's Security Breach Information Act, which Sen. Dianne Feinstein (D-Calif.) proposed in June 2003 without success. That measure would require government agencies and businesses to notify individuals whose personal data may have been compromised. Cato Institute analysts suggest the use of tort law to force companies to strengthen their data security, and one California woman is already suing ChoicePoint for not adequately protecting her information. Besides business interests, the Bush administration may not want too strong regulation on data aggregators because agencies such as the Department of Homeland Security and Department of Justice rely on those firms for identity-verification services.
Click Here to View Full Article
From Edupage, March 4, 2005
Harvard Rejects Applicants Who Peeked
Wall Street Journal, 8 March 2005
- Officials from the Harvard Business School said they will reject 119 applicants who used a hacker's instructions to try to find out whether they had been accepted by the school. Calling the action "unethical" and saying that it cannot be rationalized, a statement from Harvard said, "Any applicant found to have done so will not be admitted to this school." Administrators at Carnegie Mellon University have also said they will reject candidates who attempted to gain unauthorized access to admissions records. Applicants to several other institutions affected--including Stanford University, Duke University, and Dartmouth College--will have to wait to find out how those schools decide to treat the situation. Using the instructions posted online by a hacker, applicants were able for a short period to use a name and password to access the admissions records. Institutions have been able to identify applicants who accessed admission records based on the name and password. For many who looked, there was no decision in the system, and school officials stressed that even if an applicant located an answer, those decisions were not necessarily final. Some have criticized Harvard officials for responding too harshly to the incident. (sub. req'd) http://online.wsj.com/article/0,,SB111029921614173536,00.html
Hackers Compromise Publisher's Database
CNET, 9 March 2005
- Hackers compromised a database owned by publisher Reed Elsevier, gaining access to names, addresses, Social Security numbers, and driver's license numbers of about 32,000 individuals. Other information, including credit history and financial data, was reportedly not involved. The breach happened at Seisint, a data-collection company that the publisher bought last year. Seisint is a competitor to ChoicePoint, which recently reported an incident in which hackers accessed records on 145,000 individuals. According to officials at Reed Elsevier, the fraud came to light when a billing complaint from a customer showed unauthorized activity with a user name and password. Reed Elsevier is contacting the individuals affected and working with the FBI and the Secret Service to locate the hackers. http://news.com.com/2100-1029_3-5605736.html
From Edupage, March 4, 2005
Hacker Exposes Admissions Records
San Jose Mercury News, 3 March 2005
- A hacker who was able to access admissions records for dozens of business schools posted instructions online for how applicants could access those records. Among the universities whose records were exposed were Harvard University, Stanford University, Duke University, Carnegie Mellon University, and Dartmouth College. All of the affected schools use an online application and notification system called ApplyYourself.
The vulnerability that allowed the unauthorized access has been fixed, but during the nine hours in which the systems were exposed, several hundred students attempted to find out if they had been accepted to schools to which they applied. Final decisions and notifications of acceptance are not expected for several more weeks. School officials have been able to identify at least some of the applicants who gained access to the records systems, and officials from some schools said such activity would factor into the admission decision. Steve Nelson of Harvard's MBA program said, "Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop." Even if a student saw a decision, said Nelson, that decision isn't final until March 30.
http://www.siliconvalley.com/mld/siliconvalley/11044063.htm
From ACM's Tech News, February 28, 2005
"Thwarting 'Evil Geniuses'"
Spokane Journal of Business (02/24/05); Read, Paul
- Blue Water Technologies CEO John Shovic teaches computer-science majors at Eastern Washington University about cyberthreats and their perpetrators so that they can shield themselves against such dangers. He teaches four courses: The first two detail computer network operations, the deployment of security measures, and the hacking of networks; the second two courses educate students in malware creation, hacking strategies, and defensive measures by having them practice information warfare in a controlled, network-isolated environment. "Before you can learn to defend, you have to learn how to attack," argues Shovic, noting that his students attempt to breach computers in a special facility and learn computer forensics techniques to analyze security exploits and trace hackers. One exercise involves student teams attempting to disable each other's systems while simultaneously defending their own systems. Shovic divides hackers into two varieties: "Script kiddies" who download software that automates the location and infection of victims, and "evil geniuses" who craft malware and inflict serious harm; he says his courses focus on both mentalities, while the advanced classes primarily concentrate on the second, more damaging kind of hacker. To shore up against cyberattacks, Shovic recommends that businesses install internal security policies, such as restrictions on employees downloading software without supervision; protect networks from the Internet with firewalls; run and constantly update antivirus software; regularly update operating systems with patches issued by the manufacturer; make a greater effort to bolster internal security; and encrypt all data routed along wireless networks. Shovic says graduates of his courses have an easy time finding employment, given the desirability of network security expertise and the current scarcity of training in that area.
Click Here to View Full Article
From Edupage, February 28, 2005
Bank Loses Sensitive Data
New York Times, 26 February 2005
- The Bank of America has lost backup tapes containing details of Visa cards that the bank issued to 1.2 million federal employees, who use the credit cards for travel expenses and other purchases related to government business. About 900,000 of those affected work in the Defense Department, according to Alexandra Trower, a spokesperson from the bank. Trower said that following a shipment of a number of such backup tapes, it was discovered that some were missing. The Secret Service was notified and is investigating the disappearance, but according to Trower, no evidence has surfaced that any of the lost information has been put to improper use or that the loss resulted from theft. The bank does not plan to change any of the affected credit card numbers, but it has notified those individuals whose information was included on the missing tapes. (registration req'd) http://www.nytimes.com/2005/02/26/national/26data.html
From ACM's Tech News, February 25, 2005
"Cybercorps Scholarships Fund New Generation of Security Gurus"
Software (02/05) Vol. 22, No. 1, P. 98; McLaughlin, Laurianne
- The goal of the National Science Foundation's Cybercorps scholarship program is twofold: To increase leading computer science students' knowledge of information assurance and security, and to encourage them to apply that knowledge to government work after they graduate. Professors think the scholarship students will enhance the safety of America's public and private digital infrastructure in the future. The program funds either an undergraduate's junior and senior years or a two-year graduate program, on the condition that recipients spend two years in the employ of a government agency following graduation. Participating universities can also receive capacity-building awards to help upgrade information assurance and security curricula and courses, as well as help the schools qualify as National Security Agency Centers for Academic Excellence. Cybercorps was motivated by a number of factors, including the need for more students with information assurance and security skills in government agencies. Cybercorps lead program director Diana Gant notes that nearly 90% of all Cybercorps graduates have earned a government job and been employed by government agencies, while Carnegie Mellon University Cybercorps program coordinator Don McGillen reports that students are electing to remain with government agencies even after their term of service ends. Placing Cybercorps graduates in government jobs can be a slow process because of the need for security clearances, although Gant says participating agencies are attempting to resolve this problem. The program's future targets include making government agencies more aware of the program, boosting the amount of real-world content that students use in classes, and addressing information security across multiple disciplines, including anthropology, engineering, political science, and sociology.
Click Here to View Full Article
From Edupage, February 16, 2005
Companies Point To Education For Poor Security Training
CNET, 16 February 2005
- In a panel discussion at the Secure Software Forum in San Francisco, a
number of major software makers pointed to inadequate security training
at colleges and universities as a main reason software continues to be
plagued with security flaws. Mary Ann Davidson, chief security officer
at Oracle, said, "Unfortunately, if you are a vendor, you have to train
your developers until the universities start doing it." Although other
problems were identified, including a lack of sophisticated, automated
tools to identify flaws, representatives of other software companies
included in the panel agreed that at least some of the blame falls on
colleges and universities for not providing graduates with sufficient
understanding of security issues. Fred Rica, a partner in
PricewaterhouseCoopers' Threat and Vulnerability Assessment Services,
disagreed, saying that "Functionality still trumps security." When
companies must decide how to allocate development money, he said, they
choose new features over security for existing applications. A study by
Gartner noted that although companies cite lack of skills among
developers as a significant problem, those same companies put
relatively little funding into training programs.
http://news.com.com/2100-1002_3-5579014.html
From ACM's Tech News, February 14, 2005
"How to Stop Junk E-Mail: Charge for the Stamp"
New York Times (02/13/05) P. BU5; Stross, Randall
- Author and historian Randall Stross suggests that re-thinking the email system along the lines of the postal service, in which the sender pays for sending messages, can plug up the flood of spam. He describes the Can-Spam bill as "worse than useless," noting that prominent experts such as John Marshall Law School professor David Sorkin say the measure has effectively legalized unsolicited commercial email. Can-Spam places the burden of authorizing or not authorizing direct marketers to send junk email on the recipients through its "opt out" system. Stross writes that the recently created Messaging Anti-Abuse Working Group, whose members include ISPs such as Yahoo!, AOL, and EarthLink, is a promising venture, in that members are sharing anti-spam methods and courting other ISPs to adopt protective measures by screening both incoming and outgoing emails. Stross also notes that ISPs have begun to attach digital signatures of their customers' domain names to outgoing mail, preventing forgery or alteration via open-source DomainKeys encryption software. However, he doubts that authentication technologies or legislation will solve the spam problem, and calls for a scheme to make spammers pay for sending email that forces legitimate companies to concentrate on the best business prospects and makes spamming unprofitable for the more flagrant abusers. One such scheme is an email "stamp" proposed by computer scientists Cynthia Dwork and Moni Naor, in which the sender is charged a levy of time for each message he sends by forcing his computer to solve a complex computational puzzle. The Penny Black Project system would be used on a voluntary basis, and not be needed when the sender fires off email to friends and relatives. Another anti-spam strategy backed by AOL's Carl Hutzler is "Port 25 blocking," which would deny individual PCs from acting as a mail server; all outgoing mail would be forced to go through an ISP, where spam mail could be easily identified and blocked.
Click Here to View Full Article
"Terror's Server"
Technology Review (02/05) Vol. 108, No. 2, P. 46; Talbot, David
- Terrorists have a diverse array of online tools and techniques at their disposal with which to fund their causes, spread their messages, swell their ranks, orchestrate malicious acts, and generate fear. Examples include the ghoulish posting of murder imagery; terrorist Web sites, which University of Haifa professor Gabriel Weimann says have exploded in recent years; and coded communications via email or chat rooms. Filters that block offensive Web content are available but imperfect, while Internet content regulation faces both legal challenges such as First Amendment rights and technical challenges such as filtering tools' tendency to sometimes shut out needed content. Still, the public and private sectors are aggressively developing and deploying new technologies for detecting and monitoring terrorist activity so that more effective anti-terrorism strategies can be formulated and implemented. A Rensselaer Polytechnic Institute research group is working on an algorithm that targets online social networks that could be used to plan terrorist activities. Industry efforts to combat spam and other forms of cybercrime also have anti-terrorist applications, as terrorists often use such scams to get funding; defensive measures in this vein include new email authentication schemes and moves by major ISPs to more conscientiously enforce their terms of service, which include provisions to remove objectionable content upon request. However, SRI International computer scientist Peter Neumann reports that these various efforts come up short because the cultural impetus to create trustworthy systems is lacking. Experts also think a cyberterrorism incident or the emergence of concrete connections between online fraud and terrorist attacks could provoke an overreaction in which government and industry transform Web content into a rigidly controlled and monitored resource.
Click Here to View Full Article
From ACM's Tech News, February 11, 2005
"Virtual Jihad"
Newsweek (02/09/05); Isikoff, Michael; Hosenball, Mark; Horesh, Andrew
- Radical Islamic Web sites are urging readers to launch a cyber-jihad against their enemies; this calls attention to the potential for cyberterrorism, which national-security experts have identified as a major threat that could damage the United States far more seriously than the general public believes. Experts warn that critical, digitally-controlled U.S. infrastructure such as broadcasting networks, public utilities, and transportation systems are ripe for cyberattack--as is the FBI, which admitted as much after intruders broke into one of the bureau's commercial servers last week. One of the more notorious examples of well-coordinated cyberattacks was highlighted at a recent conference for federal computer-security experts hosted by the Defense Department's Computer Crime Center. The attack took place in the fall of 2000 when the capture of three Israeli soldiers by Lebanese Shiite fighters prompted angry hackers to deface the Shiite Hizbulla movement's Web site, which in turn triggered a cascade of Israeli-Palestinian cyber-warfare that eventually extended to U.S.-based targets. Israeli officials believe the online conflict was directly responsible for economic and governmental disruptions. The incident shows that nation-states, not just private citizens, are capable of cyberterrorism, according to Kenneth Geer with the Navy Criminal Investigation Service. Cybersecurity experts also point to a case in Australia in which a disgruntled former public utility contractor released raw sewage into public areas by breaking into the computer system that controlled a local sewer network, thus illustrating the potential damage that could be caused by crafty or well-informed hackers. SITE Institute director Rita Katz notes that almost all extremist Islamic Web sites calling for a holy war have how-to sections on cyberterrorism.
Click Here to View Full Article
From ACM's Tech News, February 9, 2005
"Project Honeypot Aims to Trap Spammers"
New Scientist (02/05/05) Vol. 185, No. 2485, P. 26; Biever, Celeste
- The tide of spam can only be countered by a partnership between technology and legislation, stresses John Praed of the Internet Law Group. This was established by the trackdown, prosecution, and conviction of spammer Jeremy Jaynes, who may face nine years of incarceration for his activities, which netted him about $750,000 per month. Paul Graham, organizer of MIT's annual Spam Conference, says evidence uncovered at Jaynes' office suggests that spammers think spam filters are easier to thwart than they actually are. Filters, which scan messages for words typical of junk email, can sometimes be fooled by large amounts of random text spammers insert within their messages; or spammers can hijack computers with viruses and use them as spam launching pads. One tool Webmasters can use to build evidence against spammers is Chicago lawyer Matthew Prince's Project Honeypot software, which exploits a provision in the federal CAN-SPAM Act that criminalizes the harvesting of email addresses for spamming. The software can transform a Web site into bait for such harvesters: When "crawler" software visits the site, the software produces a bogus email address that the crawler captures, and records the time, date, and crawler address; this ensures that any mail sent to the fake address originates from the spammer. Prince admits that spammers will likely come up with anti-honeypot countermeasures, but says he has countermeasures of his own to deal with this scenario. Still, Graham notes that though Jaynes' conviction was cause for rejoicing at the Spam Conference, the battle against spammers is far from over.
Click Here to View Full Article
From ACM's Tech News, February 2, 2005
"Law Barring Junk E-Mail Allows a Flood Instead"
New York Times (02/01/05) P. A1; Zeller Jr., Tom
- Instead of curbing the growth of unsolicited junk email, the year-old federal Can Spam Act has helped it along: Estimates reckon that spam currently accounts for about 80 percent of all email sent, compared to between 50 percent and 60 percent before the law was enacted. Antispam proponents such as Spamhaus Project founder Steve Linford contend that the law has legalized spamming by essentially granting bulk advertisers permission to send junk email as long as they adhere to certain regulations. Critics argue that Can Spam's biggest loophole is the requirement that recipients must opt out of being retained on an emailer's list, and violators simply use opt-out messages to confirm the validity of email addresses and the likelihood that people are using them. Institute for Spam and Internet Public Policy CEO Anne Mitchell says it is ridiculous to think that law enforcement agencies could halt spam's growth instantly, and notes that filters' general success probably contributed to the increase by forcing spammers to send out more junk email in order to maintain the dollar rate of return. Sen. Conrad Burns (R-Mont.) says judging Can Spam's effectiveness now is premature, noting in an email that the Federal Trade Commission may simply need a little prodding to enforce the law. Microsoft Internet safety enforcement lawyer Aaron Kornblum sees value in pursuing lawsuits against spam enablers under Can Spam, explaining that "Our objective with sustained enforcement activity is to change the economics of spamming, making it a cost-prohibitive business model rather than a profitable one." Unfortunately, analysts foresee the spam problem worsening as spammers take advantage of malware to turn PCs into "zombie" spam distributors and steal working email addresses from ISPs, while spam-friendly merchants subscribe to "bulletproof" Web host services to keep their Web sites offshore and out of U.S. jurisdiction.
Click Here to View Full Article
From New York Times, October 25, 2004
New I.B.M. Report Will Warn of Computer Security Threats
New York Times, October 25, 2004, by John Markoff
- I.B.M. plans to begin releasing a monthly report of threats to computer networks in an effort to establish an indicator similar to the federal government’s Homeland Security Advisory System.
Read the article
From Is Your Job Going Offshore?, October 24, 2004
Outsourcing booms, although quietly
THE WALL STREET JOURNAL, By Jesse Drucker and Jay Solomon
Read the Article
From New York Times, October 24, 2004
Identities Stolen in Seconds
by Timothy L. O'Brien
- Identity theft, thanks mainly to the growth of the Internet, is epidemic. Can it be stopped?
Read the article
From ACM's TechNews, October 20, 2004
"Tech Firms, Lawmakers Target Spam, E-Mail Fraud"
Baltimore Sun (10/18/04) P. 1A; Bishop, Tricia
- Spam and email fraud have entered the crosshairs of legislators and technology companies, making Bill Gates' prediction that spam would be eliminated by 2006 seem less unlikely now. "I think you'll see some real changes within three years," declares Pew Internet and American Life Project researcher Deborah Fallows. The general consensus among experts is that spam now accounts for 70 percent to 80 percent of all email, compared to approximately 10 percent three years ago. Meanwhile, the Anti-Phishing Working Group reports that phishing--the practice of scamming consumers into revealing personal financial data by using bogus Web sites and logos that resemble familiar financial services firms--has increased by a factor of 17 since December 2003 to almost 2,000 distinct scams. "One very big fear about spam is it will turn off people from electronic commerce and using email in general," notes John Palfrey of Harvard Law School's Berkman Center for Internet and Society. One of the more significant anti-spam developments was this month's passage of a Maryland law that carries a maximum fine of $25,000 and a 10-year prison sentence for violators, although some experts say such measures lack teeth in the absence of an effective method for verifying email senders. However, a trio of email authentication techniques is currently being tested by Internet service providers: One method focuses on verifying the authenticity of the address posted on the email's "envelope;" another aims to confirm the legitimacy of the address listed in the "from" line of an email; and the third employs a digital signature for message authentication. The Federal Trade Commission has stated that it will intercede and prescribe an email authentication standard if the industry cannot.
Click Here to View Full Article
From ACM's TechNews, October 13, 2004
"The Quest for Secure Code"
Globe and Mail (CAN) (10/12/04); Kirwan, Mary
- Poor software quality is responsible for every one of the SANS Institute's top 20 Internet security vulnerabilities, yet universities still fail to teach proper coding techniques and government remains cowed by industry lobbying efforts. SANS Institute research director Alan Paller says evaluation and certification programs are needed to ensure that programmers have the proper training, and he notes that even universities appointed by the government to be "Centers of Excellence in Cybersecurity" do not require security courses for their IT graduates. Carnegie Mellon University computer science department head Jeannette Wing says even if students are taught more security, practical realities at the workplace will mean feature-focused code produced quickly, if that is what those students' employers desire. Meanwhile, millions of business customers are hindered by restrictive licenses from tweaking their software purchases. Microsoft emphasizes security during its interview process for prospective employees and evaluates workers on their ability to deliver quality code, but the company has a huge legacy infrastructure and backward compatibility issues, says Wing. The government has made many efforts to intervene and make vendors liable for their products, but have been met with hundreds of millions of dollars in lobbying efforts, notes Paller. Even attempts to make vendors liable with caps on potential damages has not worked, as IT industry lawyers are reluctant to admit that secure code is possible. Rep. Adam Putnam (R-Fla.) is expected to make a new push for legislation soon and is chair of the House subcommittee on cybersecurity policy, and the Federal Information Security Management Act is also expected to make a change as vendors cater to the $40 billion federal IT market.
Click Here to View Full Article
"A Matter of Trust: Privacy and Security in the Information Age"
IST Results (10/08/04)
- A number of FP6 IST projects seek to improve privacy and identity management (PIM) in the hopes of enabling Europeans to interact in cyberspace safely and securely while allowing them to manage their personal data, a critical ability if citizens are to adopt new online services. Notable initiatives include Privacy and Identity Management for Europe (PRIME), the Future of Identity in the Information Society (FIDIS), Government User IDentity for Europe (GUIDE), and Roadmap for Advanced Research in Privacy and Identity Management (RAPID). The RAPID project, which was completed in June 2003, influenced the FP6 research agenda by recognizing two categories: A technical category concerning multiple and dependable identity management, infrastructure, and enterprise, and a nontechnical category that dealt with socioeconomic and legal issues. PRIME involves a 20-member international consortium that aims to improve the usability and functionality of privacy-enhancing technologies (PETs) through the application of "privacy by design" and "data minimization" principles: The former focuses on building PETs into information systems using basic technologies such as human-computer interfaces, ontologies, authorization, and cryptology, while the latter stresses permitting the collection of personal data on an as-needed basis. Both the FIDIS and GUIDE projects emphasize the need for an integrated, coordinated, Europe-wide identity research effort to achieve their respective goals. FIDIS members will collaboratively investigate interoperability of IDs and ID management systems, forensic applications, mobility issues, profiling, the "identity of identity," and de-identification and the high-tech ID. GUIDE's objective is to construct an open architecture for secure, compatible e-government electronic ID services and transactions for Europe.
Click Here to View Full Article
From EduPage, October 11, 2004
Antispam Conference Calls For International Cooperation
BBC, 11 October 2004
- Attendees of the International Spam Enforcement Workshop this week heard officials from the United States and the United Kingdom make the case that a key element to addressing the problem of spam is increased international cooperation. Data suggest that 60 percent of all e-mail is spam and that 80 percent of spam originates in a different country from where it is delivered. More than 20 nations were represented at the workshop, organized by the U.S. Federal Trade Commission (FTC) and the U.K.'s Office of Fair Trading (OFT). Deborah Majoras, chairwoman of the FTC, said that the biggest challenge to stopping spam is locating its source, which requires governments to share information on suspected spammers. Richard Thomas, the U.K.'s Information Commissioner, called for expanding powers of enforcement to shut down spammers. He said governments should pass laws requiring Internet service providers (ISPs) to disclose information about spam sent on their systems, something ISPs currently are not forced to do.
http://news.bbc.co.uk/2/hi/technology/3733864.stm
From ACM's TechNews, October 8, 2004
"Mission: Critical"
Information Security (09/04) Vol. 7, No. 9, P. 26; Barlas, Stephen; Earls, Alan; Fitzgerald, Michael
- An Information Security survey of professionals in the financial, energy, transportation, telecom, and government sectors highlights the vulnerability of the U.S. critical infrastructure to online attack: Fifty-one percent of financial services professionals say their industry is not prepared for cyberattacks, a sentiment echoed by 57 percent of energy industry respondents, 65 percent of transportation industry respondents, 60 percent of telecom workers, and 62 percent of federal IT/security personnel. Still, most respondents agree that their sector is better prepared for cyberattacks than they were before Sept. 11, 2001. The cyberterrorist threat has spurred workforce, infrastructure, and data redistribution, as well as the erection of flexible backup centers and lines of communication, among financial institutions; sector-wide collaboration to understand and protect against individual and collective threats is being facilitated by data exchange channels such as the Financial Services Information Sharing and Analysis Center. The energy sector's cyber-vulnerability is growing as the system control and data acquisition (SCADA) systems that direct the majority of energy automation link to the Internet, and the industry response's has been to build security standards and information sharing, while the departments of Homeland Security (DHS) and Energy are studying and lowering risks through a National SCADA Testbed. Each sub-sector of the transportation industry is exploring and implementing cybersecurity strategies, with air transportation being scrutinized the most because of privacy issues related to the personal data airlines are collecting. Telecom experts are more fearful of the damage potential of a multi-pronged assault rather than a single attack, but few think such a siege would cripple the United States. Especially frustrating are the poor marks the DHS has been receiving from security experts, although the government security improvement budget will increase while administrative bodies such as the DHS' National Cybersecurity Division will continue to disseminate security info to both federal and private entities, stage incident response exercises, and build more secure government networks.
Click Here to View Full Article
From ACM's TechNews, October 6, 2004
"Hacking 101: It's For Your Own Good"
Charlotte Observer (10/05/04); Choe, Stan
- UNC Charlotte (UNCC) professors such as Bill Chu believe the best way to cultivate network security professionals is to "expose our students to dark side techniques so they gain insight on how bad guys can penetrate systems and how to effectively protect them." Chu teaches Vulnerability Assessment and System Assurance, an ethical hacking course that assigns homework assignments such as breaking into a computer network or spreading malware. Students enrolled in the course are required to sign a legal agreement in which they promise not to employ the techniques or information they learn for malevolent purposes. Russell Shackelford, who heads ACM's education board, notes that teaching students responsible, ethical behavior has been a difficult task for computer science and IT programs, and the usual strategy has been to teach a separate course on ethics that often bores students. More and more "white hat" hackers are being hired by businesses to attempt to crack corporate network security so that vulnerabilities can be spotted and remedied before malicious hackers can exploit them. At a recent UNCC lecture, a visiting professional white hat hacker told students that courses such as Chu's merely provide the tools to learn hacking skills, which cannot be cultivated without a student's drive. "It goes to fundamental human curiosity," he remarked. Ethical hacking students often find work in companies' IT staffs.
Click Here to View Full Article
"Cyber Center Targets Internet Plagues"
NewsFactor Network (10/05/04); Martin, Mike
- Much like the Centers for Disease Control study how to prevent and contain human sicknesses, the National Science Foundation (NSF) is funding a new Center for Internet Epidemiology and Defenses (CIED) that will study computer viruses and worms. The Internet's openness and efficiency may have led to its phenomenal success, but those qualities also pose the biggest challenge to the Internet as well, says CIED project director and University of California computer science professor Stefan Savage. "Infection is spread via contact, and the Internet allows a host infected in one place to rapidly contact any other system on the planet," he explains. Outbreaks occur so fast that only fully automated defenses will be able to control them, which is why CIED is focusing on classes of computer infections, not just single versions of computer code. University of California at Berkeley International Computer Science Institute senior researcher Vern Paxson says creating defenses against a known infection is easy, but understanding entire classes of pathogens requires deep insight into the behavior of those infections and how it differs from normal network activity. CIED will use technology such as "network telescopes" and "network honeyfarms" to monitor and measure ongoing Internet infections in real time in order to gather evidence. Eventually, the researchers expect to produce algorithms that can automatically create virus and worm signatures to inoculate systems. CIED is part of the NSF's $30 million Cyber Trust program that aims to not only deal with current problems, but create more secure and resilient infrastructure for the future, notes NSF Cyber Trust program director Carl Landwehr.
Click Here to View Full Article
"The Search for Computer Security"
Harvard University Gazette (09/30/04); Powell, Alvin
- Greg Morrisett, a professor at Harvard University's Division of Engineering and Applied Sciences (DEAS), believes the burden of trusting an incoming program to be free of bugs or malware should be transferred from the computer user to the program itself. "What we're aiming for is a day when you don't have to 'trust' a code, where you can state your guidelines [for acceptable code] and the builder would have to give you a [mathematical] proof that you can check," he explains. Morrisett, a programming language pioneer who has developed tools that identify exploitable flaws in computer programs, is authoring software tools designed to help programmers write less buggy code. He estimates that one bug exists for every 100 to 1,000 lines of code, and the growing complexity of computer programs makes manual checking for bugs impractical without computerized assistance. Morrisett's tools scan code for consistency in a process that the DEAS professor likens to checking that speed calculation formulas use the same units. Morrisett acknowledges that the programs he designs for tracking down and eliminating software bugs can just as easily be used for exploitation by hackers. He predicts that "The next round of questions [pertaining to computer security] will be ethical, legal, and social," and he hopes to use his position at Harvard to help address these questions. He says, "We have to understand that technology gets you to a certain place, and the remaining questions are harder."
Click Here to View Full Article
From EduPage, October 4, 2004
Survey Shows U.S. Computer Users Unaware Of Security Risks
BBC, 3 October 2004
- A survey commissioned by the National Cyber Security Alliance (NCSA) shows significant gaps of understanding among U.S. computer users about the actual threat posed by computer security problems. According to the survey, 30 percent of Americans believe they are more likely to be hit by lightning, to be audited by the IRS, or to win the lottery than be the victim of a computer security problem; among users under the age of 25, the rate of those who believe this rises to 40 percent. In truth, cybersecurity threats, including viruses, phishing scams, and hacking, affect about 70 percent of computer users, while the odds of being hit by lightning are 0.0000102 percent, according to the U.S. National Weather Service. The survey also found that 90 percent of computer users remember Janet Jackson's "wardrobe malfunction" during the Super Bowl, but only 60 percent remember when the security software on their PCs was last updated. Ken Watson, chairman of the NCSA, said that 91 percent of PCs are infected with some variant of spyware. The NCSA has declared October to be National Cyber Security Awareness month in the United States and is sponsoring educational efforts to teach users about the real risks of ignoring cybersecurity.
http://news.bbc.co.uk/2/hi/technology/3708260.stm
From ACM's TechNews, October 4, 2004
"E-Cyclers Embrace Data Destruction"
eWeek (10/01/04); Hachman, Marc
- Computer recyclers are taking measures to verifiably destroy data as well as hardware in order to comply with federal regulations such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act, which prohibit the public exposure of confidential data by financial and health care institutions; meanwhile, fears of civil suits are driving more traditional companies to pursue the same goal. Debate has sprung up over the best techniques to destroy data, which range from Department of Defense-compliant overwriting software to the physical shredding of disk platters. Software vendors say that overwriting a hard disk once either with other files or random bits of data is inadequate, as some or all of the information in a file can be revealed by latent magnetism. The DOD's 5220.22-M specification advises overwriting each disk sector several times with nonrandom and pseudorandom data. However, shredding is recommended for both nonfunctional drives and drives with more than 10 defects. A Sept. 30 teleconference between members of the National Association for Information Destruction (NAID) failed to resolve differences between supporters of software wiping and supporters of shredding, but attempts will be made to reach an accord before the NAID board's final recommendation on Nov. 29. Small-scale nonprofit recycling organizations are also joining the data destruction bandwagon, and a lack of certification procedures for compliance with the DOD's 5220.22-M spec is benefiting these firms by boosting competition in the data-destruction product market. Data destruction certification has been adopted by many recyclers as a saleable service, and there is little oversight in the negotiation of contracts and certifications between recyclers and clients.
Click Here to View Full Article
"App Developers Need to Redouble Security Efforts"
eWeek (09/30/04); Schindler, Esther
- The recent Gartner Application Development Summit included new statistics underscoring the need for development and quality assurance teams to increase their security efforts. Gartner research director Theresa Lanowitz says the problems of IT network and physical security have been solved for the most part, which means that the application layer is the most vulnerable. Companies must take responsibility for security issues during development, or have a higher risk of a catastrophic event. According to Gartner, if 50 percent of software vulnerabilities were dealt with before production use, enterprise configuration management costs and incident response costs would each be reduced by 75 percent. Lanowitz says someone in the organization must be responsible for security issues, such as an "application security architect." This person's primary focus is the risk that a company faces, and articulating that risk to staff and management. Lanowitz says government agencies and financial institutions have been leading the way in creating application security architects that work on the same level as application architects and ensure that security testing is added to the quality assurance framework. Gartner predicts that 80 percent of development teams will incorporate application security architects by 2006. Lanowitz also expects to see a wave of development tools integrating security functions by 2007, although the market for now is in its infancy.
Click Here to View Full Article
From EduPage, September 29, 2004
California Gets Tough On Spyware
Reuters, 28 September 2004
- Arnold Schwarzenegger, governor of California, this week signed an antispyware bill that criminalizes placing software on another user's computer without authorization. The bill bans surreptitious software that monitors users' surfing habits or tracks keystrokes, among other types of spyware. Under the legislation, computer users can sue those responsible for spyware for actual damages from the applications. Several other states and the federal government are currently working on similar measures to try to limit unauthorized software. Critics of the law say it lacks adequate enforcement provisions. Spyware expert Ben Edelman called the bill "a piece of junk," saying it is "the most superfluous of all legislation."
http://www.reuters.com/newsArticle.jhtml?storyID=6359582
From EduPage, September 24, 2004
Concern Grows Over JPEG Flaw
BBC, 24 September 2004
- Some security experts are warning users that a recently announced flaw in the way some Microsoft applications handle JPEG images could lead to the next large-scale virus infection. David Perry of anti-virus firm Trend Micro noted that the combination of several factors has his firm especially worried about the JPEG flaw. Those factors, Perry said, include the number of applications that are affected by the flaw--more than a dozen--and the fact that there has not been a significant virus attack for some time, which may have the effect of lowering users' attention to preventive measures. When the flaw was announced, no code had yet appeared that exploited it. Within the past week, however, such code has been written and has appeared on a private mailing list and a public Web site. Perry characterized the current situation as "the virus equivalent of a harmonic convergence." Others were not as worried about the threat posed by the flaw. Graham Cluley of anti-virus firm Sophos noted that so far no malicious code is being delivered using the flaw. "It is purely being done as a 'proof of concept,'" said Cluley.
http://news.bbc.co.uk/2/hi/technology/3684552.stm
From ACM's TechNews, September 22, 2004
"Reports on Spam Levels Paint Differing Views of the Problem"
Wall Street Journal (ONLINE) (09/21/04); Bialik, Carl; Creighton, Deborah S.
- Accurately measuring the extent of the spam problem and the effectiveness of strategies to combat it is complicated by inconsistent statistical reports on the volume of junk email, and the fact that the most oft-cited reports are furnished by antispam software vendors. An August estimate by MessageLabs determined that spam constituted 84 percent of all email, while a report from Brightmail indicated 66 percent. Meanwhile, FrontBridge Technologies and Brightmail claim that the spam problem continues to expand, while AOL contends that spam growth has been level for the past 12 months. The antispam companies supplying these reports usually cull their data from email they scan for corporate clients, which may not represent a cross-section of Internet users, though both vendors and certain analysts believe spam-fighting products' mainstream penetration is reducing this sampling partiality. Still, the inconsistency between spam level reports has been a frustrating factor for legislators: For example, spam level estimates accumulated by the Organization for Economic Cooperation and Development (OECD) varied so wildly as to discourage the organization's attempt to evaluate the spread of spam and the performance of countermeasures. "There's not much out there except what's coming from private companies, where the methodology differs and we don't know how it differs," remarks Dimitri Ypsilanti with the OECD. Muddling matters are divergent definitions of spam among antispam companies and nations, while some spam filters operate by amassing reports from users, whose characterization of spam is not always objective. Furthermore, the reported numbers are mean averages that can be distorted by major spam attacks against a few companies.
Click Here to View Full Article
From SANS' News Bites, September 22, 2004
FTC Considers Offering Bounties for Spammer Convictions
17 September 2004
- The US Federal Trade Commission would like to be able to prosecute more spammers, but given the lack of admissibility of much of the evidence they use in identifying spammers, this has proven problematic. What they need is hard, admissible evidence, probably provided by an insider. Such evidence would likely be provided only if there were a bounty program, much like Microsoft's $250,000 bounty for the successful prosecution and conviction of malware authors.
http://www.silicon.com/research/specialreports/thespamreport/print.htm?TYPE=story&AT=39124098-39025001t-40000011c
Phishers Target Gmail Accounts
15 September 2004
- Some phishers are now trying to steal Gmail accounts. The phishing email informs Gmail users that they can invite friends to sign up for a Gmail account if they fill out a form that includes their Gmail address and password. Gmail accounts are in demand because of their limited availability. Google does send out free invitations for users to send to friends, but all the users need to do is click on a button, rather than providing their personal account information.
http://news.com.com/2102-1032_3-5367986.html?tag=st.util.print
From ACM's TechNews, September 20, 2004
"'Dirty Dozen' Tips From Former Cybersecurity Czar"
Computerworld New Zealand (09/14/04); Watson, David
- Richard A. Clarke, the former cybersecurity advisor to President Bush, claims hackers and phishers are keeping e-commerce and e-government from reaching their full potential. Clarke says security worries are the primary factor thwarting the widespread take-up of Internet banking and other transactions that can be done more cheaply and efficiently online. Clarke lists a dozen trends that will influence IT security in the future, including encryption of archived data and automated security audits of IT assets with asset management software. In IT security, the future "dirty dozen" trends also include more thorough testing of software code for mistakes such as buffer overflows and protecting the client side as well as the back-end. One of the most crucial trends will be to control the "road warriors"--travelers and visitors who remotely connect their laptops into corporate networks and introduce worms and viruses. Clarke says products that scan and check laptops for security risks will become more widely used. Another important trend is the outsourcing of fundamental security functions such as firewalls and intrusion detection to groups such as ISPs. More attention to security threats from inside, such as former workers who keep access to systems and information at their former workplace, will find corporate networks increasingly segmented so that workers can only obtain access to systems relevant to their position. Clarke says, "People are trying to take back cyberspace from the phishers, identity thieves and hackers and we can all be part of the effort to take it back."
Click Here to View Full Article
From New York Times, September 19, 2004
Users Find Too Many Phish in the Internet Sea
By David F. Gallagher
- A recent flood of fake Citibank e-mail messages demonstrates the growing arsenal of tricks used by online "phishers."
Read the article.
Attacks on Windows PC's Grew in First Half of 2004
By John Markoff
- A survey of Internet vulnerabilities shows a sharp jump in attacks on Windows-based personal computers and a marked increase in commercially motivated threats.
Read the article.
From New York Times, September 19, 2004
Barbarians at the Digital Gate
By Timothy L. O'Brien and Saul Hansell
- How spyware, a program that creeps onto a computer’s hard drive unannounced, is wrecking the Internet.
Read the article
From ACM's TechNews, September 17, 2004
"DHS Moves Ahead With Cybersecurity R&D Efforts"
Computerworld (09/15/04); Verton, Dan
- The Department of Homeland Security (DHS) is engaged in several pilot cybersecurity efforts designed to address the scarcity of real-world incident data, such as the Protected Repository for Defense of Infrastructure Against Cyber Threats (Protect) program. The goal of Protect is to convince major private-sector infrastructure companies to voluntarily provide real-world attack data that can be used to test prototype cybersecurity measures, says Douglas Maughan with the Homeland Security Advanced Research Projects Agency. He says the program would be dependent on a trustworthy access repository process featuring a government-backed data repository hosted by a third party, with written contracts with data suppliers; researchers can apply to participate in Protect, while data owners would be permitted to block access for specific researchers. Meanwhile, DHS' Cyber Defense Technology Experimental Research test bed aims to contribute to the creation of next-generation critical infrastructure security technologies by building a homogeneous emulation cluster residing at the University of Utah's Emulab facility. The initiative, which lets researchers concentrate on security hole prevention and detection as well as assess operational systems' security and dependability, has so far received $14 million in funding. Sept. 20 marks the first meeting of the DHS' Border Gateway Protocol steering committee, which is readying R&D pilots to build safe protocols for the routing framework that links ISPs and subscriber networks, which is highly susceptible to human error and router-directed assaults. Another DHS-organized steering committee will analyze and develop cybersecurity pilots for the Domain Name System that will study such dangers and vulnerabilities as denial-of-service attacks and unsanctioned root servers and top-level domains.
Click Here to View Full Article
"Dozens of Experts Take on Cyberterror"
Seattle Post-Intelligencer (09/13/04); Shukovsky, Paul
- Government and business leaders from across the Pacific Northwest conducted a cyberterror simulation last week to assess the vulnerability of computer-controlled critical infrastructure. The public-private partnership attracted more than 100 experts from several states, the Department of Homeland Security, the military branches, Microsoft, Boeing, the FBI, a number of U.S. and Canadian utilities, the Bonneville Power Administration (BPA), and the Los Alamos, Sandia, and Argonne national laboratories. In opening remarks, Maj. Gen. Timothy Lowenberg, adjutant general of the Washington National Guard, described cybertechnology as a great strength for the nation, but also as an area of tremendous weakness. The exercise, dubbed Blue Cascades II, gave experts an opportunity to determine how telecommunications, utilities, and other major systems rely upon one another, such as how a power failure brings banking and finance to a halt, for example. Participants signed an agreement not to reveal the result of the exercise, and a reporter was asked to leave after introductions. In exercises conducted by the BPA, systems were found to be secure from attacks. However, "there are some utilities that operate on the Internet, and that's a vulnerability," said BPA security manager Robert Windus.
Click Here to View Full Article
"The Next Threat"
Forbes (09/20/04) Vol. 174, No. 5, P. 70; Lenzner, Robert; Vardi, Nathan
- There is growing evidence that terrorist cells such as al Qaeda are attempting to become skilled in hacking and other forms of cyberwarfare, and experts warn that cyberterrorists could cripple the World Wide Web, interfere with military communications systems, or disrupt electrical grids to catastrophic effect. But few federal agencies or corporations have considered or followed recommendations for shoring up both public and private infrastructure, despite the imminence of the cyberterrorist threat. Reasons for the sluggish response include political in-fighting, beliefs among government officials that the threat is exaggerated, indecision over who should foot the bill for implementing tougher cybersecurity, and regulatory and financial stumbling blocks that are hindering the growth of corporate security spending. American businesses are reluctant to pass on the costs of cybersecurity upgrades to customers, either because they are tightly regulated or are faring so poorly that a price hike could kill them. Rep. William Thornberry (R-Texas) thinks tax incentives would be a far more productive tool to encourage corporate spending than government regulations, while the major automated control system providers contend that customers flatly refuse anything with a price tag, even if it is more secure. However, the deployment of such control systems to run utility grids and other key components of U.S. infrastructure is the reason why America is so vulnerable to cyberattack: Ted Lewis of the Navy Postgraduate School reports that almost 300 facilities responsible for 80% of America's electricity use employ poorly shielded control systems, which lack encryption and are easy to manipulate. Of particular concern are weaknesses demonstrated in the Border Gateway Protocol, which could be exploited to manipulate routing information and corrupt the Internet, and the Domain Name System, which is underpinned by poorly secured root servers.
Click Here to View Full Article
From Business Week Insider, September 17, 2004
Are Hurricanes Swamping Spammers?
- Lots of folks think the hits that the Sunshine State
(aka Spam State) have taken slowed the volume. Probably
isn't so, though http://www.businessweek.com/technology/content/sep2004/tc20040916_1065.htm?c=bwinsidersep17&n=link12&t=email
From ACM's TechNews, September 15, 2004
"OpenBSD's Theo de Raadt Talks Software Security"
Computerworld Australia (09/10/04); Gedda, Rodney
- OpenBSD founder Theo de Raadt says the vast majority of software security holes are due to low-level programming errors that are copied and spread throughout many different applications. He says programming errors occur when the code author misuses program functions in seemingly insignificant ways, and these mistakes slip by and get propagated as those portions of code are re-used, until billions of lines of open and closed source code are riddled with potential security vulnerabilities, as is the case today. De Raadt explains that it is impossible to root out all of the vulnerabilities, and that there is basically nothing that can stop hackers from finding and trying to exploit those flaws. The approach de Raadt advocates is making the environment difficult for the hacker to understand, so that even after they have found the bug, they do not know how to use it to obtain the needed system privileges. Software vendors must boost security audits, improve education, and incorporate basic technologies that can thwart hacks in general, de Raadt says. He claims that some Linux variations are using strange-environment defense approaches similar to OpenBSD, and there are even some Unix users who disguise their systems to look like OpenBSD machines in order to discourage targeted hack attacks. Adopting OpenBSD is not a solution to security problems, however, since most hackers are targeting the Internet at large and building up spam or denial-of-service capabilities that threaten even securely coded systems. De Raadt is especially critical of Microsoft, which he says will probably always be vulnerable to security flaws because of integration with a bug-riddled Web client.
Click Here to View Full Article
From ACM's TechNews, September 13, 2004
"Malware Writers Using Open-Source Tactics"
Linux Insider (09/09/04); Mello, John P. Jr.
- Malware writers have adopted open-source software development techniques to help them create zombie networks of remotely controlled PCs, which are estimated to generate between 25 percent and 30 percent of all spam. "There's a community of worm builders creating, almost in an open-source fashion, Trojan source code that can be downloaded, compiled and released into the wild," says MX Logic CTO Scott Chasin. Zombie networks earn money for their creators when rented out to spammers. Sanvine cofounder and chief architect Don Bowman says the people who control zombie networks have become more savvy to counter defense measures, such as monitoring activity on port 25. Because too much traffic on suspect channels will raise the attention of ISPs and get the account shut down, larger networks of spam software are now programmed to send out fewer messages per hour and operate during hours when the PC user is unlikely to be online. Analysts say that such zombie networks are responsible for anywhere from 25 percent to 80 percent of all spam now being sent; Chasin says the creators of these networks benefit from the open source model of application development. He says, "A lot of these Trojans and their variants borrow from the open-source industry and are built off a community effort in the underground environment."
Click Here to View Full Article
From ACM's TechNews, September 10, 2004
"House Panel Gets Tough on Spyware, P2P Piracy"
InternetNews.com (09/08/04); Mark, Roy
- The House Judiciary Committee has toughened its stance on peer-to-peer digital piracy and spyware with the Sept. 8 passage of the Piracy Deterrence and Education Act and the Internet Spyware Prevention Act. The former bill goes after the digital dissemination of copyrighted content "with reckless disregard for the risk of further infringement," and proposes a maximum prison sentence of three years to violators who electronically distribute 1,000 or more copyrighted materials over a 180-day period. Furthermore, the bill sets aside $15 million for the establishment of an Internet use education program coordinated by the Department of Justice (DOJ). The Spyware Prevention Act criminalizes the deliberate access of a computer without authorization as well as the intentional circumvention of authorized access, and calls for a maximum jail term of five years if the goal of such an intrusion is to support another federal crime. The legislation also calls for a prison sentence of up to two years for violators who intentionally injure or defraud a person or damage a computer by installing spyware without permission, and allocates $10 million to the DOJ to fight spyware and phishing scams. The act's approval follows the passage of an earlier spyware bill by the House Energy and Commerce Committee that requires consumer notification of spyware's presence prior to downloading software, injunctions against unfair or deceitful practices such as computer hijacking and keystroke logging, and the provision of an opt-in screen before the transmission or enablement of any data collection software by anyone who is not the owner or authorized user of a computer. Judiciary spyware bill co-sponsor Rep. Lamar Smith (R-Texas) says that his bill, unlike the Energy and Commerce version, targets bad behavior rather than technology. "At the same time, the legislation leaves the door open for innovative technology developments to continue to combat spyware programs," attested Rep. Bob Goodlatte (R-Va.).
Click Here to View Full Article
"System Alert: Web Meltdown"
Independent (London) (09/08/04); Grossman, Wendy
- The Internet has already "melted down" when considering it is impossible for users to avoid spam and viruses, poor-quality software, and vaguely defined restrictions on how they can use their ISP accounts, according to networking expert Lauren Weinstein and other technology experts who met recently in Los Angeles to discuss the dangers to the Internet. Weinstein, University of Pennsylvania professor Dave Farber, and computing expert Peter Neumann convened the gathering of about 50 technology experts, and the atmosphere was pessimistic. Whereas 10 years ago, technologists confidently tackled fixes or workarounds necessary to make the Internet run, the recent gathering seemed unsure of their technologist powers. Part of the problem is the increasing amount of regulation: ISPs restrict whether users can share their connections or use them for Web servers, entertainment industries have successfully squelched file-sharing networks such as eDonkey, ICANN remains a law unto itself, and governments around the world are eyeing telecommunications-style regulation for VoIP. Former ICANN board member and programmer Karl Auerbach says the Internet is rapidly becoming a fundamental utility, even as it is still developing and facing numerous challenges. Government, business, and regular users depend on the Internet for daily activity and core operations. Meanwhile, evidence shows that anti-virus firms are falling behind in the race to provide security solutions and denial-of-service attacks regularly knock out or slow major sites. Internet governance law expert Michael Froomkin, however, says concern about the state of the Internet is nothing to be worried about in itself; instead, it portends a radical change to fix the situation.
Click Here to View Full Article
"Are Hackers Using Your PC to Spew Spam and Steal?"
USA Today (09/08/04) P. 1B; Acohido, Byron; Swartz, Jon
- Since last year, infectious programs have been turning hacked PCs into zombie computers, making them send spam emails and take part in other illegal activities. Experts say the number of infected machines has reached the millions at a time when computers are more powerful and dangerous than ever. Intelguardians co-founder Ed Skoudis says there has been a sharp rise in the number of machines attacked this year, and he's "worried things will get much worse." Most hijacked computers are in homes, on college campuses, or at small businesses, and the motive for hacking has changed from challenge to profit. Experts say code writers put together networks of zombie PCs and then sell access to identity thieves, spammers, and blackmailers. Most consumers whose computers are taken over are not immediately aware of the problem. Dave Dittrich, senior security engineer at the University of Washington's Center for Information Assurance and Cybersecurity, says, "We have a large population that is easily tricked." Regulators must deal with jurisdictional problems in trying to catch suspects since many are not located in the United States, and critics say that existing laws are too weak. The situation will not change quickly, experts believe, since affecting drastic security improvements means tech suppliers would have to cooperate on universal security standards. While vendors are unlikely to move fast on their own, experts say consumer outrage could speed things up. Meanwhile, cyber security experts say law enforcement has only recently begun to focus on the problem, but they are hindered by weak laws and the enormity of the problem. Keith Lourdeau, deputy assistant director of the FBI's Cyber Division, says, "Hackers can do almost anything with a compromised PC, and there isn't much we can do about it."
Click Here to View Full Article
"Industry Group Voicing Cybersecurity Concerns in Washington"
Investor's Business Daily (09/09/04) P. A6; Howell, Donna
- Executive director of the Cyber Security Industry Alliance (CSIA) Paul Kurtz says the motivation for the organization's establishment was to give cybersecurity industry leaders "a common voice in Washington on cybersecurity policy issues." The seven-month-old CSIA aims to address such issues as cybersecurity awareness--which Kurtz says is showing signs of progress, although more improvement is needed--and the implications of regulatory measures such as Sarbanes-Oxley and the Health Insurance Portability and Accountability Act for IT security. Section 404 of Sarbanes-Oxley, which requires CEOs to affirm their financial statements, is hazy in how it relates to cybersecurity, and Kurtz notes that his organization is attempting to find and cite case studies as examples of strategies companies can employ to comply with the regulation. He explains that when it comes to Section 404 compliance, firms need to track transactions related to collating their financial statements along with their sanction and assent. He says, "While the CSIA doesn't have legal authority to put down guidelines, what we can do is put together a picture of what's happening in the space, how companies are responding, and help other companies determine what to do." Kurtz says he reports to the senior executives of the CSIA's founding firms, who are eager to collaborate with other cybersecurity-focused organizations such as the Business Software Alliance and the Information Technology Association of America. He also notes that the CSIA will be pushing for increased understanding of cybersecurity issues through close collaboration with people on Capitol Hill.
From SANS' News Bites, September 9, 2004
--Investigative Report: How Hackers Infect PCs To Spread Spam and Steal
Money
- In a landmark study of the economics and techniques of hackers, two top reporters from USA Today have painted a vivid picture of what is really going on in cyber crime today and how it involves millions of home and business users. This article is the first of two parts. Part One vividly illustrates the problem and ends with the challenge: "Consumer outrage needed." On Thursday, September 9, Part Two shows that the problem will just get worse if vendors and ISPs continue to refuse to do their fair share to reduce the risk.
http://www.usatoday.com/money/industries/technology/2004-09-08-zombieuser_x.htm
"The Human Factor Trumps IT in the War on Terror"
Government Computer News (09/01/04); Jackson, William
- Information technology can be used as an intelligence gathering and analysis tool in the war on terrorism, but the organization of the intelligence community will need to change to make the data as effective as possible, according to industry experts. The place of IT in the war on terrorism was the topic of a panel of computer scientists at the University of Maryland. "While there is a lot of good information out there, it isn't getting to the right people at the right time," explained William J. Lahneman, coordinator of the Center for International and Security Studies in the School of Public Policy. The culture of "knowledge is power" in the intelligence community prevents more effective sharing of information, and James Hendler of the university's Institute for Advanced Computer Studies agreed that changing the culture of intelligence agencies would be a huge challenge. The scientists also stressed the need for a change in IT architectures, including the Web. And although terrorists have not used the Internet to carry out any significant attacks, they are using the Web more effectively to galvanize supporters than the U.S. government, according to the researchers.
Click Here to View Full Article
From ACM's TechNews, September 3, 2004
"When E-Mail Points the Way Down the Rabbit Hole"
New York Times (09/02/04) P. E8; Johnson, Kirk
- Spam is a runaway technology phenomenon that focuses on better understanding human interests, according to academics and spam experts. Spam and technologies to counter it develop quickly, but are not developing in the traditional economic sense where the aim is to gain market share; instead, spam technologies are more similar to military stealth technologies, except that to succeed the spam must better understand human behavior. That is why a spam message that offers anti-spam solutions seems eerily self-aware, or at least sensitive enough to know a solicitation to stop messages such as itself is appealing to the targeted reader. Anti-spam research focuses on knowing what is truly of interest to the email user and seeks to block all other messages, while spam purveyors become successful by tapping the messages that users really want, or perhaps did not know they wanted. Interestingly, no one really knows where spam development is headed: "It brings home the idea of technology living an independent existence--a parallel universe of computer programs living in a world of their own, having their own quarrels," says MIT Center on Technology and Self director Sherry Turkle. Unlike self-conscious technology that is developed in the laboratories of science fiction, perhaps a future intelligent spam will be consumed with base human issues such as penis enlargement, online gambling, and debt consolidation. Turkle warns that spam is likely to continue to provide more accurate mirrors of human interests, even to the point where spam filtering technologies may discern users' subconscious desire to read some spam messages. Using Web activity records and personal data, spam and anti-spam software will become more attuned to individual minds.
Click Here to View Full Article
From EduPage, September 3, 2004
More Compromised Data, Or Simply More Disclosure?
San Jose Mercury News, 2 September 2004
- Since January 2004, officials in California have notified nearly 600,000 students, faculty, and staff at the state's higher education institutions that personal data about them had been compromised in a number of separate incidents. In June, for example, an auditor working for the California State University system lost a hard drive that contained information including names, addresses, and Social Security numbers for 23,500 individuals. The largest single incident involved data for more that 500,000 individuals, which was accessed by hackers who broke into computer systems for San Diego State University and the University of California, San Diego. A law requiring notification of such security breaches went into effect in July 2003. Joanne McNabb of the Office of Privacy Protection in the California Department of Consumer Affairs noted that the incidence of such compromises likely has not increased. "It's just that we know about them now," she said, "when we didn't hear [about them] before."
http://www.siliconvalley.com/mld/siliconvalley/9568329.htm
From ACM's TechNews, September 1, 2004
"Organized Crime Invades Cyberspace"
Computerworld (08/30/04) Vol. 32, No. 35, P. 19; Verton, Dan
- Antivirus researchers say a surprising increase in virus and worm activity is linked to an underground economy in identity theft and spam. F-Secure antivirus research director Mikko Hypponen says the connection is not very new, though until recently the writers were thought to be only a rogue subculture. He says MyDoom was the start of a concerted effort to make money from virus and worm infections. Although the MyDoom worm gained notoriety for its denial-of-service attacks against SCO and Microsoft, the more significant activity was going on behind the scenes, when someone scanned millions of IP addresses for backdoors left open by the virus. A network was set up, ready to service the underground spam market. F-Secure analysts decoding encrypted messages in a version of Bagle found warnings to the author of the Netsky.R virus. Bands of hackers, likely Russian immigrants living in different European countries, had been using Bagle and other malware to expand their spam proxy networks, but the Netsky.R author used the infection to clean out those spammers' viruses and was running denial-of-service attacks against their front Web sites. Symantec director Brian Dunphy says that a recent variant of MyDoom featured peer-to-peer networking capabilities that allowed the author to update infected machines and protect his network against rivals. Viruses and worms are also being used to install Web servers on vulnerable systems; Web sites often sell subscription services on compromised computers. Some support identity theft rings, harvesting credit card and other information to sell underground.
Click Here to View Full Article
From EduPage, August 27, 2004
DNA Analysis Used To Fight Spam
BBC, 25 August 2004
- Researchers at IBM's TJ Watson Research Center have modified an algorithm--originally created to discern patterns in protein sequencing--to serve as a spam filter. The algorithm, named Chung-Kwei after a Feng Shui character, analyzes e-mail, looking for patterns of letters that exist in spam but not in legitimate messages. Because of the amount of spam in circulation today, the researchers have an abundance of spam e-mail to feed to the algorithm to train it to identify those strings of characters that indicate a message is spam. Chung-Kwei is able to process 88,000 messages in about 15 minutes, said the researchers, and will continue to "learn" as more e-mail arrives. The tool is able, for example, to identify e-mails that have "S" replaced with "$" as spam. Researchers said Chung-Kwei is able to successfully detect nearly 97 percent of spam.
http://news.bbc.co.uk/2/hi/technology/3584534.stm
From ACM's TechNews, August 27, 2004
"Exhibit Features Viruses as Art"
Wired News (08/27/04); Delio, Michelle
- The "I Love You rev.eng" art exhibit is set to begin a worldwide tour this September in the United States, featuring an historical analysis of hacker culture, hands-on exhibits where people can create and observe computer viruses, and art displays featuring computer code. The show is a second part to the 2002 presentation, "I Love You Computer_Viren_Hacker_Kultur," that was held in Frankfurt, Germany. Curator Franziska Nori says the aim of the show will be to document a range of hacker activities, but especially to highlight how hacker culture embodies the Buddhist teachings of the Dalai Lama. "'Share your knowledge and you will achieve immortality,' and, 'Learn the rules so that you will know how to break them,'" she quotes. Nori says hackers influenced the Internet's development more than any other group, and that there is a large distinction between the large majority of hackers and virus creators and a few that are intent on damaging property. "Most viruses remain to a large extent in private collections within the hacker community and were deliberately never made public," she says. "I Love You rev.eng" refers to reverse engineering, and is a variant from the first show's title as a tribute to virus writing. The show will feature a virus laboratory, called "The Zoo," where people can watch how malware affects computers, and another set-up where people can use virus kits to create their own code and release it on machines in the zoo. In addition to other art exhibits, the show serves as a starting point for Brown University's yearlong study of global networking and will feature a symposium. The show begins at Brown University in Rhode Island on Sept. 11, and will travel to Copenhagen, Denmark, before possibly moving on to other destinations.
Click Here to View Full Article
"A Proactive Approach to Security"
VNUNet (08/18/04); Thomson, Iain
- Symantec chief technology officer Robert Clyde is also a founding member of the IT industry's Information Sharing and Analysis Center, as well as the group's executive committee treasurer. In an interview, he says virus threats will continue to drive the security business, and notes that malware attacks are increasing in frequency and complexity. He says reactive, signature-based security methods are becoming less effective, and more proactive and predictive security is needed, perhaps through behavior blocking and client compliancy. Clyde says, "The time from software patch to exploit is dropping below the time needed for companies to install the patch. Even if you start when the patch is released, most IT departments will take 30 days to test and patch a system and hackers are faster than that now." Hardware security is not enough, and software will continue to have vulnerabilities, Clyde predicts. He says an average of 53 software vulnerabilities are found each week, and most are high-severity. Although that number has leveled off, Clyde thinks that "we're at a knee in the vulnerability curve and the numbers will continue to rise as new, more feature-rich operating systems come on the market." Vulnerability scanners are useful for writing secure code, but they are by no means perfect, and Clyde believes that vulnerability will be a problem for the next 20 years or so. Outsourcing is a better option for some industries than others.
Click Here to View Full Article
From ACM's TechNews, August 25, 2004
"Concerns Mount Over Major Web Strike"
eWeek (08/24/04); Morgenstern, David
- A rash of assaults on primary Internet servers and the recent defeat of the MD5 and Shah Level 0 encryption algorithms are raising concerns among Internet operators that a convergence of political activism and hacking is taking place. Compounding these fears are warnings from security experts that terrorists may launch a long-threatened "electronic jihad" against servers sometime this week; in fact, Kaspersky Labs International founder Yevgeny Kaspersky expects an attack against financial and political sites on Aug. 26, according to a Tuesday report from RIA Novosti. Kaspersky's warning appears to imply that the e-jihad will take the form of wide-scale distributed denial of service attacks such as the ones that targeted Akamai Technologies in June and DoubleClick's domain name system in July, although experts hint that major Internet services as well as root servers are under threat as well. Meanwhile, Packet Clearing House research director Bill Woodcock implies that Internet servers and ISPs could be threatened by the cracking of MD5 and Shah-0, which was detailed at the recent Crypto 2004 conference. The algorithms are employed in numerous commercial applications that include financial turnkey systems, enterprise content servers, and Internet routers. Woodcock likens the MD5 and Shah-0 circumvention to tumbling dominos: "A vulnerability is found, and a bunch of smart people follow the trail until bad things happen," he explains. The technique used to crack the algorithms may be unfeasible, but Woodcock notes that Internet operators are worried that Internet services will be adversely affected if hackers adopt and refine the method.
Click Here to View Full Article
"Selective Shutdown Protects Nets"
Technology Research News (09/01/04); Patch, Kimberly
- Max Planck Institute researcher Adilson Motter has demonstrated that cascade failures triggered by assaults on large, central network nodes could be mitigated by shutting down peripheral nodes. The scientist has built a model showing that the scale of a cascade failure can be dramatically lowered if a certain population of nodes that manage small loads are deactivated before the cascade effect starts, while the overall network load is kept in balance. Finding the right nodes to eliminate is the key challenge, as the wrong nodes can worsen the cascade effect. Nodes have the dual purpose of transmitting and generating load, but central nodes are targeted by attackers because they more often serve as transmitters and thus play a major role in load balancing. Motter's model illustrates that cascade failures produced by sudden load shifts can be diminished by the removal of load-generating nodes, as well as by the shutdown of heavily-loaded connections that convey traffic from load-generating nodes to central distribution nodes. This scheme can be extended to power grids, which consist of generator stations that supply power, local stations that distribute power to customers, and transmission stations that carry power from generators to local stations; automatic devices along the transmission lines shut down grid components when their load becomes unmanageable, and Motter explains that transmission stations are most vulnerable to cascade effects. Intentionally disconnecting local stations from the transmission stations that are about to fail can reduce the size of the cascade, according to Motter's model. "It is still speculative to talk about practical applications [but] I hope to my work will motivate new studies on the control of cascading failures in realistic models of network systems," comments Motter.
Click Here to View Full Article
From SANS NewsBites , August 23, 2004
London Internet Exchange Members Adopt Code of Practice to Thwart Spammers
The Register, 18 August 2004
- Internet Service Providers (ISPs) that belong to the London Internet Exchange (LINX) have approved "a code of practice" to shut down web sites that are advertised by spam, even when the spam itself comes from a third party or another network. LINX also would like to see ISPs take down web sites that sell spamming tools. LINX hopes to spread the standard across the globe in a concerted effort to put spammers out of business. LINX boasts 150 members, including most major ISPs in the UK as well as some in continental Europe, the US and Asia. Read more at http://www.theregister.co.uk/2004/08/18/isp_war_on_spam/print.html and
http://www.linx.net/press/releases/103.thtml.
Yankee Group Study Suggests Most Large Companies will Outsource Security by End of the Decade
Information Week, 23 August 2004
- According to a Yankee group study, nearly 90% of big US companies will outsource security by 2010. Apart from the cost savings, the reasons companies are moving toward outsourced security include the fact that attacks are arriving more and more swiftly, giving companies little time to put appropriate defenses in place. In addition, companies need to focus on compliance with HIPAA and Sarbanes-Oxley regulations. Finally, it is becoming more difficult to describe network perimeters.
http://informationweek.com/shared/printableArticle.jhtml?articleID=29116929.
From Peter Coffee's Enterprise It Advantage, August 23, 2004
Immature standards, encryption attacks impose burdens on early adopters
eWeek, August 23, 2004
- "There must be millions of people," wrote columnist Robert Benchley about 70 years ago, "who are no more equipped than I am to guide a motor vehicle through any more of an emergency than a sudden light breeze. The logical ending to the whole situation is for all the automobiles in the world to pile up on top of one another at one big cross-road."
- When people talk about an Information Superhighway,
Benchley's image quickly comes to my mind. In the same way
that Benchley could never have imagined an H2 bearing down
on a Mini, the people who built the Internet could never
have imagined zombie bot nets mounting distributed-denial-of-service attacks on Net-edge cache servers. The Internet was built to tolerate random failures, not to withstand deliberate and focused attacks; it seems to me that new Internet initiatives still tend toward a science-project definition of technical success that says, "once it can be shown to work, it's done."
- Read the rest of the column at http://eletters.eweek.com/zd1/cts?d=79-1017-6-7-128123-115810-1.
From
ACM's TechNews, August 20, 2004
"Convergence Quagmire: Viruses with Spam"
TechNewsWorld (08/18/04); Lyman, Jay
- A July intelligence report from MessageLabs indicates virus authors and spammers are forming a symbiotic relationship that combines their expertise and strategies into a new class of email security threat. The report finds that BugBear, SoBig, MyDoom, and other viruses are employing spamming techniques so they can proliferate, with financial gains being the ultimate goal. "What is 'cool' is to join forces with the spammers and prove that you're capable of making money out of malicious code," states the report. MessageLabs security analyst Natasha Staley says nearly all viruses released this year have been distributed via spam or have been used to penetrate systems used for spamming, and that treating spam and viruses as a single threat is the best defensive measure against the growing convergence of these two practices. "It's actually a pretty incestuous relationship and it's really hard to separate the two anymore," Staley concludes. IDefense malicious code intelligence
director Ken Dunham believes the merging of viruses and spam is part of cybercrime's natural evolution, and adds that increasing dependence on network protocols and network shares, among other things, is spurring other kinds of cross-breeding between cybercriminals. He observes that the virus/spam convergence is being accompanied by the growing availability of source code, tools, and knowledge used to create and launch malware or spam. Dunham notes that virus writers use spamming techniques to better mask their identity and the starting point of virus outbreaks.
Click Here to View Full Article
From EduPage,
August 18, 2004
SURVIVAL TIME OF UNPROTECTED PCS DROPS
CNet, August 17, 2004
- Researchers at the SANS Institute's Internet Storm Center estimate that an unprotected PC will be compromised within 20 minutes of being connected to the Internet, down from an estimated 40 minutes last year. The estimate is based on observations of vacant IP addresses, which received reports approximately every 20 minutes. According to the researchers, if those reports come from Internet worms, the unprotected machine would likely become infected within 20 minutes, which is especially troublesome because most patches that would protect the computer take longer than that to download and install. Scott Conti, network operations manager for the University of Massachusetts at Amherst, said that, as a test, his institution recently put two unprotected computers on the school's network, and both were compromised within 20 minutes. As a result, all computers at the institution will be checked before they are allowed to connect to the network.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 18, 2004 - Vol 6, #33
"Philippine Government Plans National Cyber Security System"
IT World, August 10, 2004
- he Philippine government has outlined its plan for a national cyber security system to protect government and business systems from cyber attacks. There are six priority initiatives designed to help get the program going. They include enacting a Computer Crime Law, reducing the risk of threat to the country's electronic critical infrastructure with the help of a risk and vulnerability assessment plan and the creation of an Incident Response Team Coordinating Center.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 18, 2004 - Vol 6, #33
"AOL and Yahoo to Use Authentication Technology in Fight Against Spam and Phishing"
Computer World, August 12, 2004
- America Online and Yahoo both plan to begin using email authentication technology to fight the worsening problem of spam and phishing scams. AOL plans to use Microsoft's Sender ID authentication architecture to verify that incoming email is legitimate; Yahoo will use DomainKeys technology to sign outgoing email.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 18, 2004 - Vol 6, #33
"eMail Security Companies Say They Will Support Sender ID"
TechWeb , August 12, 2004
- A number of email security companies voiced support for Microsoft's Sender ID sender authentication standard and said they would incorporate it into their products. The companies had gathered at a summit requested by the eMail Service Provider Coalition (ESPC) and hosted by Microsoft.
Click Here to View Full Article
From
ACM's TechNews, August 16, 2004
"Cellphone Viruses: How Worried Should You Be?"
Business Communications Review (07/04) Vol. 34, No. 7, P. 14; Krapf, Eric
- Security experts warn that the Cabir virus, which spread through smart cell phones last month but did not actually do damage, is an example of the havoc that could take place. Cabir may or may not have been the first wild cell phone virus; it used the Bluetooth specification to spread through phones that use the Symbian operating system. Core Competence President David Piscitello says Cabir arrived as a message. "The reason it can infect other phones by proximity is that lots of phones are left with default settings on their Bluetooth interface," he explains. Cell phone viruses can also spread through ring tones, email attachments, text messaging, skins, pictures, or audio recordings. Piscitello considers cell phone viruses serious because the phones' operating systems are fairly fragile. He says, "You can create all sorts of denial of service attacks against the relatively fragile operating systems of handhelds and cell phones. Remember, these devices don't have lots of memory
or CPU, so overwhelming them isn't exactly hard." Core Competence vice president Lisa Phifer also notes that few people may even know if their phones are infected. PDAs are also at risk, but there is some antivirus software available for them; users should also consider host-based intrusion-detection and personal firewalls for handheld devices, Phifer adds. Phifer also warns that VoIP is at risk for Wi-Fi-enabled VoIP technology connected to WLANs. Piscitello advises users to consider their IP phones more computer than phone, and thus just as vulnerable to viruses. No Link provided.
From
ACM's TechNews, August 13, 2004
"Unprecedented Security Network for Olympics"
Associated Press (08/10/04); Varouhakis, Miron
- Security at the Olympic Games in Greece this month will include street surveillance cameras, paired with sophisticated software, that will act as digital security guards collecting intelligence. The $312 million system was developed by a consortium led by Science Applications International and gathers images and audio from more than 1,000 high-resolution and infrared cameras, four mobile command centers, 12 patrol boats, one blimp, 4,000 vehicles, and nine helicopters. Speech-recognition software will put spoken words into text, and the text and other electronic communications will be searched for patterns. The system covers nine ports, airports, greater Athens, and all the other Olympic cities, and has components used by U.K. and U.S. government intelligence agencies. In preparation for the Olympic Games, the Greek government modified legislation to allow increased tapping of mobile and land line phone conversations. With the technology-enabled security measures and
surveillance, authorities will be able to respond to critical incidents in the most effective way since they already have important information on hand, explains Greek police spokesman Col. Lefteris Ikonomou. The camera software is intended to spot and rank possible risks, says Dionysios Dendrinos, general manager of consortium member One Siemens. It is also sophisticated enough to distinguish between a tire blowout and a gunshot. The security net also includes a sensor network established throughout Athens designed to detect chemical agents. There have been some protests over the use of the extended security measures, since some people fear the loss of privacy.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 11, 2004
"APWG Data Shows Steady Increase in Phishing Scams During First Half of Year"
Computer World, August 4, 2004
- Data from the Anti-Phishing Working Group indicates that the incidence of phishing scams increased an average of 50% a month during the first half of 2004. A Websense Inc. analysis of APWG's report found that 25% of phishing sites were on hacked servers and that 94% of the sites allowed attackers to remotely download personal information entered by those who fell prey to the attacks.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 11, 2004
"HOMELAND SECURITY AND GOVERNMENT SYSTEMS SECURITY"
Computer World, August 6, 2004
- Sensitive Building Data is Readily Available on the Internet (6 August 2004) Sensitive information about the physical security of various companies has been found on their corporate web sites. For example, there are 3-dimensional models of the exterior and some of the interior of the Citigroup's Manhattan headquarters; there is also information about the building's structural design flaws. Amit Yoran, director of the Homeland Security Department National Cyber Security Division, says they may consider publishing best practices guidelines for companies regarding the availability of such information.
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 11, 2004
"Hospitals Defy Patching Restrictions"
NW Fusion Ellen Mesmer, August 9, 2004
- Concerned that patient safety could be threatened, hospital staff members are applying Microsoft's patches to various Windows-based devices in defiance of the manufacturers' restrictions. Manufacturers often have a long testing period or are concerned that a patch may impair a device's functionality. Hospital staff are concerned that malware could imperil patient safety and that applying patches is a part of HIPAA (the Health Insurance Accountability and Portability Act) compliance. The Food and Drug Administration (FDA) is encouraging hospitals that run into these problems to file complaints in writing which could result in the manufacturers losing their "government seal of approval."
Click Here to View Full Article
From
The SANS Institute NewsBites@sans.org, August 11, 2004
"FCC Rules: Spammers Need Consent to Send to Wireless Subscriber Messaging Service Domains"
Washington Post, Information Week Articles
- The Federal Communications Commission (FCC) has issued a new rule requiring mass marketers to obtain express permission from users before sending commercial messages to mobile phones and PDAs. The Commission is also requiring that the Commercial Mobile Radio Service providers compile a list of all pertinent Internet domains that will be used as a do not spam list; the list would not contain individual addresses.
Click Here to View Full Washington Post Article
Click Here to View Full Information Week Article
From
The SANS Institute NewsBites@sans.org, August 11, 2004
"Reverse Engineering of Windows XP SP2"
PCWorld.com (08/03/04); Brandt, Andrew
- Reverse Engineering of SP2 Reveals Strong Security Approach (9 August 2004) Security company F-Secure has reverse-engineered SP2 and believes the update will do a good job protecting against outbreaks of worms like Sasser, Slammer and Blaster; infections will spread more slowly and it will be more difficult for automated worms to spread on updated systems.
Click Here to View Full Article
From
ACM's TechNews, August 9, 2004
"Feds Seek a Few Good Hackers"
PCWorld.com (08/03/04); Brandt, Andrew
- The recent Defcon 12 hackers' conference included a recruitment presentation by federal law enforcement agents searching for talented people to work for the government. "The Department of Defense understands how important computers are to defending the United States, and is always on the lookout for good people," said Alvin Wallace, a supervisory special agent for the Air Force's Office of Special Investigations. The presentation was well-received with many of the twenty-something crowd taking business cards and asking questions about pay, security clearances, and college scholarships. Former National Security Agency director of information assurance Mike Jacobs spoke, urging hackers to help protect the United States from spies and terrorists. He said that when he worked at the agency, he would remind his colleagues that "the hacker community is probably our ally, and we need to pay attention to what they're doing out there." Some hackers may have trouble getting security
clearances due to past misbehavior. Jim Christy, director of the Defense Department's Cyber Crime Center, says that the fight against terrorism has reduced security agency resources for cybercrime. The presenters noted that recruitment has to continue because employees tend to move into private industry. Wallace says his office provides "one of the best training grounds...Some of the best computer crime investigators in other federal agencies had their start in the Air Force Office of Special Investigations."
Click Here to View Full Article
From
ACM's TechNews, August 6, 2004
"Stealth Wallpaper Keeps Company Secrets Safe"
New Scientist (08/04/04); Fox, Barry
- BAE Systems, under contract with British telecoms regulator Ofcom, has developed a technique to thwart the interception of Wi-Fi signals from office base stations while ignoring mobile phone signals, through a system based on a secret "stealth" technology originally created to hide military radars. The technology is a wallpaper composed of Frequency Selective Surface sheeting, which can mask radar antennas by being electrically programmed to permit only the exact frequency the antennas wish to transmit and receive, while soaking up all other frequencies. The sheeting consists of a kapton substrate coated with a thin layer of copper on both sides: One side is covered by a grid of copper crosses, while on the other side matching crosses set at a 45-degree angle are etched off, leaving a copper film with a grid of cross-shaped holes. Careful adjustments to the size and spacing of the crosses allows the wallpaper to pass specified frequencies while inhibiting all others, according
to BAE. Ofcom engineers say the wallpaper can stop Wi-Fi signals at 2.4 GHz, 5 GHz, and 6 GHz, while permitting the passage of 3G and GSM cell phone signals, as well as emergency calls. Linking diodes between the copper crosses allows frequency filtering to be switched on and off, and the wallpaper can be produced in volume relatively cheaply. Up to now, the only effective measure to prevent interception of office communications was to line walls with aluminum foil and cover the windows with radio-absorbent glass, but such a "Faraday cage" scheme precludes the use of mobile phones in the office. An even thinner, transparent version of the wallpaper is being developed as a window covering.
Click Here to View Full Article
From
ACM's TechNews, August 6, 2004
"Onion Routing Averts Prying Eyes"
Wired News (08/05/04); Harrison, Ann
- Tor is a second-generation communications system being developed by the U.S. Naval Research Lab that employs onion routing to anonymize Web surfers and protect their activities from corporate or government eavesdropping. In an onion-routing scheme, messages are sent through a distributed network of nodes selected at random; each node is aware of its preceding and succeeding nodes only, and each server has a symmetric encryption key that removes one layer of a message and reveals instructions for the next node along the route. Onion routing cannot support flawless anonymity, but it helps shield users from snoopers who are not monitoring both the sender and recipient of the message at the time the transaction transpires. Tor is designed to be easier to use and less problematic than its first-generation predecessor, and developers say the system can thwart the tracking of users by Web sites, inhibit the compilation of Web site visitor lists by governments, keep whistleblowers
safe, and subvert local censorship by employers, ISPs, or schools. "The point of the Tor system is to spread the traffic over multiple points of control so that no one person or company has the ability to link people," explains programmer Roger Dingledine, who adds that companies could employ the system to carry out prudent competitive research or route their staff's Web browsing to prevent employment sites from ascertaining which employees are job-hunting. The Navy's motivation in funding Tor's development is to protect the identity of government workers who gather intelligence and conduct politically volatile negotiations through anonymous communication. Dingledine and Nick Mathewson are developing Tor as a research platform with a global pool of open-source software developers; users are allowed to operate as many Tor nodes as they want.
Click Here to View Full Article
From
ACM's TechNews, August 6, 2004
"FCC Takes on Spam, Copying"
Wired News (08/05/04); Grebb, Michael
- The FCC adopted a number of proposals on Aug. 4 concerning wireless spam and digital copying controls, as well as how wiretapping rules should be applied to voice-over-Internet-protocol (VoIP) services. The commission motioned that certain wireless spam messages be banned as part of its deployment of the Can-Spam Act: Unsolicited "mobile service commercial messages" were banned, but short message service messages that go directly to phone numbers were permitted, and spammers could exploit this exemption. "Transactional" and "relationship" messages such as billing statements were also exempt, and the job of defining what messages fit into those categories was left to the FTC. Wireless providers were also mandated by the FCC to submit wireless domain names to the commission so that a public database of not-to-be-spammed domains can be compiled. The FCC also proposed that certain VoIP telephony services fall under the jurisdiction of the Communications Assistance for Law
Enforcement Act's (CALEA) wiretapping rules, which currently exclude ISPs, although law enforcement authorities support the application of those rules to the Net. However, the FCC's proposal specified that CALEA could only cover "connected" VoIP providers that permit Internet-to-traditional phone calls, while peer-to-peer VoIP services would be exempt. The commission also approved 13 technologies that digital TV equipment manufacturers can incorporate into devices that work with "broadcast flag" copy controls, although some technologies such as TiVoGuard permit limited cross-platform distribution of copied content. The Motion Picture Association of America expressed its disappointment that the agency approved TiVoGuard without conducting "further analysis," while Fred von Lohmann with the Electronic Frontier Foundation said that users are still left vulnerable to crippling copy protections.
Click Here to View Full Article
From
ACM's TechNews, August 4, 2004
"Talking Computer Security"
CyberDefense Magazine (07/04) Vol. 2, No. 7, P. 16
- In a roundtable discussion with CyberDefense Magazine, eBay VP and former White House Special Adviser for Cyberspace Security Howard Schmidt, PatchLink Chairman Sean Moshir, and Foundstone President Stuart McClure talk about the current status of the computer security industry as well as future directions it may take. The panelists provide numerous reasons why the Internet's safety and security is so hard to maintain, among them: The design of the Internet to be an open and collaborative environment that supports anonymity; the inability to keep up with new problems, which are being unearthed on a daily basis; and vendors' eagerness to give customers special features and functionalities without considering how they might impact security. Schmidt remarks that America has taken a vanguard position in boosting cyber-defenses through private-sector and international partnerships, and McClure reports good progress in security deployments by American companies and greater security
education. A General Accounting Office report indicates that progress has been made in security patch management, but Moshir contends that the narrowing gap between the announcement of a vulnerability and its exploitation means that patch automation can no longer be just a luxury. Schmidt observes that on-demand Web-based vulnerability evaluation is key to patch management, while McClure says, "The two will go hand-in-hand eventually." McClure raises the need for more knowledge about security requirements among small organizations, while Schmidt calls for better identification of IT systems' interdependencies, developers' prioritization of software quality control over new features and usability, expanded cybersecurity education, and better enforcement of cyber criminal investigation and prosecution. The possibility of a cyberattack comparable to 9/11 is debatable: Schmidt says that society's resiliency against network assaults is improving, but this is no reason to relax our vigilance.
Click Here to View Full Article
From
ACM's TechNews, August 4, 2004
"Fingerprinting Your Files"
Technology Review (08/04/04); Garfinkel, Simson
- Cryptographic hash functions are one of the most useful mathematical tools in computing today, because they allow people to easily protect passwords, stored files, and even database information. One of the most recent applications comes from three Stanford University researchers, who created a browser plug-in that scrambles one easily remembered password for different e-commerce sites based on those sites' Web domains; this protects people from hackers who could use their uniform log-in and password to gain access to multiple accounts, while providing users with the convenience of remembering just one set of identifiers. Yahoo! also uses a version of hash cryptography in its registration process where the user computer is sent a "challenge" sequence that must be appended to the entered password, protecting people using insecure public terminals from hackers sniffing Web traffic, for example. Hash functions are mainly based on research done in the 1980s by RSA co-inventor and
MIT professor Ron Rivest, who developed the system as a way to ensure the integrity of a file; hash files garnered from a set of computer files can let the owner know those files were not tampered with, for instance, because any change in the input would produce a different hash code. Hash technique is also used in the Surety secure timestamp service to verify a file was in existence at a certain time, and this involves publishing the hash code in a well-known location owned by a third-party, such as the New York Times classifieds. Although the Message Digest #5 (MD5) hash function is the most widely used today, perhaps the most secure is the U.S. government's Secure Hash Algorithm, or SHA-1, which caused some controversy at the time of its announcement because cryptographers theorized it contained a backdoor for U.S. intelligence services. Hash functions continue to be used in innovative ways, and might possibly be used to secure entire databases as proposed in the book "Translucent Databases" by
Peter Wayner.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"The Shaky State of Security"
InfoWorld (07/26/04) Vol. 26, No. 30, P. 32; Roberts, Paul F.
- The 2004 InfoWorld Security Survey of over 600 IT professionals paints a fairly bleak picture of enterprise security: Only 38 percent of respondents report strong confidence in their security, while just 8 percent report extreme confidence. IT leaders are also highly concerned with a lack of sufficient personnel and training to bolster security, while the swelling ranks of applications available online has increased concern about application vulnerabilities. Security fears are being stoked by the growing number of worms and viruses plaguing the Internet over the past 12 months--in fact, almost 30 percent of survey respondents called malicious code the greatest single threat to enterprise network security. Thirty percent of respondents have no clue as to how many attacks their network was subjected to in the past year, and 22 percent do not know how many successful attacks transpired at that time. These figures come as no surprise to SANS Institute research director Alan Paller,
who explains that "It's difficult to find infected machines when the infection is meant to be kept hidden." Bank of America's John Schramm says low-level passive attacks occur with such regularity on some corporate networks that IT administrators usually ignore them and concentrate on higher-level attack data, while 57 percent of respondents working for enterprises that manage their own network security say the effectiveness of intrusion detection is often determined by the number of staffers on hand. Forty percent of surveyed IT professionals blame network exploits on operating system flaws, 24 percent report their organization suffered a denial-of-service attack, and 19 percent cite buggy Web applications; yet many respondents' loyalty to major software vendors remains steadfast. This year's respondents are chiefly fearful of malicious code, but experts believe that spyware, identity spoofing, and other threats of less concern are becoming increasingly serious, which makes a case for boosting
awareness of enterprise security.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"Hack This"
EDN Magazine (07/22/04) Vol. 49, No. 15, P. 26; Webb, Warren
- Dealing with malware on desktop systems is often as simple as rebooting the computer, but this strategy does not apply to embedded systems, whose operation must continue even when faced with security threats. The National Institute of Standards and Technology (NIST) has prepared a list of security-related design principles for designers to think about throughout the embedded systems' lifespan, such as defining a security agenda, designing the product, accommodating upgrades and changing threats, incorporating a new technology, erecting multiple security layers, and training programmers to develop protected software. Issues that must be addressed in order to determine the best security measures include what data needs to be protected and what kinds of potential attackers are out there and how sophisticated they are. Because embedded devices, particularly portable ones, are vulnerable to so many more threats than desktop systems, designers are advised to include physical
protection, such as hardened enclosures and seals or tapes that provide visible evidence of tampering, in addition to traditional software security. Designers can also follow embedded software security standards, such as the Common Criteria for Information Technology Security Evaluation and Multiple Independent Levels of Security. Users must pass a multi-stage authentication process before they are allowed to interact with secure embedded systems. When an embedded system must be linked to a network or the Internet, designers encrypt the data either symmetrically or asymmetrically, though both methods require a secret key and an encoding sequence to translate plain text into cipher text and back again. Embedded-product-development budgets are expected to grow so these safeguards can be provided.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"Search Engines Expose Vulnerabilities"
Computerworld (07/29/04); Willoughby, Mark
- Hackers use search engines to discover vulnerabilities in Web site source code, and security experts forecast an increase in this behavior. "People have discovered that they can make a really tight Google query that comes back with results that show lots of vulnerabilities at once," says SPI Dynamics application security analyst Matt Fisher. He points out that backup files and source code are sometimes stored in clear text or as HTML files, adding that the problem lies with poor Web application security, not search engine security practices. Passwords are sometimes found in embedded code, and searching with an invalid file extension, such as .inc, .bak, or .old, will usually return Web site source code. The information tells what the site is storing, as well as configuration data that could be helpful in a hack. "Developers are not taught secure coding," Fisher says, noting that firewalls will not protect against such invasions. Chris Wysopal, vice president of @stake, says
that hackers also use search engines to hide their locations and to complicate forensic investigations. Since hackers view the search engine results through a third-party cache, there is no information left about their IP address. Also, the MyDoom.O worm used search engines to locate email addresses stored in a domain range. Wysopal warns people must understand how attackers work and that they are not usually going after a given site but just searching for an opportunity.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"Hackers Plan Global Game of 'Capture the Flag'"
CNet (07/30/04); Lemos, Robert
- Hackers from all over the U.S. are planning to engage in a massive game of capture the flag next February, in which they will launch a cyberattack of unprecedented scale against systems set up and maintained by other hackers. The three-day event will pit East Coast against West Coast hacker teams in what is publicized as the first large-scale hacking competition to be waged over the public Internet; the contest's organizers, the Ghetto Hackers security group, expect to have 1,000 participants signed up by February. The game is being advertised at this week's Defcon hacking convention. So that the game does not leak onto the Internet, the Ghetto Hackers intend to build a network that runs on the Internet but is independent from it, through the use of a virtual private network. Security experts are largely unfazed by the event: Counterpane Internet Security founder Bruce Schneier notes that most players will not resort to "large-scale, uncontrollable attacks." Jennifer Granick of
Stanford University's Center for Internet Law and Society reports that in a case where a virus or worm spills over from the game onto the Internet and causes damage, there could be a basis for legal action. Doug Tygar of the University of California, Berkeley doubts that the capture-the-flag game will yield anything significant to scholars, though he does see value in the experiment as a learning experience. Every year for the last three years at the Defcon convention, the Ghetto Hackers have coordinated a small capture-the-flag game in which eight teams hack each other on a closed network, but next year's contest promises not only to be global but to involve more amateur hackers.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"Academics Enlist in Spam Battle"
eWeek (07/31/04); Hicks, Matt
- The Conference on Email and Anti-Spam, which brought together researchers from both academic and industry labs, represented the first serious academic conference to focus on spam and spam countermeasures, according to Microsoft Research's Joshua Goodman. The hottest debate centered on the proliferation of economic-based models for spamming deterrents, such as programs where spammers pay a fee for sending unsolicited commercial email, perhaps as a micropayment when a message is determined to be spam by a recipient. The same panel explored a Microsoft research project that employs a computational puzzle strategy to force spammers' computer systems to consume additional CPU or memory resources to send email in bulk, as well as challenge-response questions. University of Cambridge researcher Richard Clayton argued that each deterrent could be subverted by determined spammers. Challenge-response systems, for instance, could be thwarted by cheap labor employed by spammers, while
computing power could be stolen from zombie systems in order to beat computational obstacles. "The problem is that not only is my machine insecure and my identity insecure but that my money is insecure as well," Clayton explained. Presentations at the conference included: an analysis of phishing schemes by MailFrontier engineer Jon Oliver, who concluded that even legitimate marketing emails from major companies are being misinterpreted as phishing scams because the problem is so widespread; a report from the University of Illinois at Champaign-Urbana's Ben Gross that 50 percent of people use multiple email accounts; and observations from Geoff Hulten of MSN's Anti-Spam Technology and Strategy Group that spam for non-graphical sexual products is increasing dramatically, while spam for explicit sexual products is falling.
Click Here to View Full Article
From
ACM's TechNews, August 2, 2004
"Hackers Are Discovering a New Frontier: Internet Telephone Service"
New York Times (08/02/04) P. C4; Belson, Ken
- Internet phones are becoming more and more attractive to hackers as the technology proliferates among home and business users. Several malicious attacks directed against Net phone networks have already resulted in millions of dollars in lost business. Hackers or angry employees with access to a corporate phone server can listen in on conversations by secretly setting up software that tracks voice packets, and Net phone tapping is much easier than wiretapping. Phone manufacturers and Internet security experts say the damage caused by Internet phone hacking has been low, while quantifying the extent of the damage is difficult because the technology is immature and many companies are reluctant to reveal problems; however, the general feeling is that Net phone exploitation will become more frequent and more serious as companies establish digital phone networks and integrate them with their data networks. "Voice over Internet phones are not in the spotlight of hackers yet, but in this
voyeuristic world, if someone can listen in on people's conversations and get a thrill, they will," warns Avaya security consultant Joe Seanor. Beyond cheap thrills, hackers may eavesdrop on digital phone conversations to gather information that can be sold to rival companies. Measures hackers may take against digital phone networks include programs that seek holes in firewalls and disrupt phone traffic and counterfeit voice packets that can get past security programs. Vonage and other companies supply Internet calling services that are more difficult to hack into, but hackers could still infect an individual phone user's computer and eavesdrop on any emails and voice calls that go through the compromised system. Experts say firms can avert incidences of internal sabotage by installing encryption software and restricting code access to a select handful of employees or resort to "deep packet inspection" in case the first strategy fails.
(Articles published within 7 days can be accessed free of charge on this site. After 7 days, a pay-per-article option is available. First-time visitors will need to register.)
Click Here to View Full Article
From
ACM's TechNews, July 30, 2004
"Internet Snagged in the Hooks of 'Phishers'"
Washington Post (07/29/04) P. E1; Walker, Leslie
- Phishing attacks are occurring more frequently, worrying the e-commerce and banking industries. According to Gartner, some 57 million U.S. adults have received a phishing email, and nearly 11 million clicked on a false link, while 1.8 million actually gave out personal information. The Federal Trade Commission is planning a summit this autumn to focus on authentication tools guarding against phishing attacks, and the FBI will start a drive to identify and catch phishers next month. SAIC chief scientist James Jones says that phishers seem to be getting pickier about their targets and appear to be culling target lists. Meanwhile, companies such as Earthlink are feeling the pain along with their customers. Each time a phishing exploit targets Earthlink customers, the company receives 40,000 phone calls from users, says senior manager Scott Mecredy. Earthlink offers ScamBlocker software that keeps a blacklist of known phishing sites on people's Web browsers. VeriSign notes that the
attacks are becoming more sophisticated, with 93 percent of the emails the company examined containing spoofed return addresses to make them look more legitimate. Phishers are also getting better at making their fake sites look like the real thing and can camouflage the real Internet address or replicate the small padlock icon at the bottom right-hand corner. There is a need for universal tools to verify the authenticity of emails and Web sites. Next month the FBI will launch a new concerted effort with various law enforcement agencies called Digital Phishnet designed to identify and catch phishers. Meanwhile, experts say online commerce is suffering due to Internet security concerns. Gartner analyst Avivah Litan says, "I think we will see the slowdown accelerate. And if the problems aren't fixed, people will use the Internet for surfing, but they won't transact online."
Click Here to View Full Article
From EduPage,
July 7, 2004
WORM VARIANT CLOGS E-MAIL, SEARCH ENGINES
ZD-Net, July 26, 2004
- A variant of the MyDoom worm hit early Monday, clogging e-mail accounts worldwide and slowing search engines Google, Yahoo, AltaVista, and Lycos because it automatically performs Web searches on those search engines after it infects a PC. Tens of thousands of PCs have reportedly been infected. Looking for e-mail addresses on search sites is a twist on earlier variants of MyDoom, which looked for addresses only on the host hard drive. ZDNet, 26 July 2004
Click Here to View Full Article
From
ACM's TechNews, July 26, 2004
"An Eye Opener on Open Source Internet Security"
IST Results (07/22/04)
- The purpose of the Information Society Technologies program-funded SECRETS project was to assess the advantages and disadvantages of open source software for Internet security for the benefit of the public and private sectors, and its evaluation of the toolkit for deploying OpenSSL's Secure Sockets Layer (SSL) and IPSec's Free Secure Wide Area Network (FreeS/WAN) yielded mixed results. The protocols' functionality was tested in the areas of secure e-commerce, secure mobile communications, network monitoring, and intelligent networks. Intrasoft International's Antonis Ramfos reports that one of open source software's major drawbacks is that the organizations that devise the protocols frequently fail to capably support them afterwards, while a dearth of standardization has led to interoperability problems with other open source software. Such problems were typical of FreeS/WAN, according to the SECRETS evaluation. Despite such problems, Motorola's Ross Velentzas says the SECRETS
project determined that the protocols' deployment is "worth considering by commercial organizations and governments for integration into the software products" they build or employ. The utilization of OpenSSL by others is much easier than FreeS/WAN because, unlike Free/SWAN, OpenSSL boasts sufficient documentation from its organization. The SECRETS partners, which include Motorola, Intrasoft, and Alcatel, are still working with open source software for Internet security, and Ramfos and Velentzas concur that both the public and private sectors will use such protocols more extensively in the future.
Click Here to View Full Article
From
ACM's TechNews, July 26, 2004
"Wanted: Cybersecurity Experts"
Medill News Service (07/22/04); Kumler, Emily
- The federal government was urged to make a greater commitment to cybersecurity and to
have cyberspace experts take on a larger role in Homeland Security efforts during a hearing before the House Science Committee on July 21. Cybersecurity experts said more educational programs are needed, and added that courses will have to be up-to-date and be able to adapt to the latest demands of cyberspace. Chet Hosmer, president of Wetstone Technologies, a cybersecurity research development company, stressed that security experts will need to make adjustments quickly because potential attacks can develop and change at "Internet speed." Hosmer also took issue with the setup of higher-education curricula, which is producing fragmented cybersecurity training programs because of its rigidity. The social science department offers criminal justice programs, while computer science is relegated to math or computer science departments. "Building programs that cross domains is quite difficult for many reasons, and the student typically lacks depth in either area and is ill-prepared for [work in] digital
investigation after graduation," said Hosmer. Some educators saw community colleges as an ideal resource for security training because of their focus on practical skill. Military educational programs, such as the National Strategy to Secure Cyberspace, are another form of cybersecurity training.
Click Here to View Full Article
From
ACM's TechNews, July 23, 2004
"Is Your Computer a Loaded Gun?"
Salon.com (07/22/04); Vaidhyanathan, Siva
- The Senate Judiciary Committee will hear testimony today on the Induce Act, which aims to ban technologies that enable copyright infringement and allow civil penalties for users that intentionally assist a third person in violating copyright. Although the Inducing Infringement of Copyrights Act is aimed specifically at changing the behavior of 60 million Americans who have participated in unauthorized file-sharing, it is so broad in its potential application that it makes basic technology components suspect. Not only would this law undermine the landmark 1984 "Betamax case" that provides for reasonable recording and archiving, but it also threatens to stifle technological innovation. Peer-to-peer file-sharing companies would be the direct targets of the Induce Act because they offer the interface software people use to easily share files on the Kazaa and Grokster networks. Last year, a federal court ruled these software makers cannot be responsible for the illegal activities of
their users because of the way they are designed; moreover, a previous federal court ruling allowed new digital technologies such as the MP3 player because they had "substantial non-infringing uses." The Motion Picture Association of America and Recording Industry Association of America (RIAA) say the Induce Act does not target normal technology, or "neutral technology," in the words of the RIAA's Mitch Bainwol--yet no technology is neutral, especially when it is as powerful and enabling as networked digital technologies are. When users have the opportunity to use alternative file-sharing technologies such as Gnutella, ICQ, FreeNet, and BitTorrent, they will do so. Unless authorities and industry officials are willing to re-architect the entire system to disallow this misbehavior, interfering policy such as the Induce Act will fail, writes Siva Vaidhyanathan, New York University assistant professor of culture and communication.
Click Here to View Full Article (Access to this article is available to paid subscribers only.)
From EduPage,
July 7, 2004
PIRACY REPORT STIRS CONTROVERSY
New York Times, July 19, 2004
- A recent report by the Business Software Alliance (BSA) about the cost of software piracy has prompted some to suggest a political motive for the report. Two weeks ago, the BSA issued a report that estimated annual losses to software piracy at $29 billion. To some, however, the timing of the report--released not long after a Senate bill was introduced that would significantly strengthen copyright law--was not merely coincidental. Opponents of the Senate bill argued that it would effectively invalidate a Supreme Court decision that protects those who develop technology that could be--but is not necessarily--used for copyright violations. Overturning that precedent, said critics, would only serve to protect interests of copyright holders and would stifle technological innovation. Critics of the bill contend that the BSA, which has previously estimated losses to piracy at $13 billion, exaggerated the amount and released the report at a time that it would influence senators
considering the bill. Supporters of the bill said it is sufficiently focused to target egregious violators of copyright. The BSA defended the new estimate, saying the data that led to the higher number were more comprehensive than in previous studies. New York Times, 19 July 2004 (registration req'd)
Click Here to View Full Article
From
ACM's TechNews, July 19, 2004
"Loose Clicks Sink Computers"
Baltimore Sun (07/19/04) P. 6A; Stroh, Michael
- Stray signals discharged from an electronic device can unintentionally reveal sensitive data, a phenomenon known as "compromising emanations" that has long been an attractive area of study for civilian computer researchers. In one experiment, Cambridge University computer scientist Markus Kuhn can intercept radio waves emitted by laptop video connectors, and he says that "There are probably a half-dozen or dozen exciting phenomena yet to be discovered." In another experiment, Kuhn was able to rebuild the image on a computer screen by analyzing its reflected glow on a nearby wall, while Lockheed Martin Space Systems' Joe Loughry and Auburn University's David Umphress learned that the patterned blinking of light emitting diodes embedded in hardware components can give hints about the information passing through the machine. The exploitation of compromising emanations has been a longstanding tradition, and about four decades ago the U.S. military started a highly classified project
run by the National Security Agency to develop hardware that could sense and block such signals. Electromagnetic radio waves have long been the most worrisome kind of compromising emanations, but more subtle electronic signals have been uncovered in recent years. A pair of IBM researchers, for example, developed a relatively inexpensive technique to figure out what a person is typing by training neural network software to translate unique sound waves produced when the keys strike a membrane between the keyboard and its base; the use of a parabolic microphone allowed the experimenters to listen in from a distance of almost 50 feet. Meanwhile, Eran Tromer of the Weizmann Institute revealed at a May conference that encrypted data could theoretically be cracked by monitoring high-frequency noise emitted by Intel Celeron microprocessors.
Click Here to View Full Article The Baltimore Sun has removed this link - they may have corrected the problem.
From
ACM's TechNews, July 14, 2004
"Computer, Heal Thyself"
Salon.com (07/12/04); Williams, Sam
- Berkeley researcher and ACM President David Patterson and Stanford scientist Armando Fox's Recovery Oriented Computing (ROC) project focuses on the design of computer systems that can can rapidly bounce back from malfunctions. The initiative is just one of many "autonomic computing" projects that are sweeping academic and corporate research facilities. Fox says modern systems are plagued with software bugs that programmers have had to contend with since "the beginning of time," and he and Stanford doctoral student George Candea have co-authored a series of papers that probe "micro-rebooting," a strategy in which system managers simply reboot the malfunctioning elements of a computing network, an approach that Candea says often fixes the bug faster than tracking down and correcting the root cause. Both he and Fox have devised recursive restartability, a preventative maintenance process whereby an automated network manager reboots each branch of a network's node tree, while Candea is focusing on the integration of micro-rebooting and fault injection, a strategy he calls crash-only computing. The doctoral student has created a Java applications server split into a management element that periodically queries the software system and looks for any indications of bad data, and a monitoring element that assesses the error path and malfunctioning component and triggers a micro-reboot. The National Science Foundation has funded University of Virginia researcher David Evans' project, which mimics biological systems more closely by having modules in a software network communicate in a manner modeled after chemical diffusion. Each module is programmed to construct and maintain a 3D superstructure, after which various modules are exposed to destructive data and purged from the system when they fail; the network is designed to replace the lost modules by tapping a distributed memory or "signal" of each component's position and function.
No Additional Article Link
From
ACM's TechNews, July 14, 2004
"Hacktivism and How It Got Here"
Wired News (07/14/04); Delio, Michelle
- The term "hacktivism" was not coined until 1998, when several members of the Cult of the Dead Cow (cDc) hacker organization held an online discussion of how hacking could be used to promote political freedom in China after the Tiananmen Square incident. Professor Ronald Diebert of the University of Toronto's Citizen Lab explains, "The combination of hacking in the traditional sense of the term--not accepting technologies at face value, opening them up, understanding how they work beneath the surface, and exploring the limits and constraints they impose on human communications--and social and political activism is a potent combination and precisely the recipe I advocate to students and use to guide my own research activities." He adds that increasing numbers of mainstream human rights activists and major foundations are embracing hacktivism, and singles out cDc in particular for its often irreverent, ethical, and ingenious tactics. CDc leverages the section of the UN Declaration
of Human Rights stating that freedom of opinion and expression without interference and through any media is a universal human right. Oxblood Ruffin, a member of cDc, says the group has been establishing relationships with grass-roots and traditional human rights organizations. One cDc group, Hacktivismo, has devised tools that permit people to access and exchange information marked as undesirable by their government. Patrick Ball, who directs human rights programs at the nonprofit Benetech, says "hacktivism is an opportunity for engaged young programmers to do cool and socially beneficial stuff with their technical skill and curiosity--instead of getting in trouble."
Click Here to View Full Article
From
ACM's TechNews, July 12, 2004
"For Hackers, Shop Talk, a Warning and Advice"
New York Times (07/12/04) P. C3; Thompson, Nicholas
- This year's Hackers on Planet Earth (HOPE) conference featured speakers such as Apple Computer founder Stephen Wozniak, who bemoaned that people today consider hackers to be synonymous with terrorists to such a degree that the government has instituted excessively harsh penalties against violators of computer fraud regulations. Wozniak described hacking as mainly "just some kid trying to do something funny," illustrating his argument with his own hacking escapades, which included such pranks as manipulating the phone system to place a free call to the pope. Wozniak told the younger attendees that they should follow a code of ethics and resist the temptation to do harm, a view espoused by many veteran hackers. HOPE conference head of security Mike Roadancer said he thinks younger hackers have a strong need for guidance and discipline. A recurring contention among speakers and participants at the conference was that they hack chiefly to expose security holes in corporate computer
systems in the hopes that their actions will lead to improved data protection and privacy. "If a hacker breaks into a company's system, and that system isn't properly secured, that company should be held liable," remarked veteran hacker John T. Draper. A good portion of the event was devoted to arguing the need for the government to loosen its monitoring and control of computer networks. Sessions were held to help hackers become more competent, while others concentrated on tools that could help penetrate or secure computer systems.
Click Here to View Full Article (Access to this site is free; however, first-time visitors must register.)
From ACM's
TechNews, July 12, 2004
"Cybersecurity Research Underfunded,
Executives Say" Government Computer News
(07/08/04); Jackson, Joab
- The National Science Foundation (NSF) can only
fund about 10 percent of the research proposals it
receives in regards to improving IT security,
according to testimony at a House Government Reform
Subcommittee on Technology, Information Policy,
Intergovernmental Relations and the Census hearing
this week. "There are good ideas in the cybersecurity
area that we're simply not able to fund," said NSF
computer and information science and engineering
directorate assistant director Peter Freeman. He said
the foundation has received over 150 proposals for a
current solicitation in computer security, about a
third of which show promise, but that the agency has
only enough money to fund 10 percent of the total.
Hratch Semerjian, the acting director of the National
Institute for Standards and Technology (NIST), said
computer security deserves more emphasis and that it
is an important part of nearly every new application
developed by the institute. The NSF has requested $751
million for networking and IT research next year,
while the NIST has requested $57.9 million for
computer science research, with another $6 million
specifically for cybersecurity. Overall, Rep. William
Clay (D-Mo.) says federal spending on IT-related
R&D will total about $2.2 billion this year, but
would fall to $2 billion in 2005 under President's
Bush budget proposal. Click
Here to View Full Article
From ACM's
TechNews, July 12, 2004
"Corporate Governance Task Force Pushes
Security Best Practices" Enterprise Systems
(07/07/04); Schwartz, Mathew
- A new report from the National Cyber Security
Partnership's (NCSP) corporate governance task force
says getting executives involved in security is the
best way to protect the nation's critical
infrastructure. The report, "Information Security
Governance: A Call to Action," suggests more federal
funding for software development tools that root out
defects, a management framework for information
security governance, and more executive-level and
boardroom-level attention to security. Unisys managed
security services global director John Summers says
the report's aim was to help governments and companies
correctly implement and secure an electronic
infrastructure. He says, "One of the challenges that
all organizations are trying to address--the
government in particular--is what is the right way to
implement [and] secure an electronic infrastructure."
Unisys is assisting the Transportation Security
Administration with network implementation, including
IT security. Summers believes that critical
infrastructure industries are moving from making
security imperative to making it routine. Companies
usually want others to define security standards and
responsibilities, but it is hard to define best
practices when things are still evolving, he explains.
To complement the NCSP report, Summers recommends the
National Institute of Standards and Technology's
security infrastructure best practices, which are
intended for federal agencies. It is too soon for
regulations because threats and responses are changing
too quickly. Summers says that security is more about
risk management; security assessment should involve
the needs of the business overall. Click
Here to View Full Article
From ACM's
TechNews, July 12, 2004
"For Hackers, Shop Talk, a Warning and
Advice" New York Times (07/12/04) P. C3;
Thompson, Nicholas
- This year's Hackers on Planet Earth (HOPE)
conference featured speakers such as Apple Computer
founder Stephen Wozniak, who bemoaned that people
today consider hackers to be synonymous with
terrorists to such a degree that the government has
instituted excessively harsh penalties against
violators of computer fraud regulations. Wozniak
described hacking as mainly "just some kid trying to
do something funny," illustrating his argument with
his own hacking escapades, which included such pranks
as manipulating the phone system to place a free call
to the pope. Wozniak told the younger attendees that
they should follow a code of ethics and resist the
temptation to do harm, a view espoused by many veteran
hackers. HOPE conference head of security Mike
Roadancer said he thinks younger hackers have a strong
need for guidance and discipline. A recurring
contention among speakers and participants at the
conference was that they hack chiefly to expose
security holes in corporate computer systems in the
hopes that their actions will lead to improved data
protection and privacy. "If a hacker breaks into a
company's system, and that system isn't properly
secured, that company should be held liable," remarked
veteran hacker John T. Draper. A good portion of the
event was devoted to arguing the need for the
government to loosen its monitoring and control of
computer networks. Sessions were held to help hackers
become more competent, while others concentrated on
tools that could help penetrate or secure computer
systems. Click
Here to View Full Article
From EduPage,
July 7, 2004
United Nations To Address Spam
Problem San Jose Mercury News, 6 July
2004
- Officials from a United Nations agency said this
week it will work to fight spam on an international
scale. According to Robert Horton, the acting chief of
the Australian communications authority, the
International Telecommunications Union (ITU) will work
to bring the problem of spam under control within two
years. The ITU, which is meeting this week in Geneva
to address the growing problem of spam, will write
examples of legislation that would allow effective
cooperation among governments in fighting spam. Many
countries currently lack any legislation dealing with
spam, and those that do often have laws that are
difficult to reconcile across borders. According to
the ITU, spam may account for as much as 85 percent of
all e-mail today, as well as a significant portion of
text messages received by cell phones. http://www.siliconvalley.com/mld/siliconvalley/9089737.htm
Three Countries To Coordinate Antispam
Efforts Internet News, 6 July 2004
- The United States, the United Kingdom, and
Australia have agreed to coordinate their efforts to
fight spam. Under the agreement, the U.K. Office of
Fair Trading, the Australian Competition and Consumer
Commission, and the U.S. Federal Trade Commission will
share evidence and investigative information against
spammers. The United Kingdom and Australia are
expected to benefit from the agreement more than the
United States, which is responsible for more global
spam than any other country. According to a recent
report, the number of spam outbreaks has risen from
350,000 per day to 500,000 since the United States
passed the Can Spam Act. The report also estimates
that within two years, spam will account for 98
percent of all e-mail. http://www.internetnews.com/xSP/article.php/3377451
Report Shows Steep Rise In Software
Piracy CNET, 7 July 2004
- A new report from the Business Software Alliance
(BSA) estimates that pirated software represented 36
percent of all software installations worldwide during
2003, with corresponding losses to software makers of
$29 billion. According to the report, financial losses
were highest in Western Europe, at $9.6 billion, and
the highest levels of piracy were found in China and
Vietnam, at 92 percent. The BSA, which represents
companies including Microsoft, Apple Computer,
Hewlett-Packard, Intel, and IBM, largely attributes
the rise in software piracy to P2P networks. Jeffrey
Hardee, the BSA's Asia-Pacific director, said that
governments in the Asia-Pacific region "really do want
to develop strong IT sectors. And to do that, there's
no question they have to bring down the levels of
piracy." http://news.com.com/2100-1014_3-5259395.html
From ACM's
TechNews, June 30, 2004
"Software Fuse Shorts Bugs" Technology
Research News (07/07/04); Patch, Kimberly
- Stanford University researcher George Candea says
restraints on input and outputs could make software
more stable, preventing much of the bug-related
troubles that cost the U.S. economy nearly $60 billion
each year, according to National Institute for
Standards and Technology estimates. Software fails
when operations extend beyond the set of conditions
for which the software was tested, and Candea proposes
constraining reality for software by rejecting
unanticipated inputs and outputs through the use of
software fuses, which are protections similar to
electrical fuses regulating current flowing through a
circuit. Developing these fuses requires correctly
defining acceptable input and output, as well as
measuring predictability so that trade-offs can be
made between predictability, performance, and cost.
Candea's approach treats the software application
itself as a black box so that the software fuse is
similarly deployed with both legacy systems and newer
software. Traditional software reliability researchers
may eschew limiting inputs and outputs, but Candea
says the method is a pragmatic way of dealing with a
very difficult problem, and should coincide with
regular software quality improvements. He says,
"Instead of fixing the product that fails when given
wrong inputs, fix the inputs." Software fuses would
guard against inputs of unexpected size, such as
buffer overflow exploits used by the SQL Slammer worm,
for example, or inputs of unexpected content, such as
the HTML parsing technique used in denial-of-service
attacks with the Apache Web server and Squid proxy
cache. Other benefits of the software fuse method
include the ability of third parties to install the
fuses on proprietary software and their relative
cost-effectiveness compared to constantly rewriting
software, which often introduces new bugs. Click
Here to View Full Article
"FTC Mulls Bounty System to Fight
Spam" MSNBC (06/29/04); Brunker,
Mike
- The perceived ineffectiveness of the federal
CAN-Spam law has prompted the FTC to consider a bounty
system in which a person who identifies a spammer
breaking the law will receive a reward of at least 20
percent of the civil penalty the FTC eventually
collects--a particularly attractive proposition,
considering that the FTC will probably seek
multimillion-dollar fines against the most flagrant
violators. The bounty concept was given currency by
Stanford Law School professor Lawrence Lessig, who
concluded, "If the vigilantes who are working so hard
to keep lists of offending email servers were to turn
their energy to identifying and tracking down
spammers, then this passion to rid the world of spam
might actually begin to pay off--both for the public
and for the bounty hunters." The FTC is accumulating
and evaluating expert testimony on the plan and is
expected to tell Congress whether it is feasible by
September, but critics want the plan rejected.
Spamhaus.org founder Steve Linford sees no point to
such a system, given that the FTC has already compiled
so much data about spammers' identities, while Louis
Mastria with the Direct Mail Association says the plan
would only encourage online vigilantism and probably
would not lead to any actual arrests. But
disappointment in CAN-Spam's performance is palpable
and growing stronger, given reports of steadily
increasing volumes of spam. Worse, IronPort Systems'
Tom Gillis says spammers are increasingly using
"zombie" computers as spam launching platforms in
order to avoid being traced by authorities. On the
other hand, CAN-Spam advocates feel the law is
fulfilling its purpose, and was never intended to be
an all-in-one solution, but rather "one weapon in the
[anti-spam] arsenal," according to Carol Guthrie, a
representative of CAN-Spam co-author Sen. Ron Wyden
(D-Ore.). Click Here
to View Full Article
From ACM's
TechNews, June 28, 2004
"Winning the War on Spam" Discover
(06/04) Vol. 25, No. 6, P. 24; Johnson,
Steven
- The current model for fighting spam is treating it
as a disease, with spam-blocking software, blacklists,
and other techniques being disease-fighting
antibodies. Some technology experts say this thinking
is flawed because it does not try to address the root
cause of spam, which is its profitability: If millions
of identical messages are sent out, the cost is still
basically the same as if the spammer sent only one
message. Ferris Research estimated businesses spent
$10 billion fighting spam last year, not to mention
the inconvenience caused to home users and the
millions of hours consumed emptying junk mail. Over
the past several decades, environmentalists figured
out that industrial pollution, like spam, actually
costs more than it appears: People buying gas at the
pump pay for the oil extraction, refining, and
transportation, but do not pay for the associated
damage to the environment; in this sense, email is
simply too cheap to reflect the exorbitant costs of
spam on users and the Internet infrastructure.
Although some experts have advocated a small monetary
charge for email, this system would not only be
difficult to implement, but would unfairly punish
those who could possibly benefit from email most.
Microsoft researcher Cynthia Dwork has another
solution that involves payment for email, except in
computation time, not money: She suggests making
sending computers figure out a puzzle so that each
email message would cost about 10 seconds in
computational time. Dwork's scheme is dependent on a
variable element in the puzzle, which can increase the
complexity of the puzzle in relation to Moore's law;
though this 10-second tax would not likely affect
regular users much since they could do other tasks on
their PC in the meantime, it would mean a single
computer could only send out roughly 8,000 emails per
day instead of the millions they currently can churn
out. Spammers would have to buy more machines, which
would put many of them out of business. Click
Here to View Full Article
"Internet Takedown" Government
Technology (06/04) Vol. 17, No. 6, P. 24; McKay,
Jim
- The United States is depending more and more on
the Internet to conduct business and government
functions, but this poses a risk given the
vulnerability of the Internet. Experts say that the
chances of a major disruption--whether from deliberate
attack or from an accident like the 2003 blackout--are
growing. "The problem with the Internet is we
developed it so fast and furiously, and didn't take a
step back and build it foundationally with security in
mind," says Phyllis Schneck, chairwoman of the FBI's
InfraGard board of directors. There is no real
short-term solution besides reducing the severity and
number of interruptions, including viruses. Georgia
Technology Authority Walter Tong says hackers are the
most worrisome threat presently. A company with
excellent security could still be at risk if it is
connected to one with poor security, and Carnegie
Mellon University Software Engineering Institute
fellow Watts Humphrey says today's software is so
defective that hackers easily find flaws in it. There
is no real agreement as to how much damage an accident
or a hacker can cause, though studies at Ohio State
University suggest that the storage of key Internet
routing information in only a few nodes is not a good
idea, since damaging one could affect many areas.
Critical infrastructure such as emergency services and
transportation use the Internet, which puts those
systems at risk until some technological solution is
developed, such as a parallel network with secure
routers. John McCarthy, executive director of the
George Mason School of Law's Critical Infrastructure
Protection Project, is involved with a partnership
between the District of Columbia, Maryland, Virginia,
and the Homeland Security Department to find out what
infrastructures are essential, how they are
interdependent, and what to do to protect them. He
believes that every sector should understand its role
in protecting, and that state governments must
determine which infrastructures are most important. Click
Here to View Full Article
From ACM's
TechNews, June 25, 2004
"IT and End Users Differ on Spam
Severity" IT Management (06/18/04); Gaudin,
Sharon
- Spam in the workplace is a greater source of
concern among IT managers than end users, according to
a study performed by Insight Express for the
information security firm Symantec. Around 50 percent
of polled end users say junk email is not a problem in
the office, while 79.1 percent of IT managers report
that spam is a weighty problem. Ten percent of IT
administrators say spam is out of control, 33 percent
claim it is barely under control, and 56 percent are
convinced spam is fully under control. In comparison,
about 8 percent of end users believe spam is out of
control, 23.3 percent think spam is barely under
control, and 68 percent are confident that it is
firmly under control. IT managers listed spam as their
worst problem after malware, according to the Insight
survey. Symantec product management director Chris
Miller explains that spam is a bigger problem for IT
administrators because they must deal with the spam
that all the staff receives, not just one employee.
"They're dealing with bandwidth usage, storage usage,
viruses it may be bringing in, staffing, and the hours
they have to put in," he notes. "The end user sees it
as garbage they have to deal with. The IT manager has
a lot of other issues." One thing IT managers and end
users agree on is spam's staying power: Almost 71
percent of IT managers expect to be struggling with
spam three years from now, while 72 percent of end
users wager that the spam problem will increase in
severity. Click
Here to View Full Article
"Task Force Pushes for Early Warning
System" Security Management (06/04) Vol. 48,
No. 6, P. 40; Piazza, Peter
- The Cyber Security Early Warning task force,
formed at last year's National Cyber Security Summit,
has issued recommendations for the first time,
including one for the creation of an Early Warning
Alert Network (EWAN) to work with existing
public-private information-sharing organizations. The
network would be funded by stakeholders and the
Homeland Security Department, and would create a
network of networks. The task force's aim is to
improve the sharing, integration, and dissemination of
cybersecurity threat information culled from the DHS'
US-CERT, the FBI's InfraGard program, and critical
infrastructure information sharing and analysis
centers (ISACs). The task force wants to start beta
testing EWAN in October and launch it in December, but
those dates are not fixed. The task force would also
like to create a National Crisis Coordination Center
(NCCC) to pull together both private and public
constituencies to prevent and respond to crises.
Information Technology Association of America vice
president Greg Garcia describes the NCCC as "a
cross-disciplinary organization in which, working side
by side, were representatives from intelligence
agencies, law enforcement agencies, the private
sector, academia, all working together in a
collaborative environment" on both cyber and physical
security. However, the center is a ways off from
realization. Tekmark Global Solutions managing
director Mike Higgins believes that the
recommendations will run into the same snags that have
hindered similar ventures, such as the private
sector's fear of sharing information with the
government, and having it thus exposed to the Freedom
of Information Act. Nevertheless, the NCCC has strong
support from Congress and various government agencies.
From New York
Times, June 23, 2004
Two Arrested and Charged in E-Mail Theft By
Saul Hansell
- U.S. investigators arrested an America Online
employee for stealing the Internet provider's customer
list and selling it to a purveyor of "spam" e-mail.
From EduPage,
June 23, 2004
ISPs Agree On Antispam Measures New York
Times, 23 June 2004
- Four of the largest e-mail providers have agreed
to work collectively on sender-authentication
technologies to limit the flow of spam. Despite saying
more than a year ago that they would cooperate on such
an undertaking, America Online, Yahoo, EarthLink, and
Microsoft have been working on separate approaches to
the challenge of screening out e-mail that does not
come from its purported source. In May, however,
Microsoft announced it would combine its technology,
called Caller ID, with that of America Online and
EarthLink, called Sender Policy Framework (SPF), and
name it Sender ID. Meanwhile, Yahoo has been
developing a technology called Domain Keys, which is
potentially more effective but requires more work to
implement. The four companies announced this week they
would test each other's technologies, paving the way
for a coordinated effort to block spam. http://www.nytimes.com/2004/06/23/technology/23spam.html
From ACM's
TechNews, June 23, 2004
"Software Industry Seeking New Ways to Fight
Piracy" Investor's Business Daily (06/22/04)
P. A4; Bonasia, J.
- The software industry has been attempting to
counteract digital piracy through education and
technological measures, but the results have been
uneven. Business Software Alliance (BSA) VP Bob Kruger
says program-sharing employees at small and midsize
firms are chiefly responsible for the rampant spread
of software piracy, which costs the industry $13
billion annually, by BSA estimates. The software
industry's anti-piracy tactics have evolved from
unwieldy "dongles" to the application of serial
numbers to software products that verify licensed
users online when a new program is activated, but
Autodesk government affairs director David Crane
believes the optimum solution is a greater emphasis on
education and anti-piracy enforcement. The nonprofit
BSA raises public awareness of digital piracy through
representation at industry events, offices, and
schools, and via notices and advertisements; in
addition, people can report on their current or former
employers through a BSA Web site or a toll-free hot
line. If companies are not complying with software
license terms, BSA fires off a letter of warning to
the CEO, and then may request a court order for a
surprise software audit if the company remains
noncompliant. "We want to bring these companies into
the fold of responsible software users," says Kruger.
Perpetrators of black-market organized digital piracy
may also face the wrath of the Justice Department: Two
years ago, John Sankus Jr., chief architect of the
notorious DrinkOrDie software piracy ring, received a
prison sentence of 46 months. Kruger says such
incidents can serve as reminders to corporate tech
managers of the importance of software license
enforcement.
"Spam-Sending PCs Could Be Kicked
Offline" MSNBC (06/22/04); Sullivan,
Bob
- The Anti-Spam Technical Alliance, which counts
Yahoo!, AOL, Earthlink, and Microsoft among its
members, released a set of recommendations on June 22
for halting the proliferation of junk email. One of
the recommendations calls for ISPs to cut email
service for any users whose computers have been turned
into "zombie" spam-launching platforms, even if they
are unaware that their systems have been hijacked.
MessageLabs.com estimates that almost two-thirds of
all spam is sent by zombie systems, while AOL believes
that figure could be closer to 90 percent.
MessageLabs' Brian Czarny doubts that ISPs would be
able to suspend service for so many users, given the
massive volume of customer service calls they would be
inundated with; a more realistic expectation is for
the firms to restrict outgoing emails to 100 or 500
per day, and then notify users that their machines
must be purged before they can send any more messages.
MessageLabs researchers have also determined that
spammers are increasingly personalizing spam by
monitoring recipients through spyware programs--in
fact, a recent Earthlink poll calculates that
one-third of all Net-linked computers have been
infected with spyware. More accurately identifying
actual email senders is another priority of the
Alliance, and among its proposals for reaching this
goal is restricting the number of emails spam
purveyors can send, if not shutting off their email
altogether. "It's much the way a credit-card company
would look for...suspicious spending on your credit
card and either contact you or secure your account
immediately," explains AOL director of anti-spam
operations Carl Hutzler. Earthlink chief architect
Robert Sanders argues that deactivating consumers'
email benefits them since their PCs are already
contaminated by malware. Click Here
to View Full Article
From ACM's
TechNews, June 21, 2004
"Shortage of Computer Security Experts Hampers
Agencies" National Journal's Technology
Daily (06/10/04); New, William
- Homeland Security Department chief security
officer Jack Johnson warns there is a severe lack of
IT security professionals in government, and that the
government needs to train the "next generation" of
cyber experts. Johnson says his agency lacks the IT
workforce it needs to build required security systems,
and would contract that job out to private-sector
workers, except that there are only so many cleared
contractors. At the Homeland Security Department,
Johnson and CIO Steve Cooper have split data security
tasks, with Johnson handling unclassified data and
Cooper dealing with more sensitive material. Cooper is
currently working on a Homeland Security Information
Network he says will be on par with Defense Department
security by the end of this year, and is also
redesigning personnel security in order to lessen
internal cybersecurity threats. Federal Aviation
Administration (FAA) deputy director Thomas O'Keefe
says that more research and development is needed for
cybersecurity, along with more collaboration among
industry and researchers. He argues that
information-sharing among government security
professionals needs to be more efficient and effective
than information-sharing among Internet criminals.
O'Keefe notes that the nation's air-traffic control
system is completely separate from the Internet,
protecting it from viral outbreaks. The FAA is moving
to an IP-based system, but will still keep its network
separate from the general Internet. Click
Here to View Full Article
"Vigilantes on the Net" New
Scientist (06/12/04) Vol. 182, No. 2451, P. 26;
Moran, Barbara
- Counterstrike software is viewed as a panacea by
companies frustrated by ineffective laws and
enforcement against hackers and other online
miscreants, but critics claim that such a tact is
unethical, possibly unlawful, and could provoke an
all-out war in cyberspace. Most organizations'
response to cyberattacks is to bolster their defenses
with firewalls, honeypots, and other measures, but
network managers are locked into an unending game of
one-upmanship with hackers; furthermore, small
companies may not have the financial resources to
upgrade their protection. It was this conundrum that
prompted Tim Mullen of AnchorIS to develop software
that strikes back at malware such as the Nimda worm by
sending its own mutual exclusion (mutex) program back
to the machine the worm came from and causing it to
reboot (thus canceling the worm's mutex), while the
user of the worm-sending machine is informed of his
culpability via a pop-up window. Symbiont's iSIMS
software is more sophisticated, and offers more
aggressive counterstriking options: The product
analyzes attacks to determine their point of origin,
the damage they could cause if not stopped, and
possible response strategies, leaving the final
decision to the individual client. Offensive measures
iSIMS is capable of include altering routing data on a
malware-laden packet so that it is directed back to
its source, and a last-resort option of sending code
to the attacking computer that stops the attack. A key
concern of critics is that counterstrike software can
target innocent users such as owners of "zombie"
computers who are unaware that their machines have
been hijacked, or people whose addresses have been
deliberately spoofed by hackers. In one scenario,
malicious parties could exploit counterstrike software
and goad two organizations to attack each other.
Lawrence Berkeley National Labs engineer Eugene
Schultz contends that the mentality behind
counterstrike software is typical of "a small number
of...hotheads...who want to get back at people."
"Decoding Application Security" CSO
Magazine (05/04); Violino, Bob
- The World Wide Web has made business easier, but
it has made information security more expensive and
difficult. Application security is a major issue for
chief information security officers (CISOs). Security
product vendors are introducing new products intended
to provide application-level security that firewalls
cannot, but CSOs and CISOs say that enterprises should
proceed cautiously as the processes and products
mature. Web application attacks use application flaws
to get into systems or computers, and defensive
measures include code inspection, outside scanning for
flaws, and application-security gateways that scan
incoming network traffic more deeply than conventional
firewalls. Web-application security monitors
applications to make sure they behave the way they are
supposed to, explains Gartner's Richard Stiennon,
which is more effective than trying to learn every
attack signature. Yankee Group predicts that the
market for application security products and services
will go from 2002's $140 million to $1.74 billion by
2007. The technologies currently available are working
well, say early adopters. New York State Office of
Cyber Security & Critical Infrastructure
Coordination director Will Pelgrin says the state is
looking into application-security products, and has
included application-security best practices in its
state agencies' security policy. The Department of
Energy is evaluating a NetContinuum gateway, and
senior security analyst John Dias says the agency's
vulnerability to application-level attacks has
dropped. However, the technologies are hindered
somewhat by their impact on application performance,
complex implementation, untested record, and funding
and training issues. Click
Here to View Full Article
From ACM's
TechNews, June 16, 2004
"FTC Rejects Creation of No-Spam
Registry" Washington Post (06/16/04) P. A1;
Krim, Jonathan
- FTC Chairman Timothy Muris announced yesterday
that the agency would not develop a do-not-spam list
similar to the highly popular do-not-call list; Muris
said the list would be ineffective because spammers
would simply choose to ignore it. Worse still, he said
such a registry could be exploited by spammers to
increase their mass sending of junk email. Sen.
Charles E. Schumer (D-N.Y.) expressed his
disappointment with the decision in a written
statement, noting that "The registry is not the
perfect solution but it is the best solution we have
to the growing problem of spam and we will pursue
congressional alternatives in light of the FTC's
adamancy." Muris said the FTC would pressure industry
to develop an electronic email sender authentication
scheme that would make it more difficult for bulk
emailers to conceal their locations and mask their
identities, and Internet providers such as AOL,
Yahoo!, Microsoft, and EarthLink are working toward a
standard authentication platform. Lurking beneath the
surface of the no-spam registry issue is the question
as to whether the federal CAN-SPAM Act is successful,
and recent reports have been less than encouraging: A
survey sponsored by the Chief Information Officer
Executive Council rates the law as ineffective, based
on estimates that 39 percent of 141 polled CIOs expect
their companies to spend more than $100,000 to combat
spam this year. In addition, more than half of the
respondents expressed a desire for a no-spam registry.
Advocates believe such a measure could help correct
what they perceive as a major drawback of CAN-SPAM,
which is the reliance on an opt-out system that
requires users to ask to be removed from marketing
lists. Proponents argue that a no-spam registry would
serve the same function as an opt-in system,
eliminating much of the complexity of enforcement. Click
Here to View Full Article
"Is the Future of E-Mail Under
Cyberattack?" USA Today (06/15/04) P. 4B;
Swartz, Jon
- Experts fear that email's utility is gravely
threatened by a growing prevalence of malware, spam,
and various online scams, and individuals and
companies are considering or implementing alternate
measures and restrictions to mitigate the problem.
Many consumers have gotten into the habit of deleting
unfamiliar messages, and have stopped attaching large
documents to their emails because they are usually
deleted by recipients concerned that such packages may
contain malicious payloads. Meanwhile, some companies
prohibit workers from using email accounts not related
to their jobs, and an InsightExpress poll of 500
business owners estimates that roughly 40 percent of
small businesses would consider dumping email for
business correspondence if junk email gets worse. The
situation is prompting security companies to market
intrusion detection products, while AOL, Yahoo!, and
Microsoft have joined forces to create the email
equivalent of a "caller-ID" standard, which is at
least a year away from rollout. Market researchers
indicate that spam, computer viruses, and unique
phishing attacks were responsible for personal losses
and lost workplace productivity adding up to over $15
billion in 2003. The erosion of people's trust in
email is being driven by an acceleration in spamming
and scamming, while many home PCs lack proper security
measures. Nucleus Research says the annual cost of
spam in terms of lost productivity has doubled over
the past year to almost $2,000 per worker; the
Anti-Phishing Working Group estimates that the number
of unique phishing attacks skyrocketed from 402 to
1,125 between March and April; and security experts
report that virus authors, spammers, and phishers are
increasingly teaming up outside of U.S. jurisdiction.
Click
Here to View Full Article
From ACM's
TechNews, June 14, 2004
"Pay or Go Away: What Would Spammers
Do?" EurekAlert (06/08/04)
- Researchers at the University of Michigan believe
that charging spammers for every message they send
would solve the spam problem within two to three
years. Marshall Van Alstyne, an assistant professor in
the School of Information, computer science doctoral
students Thede Loder and Rick Wash, and Mark Benerofe,
a technology industry and media executive in Atlanta,
Ga., were in Washington, D.C., this week to present a
proposal to the FTC's Bureau of Economics. The
Attention Bond Mechanism (ABM) would have recipients
and senders negotiate the terms of communication
without any assistance from a third party. "The sender
who believes his or her message is not spam is willing
to put up that money--to risk it--to prove that if the
recipient reads the email, they will agree that it is
not spam," says Van Alstyne. The researchers say the
technology needed to make the ABM system a reality is
already available, adding that changes in
infrastructure will be needed as well as proper
wiring. The anti-spam technology would boost the
"quality of information exchange and reduce the email
volume that clogs networks and increases costs for
consumers and business," adds Wash. Click
Here to View Full Article
From ACM's
TechNews, June 11, 2004
"Invasion of the Spambots" Salon.com
(06/08/04); Williams, Sam
- Spambots are mutating into numerous varieties that
relentlessly penetrate new areas, such as instant
messaging, blogs, chat rooms, and cell phones, and
these mutations are being driven by two antithetical
online publishing trends: Growing homogeneity in the
use of Google and other basic software tools, and
increasingly specialized content. These new, indirect
techniques are designed for the purpose of enhancing
visibility rather than solicitation or receipt
confirmation, in the hopes that popular search engines
such as Google will highly rank links to marketers'
sites in search results. Innovative spambots lend
themselves particularly well to adult entertainment
companies such as Edge Productions, whose VP Domenic
Merenda has split the programs into three
varieties--address-harvesting bots, URL-proliferator
bots, and lead-generation bots, the most advanced and
expensive option. The lead-generation bots analyze R-
and X-rated chat-room logs, where they scan
transcripts to determine the names and addresses of
the most active participants, who are then targeted by
adult-oriented ads produced by third-party vendors.
However, this strategy can backfire due to large
numbers of bots disguised as people who turn out to be
the most active forum participants. Carnegie Mellon
University researchers have developed automated
CAPTCHA programs to discourage spammers' use of
lead-generation bots in chat rooms, although the
safeguard is not foolproof. CAPTCHAs are set up so
that users must identify a randomly generated word to
prove they are human, the catch being that the word is
distorted and often displayed against a patterned
background that even the most advanced optical
character recognition systems cannot decipher.
From EduPage,
June 9, 2004
Used Computers Full Of Sensitive
Information BBC, 9 June 2004
- A British security firm researching the fates of
lost or stolen laptops has found significant risk of
security lapses in such situations. Pointsec Mobile
Technologies purchased 100 laptops and hard drives
from auctions and Web sites such as eBay. Despite
having supposedly been erased, 70 percent of the hard
drives the researchers inspected were easily readable.
One of the hard drives obtained by the company for
five euros on eBay included personal customer
information, including pension plans, dates of birth,
and home addresses, from one of Europe's largest
financial services groups. In addition, Pointsec was
able to access information on one in three laptops,
simply by using commonly available password-cracking
software. According to the company, most airports and
police stations routinely sell unclaimed
computers--with all of the information still on
them--after three months. http://news.bbc.co.uk/2/hi/technology/3788395.stm
From ACM's
TechNews, June 9, 2004
"Worst-Case Worm Could Rack Up $50B in U.S.
Damages" TechWeb (06/04/04); Keizer,
Gregg
- International Computer Science Institute security
researchers Nicholas Weaver and Vern Paxson say that a
worm attack could cost the United States as much as
$50 billion in direct damages by attacking widely used
services and carrying a highly destructive payload.
The worst-case scenario combines state-funded
attackers exploiting an unpublished Windows
vulnerability with a fast-spreading worm. The $50
billion figure includes lost productivity, repair
expenses, deleted data, and damaged equipment. The
researchers say that worms would be the choice method
for the attack because of their speed. The study says
state-sponsored hackers would have both the time and
resources needed to find an unpublished vulnerability
and rigorously test their worm. While past worms have
been limited to mostly Windows XP or Windows NT
systems, a more effective worm would attack a wide
range of Windows environments. The researchers also
tested popular motherboard and system configurations,
and found that a particularly well-designed worm could
force users to replace the motherboard in a third of
the tested systems, while the other two-thirds would
need to have their BIOS restored. However, although
the corrupted PC BIOS could be restored, it would
require highly skilled workers. The most likely
candidates for the exploit include the SMB/CIFS
file-sharing service included on all Windows systems
since Windows 98. Possible countermoves for government
and businesses include deploying mass-mailed worm
defenses, restricting file-sharing on users' desktops,
and using SMB/CIFS-compatible servers. Still, Weaver
and Paxson warn that "Current defenses are not capable
of dealing with threats of this magnitude." Click
Here to View Full Article
"Recognition Keys Access" Technology
Research News (06/09/04); Patch, Kimberly
- Researchers from Israel's Hebrew University
presented their work on a new user authentication
scheme at ACM's CHI 2004 conference in late April. The
scheme enables people to use a special kind of
password that does not need to be consciously
recalled, a technique that draws upon the brain's
instinctive imprinting process for handling
complexity. Hebrew University engineering and computer
science professor Scott Kirkpatrick says the method is
secure because it is genuinely random and cannot be
purloined or voluntarily shared. In the prototype
systems, users are trained on a set of images, a few
of which must be recognized in order for
authentication to be facilitated; users were tested on
systems that employed three classes of input:
Pictures, pseudo words, and artificial grammar. Tests
of the picture version involved users receiving a
series of user certificates, or unconscious passwords,
first by showing them a set of 100 to 200 pictures
randomly chosen from a 20,000-picture database and
ordered into groups of between two and nine
thematically similar pictures, and then having the
users practice selecting certificate images from these
theme groups. Next, users had to identify most of a
short series of certificate passwords, which are used
only once as an anti-eavesdropping measure; tests
showed that users could recall previously viewed
pictures with more than 90 percent accuracy for as
long as three months. Users trained on the pseudo word
version boasted a three-month accuracy rate of 70
percent to 90 percent, while tests of the artificial
grammar version yielded more variable accuracy rates,
the highest being 75 percent. Kirkpatrick says
challenges remain, but he envisions using the
technology for broader security systems that involve
more elaborate computer-human interaction based on
trust. Click
Here to View Full Article
"Cybersecurity: a Job for the Feds?" IDG
News Service (06/07/04); Gross, Grant
- Commentator and Chicago Tribune columnist Bill
Press and Gartner research director Rich Mogull both
believe that the nation's cybersecurity is too
important to leave up to the free market, and said so
during a panel discussion at the recent Gartner IT
Security Summit. Other panelists suggested that the
federal government influence companies through its
purchasing power, but Press contended that since
software vendors are not held liable for products with
security flaws, purchasers ultimately pay for the
flaws. Some said that dealing with software security
through legislation is almost impossible because of
the esoteric nature of software design. Gartner
Research vice president John Pescatore said software
creation is more art than science, and suggested
buyers demand better products instead of government
regulation. Bob Dix, staff director for the technology
and information policy subcommittee of the House
Government Reform Committee, said the threat of a huge
cyberattack on U.S. technology assets cannot be
overemphasized, and former White House
counterterrorism expert Roger Cressey said that while
the United States is not ready for a concerted
cyberattack, the government is moving in the right
direction. Cressey thinks that a major cyber outage
will prompt hasty national legislation, but Dix hopes
that legislation will not be necessary. Press
suggested that the software industry work with
Congress on legislation. Click
Here to View Full Article
From New
York Times, June 23, 2004
4 Rivals Almost United on Ways to Fight
Spam By Saul Hansell, Published: June 23,
2004
- Four large Internet service providers agreed
yesterday to a partial truce in their battle with one
another over potential technology to stop junk e-mail
in hopes that they can devote their united energy to
fighting spam. Read the article.
From ACM's
TechNews, May 28, 2004
"Will Code Check Tools Yield Worm-Proof
Software?" CNet (05/26/04); Lemos,
Robert
- A report from the Business Roundtable blames buggy
and vulnerable software code for most of the major
cyberattacks and network breaches that have harried
American consumers and businesses in recent years, and
says these exploitable code errors stem from software
development processes that lack effective testing,
review, and safety measures. Though software is tested
for flaws, usually the purpose of testing is to see if
the software operates properly rather than if it fails
when intentionally improper operations are performed.
Static source code checkers originally developed by
academic researchers to glean data about software
flaws are being marketed by several companies as tools
for spot-checking security. One such product was so
well received by Microsoft that the computer giant
bought Intrinsa, the company that sold it; the
technology is now a key component of Microsoft's
Trustworthy Computing Initiative, and Microsoft
security program manager Michael Howard reports that
Intrinsa's tools are used to regularly enforce
discipline for developers. Fortify Software founder
Mike Armistead notes that a commonly held attitude
among software developers is that some errors will
always be missed, and therefore it is acceptable to
ship products and let others alert the developers of
any flaws. But security researchers do not always
disclose the flaws they detect, and many security
experts think that developers could be held
accountable for the glitches they fail to find,
particularly if checking technology is
available--factors that are raising the stock of
automatic code error detection tools. Some people
believe static source code checkers are not yet ready
for commercialization: Immunity founder Dave Aitel
perceives a need for such tools, but argues that
current products generate too many false positives to
be effective. Click
Here to View Full Article
From EduPage,
May 28, 2004
Buffalo Spammer Gets Jail Time
- A judge in New York this week sentenced Howard
Carmack, the so-called Buffalo Spammer, to the maximum
three-and-a-half to seven years in prison under the
state's new identity theft statute. Carmack was
charged with setting up hundreds of e-mail accounts
under false or stolen identities and sending 850
million spam e-mails through those accounts. Internet
service provider EarthLink previously won a $16.4
million civil judgment against Carmack, though the
company has yet to collect any money from Carmack. At
his sentencing, Carmack said his prosecution was
politically motivated and that he didn't see any
victims of his actions. In response, Judge Michael
D'Amico said, "I'm having a heck of a time figuring
out why you think everybody is unfair to you," telling
Carmack he caused a lot of harm to many people. Wall
Street Journal, 27 May 2004 Read
the article (subscription required)
From ACM's
TechNews, May 26, 2004
"Viruses Nip Russia After the Cold
War" IDG News Service (05/25/04); Blau,
John
- The end of the Cold War and the collapse of the
Soviet Union have opened Russia's borders to the
Internet, which in turn has given rise to massive
computer virus infections. Security experts expect
things to get worse now that network intrusions and
the authoring of viruses are no longer the sole
province of politically- or respectability-motivated
hobbyists, but a tool for organized crime. One
hacker-turned security expert observes that there is
money to be made from hacking and virus-writing, while
Mi2g Chairman DK Matai points out that "The Mafia,
which has been using the Internet as a communication
vehicle for some time, is using it increasingly as a
resource for carrying out mass identity theft and
financial fraud." Russia's economy is an ideal climate
for hacking, as highly skilled but cash-strapped
Russian tech professionals direct their talent toward
scanning corporate networks for security holes,
crafting malware for stealing financial data, setting
up illegal spam farms by hijacking infected computers,
or ransoming companies' livelihood by threatening to
launch distributed denial-of-service attacks against
their networks or publicize sensitive information
online. Another factor is relatively lenient attitudes
toward cybercrime in a nation where violent crime is
rampant, according to Sergey Bratus of Dartmouth
College's Institute for Security Technologies Studies.
Also complicating enforcement is the increasingly
global nature of cybercrime, which makes its
perpetrators difficult to trace, and differing views
on cybercrime's definition. Gus Hosein of the London
School of Economics and Political Science predicts
that "policies will be developed to enhance the
investigation of viruses in order to trace virus
makers and other perpetrators of cybercrimes, only to
see those same powers used for different purposes,
such as pursuing copyright crime and 'indecent'
communications." Click
Here to View Full Article
"RPI Study Eyes Sick
Computers" Associated Press (05/25/04);
Hill, Michael
- The National Science Foundation is funding a
project at Rensselaer Polytechnic Institute that
probes the parallels between biological virus and
computer virus epidemics in order to find ways to
obstruct the latter. For instance, malware's infection
mechanism often takes the form of seemingly innocent
emails with seductive subject lines, in much the same
way that disease bacteria can invade cells by
appearing harmless. NSF grant recipient and RPI
professor Biplab Sikdar notes that certain viral
infections and computer virus outbreaks follow similar
patterns: The spread of highly contagious diseases
characterized by short incubation periods usually
begins with a small infected population before
skyrocketing exponentially, reaching a peak, and
fading away at a more gradual rate. Sikdar postulates
that routers could be programmed to identify sudden
protracted increases in instability and other factors
as signs of cyberattacks, and then isolate the virus.
The RPI professor believes this measure could
eliminate the need for computers with antivirus
software to update their programs, and even shield
computers that lack virus protection. Symantec senior
research director Steve Trilling points out that a lot
of recent computer security research is focused on
behavior-based threat identification instead of
reliance on a database of known threats. Vincent
Gullotto, director of Network Associates' McAfee
Anti-Virus Emergency Response Team, is skeptical that
drawing similarities between biology and the Internet
will yield effective antivirus measures. Sikdar's
five-year NSF grant also covers research into the life
expectancies of wireless networks and how minor router
bugs can lead to more complex problems. Click
Here to View Full Article
"How Are Script Kiddies Outwitting I.T.
Security Experts?" NewsFactor Network
(05/19/04); Valentine, Lisa
- Teenage virus writers are known as "script
kiddies," and are having an effect on the IT industry,
but network security experts and antivirus vendors say
their impact is not as great as is believed--most of
them are not very good at virus writing. Even
badly-written viruses require corporate users to spend
time downloading virus updates, but in addition to
causing nuisance, script kiddies serve antivirus
vendors by finding vulnerabilities for which the
vendors must then write protections. Gartner vice
president Richard Stiennon notes that this makes
things more difficult for professional hackers who
would prefer to keep the vulnerabilities unknown. He
adds that since so few hackers are caught, it is hard
to tell how many viruses are written by professionals.
Trend Micro director David Perry says that most script
kiddies' viruses never infect computers--they send
them directly to antivirus companies to go on
detection lists, about which the teens can then brag.
These are called "zoo" viruses because they are never
released "into the wild," and make up approximately
74,000 of the 75,000 known viruses. Another group of
viruses are "intended viruses" that are so poorly
written they do not function; virus-protection firms
still create defenses against these attacks should
they be fixed in the future. Antivirus vendors are
improving their ability to detect viruses before they
hit, even while the capabilities of virus toolkits
improves. Click
Here to View Full Article
From ACM's
TechNews, May 21, 2004
"Executives Criticize the Tech
Industry" Associated Press (05/19/04);
Bridis, Ted
- Members of the Business Roundtable say the
technology industry sells software that is vulnerable
to hackers and too complicated for consumers to use
safely. The trade group comprised of executives from
the top 150 U.S. corporations estimates more than $1
billion is spent addressing computer worm and virus
threats. The Business Roundtable is lobbying for
better software design, greater ease of management,
and support for older versions, but the group also
says that corporate directors and executives should be
involved in making their networks more secure.
Business Roundtable security task force director
Marian Hopkins says that, up to this point, IT vendors
have continually passed the onus of computer security
onto end users, and that it was time for them to take
more direct responsibility. Cyber Security Industry
Alliance head Paul Kurtz says that Internet security
needs both good products and good user maintenance.
Some security experts and consumer groups agree with
the Roundtable's complaints, but technology
representatives contend that their companies are
spending a lot of money to make products easier to
defend and more resilient. "Cybersecurity is
everyone's responsibility, including the vendors, the
users, enterprises, and government agencies," says the
Information Technology Association of America's Greg
Garcia. However, both the Roundtable and the
association oppose government security mandates. Click
Here to View Full Article
From ACM's
TechNews, May 21, 2004
"Senate Hears Mixed Reviews of Anti-Spam
Law" Washington Post (05/21/04) P. E5; Krim,
Jonathan
- Witnesses offered differing opinions about the
effectiveness of the CAN-SPAM law at a May 20 hearing
of the Senate Commerce, Science, and Transportation
Committee. FTC Chairman Timothy Muris praised the law,
noting that his agency has filed 62 cases against
spammers as well as cases against businesses that
employ spammers to market their products. Laudatory
views were also shared by FBI cyber crime division
assistant director Jana Monroe, who said CAN-SPAM
permits spammers to be prosecuted as felons by
criminalizing their activity rather than forcing the
government to pursue them as enablers of fraud; she
added that the FBI is developing cases against about
50 targeted spammers with the assistance of the Direct
Marketing Association. Negative views were voiced by
Consumers Union President James Guest, who called for
amendments to CAN-SPAM. He argued that the "opt-out"
policy the bill supports overburdens users,
particularly because many spammers are circumventing
spam filters by using bogus opt-out mechanisms.
Despite his support of the law, Postini CEO Shinya
Akamine estimated that the amount of email traffic
spam accounts for has risen from approximately 78
percent to 83 percent this year. One of CAN-SPAM's
provisions authorizes the FTC to consider a
do-not-spam list that would be similar in operation to
the do-not-call list for telemarketers, but such a
measure has been met with opposition from industry and
strong skepticism from Muris. Consumers Union
legislative analyst Chris Murray reported that his
organization wants the option to be considered. Click
Here to View Full Article
"Flaws Drill Holes in Open Source
Repository" CNet (05/19/04); Lemos,
Robert
- As hackers increasingly target Linux-enabled
software, E-Matters chief security and technology
officer Stefan Esser recently disclosed
vulnerabilities in two widely used source code
repository applications that could make open-source
software projects susceptible to exploitation by
hackers. One security hole is in the Concurrent
Versions System (CVS), which is run by numerous large
open-source projects to build servers that manage the
iterations of a program under development; the source
code databases are in servers used by groups
developing the KDE Linux and Gnome desktops, among
others, and Esser reported that these groups were
alerted to the flaw earlier this month. An advisory
issued by Esser indicates that the CVS bug affects all
versions of the software released before May 19, and
the occurrence of the flaw, dubbed "heap overflow,"
stems from inadequate vetting of data from the
system's users. The other security hole noted by Esser
affects the Subversion application, and its root cause
is an error in the code's date-parsing operation; in
his advisory, Esser warned that hackers could take
advantage of the flaw to permit "remote code execution
on Subversion servers and therefore could lead to a
repository compromise." It is easier to exploit the
Subversion vulnerability than the CVS vulnerability,
while Linux is the operating system most often used
with CVS. A May 19 alert from the Debian Project whose
publication coincided with the e-Matters advisory
included a patch for the CVS software. Debian Project
developer Martin Schulze said the threat of the CVS
vulnerability should be minor with the patch in place.
Click
Here to View Full Article
From ACM's
TechNews, May 19, 2004
"Fine-Tuning Spam
Filtering" TechNewsWorld (05/18/04);
Korzeniowski, Paul
- Unsolicited commercial email has expanded by more
than five times its volume since 2001, and though spam
filtering solutions help mitigate the problem, they
are not foolproof--and worse, they can unintentionally
prevent legitimate email from getting through, often
without the user realizing it. The risk of false
positives, which has escalated as spammers and
anti-spam product vendors play a rapidly accelerating
game of one-upmanship, is frustrating for companies
that rely on sending large volumes of valid email for
their business. One of the more popular spam filtering
methods, whitelisting/blacklisting, involves placing
incoming spam messages on a whitelist (senders whose
emails are permitted into the recipient's inbox) or a
blacklist (senders whose messages are blocked because
they are assumed to be spam); however, Ferris
Research's Richi Jennings warns, "Spoofing [the
process of putting another person's or organization's
email address in the header] is a major issue, and
more than one out of every three spam messages does
not come from the address listed." Another widespread
spam-blocking technique, content filtering, analyzes
message content to statistically determine whether the
email is spam, and ranks messages accordingly. With
spammers continuously probing filters for
work-arounds, and current strategies to avoid false
positives resulting in spam overload or reduced
productivity, users are clamoring for better
spam-blocking measures. Among the techniques vendors
are looking at is the use of domain keys that confirm
email senders via public-key encryption technology. A
successful domain key authentication scheme requires
widespread adoption, the creation of a standard
supported by all vendors, and upgrading corporate
email systems. Though Jennings thinks domain key
technology will help curb spam, he notes that "in the
short term, it will continue to be difficult for
companies to block spam but still deliver needed
messages to their users." Click
Here to View Full Article
From EduPage,
May 12, 2004
Canada Urges International Cooperation To
Fight Spam
- Canadian officials this week suggested that
international efforts, possibly including a treaty,
are necessary to fight the growing problem of spam.
Lucienne Robillard, Canada's Industry Minister, said,
"Alone, country by country, we cannot solve this
problem," noting that 95 percent of spam received by
Canadians originates in other countries. According to
Robillard, an international treaty on spam could
include extradition of those accused of sending spam.
Richard Simpson, director general of e-commerce for
Industry Canada, compared a potential international
agreement on spam to existing tax treaties, which
countries use in collecting taxes and "countering
other forms of activities like money laundering." A
spam treaty is also being discussed at the Asia
Pacific Economic Cooperation forum, according to
Canadian officials. CNET, 11 May 2004
http://news.com.com/2100-1028_3-5210534.html
From EduPage,
May 10, 2004
Microsoft Reward Credited With Arrest Of
Sasser Suspect
- An 18-year-old German student has been arrested
for, and has confessed to, writing the Sasser worm
that began infecting computers around the world last
week. The arrest was made after acquaintances of the
teen tipped off the Munich offices of Microsoft, which
set up a reward program last year to try to catch
writers of malicious computer code. The informers, who
said they were aware of the reward program, provided
Microsoft with details about the worm, convincing the
company to notify German authorities. After being
arrested and having his computer confiscated, the teen
confessed. The informants will receive $250,000 if he
is convicted. An official from Microsoft praised the
reward program, calling this first instance of its use
a "defining moment in demonstrating our ability to
combat malicious code in collaboration with the
authorities." Wall Street Journal, 10 May 2004 (sub.
req'd)
http://online.wsj.com/article/0,,SB108401726263605863,00.html
Sasser Author Tried To Create Virus-Fighting
Virus
- Sven Jaschan, the German teen who confessed to
writing the Sasser computer worm, told authorities he
had set out to write a virus, called Netsky, that
would remove versions of the MyDoom and Beagle
viruses. Jaschan reportedly wrote several versions of
Netsky, eventually ending up with the Sasser worm.
According to one German investigator, Jaschan is "a
really good programmer" but didn't understand the
scale of what he was doing. Just before being
apprehended by authorities last week, Jaschan released
a fifth version of Sasser, intended to limit the
damage caused by the previous four. The new version,
Sasser e, purported to include information about a
patch against the Sasser worm. Instead of limiting the
damage of previous versions, however, Sasser e also
caused computers to reboot spontaneously. According to
Sascha Hanke, a Microsoft official in Germany, Jaschan
"did it with good intentions, but it had exactly the
same damaging effects." eWeek, 10 May 2004
http://www.eweek.com/article2/0,1759,1589919,00.asp
From ACM's
TechNews, May 10, 2004
"Breach of Trust" InformationWeek
(05/03/04) No. 987, P. 58; Hulme, George V.; Kontzer,
Tony
- Companies are in danger of losing customer trust
because of the constant threat of data breaches, which
are far more common than the public is aware of.
Sensitive customer data can be compromised by hackers
who penetrate corporate networks, insiders who steal
information, and identity thieves, and they are only
the tip of the iceberg. InformationWeek Research's
2003 U.S. Information Security Survey of 815 companies
determined that over 80 percent employ antivirus and
network-firewall software, but only 23 percent use
vulnerability-scanning tools to find exploitable
security holes; furthermore, just 43 percent use
intrusion-detection systems, while only 40 percent
claimed to have evaluated and gauged the effectiveness
of their information-security policies. Symantec
reports that over seven new software holes cropped up
each day last year on average, while software
vulnerabilities are becoming easier to exploit, and
are being exploited faster as well. To curb data
breaches, firms must deploy firewalls,
application-security solutions, and
intrusion-detection systems; patch newly discovered
security flaws before they can be exploited; and
institute frequently updated security policies that
are rigorously enforced. Data encryption is another
security measure companies can employ, but the baggage
it brings varies: For instance, encryption key
management can complicate security, while encrypting
data may slow down system performance. Legislators
expect that ID theft and network hacking will be
deterred with the passage of tougher laws and stiffer
prison sentences. Some companies employ technology to
spot fraudulent activity early on and halt it before
it inflicts too much damage, a philosophy that accepts
ID and customer-data theft as a permanent fact of
life; as one anonymous financial-services executive
puts it, "The problem is like a water balloon: When
you squeeze hard in one spot it gets ready to burst
somewhere else." Click
Here to View Full Article
From ACM's
TechNews, May 5, 2004
"Crackers Redux" eWeek (04/26/04)
Vol. 21, No. 17, P. 29; Fisher, Dennis
- Cliff Stoll chronicled the attack on Unix machines
at the Lawrence Berkeley National Laboratory in
Berkeley, Calif., and university and military
facilities nearly 15 years ago in his book, "The
Cuckoo's Egg: Tracking a Spy Through the Maze of
Computer Espionage." The story that Stoll, a volunteer
system administrator at the Berkeley lab at that time,
tells shows that similar methods and tactics were used
this spring to hack into Linux machines at Stanford
University, the National Supercomputing Center for
Energy and the Environment in Las Vegas, the San Diego
Supercomputer Center, and some locations of the
TeraGrid, the distributed network of supercomputing
centers. Although security technology and techniques
have improved over the years, Stoll offers a lesson
that also would have helped security experts involved
at Stanford and the supercomputer centers. The
attackers appear to have targeted unsuspecting users
to compromise their passwords as well as the poor
security practices of the supercomputer centers, in a
strategy that was not innovative or original. It is
deja vu, according to Mark Rasch, chief security
counsel at Solutionary and a former U.S. attorney who
prosecuted the attackers in 1986. "They start with a
password compromise, which leads to a password attack,
then root, then a root kit and so on," says Rasch,
adding that changing guessable passwords afterwards
comes a bit late. "If this guy is smart, he was
creating accounts that aren't root, that they haven't
found yet." Click
Here to View Full Article
From ACM's
TechNews, April 28, 2004
"Security From the Inside Out" Tech
Update (04/21/04); Farber, Dan
- Cybersecurity experts are coming up with
multilayered approaches to protect enterprises against
attack, using a combination of patching, firewalls,
intrusion detection systems, antivirus software, deep
packet inspection, and access controls. However,
application-level attacks go around network-based
protections, and detection and antivirus patches alone
cannot keep up with worms and viruses. Most security
solutions start outside a network and build perimeters
across it, but Fortify Software offers an automated
inside-out, root-cause solution that removes
vulnerabilities as part of the software development
process. Fortify CTO Roger Thornton says programmers
need to be on the front lines of defending enterprise
IT. Systems can be made more secure during development
not only through improved code quality, but also the
elimination of vulnerabilities such as stack buffer
overflows, format string errors, SQL injection
exploits, and unconditionals. Thorton says programmers
do not generally think about vulnerabilities when
writing code, and his company's approach uses static
analysis of code to find flaws. This requires a more
flexible system that adjusts to attackers'
vulnerability probing and allows programmers to build
new libraries. Fortify's software rules are sourced
through the security establishment, research
community, and Fortify's internal team. The company's
source code analysis suite includes a software
security manager, a developer toolkit, and a source
code analysis server, and Fortify is also working on a
real-time monitoring application to detect attacks and
automatically respond. Fortify's products are intended
for larger enterprises. Click
Here to View Full Article
"Technological Networks and the Spread of
Computer Viruses" Science (04/23/04) Vol.
304, No. 5670, P. 527; Balthrop, Justin; Forrest,
Stephanie; Newman, J.
- By studying how computer virus outbreaks relate to
technological networks, effective vaccination measures
can be developed and deployed. Many technological
networks targeted by viruses are not scale-free, and
are therefore unlikely to be effectively protected by
targeted vaccination. In addition, network topology is
not always homogenous, is often influenced by how
viruses are written, and can be changed by virus
writers to subvert specific control strategies. Four
particular networks and the attack strategies they are
vulnerable to are outlined: A network of potential
connections between machines via the Internet
Protocol; a network of shared administrator accounts
for desktop computers; an email address book network;
and a network of email messages exchanged between
users. Targeted vaccinations may be effective for the
latter two networks, which boast more continuous
distributions. Among the control strategies that are
unaffected by network topology changes and do not need
managers to know a virus epidemic's modus operandi is
throttling, in which a virus is slowed down to the
point that it can be cured by conventional measures by
restricting the number of new links a computer can
make to other computers in a given time period. The
technique can also lower the amount of traffic
produced as a result of the infection. Throttling
reaches its highest level of effectiveness when the
malware generates traffic at a dramatically higher
rate than regular network communications, write Justin
Balthrop and Stephanie Forrest at the University of
New Mexico's Department of Computer Science, HP
Laboratories' Matthew M. Williamson, and M. E. J.
Newman at the University of Michigan's Department of
Physics and Center for the Study of Complex Systems.
From ACM
TechNews, April 19, 2004
"Supercomputer Hacks Highlight Ed Security
Challenge" IDG News Service (04/16/04);
Roberts, Paul
- Under pressure from government regulations,
increased user demands, Internet-borne attacks, and
even legal threats from the private sector,
universities are turning to advanced security
technologies such as intrusion prevention systems.
Universities have historically tried to maintain as
open and accessible network infrastructures as
possible, but new threats are making that obligation
especially onerous: For example, hackers recently
broke into the Linux and Solaris supercomputer systems
at Stanford University using stolen IDs and passwords,
then took advantage of shared folders on the system
that were kept up to facilitate data sharing and
system management. Unlike companies whose main network
task is to protect information, universities act as
ISPs facilitating access for users; this job is made
more difficult now that students are constantly taking
their laptop computers home, where they are often
exposed to malware, and then plugging them back into
the school network when they return. Boston College
has begun using home-grown tools to quarantine
infected computers, forcing students to play a more
active role in campus network security. University of
Georgia chief information security officer Stan
Gatewood says some of his school's departments
recently deployed a commercial messaging platform from
Mirapoint in order to better manage spam email, and
notes that managing university IT environments is a
politically sensitive task since there are so many
stakeholders. The need to manage different groups'
needs is driving network management tools that make it
easy to provision specific services with as little
overhead as possible. Federal and state regulations
are also playing a role in determining university IT
policy and priorities, as well as legal advisories
from the music and movie industries concerning
illegally traded material on campus networks. Some
universities have begun to segment their networks in
order to better manage competing needs, cordoning off
student dorm networks, for example. Click
Here to View Full Article
"FTC to Look Closer at
'Spyware'" Washington Post (04/19/04) P. A4;
Noguchi, Yuki
- Privacy advocates are in a furor over "spyware"
and "adware" that is often installed on Windows PCs in
many popular programs--free music and file-sharing
programs, for example--users download off the
Internet, sometimes without the user's awareness. The
FTC will investigate the hazards of spyware at an
April 19 workshop in Washington, D.C., focusing
particularly on whether criminals will exploit such
programs to steal users' Social Security and
credit-card numbers, notes Howard Beales of the FTC's
consumer protection division. Most spyware and adware
programs are apparently used to track consumer
preferences, but privacy experts and anti-spyware
vendors warn that such programs can compromise
consumers' control over their PCs, as well as act as
impinge on their privacy by acting as surveillance
tools for advertisers. Beales and many privacy
proponents admit that the installation of adware is
often permitted in licensing agreements users are
required to consent to in order to download popular
programs--agreements that many consumers do not fully
read. Pest Patrol's Roger Thompson says a distinction
has yet to be made between benign and malign spyware
use, noting that the relatively low incidence of
"malicious" spyware behavior does not erase the fact
that such programs "[open] a back door that allows
computers to be updated by the hacker and accept
commands to log keystrokes, read files, or turn on the
Web cam." U.S. legislators including Sens. Barbara
Boxer (D-Calif.) and Conrad Burns (R-Mont.) have
proposed a bill that would ban the installation of
software on a PC without user notice and consent, and
require that such software be easily removable. Click
Here to View Full Article
"Spam to Go" Technology Review
(04/04) Vol. 107, No. 3, P. 22; Roush, Wade
- Spam is invading text messaging, with the volume
of spam text messages originating in North America
outstripping legitimate messages last year, according
to messaging firm Wireless Services. The European
Union, Japan, South Korea, and California have all
passed laws to try to stem the tide, and Congress has
told the Federal Communications Commission to create
rules to protect cell phone users from unsolicited
text messages, which can cost users money if their
carrier charges for messaging. Both wireless companies
and software vendors are acting on their own as well,
fearing that mobile spam will discourage users from
subscribing to new data services. Advanced 3G networks
in South Korea, Japan, Europe, and parts of the United
States allow multimedia messages and are already
employing "opt-in" systems to help prevent unsolicited
multimedia messages. Wireless Services, which shuttles
text messages between U.S. carriers' networks,
introduced software last year that builds on
techniques used to block email spam, including
Bayesian filtering and a quarantine system. The
company wants to make its filters customizable for
users. Lucent Technologies has a prototype that lets
carriers create online menus so customers can specify
what kinds of messages they want to receive, and when.
Rick Hull, Bell Labs' director of network data and
services research, says, "If the consumer can block a
merchant from viewing his location information, the
merchant has no idea they're passing by." Lucent says
that such technology will be integrated with its
existing Internet infrastructure software within a
year. Click
Here to View Full Article
From ACM
TechNews, April 16, 2004
"Hackers Strike Advanced Computing
Networks" TechNews.com (04/13/04); Krebs,
Brian
- A number of hackers have compromised U.S. research
computing laboratories and networks in the past weeks,
doing little damage but raising fears that hugely
disruptive attacks are possible. Much like a Canadian
teenager used University of California, Santa Barbara
supercomputers to knock out Amazon.com, eBay, and
CNN.com in 2000, experts say that whoever took over
research resources recently could have done much
worse. Among the facilities compromised are the
Department of Energy's Argonne National Laboratory,
the National Center for Supercomputing Applications,
and the San Diego Supercomputer Center--all part of
the TeraGrid research network. That network was
disabled for several days while investigators,
including possibly the FBI, gathered evidence about
the intrusions. As many as 20 universities and
research laboratories could have been targeted,
according to sources who asked to remain anonymous
because of the ongoing investigation. Stanford
University, which is not part of the TeraGrid, has
quarantined at least 30 Linux and Solaris machines to
reevaluate the maintenance and protection of those
Unix-based systems. Stanford computer security officer
Tina Bird said the school was alerted by the FBI about
the rash of intrusions, and that the focus on Unix
systems instead of Microsoft technology was a
surprise. Argonne National Laboratory TeraGrid
engineering director Pete Beckman said the attacks
seemed to be exploratory rather than focused on
stealing scientific data or causing damage to other
Internet targets. TruSecure chief scientist Russ
Cooper, however, said the large-scale intrusion was
worrying, especially since those systems were supposed
to be among the most secure national resources. In
unrelated investigations, U.S. intelligence agencies
have monitored al-Qaeda operatives probing the
computer networks of critical infrastructure
facilities such as dams and power plants. Click
Here to View Full Article
"DRC Investigation Finds Public Websites
'Impossible' for Disabled
People" PublicTechnology.net
(04/16/04)
- The Disability Rights Commission (DRC) in the
United Kingdom has condemned Web developers and online
companies for throwing up the same barriers to access
for disabled people as exist in the physical world.
The results of the study and the DRC's recommendations
show that the Web could be made much more accessible
to disabled users at relatively modest expense
compared to what is required for physical services.
The DRC report was compiled with the help of City
University's Center for Human Computer Interaction
Design in London, and surveyed 1,000 public-facing Web
sites. An automated test of the 1,000 Web sites showed
81 percent did not meet minimum accessibility
requirements as defined by the World Wide Web
Consortium and that the average home page presented
108 barriers to access for disabled persons, including
complex page structures, disorienting navigation,
undescribed images, and little contrast between
background and content. Disabled users further
evaluated 100 of the Web sites, finding that more than
a quarter of the most basic tasks were difficult or
impossible for some users. Blind users were the most
disenfranchised, even when using screen reader
technology. Of the 400 Web developers surveyed, only 9
percent said they had expertise in accessibility while
another 9 percent said they used disabled users to
test their site's accessibility. DRC Chairman Bert
Massie said that while the Web promised equal access,
it so far had failed disabled people by keeping them
from participating in online discussion, from job
opportunities found online, convenient consumer
services, and cheaper goods and services. Legal
requirements for equal access are already on the books
in the United Kingdom, and Massie said it was only a
matter of time before disabled people brought legal
challenges to noncompliant companies. Click
Here to View Full Article
"Making Software Systems Evolve" IST
Results (04/14/04)
- The IST is pursuing a project that would make
software evolvable, enabling an organization to change
its support software without disrupting the operation
of the business. Participants in the ARCHWARE project,
which will be completed by year end, want to establish
a formal architectural specification language that can
be used for various domains, in an effort to
facilitate the implementation of systems as they
change throughout their lifecycle. ARCHWARE is
focusing on the architectural description language
(ADL) for software, which is an open source process
for modeling and encoding software activities that
would add flexibility to an organization's systems.
Evolvable systems would lower development and
maintenance costs, particularly with regard to
compliance of systems as user requirements change, and
is critical for software such as Enterprise Resource
Planning (ERP) systems. Project coordinator Ferdinando
Gallo of Consorzio Pisa Ricerche (CPR) in Pisa, touts
open source as a good business model because it
involves selling knowledge about a product, building a
new software paradigm, and becoming the expert.
"Others come and create further value by building on
that foundation," says Gallo. "In the process, they
help with the evolution of the software." Click
Here to View Full Article
From NY Times,
May 31, 2004
When Software Fails to Stop Spam, It's Time to
Bring In the Detectives
- McBride spends a lot of time waiting for spammers
to make a mistake. They usually do. Read the article.
From ACM
TechNews, April 14, 2004
"The Porous Internet and How to Defend
It" E-Commerce Times (04/10/04); Millard,
Elizabeth
- Network researchers say the open TCP/IP Internet
protocols mean criminals have easy access to their
targets, and that there is no simple way to change
Internet design. Transmission Control
Protocol/Internet Protocol (TCP/IP) was developed to
be as open and transparent as possible. Internet
designers had no idea the network would become so
large and actively tried to lower barriers, not create
them. As a result, Internet data packets are not
easily traceable if the sender wants to obscure their
origin and hackers can probe remote networks with
impunity, says Columbia University computer science
assistant professor Angelos Keromytis. AT&T Labs
research fellow Steve Bellovin says many of his
colleagues think TCP/IP is flawed, but he believes the
technology receives undue blame for the current state
of Internet security. Bellovin explains that roads and
highways are not blamed for bank robberies--bank
security takes the blame. Similarly, open Internet
design should not be blamed for faulty Internet
security, but local defenses for each private network
need to be set up. And while open network protocols
often facilitate security breaches, they also provide
for easy patch application and scalable security
management. Bellovin says the problem of network
security will only grow in the future, with ubiquitous
wireless and ad hoc networks. At that time,
cryptography will play an even greater role. Changing
the fundamental structure of the Internet is beyond
the influence on any single institution, since the
Internet is composed of so many stakeholders and
effecting a fix would mean replacing so much software.
Click
Here to View Full Article
"Concern Grows Over Browser
Security" CNet (04/12/04); Reardon,
Marguerite
- The Computing Technology Industry Association's
second annual report on IT security and the work force
indicates 36.8 percent of respondents experienced one
or more browser-based attacks during the last six
months, up from 25 percent the year before.
Browser-based attacks occur when users view a Web page
and hidden code is used to compromise security.
Sometimes all that happens is the browser crashes, but
hackers can also use browser attacks to steal
information. Emails are often used as carriers for the
attacks; the emails contain a link to a malicious Web
server, and the attack is generally launched when the
user clicks on the link. Since most firewall products
do not inspect out-going traffic, this type of attack
is often not protected against if users are complicit.
Products are available to monitor and control
corporate Web usage and some firewall vendors have
added protections, but these will not eliminate the
problem, according to association director Randall
Palm. Palm says, "Browser-based attacks are a logical
evolution. The better we get at stopping attacks, the
more creative hackers get at writing new ones."
Browser vendors are trying to add protections as well,
but companies still consider viruses and worms to be a
bigger security risk. However, there are fewer worm
and virus attacks than a year ago, the survey says,
and network intrusion issues are also less common. The
association reports that 95.5 percent of organizations
use antivirus technology, with firewalls and proxy
servers in use by 90.8 percent of respondents. Click
Here to View Full Article
From ACM
TechNews, April 12, 2004
"In the Trenches With Antivirus Guru Mikko
Hypponen" E-Commerce Times (04/07/04);
Millard, Elizabeth
- F-Secure director of antivirus research Mikko
Hypponen is one of the best virus hunters, a type of
researcher that is fairly obscure. Hypponen has been
working in computer security for 13 years, and says
that his assembly language skills have come in handy
in reverse-engineering viruses. However, assembler
skills are not widely taught any more because the
there is not great demand and learning them is tough.
He says that "very few people need such low-level
skills anymore. It's all C and C++ nowadays." However,
he believes that universities will soon start teaching
abut malicious code and how to analyze it. Right now,
he says university computer science departments focus
on some aspects of computer security, such as
cryptography, but often do not teach students how to
parse and analyze malicious code. Hypponen sees an
evolution of computer worms and viruses, from the era
of boot viruses to macro viruses to email worms. He
predicts that email worms will be replaced by network
worms as soon as next year, and that fewer worms are
written by havoc-minded teens and more are written by
those wanting to make money by stealing data or
installing spam proxies. Teens still write most
viruses, but the biggest outbreaks seem to come from
more organized groups. The most challenging computer
viruses or worms Hypponen has fought have been SMEG
and Zmist from a technical standpoint, because they
modified themselves spontaneously, though the recent
Bagle/Mydoom/Netsky variants have been extremely
tiring since so many continue to emerge. Click
Here to View Full Article
"Spamhaus Proposal Aims to Stop
Spam" InformationWeek (04/07/04); Gardner,
W. David
- Anti-spam organization Spamhaus has submitted an
application to ICANN for a .mail top-level domain name
in the belief that its proposed "server-to-server"
scheme can prevent spam from reaching email servers.
The Spamhaus server-to-server approach is a seamless
arrangement that works behind the scenes to keep email
at bay, says Spamhaus' John Reid. The way Spamhaus
envisions it, .mail users would register with The
Anti-Spam Community Registry, which would be staffed
by Spamhaus volunteers. The system relies on
sending-server operators to register a .mail domain,
and receiving-server operators would look up the IP
address of the sender and other domain information in
order to verify the transmission. This process would
allow the receiving server to "easily determine if the
sending server is spam-free, as well as determine if
the email was forged," according to the application
Spamhaus submitted to ICANN. The proposal will not
only stop spam, it will also resolve the current
problem whereby filters prevent "good" email from
getting through, says Reid. Spamhaus, which intends to
get started quickly on its proposal if ICANN approves
its application, has already contacted some of the
more prominent email-server software providers and
developers about working on the project. An array of
noted anti-spam activists would sit on the Anti-Spam
Community Registry's board of directors. Click
Here to View Full Article
"The Pure Software Act of
2006" Technology Review (04/04); Garfinkel,
Simson
- Spyware is perhaps more insidious than other
malware such as viruses and worms, since it mixes
commerce and deception in a way morally abhorrent to
most computer users, writes Simson Garfinkel. While
viruses and worms are clearly illegal, spyware that
tracks users' online activity and computer use is
often authored and distributed by legitimate companies
and with customer consent. But today's click-wrap
license agreements fall far short of the labeling
regimes in other industries, such as the Pure Food and
Drug Act of 1906, which required manufacturers to
clearly state ingredients, product weight, and avoid
deceptive labeling. Software needs similar labeling to
help consumers make more informed decisions about what
they are installing on their computer. Almost by
definition, spyware hides its true purpose though
other software programs with similar functions go out
of their way to make it clear what they do. Google's
Toolbar for Internet Explorer, for instance, urges
users to read the license agreement carefully so they
understand their browsing activity will be fed back to
Google in order to get the "page rank" for a certain
site. A hypothetical Pure Software Act of 2006 would
require the Federal Trade Commission to come up with
labeling standards and rules for use. Software
labeling would have to contain important information
without glutting consumers with too much data. Simple
icons could be used to denote potential unsavory
features, such as remote control, unremovable
programs, computer use monitoring, pop-up ads, or
modifications to the operating system. Importantly,
such a labeling regime would have to be mandatory, as
companies such as Google currently do a good job
voluntarily informing users of software features while
unscrupulous firms do not. Click
Here to View Full Article
"Email Attack Could Kill Servers" New
Scientist (04/06/04); Knight, Will
- Computer security experts at NGSSoftware have
discovered a way to disable email servers by using
forged emails with thousands of incorrect addresses in
the "copy to" field. The researchers found that
sending these emails to large email servers ricocheted
enormous quantities of unwanted email back at the
email server specified in the "copy to" field, as long
as the first machine is configured to return an email
and its attachments to each incorrect address.
NGSSoftware researcher Gunter Ollman says the email is
forged to look as though it comes from the targeted
server, and the flood of bounced messages generally
makes that server crash. Experts says that 30 percent
of Fortune 500 companies' email servers could be used
for such an attack, and using an insecure server for
the initial messages would make the attack almost
impossible to trace. Ollman says that it should be
simple to reconfigure mail servers to make them
invulnerable to the attack, but he warns that if large
firms do not adjust their mailing architecture, it
only takes a few of these companies for the attack to
work. Click
Here to View Full Article
"Group Suggests 25 Ways to Improve IT
Security" Government Computer News
(04/06/04); Miller, Jason
- The Corporate Information Security Working Group
released a report this week that says to improve
government and private sector cybersecurity, new
legislation, insurance changes, and public outreach
efforts are needed. The group, consisting of academic
and industry members, has offered 25 recommendations
to improve IT security, at the request of Rep. Adam
Putnam (R-Fla.), chairman of the House Government
Reform Subcommittee on Technology, Information Policy,
Intergovernmental Relations and the Census. Last
autumn, Putnam drafted legislation that would require
publicly traded companies to include an IT security
plan status report with their filings to the
Securities and Exchange Commission, but did not
sponsor the legislation and instead created the
working group. "Since approximately 85 percent of this
nation's critical infrastructure is owned or
controlled by the private sector," Putnam explains, "I
have worked to identify strategies that will produce
meaningful improvement in the computer security of
corporate America." The working group's subgroups
focus on reporting, information sharing and
performance metrics, procurement practices, education,
incentives and liability, and best practices. The
recommendations include enforcing provisions of the
Federal Information Security Management Act, which
requires agencies to uphold minimum security
standards; identifying qualified, certified, or
compliant third-party organizations; and providing an
antitrust exemption for critical infrastructure
industry groups that agree to obligatory security
specifications for software and hardware. Click
Here to View Full Article
"Security Patching: Easy As
1-2-3" Network Magazine (03/04) Vol. 19, No.
3, P. 37; Greenfield, David
- Network managers will have a much easier job
protecting Web applications if two new security
protocols automate vulnerability description,
assessment, and patching. However, the XML-based
Application Vulnerability Description Language (AVDL)
and Web Application Security (WAS) standards are not
being developed in regards to one another and could
have interoperability problems. Cooperation between
the standards' developers could come some time in the
future, says WAS technical committee Chair Mark
Curphey, also consulting director of Foundstone. If
the two standards work together, security vendors
could publish bulletins that organizations subscribe
to via middleware, using the WAS and AVDL standards to
define and carry the security information, says
Computer Incident Advisory Capability (CIAC) security
analyst Jon Diaz. As it is now, network managers spend
inordinate amounts of time deciphering application
vulnerability scan reports, then reconciling those
reports to their particular firewall's rule wizard,
and finally rewriting firewall rules to secure the Web
application. AVDL is supported by the Organization for
the Advancement of Structured Information Standards
(OASIS) and five lesser-known security vendors. WAS
has the backing of major vendors such as CheckPoint,
and would likely win out if the two protocols do not
match. WAS tackles the more difficult challenge of
defining tasks as opposed to simply communicating
information about the attacks between devices. IETF
Transport Layer Security working group co-Chair Eric
Rescorla, also founder of security consulting firm
RTFM, warns that automated scanning descriptions could
be harnessed by hackers to quickly create new attack
tools based on freshly discovered vulnerabilities. Click
Here to View Full Article
From Chicago
Tribune, May 3, 2004
WORM TURNS UP
- A computer infection called Sasser has been
fouling computers worldwide today. Read the article.
From ACM
TechNews, April 26, 2004
"Hackers: Under the Hood" ZDNet
Australia (04/19/04); Gray, Patrick; Foo, Fran;
Gray, Patrick
- Network security cannot be effective without a
thorough understanding of the hacker mindset, and
several hackers--Brian Martin, Adrian Lamo, and Raven
Alder--agreed to be interviewed to discuss their
backgrounds and motivation. Martin, 30, is best known
by the moniker "Jericho," and his most notable work is
the co-creation of the attrition.org Web site, a
catalog for defaced Web sites and security holes. Now
employed as an independent security consultant, Martin
recalls that his hacking escapades ran the gamut from
just plain silly to downright paranoid, such as the
time he hacked into the phone network because he was
worried that his line was bugged. He says the security
industry is in a sorry state, and is characterized by
a shortage of "real" skills and overpriced products of
exceedingly poor quality. Lamo, 23, started hacking
when he was eight years old; disenchanted by hacker
culture, he prefers working alone, and has applied his
nomadic lifestyle to his online exploits. Though Lamo
has never hacked for malicious reasons (he would
usually contact network administrators and describe
how he penetrated their systems), he was arrested when
he broke into the New York Times network and gained
access to its contributor database. Lamo calls the
security industry dishonest, and says that to work in
such an industry would be tantamount to prostitution.
Alder, 28, admits she is "geekish," and shares with
Martin and Lamo a disdain for the security industry:
"The root problem that the security industry has
is...unscrupulous people selling to an uninformed
market," she explains, although she also reserves some
culpability for end users, who remain willfully
ignorant. "People who understand security are
necessary, and in chronically short supply," Alder
laments. Click
Here to View Full Article
"Can E-Mail Be Saved?" InfoWorld
(04/19/04) Vol. 26, No. 16, P. 40; Boutin,
Paul
- Email's usefulness in the enterprise is being
threatened by the growing problem of spam, which is
why email's role in the workplace needs to be
reconsidered; a panel of a half-dozen software
entrepreneurs offer various solutions, but all concur
that the effectiveness of any solution stems from
positive identification. Sendmail author Eric Allman
believes that email problems are not restricted to
spam, and his solution is to redesign SMTP with a
focus on cryptography rather than DNS-based
authentication. He also thinks a standard
domain-authentication mechanism should be implemented
across the entire Internet. Bill Warner, developer of
the Wildfire voice system, says challenge-response
systems should be patterned after the U.S. Postal
Service's method for identifying abuse by using caller
ID schemes to identify the people sending the email
instead of the servers. Reinventing email is not the
answer, according to Ray Ozzie of Groove Networks:
What is called for is a move away from the email
paradigm, in which workplace activities are
transferred to other, more appropriate paradigms such
as instant messaging and RSS. Userland Chairman Dave
Winer states that email is no longer valid as a
publishing tool, and the best solution is RSS, which
he has made immune to spamming by keeping the system
opt-in at both ends. Proofpoint Chairman Eric Hahn
says email content must be made automatically
parsable, and this shift is being driven not just by
spam, but by the Sarbanes-Oxley Act of 2002; his
solution involves converting email into metadata
packaged in XML. Inventor Brewster Kahle offers the
bluntest solution to spam, in which spammers are
prosecuted by law enforcement for committing acts of
fraud. Moreover, Kahle says this can be done without
passing excessive new laws; for instance, he suggests
that spammers who conceal their real names and
addresses should be reported to the FBI for sending
forged documents. Click
Here to View Full Article
From ACM's
TechNews, April 12, 2004
"In the Trenches With Antivirus Guru Mikko
Hypponen" E-Commerce Times (04/07/04);
Millard, Elizabeth
- F-Secure director of antivirus research Mikko
Hypponen is one of the best virus hunters, a type of
researcher that is fairly obscure. Hypponen has been
working in computer security for 13 years, and says
that his assembly language skills have come in handy
in reverse-engineering viruses. However, assembler
skills are not widely taught any more because the
there is not great demand and learning them is tough.
He says that "very few people need such low-level
skills anymore. It's all C and C++ nowadays." However,
he believes that universities will soon start teaching
abut malicious code and how to analyze it. Right now,
he says university computer science departments focus
on some aspects of computer security, such as
cryptography, but often do not teach students how to
parse and analyze malicious code. Hypponen sees an
evolution of computer worms and viruses, from the era
of boot viruses to macro viruses to email worms. He
predicts that email worms will be replaced by network
worms as soon as next year, and that fewer worms are
written by havoc-minded teens and more are written by
those wanting to make money by stealing data or
installing spam proxies. Teens still write most
viruses, but the biggest outbreaks seem to come from
more organized groups. The most challenging computer
viruses or worms Hypponen has fought have been SMEG
and Zmist from a technical standpoint, because they
modified themselves spontaneously, though the recent
Bagle/Mydoom/Netsky variants have been extremely
tiring since so many continue to emerge. Click
Here to View Full Article
"Spamhaus Proposal Aims to Stop
Spam" InformationWeek (04/07/04); Gardner,
W. David
- Anti-spam organization Spamhaus has submitted an
application to ICANN for a .mail top-level domain name
in the belief that its proposed "server-to-server"
scheme can prevent spam from reaching email servers.
The Spamhaus server-to-server approach is a seamless
arrangement that works behind the scenes to keep email
at bay, says Spamhaus' John Reid. The way Spamhaus
envisions it, .mail users would register with The
Anti-Spam Community Registry, which would be staffed
by Spamhaus volunteers. The system relies on
sending-server operators to register a .mail domain,
and receiving-server operators would look up the IP
address of the sender and other domain information in
order to verify the transmission. This process would
allow the receiving server to "easily determine if the
sending server is spam-free, as well as determine if
the email was forged," according to the application
Spamhaus submitted to ICANN. The proposal will not
only stop spam, it will also resolve the current
problem whereby filters prevent "good" email from
getting through, says Reid. Spamhaus, which intends to
get started quickly on its proposal if ICANN approves
its application, has already contacted some of the
more prominent email-server software providers and
developers about working on the project. An array of
noted anti-spam activists would sit on the Anti-Spam
Community Registry's board of directors. Click
Here to View Full Article
"The Pure Software Act of
2006" Technology Review (04/04); Garfinkel,
Simson
- Spyware is perhaps more insidious than other
malware such as viruses and worms, since it mixes
commerce and deception in a way morally abhorrent to
most computer users, writes Simson Garfinkel. While
viruses and worms are clearly illegal, spyware that
tracks users' online activity and computer use is
often authored and distributed by legitimate companies
and with customer consent. But today's click-wrap
license agreements fall far short of the labeling
regimes in other industries, such as the Pure Food and
Drug Act of 1906, which required manufacturers to
clearly state ingredients, product weight, and avoid
deceptive labeling. Software needs similar labeling to
help consumers make more informed decisions about what
they are installing on their computer. Almost by
definition, spyware hides its true purpose though
other software programs with similar functions go out
of their way to make it clear what they do. Google's
Toolbar for Internet Explorer, for instance, urges
users to read the license agreement carefully so they
understand their browsing activity will be fed back to
Google in order to get the "page rank" for a certain
site. A hypothetical Pure Software Act of 2006 would
require the Federal Trade Commission to come up with
labeling standards and rules for use. Software
labeling would have to contain important information
without glutting consumers with too much data. Simple
icons could be used to denote potential unsavory
features, such as remote control, unremovable
programs, computer use monitoring, pop-up ads, or
modifications to the operating system. Importantly,
such a labeling regime would have to be mandatory, as
companies such as Google currently do a good job
voluntarily informing users of software features while
unscrupulous firms do not. Click
Here to View Full Article
"Email Attack Could Kill Servers" New
Scientist (04/06/04); Knight, Will
- Computer security experts at NGSSoftware have
discovered a way to disable email servers by using
forged emails with thousands of incorrect addresses in
the "copy to" field. The researchers found that
sending these emails to large email servers ricocheted
enormous quantities of unwanted email back at the
email server specified in the "copy to" field, as long
as the first machine is configured to return an email
and its attachments to each incorrect address.
NGSSoftware researcher Gunter Ollman says the email is
forged to look as though it comes from the targeted
server, and the flood of bounced messages generally
makes that server crash. Experts says that 30 percent
of Fortune 500 companies' email servers could be used
for such an attack, and using an insecure server for
the initial messages would make the attack almost
impossible to trace. Ollman says that it should be
simple to reconfigure mail servers to make them
invulnerable to the attack, but he warns that if large
firms do not adjust their mailing architecture, it
only takes a few of these companies for the attack to
work. Click
Here to View Full Article
From EduPage,
April 9, 2004
New Virus Targets Mac Users
- A new Trojan horse represents what one security
expert said is "the first native Mac OS virus." Brian
Davis of Mac security firm Intego said the MP3Concept
or MP3Virus.gen Trojan horse, which masquerades as an
MP3 file, does not cause an infected computer any harm
but merely accesses files in the System folder.
According to Davis, the virus is probably a test to
see what is possible with Mac systems, which
historically have not been targets of malicious code.
Given the growing popularity of Apple Computer's
online music service, however, OS X systems have
become a more tempting target. Because Windows--with
its dominance in the operating system market--has
traditionally drawn the attention of virus writers,
most Mac users do not use antivirus software and are
generally unconcerned about opening attachments in
e-mail. With the new Trojan horse, said Davis, these
habits for Mac users could change quickly. "They're
all susceptible to viruses and Trojans," said Davis,
"just as Windows is." Wired News, 9 April 2004 http://www.wired.com/news/mac/0,2125,63000,00.html
Security Experts Debate Appropriateness Of
Exploit Tool
- A new security tool from the Metasploit Project
has drawn criticism from some security experts who say
it offers potential hackers an easy means to launch
attacks. Computer scripts called "exploits" take
advantage of known security holes in systems. The new
tool is essentially such an exploit that can be easily
modified to test new vulnerabilities. According to
Metasploit founder HD Moore, the tool is a boon for
security personnel, who use it to test systems for
flaws and in quality assurance programs. Peter
Lindstrom of Spire Security, however, sees the tool as
having real value for only "about 10 academics and
serious researchers who may find this interesting."
Beyond those people, Lindstrom said, the tool could
allow thousands of others to become hackers. Moore
conceded that the tool could be used in malicious ways
but argued that it is nonetheless valuable for those
seeking to protect systems from attack. He said
exploits are "required for many types of legitimate
work." Other security companies have developed similar
tools to aid in security computer systems, and HP has
created an attack tool to test network security.
ZDNet, 8 April 2004 http://zdnet.com.com/2100-1105_2-5187776.html
From ACM's
TechNews, April 2, 2004
"Face-Off: Is Patch Management the Best
Defense Against Vulnerabilities?" Network
World (03/29/04) Vol. 21, No. 13, P. 44; Schultze,
Eric; Hofmeyr, Steven
- Shavlik Technologies chief security architect Eric
Schultze contends that intrusion-prevention systems
(IPSes), anti-virus software, and firewalls alone
cannot shield computers against known software flaws,
and that patch management is the key ingredient for
ensuring network security. Schultze likens a software
patch to medicine in that it attacks the disease--the
flaw itself--rather than the symptoms. He explains
that it is not always known that a patch for one bug
could also remedy another error elsewhere in the
operating system, which is why applying a firewall or
an IPS to fix one specific bug may not protect other
susceptible portions of the code; Schultze argues that
the operating system or application vendor is
optimally positioned to fix the flaw because it truly
understands the nature and breadth of the error. He
adds that patches not only contain the latest version
of the buggy code, but often also contain all known
security fixes, so applying a patch guarantees that
the user is running the latest iteration of the vendor
code, correcting public and non-public vulnerabilities
in the associated code. Sana Security founder Steven
Hofmeyr calls patch management a miserable failure: He
explains that faulty patches can carry more
organizational cost than a security breach by bringing
down vital servers, and cautions that vendors must
conduct thorough regression testing before deployment.
Hofmeyr also points out that misconfiguration and
other certain vulnerabilities cannot be remedied by
patching, while vendors sometimes fail to develop a
patch because they lack the time and resources, or
ascribe no importance to a bug. In addition, hackers
are adding new tools to their arsenal to accelerate
the reverse-engineering of patches to determine flaws,
speeding up the race between hacker exploitation and
patch deployment. Hofmeyr believes host-based IPSes
are a more effective solution, because they block
attacks against unpatched flaws and furnish immediate
protection. Click
Here to View Full Article
"New Marking Process Traces Spammers, Pirates,
and Hackers" EurekAlert (03/31/04)
- Penn State researchers have proposed a new process
to make it impossible for hackers, spammers, and
digital pirates to spoof source addresses in order to
thwart attempts to trace them. The method involves
using border routers to mark each message or data
packet with an identifying number. The marks are
formed from the border router's 32-bit IP address and
would reside in obsolete fields in the IP packet
headers; should the available obsolete field be less
than 32 bits long, the researchers suggest
partitioning the border router's IP address into
overlapping segments, each of which would be employed
by the router as a potential mark. Fragments from
packets that have been labeled as malevolent are
combined to form the names of the border routers that
tagged and forwarded them to the victim's computer,
while false positives can be reduced because the
overlapping fields permit the victim to compare
fragments from the same router. The marking scheme
generated fewer than 1% false positives per 1,000
attacking addresses in simulated distributed denial of
service attacks, and had a 100% success rate in
tracing addresses transferring copyrighted content in
another simulation. "The technique offers Internet
access providers a real-time, cost-effective way to
conduct forensics and improve security for the
Internet," notes Penn State's Dr. George Kesidis, who
developed the process with Ihab Hamadeh. "In addition,
the approach will be demonstrably effective during an
incremental deployment phase, thereby, creating
incentives for broader deployment to satisfy the cyber
security concerns of the Internet services industry
and government regulators." Click
Here to View Full Article
"Yoran Rejects Claims of Slow Progress in
Securing Key IT Systems" InformationWeek
(03/30/04); Hulme, George V.
- Amit Yoran, director of the Department of Homeland
Security's National Cyber Security Division (NCSD),
refutes recent claims by Sen. Joseph Lieberman
(D-Conn.) on the Senate Government Affairs Committee
that the White House's efforts to secure the United
States' critical infrastructure IT systems have been
sluggish and unfocused. He lists significant
accomplishments his division has achieved since its
inception last June, among them: The creation of the
U.S. Computer Response Team (US-CERT) to oversee
participation between federal and non-federal
cybersecurity entities, examine and reduce
cyberthreats and security holes, issue cyberthreat
warnings to affected parties, and coordinate
incident-response operations; the establishment of the
National Cyber Alert System, which currently
disseminates cybersecurity data to 1 million Americans
with technical and non-technical backgrounds; and the
co-hosting of the National Cyber Security Summit,
where both the government and the private sector
started working on an architecture for corporate
security governance. Another notable achievement was
the Homeland Security Department's participation in
the Livewire cyberattack simulation, which
demonstrated the need to improve the public
dissemination of cyberprotection data and two-way
information exchange with private companies, and also
spurred Yoran's department to form the Cyber
Interagency Incident Management Group. The creation of
the group, which enables law enforcement, defense, and
intelligence officers to leverage federal resources to
facilitate the most effective response to
intragovernmental cyberthreats, was accompanied by the
organization of the Chief Information Security
Officers Forum and the Government Forum of Incident
Response Teams. Yoran says the U.S. Homeland Security
Department is deeply involved in the securing of
digital control systems and the development of germane
and rational metrics to evaluate how effective its
initiatives are. Click
Here to View Full Article
From ACM's
TechNews, March 31, 2004
"Time to Enlist a 'National Guard' for
IT?" Network World (03/29/04) Vol. 21, No.
13, P. 8; Greene, Tim
- Military emergency management officials, speaking
at the recent Norwich University e-ProtectIT
conference, said the United States is not prepared to
recover quickly should a major cyberterrorism attack
take place. They also say that such an attack might
require government mobilization of IT professionals.
Retired Army National Guard Maj. Gen. Jack D'Araujo
suggested the possibility of a cyber national guard to
react to attacks, noting that there is no existing
official chain of command for such an organization.
D'Araujo says, "We're really plowing some new ground.
We flat-out aren't prepared to deal with it." Former
National Computer Security Center director Patrick
Gallagher said that IT community members do know what
to do during a cyberattack, but they lack leadership.
Gallagher says that "we have network groups who can
and do talk to each other and speak a similar language
and have the same training. What we need is the
leadership to pull that together." Qovia vice
president Pierce Reid pointed out that since no
cyberdisaster has yet taken place, it is not known
what will be required or how fast damage can be fixed.
The Cyber Security Early Warning Task Force recently
issued a report urging the creation of an
early-warning network and a CERT-run national crisis
coordination center to collect attack information and
issue warnings. Information-sharing systems already
exist, but they do not have official powers, D'Araujo
said, and many companies are reluctant to share
information. Norwich CIO Phil Sussman, who led a
seminar on network security, says even minor attacks
"will shake confidence in the network itself with a
series of things people expected but are no longer
there." U.S. Marine Gen. Commendant Alfred Gray says
IT professionals must get "street-wise" and examine
their systems the way attackers do to look for cracks
and seams in their operations. Click
Here to View Full Article
"Computer, Heal Thyself" Federal
Computer Week (03/29/04) Vol. 18, No. 8, P. 42;
Moore, John
- Computers that can self-configure, self-repair,
and self-optimize are highly desirable for
organizations that implement information grids and
other highly distributed computing models, while
autonomic computing's promised benefits to others
include more reliable and resilient machines that
require less hands-on maintenance. "It addresses the
out-of-control costs of doing basic monitoring of
operations and maintenance of IT systems," says Ric
Telford of IBM's Autonomic Computing effort. Autonomic
computing has attracted the most interest from
scientific and technical government entities such as
NASA, the Energy Department, and the Defense Advanced
Research Projects Agency (DARPA), which often
undertake projects that require distributed data
analysis; vendors pursuing the technology besides IBM
include Sun Microsystems, Hewlett-Packard, and
specialty firms such as Stottler Henke Associates.
Some officials believe autonomic computing can provide
augmented security, and DARPA has created the
Self-Regenerative Systems program for such a
purpose--namely, the development of systems capable of
automatic response to cyberattacks. Other projects,
such as Sun's N1Grid, aim to manage multiple machines
as if they were a single computer, notes Dennis Govoni
of Sun's government division. Peter Hughes of NASA
Goddard Space Flight Center's Information Systems
Division reports that autonomic computing could find
its way into NASA projects such as the Mission
Services Evolution Center, which will supply a unified
framework for ground and flight systems. The IRS,
meanwhile, plans to use autonomic computing to cut
operational costs and bolster customer service in one
of the few initiatives outside of the technical
computing arena. Industry and government executives
think agencies should prepare for the emergence of
autonomic computing by refining their IT management
practices. Click
Here to View Full Article
From ACM's
TechNews, March 29, 2004
"IT Security and Software
Development" TechNewsWorld (03/26/04);
Halperin, David
- As hardware and software proliferates, there is a
pressing need to address interoperability and security
issues, such as whether the technologies will
interoperate reliably under all potential test
scenarios. Unfortunately, the number of software
combinations that need to work together in a secure
manner--and in an environment that faces a rising tide
of malware--is nearly limitless. Aberdeen Group VP Jim
Hurley explains that it is simply too exhaustive a job
for a software supplier to model all possible hacking
outcomes. British IT consultant David Quinn thinks
part of the interoperability problem stems from the
large teams tasked with major applications and
operating systems, contending, "You try to set
standards and 'middle bits' that everything talks to
[in order to] try and cut down the diversity. But
you're never going to completely cut it down." Quinn
adds that flawed system design concepts are also a
major part of the problem, but eliminating them is
unlikely to happen because of business imperatives.
Mi2g Intelligence Unit executive chairman D.K. Matai
says configuration management is responsible for 90
percent of successful hacker attacks, and his
suggestion is that, whatever the established security
holes are, "the appropriate patches ought to be
applied, and the default configurations and services
which are running on a particular system ought to be
shut off if they are not needed." Matai predicts that
more ruthless security measures will be implemented in
the future, including: Stricter authentication, such
as random passwords that are changed frequently, and a
biometric/smartcard combination; the transfer of
complex data from a user's computer to an upstream
"vault" ensured by a bank-like entity supplying data
custody services; and governments and countries either
limiting the capabilities of commercially sold
computers or requiring users to demonstrate their
competence in being more circumspect should their
computers be hacked. Click
Here to View Full Article
"Spam-Busters" Network World
(03/22/04) Vol. 21, No. 12, P. 69; Ulfelder,
Steve
- Unspam CEO Matthew Prince, one of the top spam
fighters in the United States, argues that for spam to
be curtailed several things must happen: Technology
that can help establish and confirm a sender's
identity must be developed, which will allow anti-spam
laws to be more enforceable and effective. These laws,
Prince contends, must "decrease the cost of tracking
down spammers, decrease the cost of bringing a trial,
increase the likelihood of success at trial or
increase the social benefit from winning a trial."
Shlomo Hershkop, a Ph.D. candidate at Columbia
University, is amazed that spam has become such a
large problem, given that technology intelligent
enough to effectively combat it already exists. He
also thinks that spam will linger far past Microsoft
Chairman Bill Gates' projected mid 2005 deadline.
Freelance anti-spam software developer Matt Knox
attests that spam is a technical problem that must be
remedied with a technical solution, and echoes Bill
Gates' optimism that spam's demise is imminent, partly
because of improving, easier-to-use spam filters. At
the same time, he acknowledges that anti-spam
legislation is important, although he is uncomfortable
with leveraging the Digital Millennium Copyright Act
against spammers. Software developer Terry Sullivan
says authentication technologies are being
overemphasized as a spam solution: He explains, "Every
day users do not make their ham/spam judgment based on
the source of the message. They make it based on the
content of the message." Sullivan likens the war
against spam to the Pacific Theater in World War II,
where progress was made in fits and starts; he also
notes that there already exist strategies that could
effectively derail spam at the cost of email's
convenience, and formulating a less brutal solution
will be a tough challenge. Click
Here to View Full Article
From ACM
News, March 26, 2004
"When Instant Messages Come Bearing
Malice" New York Times (03/25/04) P. E4;
Junnarkar, Sandeep
- Instant messaging (IM) is the next big target for
spammers and hackers now that the number of people who
use the technology has grown significantly.
Popularized by teenagers during the late 1990s, IM has
now spread to the business world where people find it
useful for quickly sharing files and communicating.
The immediacy of the format makes it especially
vulnerable to social engineering schemes such as an
"Osama Captured!" game spread over America Online's IM
network: That IM spam message, known in IM parlance as
"spim," got people to click on a link claiming Osama
Bin Laden was captured, which then took them to a game
download site; when users downloaded the game, they
also got a load of adware and executable code that
sent copies to everyone on their buddy list. America
Online chief trust officer Tatiana Gau says filters
are in place now to screen out the Osama message, and
Zone Labs' John LaCour says the exploit was relatively
benign since it did not carry a more potent payload.
The CERT Coordination Center at Carnegie Mellon
University has repeatedly warned about the danger
social engineering attacks pose to IM networks.
Promises of free products, pornography, and intriguing
links have long been used to trick email users, and
now are expected to increasingly show up on IM. IM is
also inherently less secure than email since it is
sent as plain text over the network, allowing
unethical system administrators to cull messages for
passwords or personal information. IM users also often
have the option of opening shared files to people on
their buddy list, and those files can contain
important documents or other pieces of information
possibly aiding identity theft. Major IM client
vendors Yahoo!, Microsoft, and America Online all use
closely guarded code which experts say makes them more
susceptible to have software flaws. Click
Here to View Full Article
From ACM
News, March 24, 2004
"Technology Solution to Slicing Spam
Lags" CNet (03/22/04); Olsen, Stefanie;
Festa, Paul
- Efforts to develop anti-spam technology standards
are displaying a profound lack of unification, and
some anti-spam experts are taking a long, hard look at
the standards issue's progress in the wake of AOL,
EarthLink, Microsoft, and Yahoo!'s joint lawsuit
against scores of spammers. There have been few public
signs of teamwork between the members of the Anti-Spam
Technical Alliance (who are also the plaintiffs in the
lawsuit), but they are individually developing
anti-spam measures: AOL recently started testing its
DNS-based Sender Policy Framework (SPF); Yahoo! often
discusses plans to support the proposed DomainKeys
email sender authentication scheme; and Microsoft has
devised an email verification scheme of its own,
Caller ID for Email, that focuses on message headers
rather than senders. Members of the alliance
acknowledge that agreement on common standards has
proceeded slowly, partly because the problem is so
complicated and there is little conclusive research
into how effective these separate standards would be.
Outblaze CTO Suresh Ramasubramanian predicts that
components of the more viable of these standards
initiatives will eventually be integrated into a
compromise proposal. An AOL spokesperson says
coalition members intend to test each other's proposed
solutions, but are still engaged in separating the
workable from the unworkable solutions. SPF, which has
been deployed by AOL and Google and selected for IETF
assessment, is a leading candidate for the common
technical anti-spam solution. MX Logic's Scott Chasin
suggests that proposed technical solutions developed
by the Internet Research Task Force's Anti-Spam
Research Group might attract more backing than any one
company's proposal, and adds that technical solutions
will have to be complemented by education and
legislation if spam is to be effectively corralled. Click
Here to View Full Article
From ACM
News, March 22, 2004
"Experts Publish 'How to' Book for Software
Exploits" IDG News Service (03/15/04);
Roberts, Paul
- Leading security researchers have published a book
that teaches how to write hacker code exploiting
software security holes. "The Shellcoder's Handbook:
Discovering and Exploiting Security Holes," set for
release next week, is intended for network
administrators, but includes working examples of code
and some previously published attack techniques.
Malicious hackers frequently use shellcode in their
attacks on computer systems. The book has chapters on
stack overflows, format-string bugs, and heap
overflows, among other topics, but co-author Dave
Aitel says the information is necessary for
administrators who want to secure their systems.
"People who know how to write exploits make better
strategic decisions," he adds. Co-authors Chris Anley
and David Litchfield say the book has information that
can already be obtained online from discussion groups,
or from university courses. The book has increased
debate over whether researchers should publicly expose
software flaws, especially since it contains
previously unknown information about how to launch
kernel attacks, for example. Novel hacking techniques
used for the first time are called "zero day"
exploits. Anley says the book is designed to defend
against hackers, not instruct them. He says, "This
isn't a collection of exploits. It's a book that tells
you how to find the bugs and understand what the
impact of the bugs is." Despite the controversy, SANS
Institute director of research Alan Paller says the
book will benefit those working to defend their
networks against attack more than it will hackers,
since it provides advice that makes sense. Click
Here to View Full Article
From ACM
News, March 19, 2004
"The Web: Hacker Turf War Raging
Online" United Press International
(03/17/04); Koprowski, Gene J.
- A turf war between three groups of rival hackers
is being waged over the Internet, the prize being the
many computer systems their malware threatens to
compromise and zombify worldwide. In computer worms
such as MyDoom, Netsky, and Bagle, Central Command
analysts have uncovered messages intended to provoke
virus writers, such as "wanna start a war?" Central
Command VP Steven Sundermeier characterizes this
battle as "a war for power and seniority," while
experts fear that this rivalry could have a
substantial negative commercial impact on the
government and economy of the United States, and even
become a serious threat to U.S. national security.
Futurist R. Pierce Reid, formerly with General
Dynamics, says the federal government is not entirely
ready to counter a coordinated attack orchestrated by
cyber-terrorists. A continuing source of mystery is
who is training these cyber-vandals and what their
political motivations are, although there have been
reports of a North Korean military facility where
hacking is taught. Several projects are underway to
root out cyber-terrorists by scrutinizing the code of
the malware they use: Britain's National Hi-Tech Crime
Unit is studying connections between extremist
organizations and virus-authoring cooperatives,
looking for patterns in source code that could offer
clues to the hackers' identities. The U.S. Northern
Command's Joint Protection Enterprise Network, which
was launched this month, is an Internet-browser-based
system that facilitates the rapid exchange of
anti-terrorism data between intelligence agencies
online. Computer experts think terrorist hackers could
do substantial damage to the private sector, although
it is unlikely they could cripple the federal
government. However, some specialists do not
exclusively blame Islamic extremists for all
cyber-crimes: Some perpetrators are amoral businesses
that want to commit corporate espionage or sabotage.
Click
Here to View Full Article
"Viruses Lurk as a Threat to 'Smart'
Cellphones" Wall Street Journal (03/18/04)
P. B4; Nasaw, David
- The growing power of "smart phones" is increasing
their susceptibility to malware, which Network
Associates predicts could cost North American wireless
carriers as much as $2.5 billion in two years. As a
result, the wireless industry is preparing itself for
a major virus assault that targets intelligent
cellular phones. Less advanced "dumb" phones may not
be vulnerable to a virus infection, but an attack on
smart phones could have an impact on voice traffic for
all phones in a cell network, because voice and some
data are piped along the same channels. U.S. wireless
carriers claim they can shield themselves from
infection by scanning wireless data traffic and
filtering out suspicious behavior, which would thwart
phones from transmitting viruses embedded within text
messages to multiple numbers. Although IDC researcher
Sally Hudson says the wireless industry is making a
valiant effort to address the threat of smart-phone
viruses, she warns that "the current protection for
mobile networks is poor." Symantec and Network
Associates have responded to the threat by issuing
antivirus products for the leading handheld platforms,
while F-Secure has devised software that can
wirelessly transmit antivirus updates to phones, as
well as an antivirus filter that wireless carriers can
deploy on their download platforms to safeguard users
retrieving games, ring tones, and other programs.
Meanwhile, operating-system manufacturers are working
to reduce vulnerabilities: Symbian, for example, is
building a program that will permit a certain degree
of authentication to the integrity of applications
written for its operating system. For now, the
prospect of launching a virus attack against smart
phones is not attractive to hackers, given the small
number of vulnerable phones currently in use."
"New Hacker Program Prompts
Alert" Washington Post (03/18/04) P. E5;
Krebs, Brian
- A new hacker tool has emerged to take advantage of
the peer-to-peer networking abilities that
file-sharing networks use, and computer security
experts are watching for it. The Phatbot tool is
thought to have already infected hundreds of thousands
of computers that use the Windows operating system,
which means that hackers could control the computers
and link them into P2P networks to send spam or flood
Web sites. The Department of Homeland Security (DHS)
has sent out an alert to some computer security
experts about the tool, warning that it hunts for
passwords and tries to take down antivirus and
firewall software. Symantec senior director Vincent
Weafer describes Phatbot as "a virtual Swiss Army
knife of attack software;" the tool is a kind of
Trojan horse, but much more evolved than most such
programs. It usually gets in through security flaws in
Windows or through a backdoor installed by the Bagle
or Mydoom Internet worms, and links the computers into
a network so that hackers can issue orders through a
variety of routes, making it much harder to shut down.
Most major antivirus products detect the tool, but it
can disable the software. A DHS cybersecurity official
says, "The concern here is that the peer-to-peer like
characteristics of these 'bot networks may make them
more resilient and more difficult to shut down," since
Phatbot attacks can only be completely shut down if
every infected computer is found. Home broadband users
and computer networks at colleges and universities are
the primary Phatbot targets so far, but TruSecure
chief scientist Russ Cooper says "U.S. e-commerce is
in serious threat of being massively attacked by
whoever owns these networks" if P2P networks of
hundreds of thousands of computers are infected. Click
Here to View Full Article
From ACM
News, March 17, 2004
"In E-Mail Warfare, the Spammers Are
Winning" Baltimore Sun (03/14/04) P. 1A;
Shane, Scott; Packard, Jean
- In the arms race between spammers and anti-spam
proponents, the bad guys have the upper hand thanks to
underhanded tactics such as using computer worms to
compromise vulnerable systems and turn them into
"zombies" for mass-mailing spam. Spamhaus director
Steve Linford predicts that spam will probably account
for 80 percent of all email in the United States by
summer. Worms are not the only tool in spammers'
arsenal: Other methods include counterfeiting return
addresses, and tweaking the spam with odd spellings
and blocks of random text to thwart electronic
filters. The profit potential is irresistible for
spammers: Spam can be cheaply distributed to millions
of people in a few hours, and profits can be realized
even if only one spam recipient out of 10,000 makes a
purchase. Spam hurts the productivity of businesses
that must use up precious time to get rid of junk
email, while filters, despite their increasing
sophistication, cannot avoid mistaking legitimate
email for spam. One proposed approach for curtailing
spam involves challenge-response systems designed to
authenticate the legitimacy of email if the sender
types in a certain word or code, thus indicating that
the sender is an actual person and not a computer
program; another is to charge senders a penny for each
email they send. Legislation such as the CAN-SPAM Act
appears to have had little effect on the spam problem,
though the biggest U.S. email providers recently
invoked the law to file lawsuits against scores of
spammers. Linford believes spam can only be
effectively controlled through combined technological,
litigious, and prosecutorial efforts, though the
situation is likely to worsen in the short term. Click
Here to View Full Article
"Can Social Networking Stop
Spam?" NewsFactor Network (03/15/04);
Martin, Mike
- A new algorithm developed by UCLA professors P.
Oscar Boykin and Vwani Roychowdhury applies social
networking principles to spam filtering. "We routinely
use our social networks to judge the trustworthiness
of outsiders...to decide where to buy our next car, or
where to find a good mechanic," notes Roychowdhury.
"An email user may similarly use his email network,
constructed solely from sender and recipient
information available in the email headers, to
distinguish between...'spam,' and emails associated
with his circles of friends." The researchers'
algorithm processes a specific user's personal email
network to concurrently determine both the user's
trusted networks of friends and spam-spawned
sub-networks, Boykin explains, adding that the
algorithm distinguished between spam and legitimate
email with no errors or false negatives in a recent
test. The researchers studied six weeks' worth of
emails from assorted individuals so they could
ascertain the "components" of their email network, a
component being a series of nodes that can connect to
each other in the network, according to Boykin;
analyzing "clustering coefficients" in a
network--provided the network is big enough--is an
easy way to tell spam and non-spam components apart.
Boykin says he and Roychowdhury observed that
clustering coefficients run high for non-spam
components, and are equal to zero for spam components.
Roychowdhury's colleague attests that the algorithm
can be used to train content-based filters to
recognize words and phrases typical of spam and
non-spam, once 50 percent of email can be accurately
classified as either junk or legitimate email. Boykin
points out that the tool also produces white lists and
blacklists used to verify that content filters are
properly classifying email. Click
Here to View Full Article
"The End of Passwords" E-Commerce
Times (03/13/04); Millard, Elizabeth
- Lavasoft vice president Michael Wood says the way
that passwords are currently used poses a danger to
companies since individuals could use keylogging
spyware to record keystrokes and so learn passwords.
However, alternative user authentication technologies
such as smart cards have not caught on widely. Users
themselves often open the greatest security holes by
writing down passwords or using the same password for
multiple systems. The recent RSA conference showcased
a number of user authentication choices, including
SecurID technology, which was created by RSA and
Microsoft for Windows in particular. It uses a
personal identification number and an authentication
token, and generates new passwords every 60 seconds.
VeriSign has announced an alliance with Microsoft for
authentication services based on the Windows Server
2003 products, and Sun Microsystems says it will
create an identity-management solution for Microsoft
environments such as Windows. Given the widespread
corporate use of Windows, such technologies could
change network security. IT departments must find a
balance between security and usability, and blended
techniques are likely to become more popular this
year. Forrester analyst Michael Rasmussen says, "There
can be a trade-off on speed for security, depending on
your architecture. The decision on what to implement
is going to come down to an IT department's
preferences and needs." Click
Here to View Full Article
From New
York Times, March 18, 2004
Malicious Computer Worm Detected
By John Schwartz
- Malicious computer program known as phatbot or
polybot can create networks of remotely controlled
computers to take part in online attacks, send junk
e-mail messages and engage in other shady activities;
program uses technology like that developed as
Gnutella and Kazaa to control machines. The worm can
create networks of remotely controlled computers to
take part in online attacks, send junk e-mail messages
and engage in other shady activities common to the bad
neighborhoods of cyberspace.
From EduPage,
March 17, 2004
Putnam Blasts Federal It Security
- Rep. Adam Putnam (R-Fla.) had harsh words this
week for federal agencies' failure to adequately
protect their IT infrastructures. A December report
gave federal agencies an overall grade of "D" for IT
security, and a new report from the Government
Accounting Office (GAO) indicates growing numbers of
cyber attacks against government systems. According to
the GAO report, cyber attacks on government offices
rose from 489,890 in 2002 to 1.4 million in 2003. The
report said blame for the lack of security falls more
with poor management practices within federal agencies
than with technology. Putnam, chair of the House
Government Reform Subcommittee on Technology, noted
that the nation has gone to great lengths to protect
physical security but said "protecting our information
networks has not progressed commensurately." Jeffrey
Rush of the Treasury Department acknowledged the
failings but noted that since the creation of the
Department of Homeland Security, his agency has seen a
70 percent reduction in staff. Internet News, 17 March
2004 http://www.internetnews.com/infra/article.php/3327081
From ACM
News, February 23, 2004
"Computer-Security Efforts
Intensify" Wall Street Journal (02/23/04) P.
B4; Clark, Don; Wingfield, Nick; Hanrahan,
Tim
- An annual conference hosted by RSA Security will
be held this week, with email fraud, spam, and new
ways to hinder such practices through the
authentication of company and user IDs being major
topics of discussion. Bolstering information has
increased in importance because corporations may now
be liable for lost or compromised data thanks to new
legislation. One proposed solution is Sender Permitted
From (SPF), in which senders' servers post their IP
addresses so that email recipients can verify that
incoming messages are from legitimate sources. Time
Warner's America Online unit has tested SPF, which is
also being embedded in MailFrontier software and other
products. Meanwhile, PassMark Security will announce a
Web site authentication solution on Feb. 23 whereby
users are assigned a random image on their first visit
to a site that employs the PassMark system; they would
be shown the same image when they revisit the site
before entering their user names and passwords, or
otherwise know that something is wrong. Sun
Microsystems wants to widen the scope of smart cards
or security tokens, which reportedly offer better
protection for Web sites than passwords and more
accurate identification of emailers. VeriSign will
today announce new technical guidelines to reduce the
cost of smart cards and other robust ID measures. The
open authentication reference architecture (OATH) is a
joint project between Sun, IBM, Gemplus International,
BEA Systems, and others that aims to help companies
develop simple, interoperable online ID products.
"Spam: A Reality Check" PC Magazine
(02/18/04); Ulanoff, Lance
- The CAN-SPAM act has not stymied the rising tide
of spam email, but it has influenced changes in the
content and targeting of spam messages: Spammers are
using provisions in the CAN-SPAM law to make their
email look legitimate, including unsubscribe links and
postal mailing addresses, for example. SurfControl's
Susan Larson says one in 20 spam messages her company
captures for enterprise clients has some new
information added as a guise, and notes that new spam
messages appear to disseminate nonpromotional content,
such as trivia, but have normal spam text appended.
CAN-SPAM's requirement of snail-mail return addresses
is addressed by spammers who insert invisible white
text inside addresses, making them appear legitimate
to users but keeping anti-spam software from capturing
traceable addresses. The unsubscribe links are just a
bad idea, according to MessageLabs CEO Mark Sunner,
who says anyone even opening spam email puts
themselves at risk of virus infection, not to mention
those who click on inserted links. Sen. Conrad Burns
(R-Mont.), one of the co-authors of the CAN-SPAM
legislation, defends the bill but admits the
unsubscribe links were one area of compromise; he
looks forward to spam volume decreasing in coming
months as the Federal Trade Commission and FCC work
out enforcement rules that will likely give
protections to legitimate email marketing firms and
companies that distribute information to clients via
email. Burns also looks forward to international
gatherings such as the upcoming International Telecom
Union meeting for the creation of international
enforcement mechanisms. That would no doubt pressure
the majority of spam senders who keep their servers
outside the United States. Burns also says he has been
in contact with colleagues in the United Kingdom and
Australia about the international spam problem. Click
Here to View Full Article
"Serious Linux Security Holes Uncovered and
Patched" eWeek (02/19/04); Vaughan-Nichols,
Steven J.
- ISec Security Research, a Polish nonprofit
organization, discovered a number of security
vulnerabilities in the Linux kernel on Feb. 18 and
released an advisory. Linux kernel developers verified
the problems and fixed them with updates. One flaw
would have allowed a hacker to get full super-user
privileges, while the other would have allowed whole
systems to be hijacked or disabled. However, both
would have required local users with sophisticated
knowledge and Unix shell access, notes Debian Linux
security expert Martin Schulze. Linux distributors
including Novell/SuSE Linux, Red Hat, and the Debian
Project have released patches. Although not related,
both of the flaws were located in Linux's virtual
memory kernel subsystem; one of the flaws was found in
the mremap(2) system call of Linux 2.4 and 2.6's
kernel memory management code. Click
Here to View Full Article
"Unlocking Our Future" CSO Magazine
(02/04); Garfinkel, Simson
- Sandstorm CTO and technology writer Simson
Garfinkel maintains that computer security has Grand
Challenges equivalent to putting a man on the moon or
forecasting weather via supercomputing--in fact, he
was one of dozens of leading security researchers
invited by the Computing Research Association and the
Association for Computing Machinery to find and
present such challenges at a November workshop. The
end result was a quartet of challenges that deserve
"sustained commitments." The first information
security Grand Challenge lies in eliminating
epidemic-style worm, virus, and spam attacks within a
decade, and Garfinkel writes that most conference
attendees favored the development of a completely new
approach to solving the problem, rather than the
installation of antivirus software and the continuous
updating of systems. The second Grand Challenge is the
development of tools and principles for building
large-scale systems for critical and trustworthy
applications that also make lucrative targets, such as
medical records systems. The third Grand Challenge is
finding a reliable way to measure risk in information
systems, which could allow people to determine how
much an organization could save by deploying a
specific piece of software, for instance.
Practitioners usually establish "best practices"
designed to reduce the changes of computers being
breached, but such measures provide no metric for
making purchasing decisions, nor do they tell
organizations how secure their systems are at the
moment. The last Grand Challenge is to give end users
easily understandable security controls as well as
privacy they can control for the pervasive, dynamic
computing environments of the future; meeting such a
challenge could involve a fundamental shift in the way
people look upon and work with information systems.
Garfinkel concludes, "Ultimately...we need to start
thinking more strategically about computer security,
or else we are going to lose this war." Click
Here to View Full Article
From ACM
News, February 20, 2004
"Converging on Network
Security" Military Information Technology
(02/09/04) Vol. 8, No. 1; Gerber, Cheryl
- Solving the most formidable network security
problems is one of the goals of the National Security
Agency (NSA), which has launched programs to address
Internet interoperability, network convergence, and
wireless security bugs. The convergence of different
networks and appliances has prompted the agency to add
compatibility both inside and between commercial
infrastructures and existing, secure communications:
Secure interoperability between certain wired and
wireless systems was attained when the NSA started an
industry/government coalition that approved the Future
Narrow Band Digital Terminal (FNBDT) as a common
signaling specification; FNBDT has moved beyond narrow
band to include a common voice processing capability,
a crypto-algorithm base, and a key-management process,
which has helped it grow into the chief security
protocol for cell phones, military radios, and
emerging public safety communications devices for
first responders and homeland security initiatives.
Convergence of voice and data over secure wireless
networks has moved closer thanks to the inclusion of
secure voice and data interoperability in FNBDT mode,
while the emergence of electronic re-keying has also
helped advance FNBDT interoperability. NSA intends to
finalize a Wireless Technology Vulnerabilities
Database, which federal agencies can use to check
commercial wireless products prior to purchase, by
year's end. The Federal Information Processing
Standard 197 doctrine issued by the National Institute
of Standards in Technology (NIST) declared that AES is
the standard encryption tool for government
communications below the Type 1 level, which has
spurred many vendors to start devising or offering AES
in their non-Type 1 secure wireless products. The NSA
also has set up the Secure Mobile Environment
Integrated Products Team to cover mid- and long-term
secure mobile environment challenges such as
vulnerability discovery, research, product
development, and certification. Click
Here to View Full Article
"Spam-Busters Sort Out the Fakes" New
Scientist (02/07/04) Vol. 181, No. 2433, P. 26;
Biever, Celeste
- Email authentication strategies announced to
delegates at the annual Spam Conference could be a
more effective measure against the growth of
unsolicited commercial email than content filters or
anti-spam laws. Most spammers resort to spoofing, a
tactic in which their junk email pretends to originate
from the addresses of innocent senders; this technique
thwarts blacklisting measures, and makes owners of
spoofed addresses the targets of angry spam
recipients, as well as any spam bounced back by
content filters. Authentication schemes require
checking each email to see if its sender is genuine, a
strategy that could foil spoofing. The Internet
Engineering Task Force is currently examining a pair
of email authentication protocols as possible
candidates for standardization: Yahoo!'s Domain Keys
protocol and the Lightweight Message Access Protocol
(LMAP). Domain Keys would tag all emails with an
encrypted signature that links message to source, and
this signature would be decrypted by the receiving
server and checked to ensure that content and coded
sequence match, while the identity of its domain would
also be inspected for verification. LMAP, an extension
to the Simple Mail Transfer Protocol, would require
email providers to augment their servers with a
program designed to check the legitimacy of the
address entered in the email's "from" field; if the
claimed source's IP address does not match that of the
actual source, the email will be deleted as a spoof or
labeled as "suspected spam" and shunted to a file for
later examination. Authentication schemes will give
spammers little choice but to use real domain names,
which means it will be tougher for them to conceal
themselves. Meanwhile, Martian Software is developing
TarProxy, an anti-spam tool designed to channel
suspected spam through a "tar pit," thus slowing down
its transmission and discouraging spammers from
sending more junk email.
From ACM
News, February 18, 2004
"Passwords to Guard Entry Aren't Enough to
Protect Complex Data" ScienceDaily
(02/16/04)
- Shielding complex data from unauthorized users
with passwords and other access controls is only part
of the equation; outgoing data must also be protected
through filters, argues Stanford computer science
professor Gio Wiederhold, who will discuss trusted
information databases at the annual meeting of the
American Association for the Advancement of Science.
The access-driven security model cannot function
unless data is well organized and contained in tidy
boxes for use by people with authorized roles, while
complex, unstructured, multipurpose data generally has
poor protection. Furthermore, even the most secure
access controls are useless if trusted users turn,
such as when a malcontented employee with access to
the database decides to hurt the company by exploiting
or damaging its information assets. The biggest
detriment of the access control model is its failure
to take collaboration into account, which can hinder
research that requires multiple types of users to
access data, such as patient medical records.
Wiederhold contends that complementing access control
with release control, in which the content of
documents being sent to the requestor is monitored,
will ensure that the requestor only receives material
that is appropriate for a specific project. The
Stanford professor adds that diverse systems with data
output such as email, file systems, Web sites, and
databases are prime candidates for document release
protection. However, Wiederhold cautions that though
privacy may be better shielded with access controls
working in parallel with release control, complicated
security parameters could come into conflict or even
make data less secure. "The scope of potential use of
data is so large that no approach that relies on any
specific data organization will be adequate for all
future needs," he comments. Click
Here to View Full Article
"New Anti-Spam Initiative Gaining
Traction" eWeek (02/12/04); Callaghan,
Dennis
- Spammers would no longer be able to send junk
email anonymously if the SMTP protocol was changed so
that sending servers could be authenticated; the
SMTP+SPF working group is developing the Sender Policy
Framework (SPF) in the hopes that the Internet
Engineering Task Force (IETF) will approve it as an
anti-spoofing standard. SPF only works if domain
owners publish sender IP addresses, which would then
be matched to client IP addresses provided by mail
transfer agents; email would be rejected if the client
IP address and the published domain IP address fail to
match. Pobox.com CTO Meng Weng Wong plans to argue his
case for the IETF to establish a working group to
study SPF at the 59th IETF Meeting in late February,
although he really wants the task force to adopt the
framework directly, without going through a workgroup
phase. He says the SMTP+SPF working group has already
done most of the legwork, adding, "It may take a year
from now [before SPF goes through the regular IETF
process], and no one wants another 12 months of spam."
Wong says that existing spam filters can be tweaked to
support SPF, and anti-spam technology providers such
as CipherTrust and InboxCop are backing the framework.
In addition, almost 7,000 domain holders have posted
their sender IP addresses at the SMTP+SPF Web site,
while Wong reports that SPF would be available for
free and on a voluntary basis. Mark Wegman at IBM's
T.J. Watson Research Center cautions that SPF, though
a good starting point, cannot halt all spam, and notes
that the framework can be supported by a new spam
filter his company is working on. The filter assesses
email according to numerous factors, such as delivery
patterns and account content. Click
Here to View Full Article
"Security Still Reigns as Wireless 'Weakest
Link'" E-Commerce Times (02/17/04);
Gallagher, Helen
- Though Amry Junaideen of the Deloitte & Touche
Security Services division reports that wireless
devices such as laptops and personal digital
assistants have become more productive, that
productivity is offset by their lack of security,
which means that information could be compromised if
the devices are stolen, employed, or tapped by
unauthorized users. He recommends that corporations
institute a top-down wireless security framework that
covers why the corporation is using wireless, what its
business goals are, and what policy supervises the
entire enterprise in this area. "A policy should
require strict adherence to standards and contain
specific information on what people should do to
protect their devices once wireless has been
deployed," Junaideen explains. Devices used to store
the most sensitive data should get the highest
priority, while critical data files should be
encrypted in the event the portable device is lost,
even though encryption is an expensive option.
Junaideen says protective measures for wireless
devices include not just file encryption, but
firewalls, virtual private networks, quarantining
tools, and data wipe technology. He suggests that
users cut wireless connections immediately if a
sniffer detects that a device has been compromised,
while data wipe software can erase all data from a
lost device if someone attempts to exploit it. Network
Associates' Sydney Fisher says the security risks of
wireless are related to its advantages: "It's
important to have appropriate security so data is
stored properly, travels properly and is protected
from people who shouldn't get it, but [is] accessible
to those who do need it." Fisher notes that sniffer
products are well suited for wireless environments
such as WANs, LANs, or ATM networks. Click
Here to View Full Article
"Spammers Exploit High-Speed
Connections" Associated Press (02/16/04);
Jesdanun, Anick
- Spammers are hijacking home computers with
high-speed Internet connections to use as proxy spam
relays, and email security companies estimate that
between one-third and two-thirds of junk email is sent
by "spam zombies" whose owners misconfigure their
software or fail to implement or update their PCs'
security. Proxy relays could be run from any
Internet-connected machine, but most of the malware
that installs these proxies targets PCs that run
Windows. The shift in spamming tactics spurred the
Federal Trade Commission to issue a consumer advisory
in January, recommending that consumers employ
firewall and antivirus programs as well as check "sent
mail" folders for suspicious content. Visiting
windowsupdate.microsoft.com regularly to download the
latest updates to the Windows operating system is
advised by others. EarthLink's Mary Youngblood
explains that ISPs have a lot of trouble detecting and
blocking proxy spam relays; some remain open for a
short while and vanish by the time ISPs are aware of
the problem, while newer, more versatile proxies
constantly reconfigure themselves and are harder to
lock down. "Fighting Spam for Dummies" co-author John
Levine speculates that as proxies spread, ISPs could
be forced to restrict the number of messages a
subscriber is allowed to send in a given time period.
Brightmail chief technology officer Ken Schneider
predicts that the situation will only get worse, now
that virus writers have an economic incentive to
create malevolent code. Click
Here to View Full Article
"Hackers for Hire" TechNewsWorld
(02/13/04); Germain, Jack M.
- It has been a common practice for companies to
hire "White Hat" hackers to test their network
security, but some experts are questioning the wisdom
of such an approach, especially as new, stronger, and
more potentially damaging cybersecurity threats emerge
and government regulations about data security and
customer privacy increase. Former regional partner for
Deloitte & Touche Security Services Group Thomas
Patterson compares hiring one-time hackers to putting
a fox in a henhouse, and advocates several fundamental
rules for cutting risks. "We believe we can achieve
the same level of success without sacrificing the
trust of our own clients," notes Patterson. "We may go
to the hacking conferences and stay up on what's the
latest in the hacking community, but it's a fine line.
We hire the good guys." Invisus co-founder James
Harrison draws a very fine boundary between White Hat
and Black Hat hackers, and argues that software
security products and certified computer experts offer
far more safety, since they engender reliability and
trust. On the other hand, security consultant Gary
Morse claims there are big differences between good
and bad hackers: White Hat hackers, he insists, are
veteran programmers with no criminal histories, and
they devote more time to writing lengthy documentation
on a company's security flaws than actually
penetrating networks. He also downplays the threat of
email worms and viruses, arguing that hacker threats
are far more dangerous. Click
Here to View Full Article
"Congress and
Cybersecurity" TechNews.com (02/12/04);
Krebs, Brian
- In an online discussion of cybersecurity issues,
Rep. Adam Putnam (R-Fla.) raised such points as the
need for increased awareness of such issues, and the
progress both the public and private sectors have
made. He acknowledged that there is still a lot to be
done in many areas, such as improving awareness,
instituting more oversight, and encouraging safe
computing practices. In response to a question posed
by discussion moderator Brian Krebs, Putnam said that
he decided to postpone introducing a bill that would
require public companies to confirm their compliance
with cybersecurity standards after receiving a great
deal of feedback from the private sector indicating
that it would give IT security serious consideration,
adding that he would vouch for an industry-promoted
plan that sets up sound cybersecurity practices, even
without direct federal mandate. He also praised the
National Cyber Alert System launched last month,
arguing that more than 250,000 visits to the system's
official Web site in its first week of operation was a
clear sign that "public interest and awareness are
high." The congressman addressed a question from a
inquirer in Jacksonville, Fla., in which he admitted
that 85 percent of U.S. critical infrastructure is
controlled by private industry, and explained that his
subcommittee is conducting hearings that seek to make
Congress more proactive about cybersecurity without
hurting innovation. Putnam told an inquirer from
Portland, Maine, that he has established a working
group to make software companies more responsible for
improving cyberattack measures, pointing out that
Congress has investigated the possibility of expanding
common criteria standards for sensitive defense and
intelligence purchases to the software industry.
Putnam maintained that making home users aware of safe
computing practices is important to both the
government and industry, noting that manufacturers and
educators have their roles to play. Putnam contended
that the White House Office of Management and Budget
has improved its IT spending oversight efforts
significantly under President Bush's Management
Agenda, while more cybersecurity-minded issues are
being bundled into the National Security Cyber
Division of the Homeland Security Department. Click
Here to View Full Article
From Edupage,
February 13, 2004
IBM AND CISCO TO PARTNER ON SECURITY
IMPROVEMENTS
- IBM and Cisco Systems this week announced a
partnership to build security into their products,
reflecting a growing awareness among technology
companies that security applications work better when
they are integrated into basic design rather than
added on to otherwise completed products. The new
partnership means that various hardware and software
products from the two companies will be able to
communicate, lowering the chance for security
weaknesses in networks. The IBM-Cisco deal echoes the
recent acquisition of network security firm NetScreen
Technologies by Juniper Networks. Chris Christiansen,
analyst with IDC, said that although he is skeptical
of such partnerships because "so many of them have
failed in the past," he is more optimistic about the
IBM-Cisco deal. The companies have worked together
previously, said Christiansen, and have little product
overlap. San Jose Mercury News, 13 February 2004 http://www.siliconvalley.com/mld/siliconvalley/7946744.htm
From ACM
News, February 13, 2004
"Is Cyberspace Getting Safer?" Medill
News Service (02/11/04); Newell, Adrienne
- The Homeland Security Department's National Cyber
Security Division (NCSD) is evaluating the progress of
cybersecurity over the past year and outlining future
security projects. Among the 2003 milestones the NCSD
notes is the government's creation of a critical
infrastructure information network, an
Internet-independent federal communications resource
that can be used in the event the Internet and other
computer-based communications media are knocked out;
NCSD director Amit Yoran reports that his agency has
"significantly" widened the scope of the network.
Another NCSD watershed is the establishment of the
Cyber Interagency Incident Management Group, which
brings together different experts to develop
preventative cyberattack strategies as well as bolster
the government against future cyberspace-based
assaults. The NCSD unveiled a National Cyber Alert
System in January designed to keep computer users
apprised of viruses, worms, and other cyberthreats via
email; Yoran notes that millions of computer users
have accessed the system's Web site, and says his
agency plans to expand the site to increase public
awareness of security issues. The NCSD partnered with
the private sector in a December 2003 summit to
determine areas where cybersecurity needed to be
heavily emphasized, such as spreading awareness and
providing early warnings about intrusions, but Yoran
calls current public-private partnerships to meet
these goals "unacceptable," and is calling for
additional participation. He adds that his division is
forging new public-private collaborations to push for
unified security objectives, and is advising software
developers to increase their programs' security while
making them less buggy and loose. Yoran says that
developers are "encouraged [to] adopt...automated
technologies that guide and force [them] to produce
code with fewer vulnerabilities and fewer bugs." Click
Here to View Full Article
"Coming Soon to Your IM Client:
Spim" Network World (02/09/04) Vol. 21, No.
6, P. 30; Garretson, Cara
- Instant-messaging spam (spim) may not be as
widespread as email spam, but experts believe spim
could become just as problematic as junk email as IM
proliferates throughout the corporate sector: Analyst
Sara Radicati estimates that IM is used as a corporate
service by 26 percent of companies, while 44 percent
say their workers employ IM. The most popular IM
services are offered for free, which means that
spammers only need a list of screen names to deluge
these systems with spam. In addition to consuming
network sources and hurting productivity, spim could
exacerbate workplace tensions by posting pornographic
or other objectionable content on employees' screens.
The most apparent spim countermeasure is to block
incoming messages from unknown senders, but users who
depend on IM for communications could miss important
messages. Some of the top IM service providers
downplay the spim threat--Yahoo! Messenger's Lisa
Pollock Mann reports that less than 2 percent of the
traffic Yahoo! Messenger processes is spim, while
security measures such as IM network monitoring and
Yahoo! IDs to authenticate senders fortify the service
against spamming. The past year has seen the emergence
of new anti-spim software and services: IMlogic, Zone
Labs, and Sybari offer spim-filtering software, while
end-to-end encryption and message archiving for
regulatory documentation are some of the extra
features included in such products. CipherTrust,
Brightmail, and other anti-spam filter providers are
also looking into ways of tackling the spim problem in
the hopes that the additional layer of security will
make IM more palatable to companies as a
communications tool. Click
Here to View Full Article
From ACM
News, February 11, 2004
"The Virus Underground" New York Times
Magazine (02/08/04) P. 28; Thompson,
Clive
- The year 2003 was a banner year for malware, with
the release of network worms that spread with
increasing rapidity and insidiousness, and such events
are putting elite virus writers on the spot. Even
though many top virus and worm authors have not
technically transgressed any laws and profess to hold
no malevolent intent, security experts argue that they
are complicit in the spread of malware, even if they
never actually release it into the wild. Despite the
writers' inventiveness in creating new forms of
malware that can be used for nefarious purposes, many
claim to adhere to an ethical code and refuse to
distribute their viruses onto the Internet, while
still others will post virus source code online, where
less experienced hackers or "script kiddies" can
appropriate it for their own ends. Unfortunately,
there is little to stop script kiddies from unleashing
the malware, either intentionally or unintentionally.
Security and law enforcement experts call this
irresponsible action on the part of the authors, and a
sign of their ethical naivete: "It's like taking a gun
and sticking bullets in it and sitting it on the
counter and saying, 'Hey, free gun!'" argues Purdue
University's Marc Rogers. Many elite virus writers
also reside outside the United States, where virus
writing is not against the law, while some U.S. legal
scholars claim that malware is protected under the
First Amendment, and only becomes unlawful when it is
released into the wild and inflicts considerable
damage. Virus authors' arguments are being further
weakened by recent outbreaks of stealth viruses such
as Sobig, which experts say clearly illustrate the
presence of malicious creators motivated by greed;
these particular viruses or worms are designed to
infect vulnerable systems without damaging them so
that they can secretly harvest data for exploitation.
But it is more than likely that even worse financially
or politically motivated cyberattacks are on the
horizon, such as "cryptoviruses" that allow users to
ransom their victims' files by encrypting them. Click
Here to View Full Article
"Can E-Mail Survive?" PC Magazine
(02/17/04); Metz, Cade
- Email reform is desperately needed, not only
because of the convergence of spam and viruses, but
because email is also threatening to collapse from
overload. Legislation alone will not solve the
problem: Laws such as the recently passed CAN-SPAM are
unlikely to significantly reduce spam because so much
of it comes from overseas, beyond U.S. jurisdiction.
The best solution might involve a retooling of email
on a fundamental level, as unappetizing as such a
measure may be. Some email experts think a scheme
should be set up in which a small fee is charged for
every email sent, while a similar proposal would have
users pay in CPU cycles. The solution favored by
industry will probably be an email authentication
scheme, perhaps one based on proposed standards such
as Reverse MX authentication or SMTPi. However, years
will probably pass before industry arrives at and
deploys a single email authentication standard.
Meanwhile, the combined problem of spam and viruses is
making email less and less palatable for users and
businesses, according to recent studies from
InsightExpress and the Pew Internet and American Life
Project. People discouraged from using email are
turning to phones, voicemail, and instant messaging to
fill the void. Click
Here to View Full Article
"The E-Mail Mess" Governing (01/04)
Vol. 17, No. 4, P. 40; Perlman, Ellen
- Some states have strict laws against spammers,
with some laws focusing on deceptive email and others
trying to stop spam before it starts, but the new
federal Can-Spam Act will hinder many of those laws.
The federal legislation strengthens the rights of
Internet users in states that lack anti-spam laws, and
may help residents of states with weak laws, but in
other areas people are displeased with the new law. It
does not let individuals sue spammers, and its opt-out
feature is held to be weaker than some states' opt-in
requirement. EPrivacy Group chief privacy officer Ray
Everett-Church says that previous attempts at opt-out
provisions have proven that they do not work. The
federal law's exception for providing a valid return
email address also offers a large loophole, according
to the National Association of Attorneys General.
Companies that use email as a legitimate business tool
support the federal law, saying that stricter
laws--such as those in California, Washington State,
and Delaware--are too dangerous for businesses, and
support a national "do not email" registry. Although
supporters of strong anti-spam laws agree that federal
guidelines are better than a hodgepodge of laws from
states, they say the weaker federal laws hurt overall
anti-spam efforts. Delaware state prosecutor Steven
Wood says the parts of Delaware's law that target
selling software for falsifying routing information
and making it a crime to access a person's computer to
send them spam will remain under federal law.
Washington State believes that its laws, which have
been used to prosecute five spammers targeting state
residents, will also complement, and not be superceded
by, federal laws. Still, whether any laws can really
stop the flow of spam is an open question; despite
anti-spam laws in 36 states, the flood of spam
continues. Click
Here to View Full Article
From Edupage,
February 9, 2004
REPORT SAYS CAN-SPAM ACT NOT EFFECTIVE
- A report from California-based e-mail filtering
company Postini seems to indicate little immediate
change in the volume of spam as a result of the
CAN-SPAM Act, signed into law by President Bush in
December. At that time, spam accounted for 80 percent
of all e-mail according to Postini. One month later,
that figure remained at 79 percent. Critics of the
bill had argued that it would do little to stem the
flow of spam, saying that the bill simply outlined
steps spammers must take for their e-mail to be
"legitimate." Critics also noted that many spammers
operate outside the United States, beyond the
jurisdiction of the law. Postini's Andrew Lochart said
spam can only be effectively controlled through a
combination of technology and legislation. BBC, 9
February 2004 http://news.bbc.co.uk/2/hi/technology/3465307.stm
From ACM
News, February 9, 2004
"Software Innovation Is
Dead" NewsForge (02/07/04); Love,
Jonathan
- Jonathan Love, a computing student at Imperial
College, London, claims that software innovation is
dead, arguing that software developers are no longer
motivated to pursue innovative projects. He reports
that security software has experienced the largest
amount of growth in the last several years, chiefly
because of the growing frequency of hacker attacks.
Many respectable software engineers, especially the
younger ones, prefer making a name for themselves by
inventing malware, Love contends. The student also
observes an increase in the copying of features from
competing products, which is an easier strategy for
developers than inventing completely new features.
"And what incentive is there for a developer to
implement a new feature when said developer knows that
any good feature will be copied by his competitors?"
he adds. Love writes that an innovative software
developer has two choices: He can release his software
free online, or attempt to market it. Selling his
software is a difficult proposition because there are
so many licenses to choose from. Love asserts that
creating truly innovative software will be beyond the
abilities of next-generation developers. "If I am
going to spend three or four years at university
studying computer science, yet not be able to offer
any significant advantage to a major software
development house compared to a simple 'code-monkey'
who can churn out lots of code at a very low wage,
where is my incentive to do software development?" he
writes. Click
Here to View Full Article
"False Hope for Stopping
Spam" Technology Review (02/04/04);
Garfinkel, Simson
- Legislative attempts to control spam, such as the
recently passed CAN-SPAM Act, are unlikely to
significantly impede the deluge of junk email, partly
because the amount of spam originating outside the
United States is growing. Anti-spam advocates gathered
at MIT's Spam Conference in January expressed hope
that overhauling the fundamental workings of email
would be a more effective measure, but author Simson
Garfinkel thinks the odds are stacked against them.
His argument is based on indications of an alliance
between hackers, spammers, and organized crime.
Brightmail estimates that 56 percent of all Internet
email is spam, but Garfinkel cites personal experience
to give credence to his belief that the spam situation
is far worse; he found that spam constituted 94
percent of all email he received on Jan. 26,
accounting for legitimate email, spam blocked by his
filter, and emails automatically rejected by his
server because they were sent to invalid addresses at
his domain. Worse, spam originating from Asia exceeds
legitimate email by almost 10 to 1, while spam from
the United States runs approximately 50/50 with
legitimate email. The growing sophistication of spam
attacks is spurring email providers to roll out more
advanced countermeasures such as Yahoo!'s Domain Key,
but these products could cement the providers' market
supremacy, thus making it harder for small businesses
to maintain their own email systems. Garfinkel doubts
that these next-generation tools will be effective in
the long term, and is concerned that biotechnology and
nanotechnology, like email, could be harnessed by just
a few people as weapons against most users. "If we
can't tackle the spam problem, then the future may be
quite bleak," he warns. Click
Here to View Full Article
"Tackling the Secure Web Mail
Challenge" E-Commerce Times (02/04/04);
Pasley, Keith
- The secure Web mail technology sector is trending
toward appliances that serve other email
infrastructure security purposes besides Web mail
protection, but they require some knowledge of how to
handle Web mail security, writes information security
professional Keith Pasley. Web-based email is a good
way to distribute information to workers outside the
office, but the perceived security risk makes many
businesses reluctant to deploy it. Most such systems
use a multitiered architecture and separate databases
for mail and user authentication information, raising
security issues for identity management, availability,
privacy, and data integrity. Many systems support a
variety of authentication methods, and cryptography is
usually used to ensure privacy and data integrity;
redundant servers and load balancing can increase
availability. The management of session cookies is a
main issue of Web mail session management; if they are
not erased at user logoff and the browser is not
closed, an attacker can get in, but countermeasures
are available. Management commitment to using secure
methodologies helps counter flaws, as does a secure
software development philosophy and proper training.
Security technology or outsourcing or hosting the
service can increase security as well. Click
Here to View Full Article
From Edupage,
February 6, 2004
MICROSOFT PROPOSES NEW STRATEGIES TO LIMIT
SPAM
- Software giant Microsoft, which has lately
announced its intention to help stem the flow of spam,
is working on programs designed to place a significant
burden on those who want to send vast amounts of
unsolicited e-mail. Under an initiative called "Penny
Black," computers that send e-mail would be required
to spend several seconds solving a complex math
problem. Such a scenario would cause virtually no
slowdown for average users, but spammers trying to
send millions of e-mails would be faced with an
enormous computational demand. Officials from
Microsoft noted that the company is working on several
other anti-spam programs and does not consider the
Penny Black program to be a "silver bullet." For any
solution to be effective, said Microsoft's George
Webb, it must have "broad-based deployment across the
e-mail system." Washington Post, 5 February 2004
From ACM
News, February 4, 2004
"Europe Blames Weaker U.S. Law for Spam
Surge" Wall Street Journal (02/03/04) P. B1;
Mitchener, Brandon
- Brightmail estimates that more than half of all
email in the European Union is spam, and Europeans
claim U.S. anti-spam laws, which are far more lax than
European regulations, are chiefly to blame. Eighty
percent of EU spam is written in English, and that
same percentage apparently originates from North
America. EU law subscribes to an opt-in policy, in
which email marketers cannot send unsolicited
commercial email unless recipients specifically ask
for it; U.S. law follows an opt-out policy, whereby
spammers do not have to obtain prior permission from
recipients to send them spam. Canada, Australia, and
Switzerland have implemented an opt-in anti-spam
policy similar to the EU model, while Japan, South
Korea, and Mexico follow the opt-out strategy. Europe
is demanding that the United States crack down harder
on spamming, a vital issue in a week when the
Organization for Economic Cooperation and Development
is meeting in Brussels to call for more international
cooperation on anti-spam enforcement. "The ball is
very much in the [U.S.] Federal Trade Commission's
court," notes European Coalition Against Unsolicited
Commercial Email Chairman George Mills. The U.S.
counters that adopting an opt-in policy would be
detrimental to small businesses that rely on
unsolicited email to market themselves and compete
with bigger players, and force companies into the
onerous task of proving they had permission to send
email. Howard Beales III, head of the FTC's bureau of
consumer protection, dismisses the notion that opting
out worsens the spam problem, and urged conferees in
Brussels to help deflate this "urban myth."
"Why This One Is Scarier" San Francisco
Chronicle (02/03/04) P. B1; Kirby, Carrie
- The Mydoom computer worm's success in shutting
down the SCO Group's Web site through a
denial-of-service attack waged by 25,000 to 50,000
infected "zombie" computers raises the bar for malware
in terms of damage and sophistication, but some
security experts believe Mydoom was created as a
spamming tool, rather than a political weapon wielded
by fringe Linux advocates against SCO's attempts to
halt the distribution of the Linux operating system.
Such a possibility highlights the growing prevalence
of financial gain as a motive for virus development
and exploits. F-Secure systems engineer Tony
Magallenez observes that viruses often follow a
parallel evolutionary track to communications
technology--for instance, the Melissa email virus made
a big splash back in 1999 because email had just
become a breakout communications medium. As email
viruses became more advanced and threatening, email
users grew more cautious, which in turn prompted virus
authors to resort to new strategies to spread their
malware, such as writing deceptive lines and messages.
Bugs that spread automatically online, such as Code
Red, Nimda, and Slammer, soon followed, and each new
major worm proliferated faster than the one before it.
Mydoom, the latest email worm, installs "back doors"
in victims' computers, allowing hackers to commandeer
those machines for their own ends. The original Mydoom
permutation infected around 500,000 computers,
according to Network Associates; a far smaller number
of systems was tainted by the variant Mydoom.B worm,
which is targeting Microsoft. Network Associates'
Craig Schmugar reports that approximately 7 percent of
Mydoom.B-infected computers will launch an attack on
www.microsoft.com, which may hardly make a dent in its
operation. Click
Here to View Full Article
"Dual Curses: Viruses and
Spam" Computerworld (02/02/04) Vol. 32, No.
5, P. 29; Ubois, Jeff; Betts, Mitch
- A Web-based survey of senior executives conducted
by Computerworld and Ferris Research finds that
viruses and spam are the biggest email-related
headaches. IT managers are fearful of zero-day attacks
because virus authors are exploiting software
vulnerabilities faster. Meanwhile, spam is a source of
frustration because it leads to lost productivity as
well as embarrassment: A Nucleus Research study
estimates that system administrators lose an average
4.5 hours of productivity a week to spam-related
problems, while CIOs may feel pressured to solve spam
problems because they are a source of irritation and
humiliation in the workplace. Respondents to the
Ferris/Computerworld survey also list regulatory
compliance as a major email issue; in addition, a
surprising result of the poll is the indication that
concerns about dealing with denial-of-service attacks
are growing among CIOs. Email downtime is apparently
not a source of concern with CIOs, but respondents
have expressed fears about prolonged periods of
disabled email service stemming from hacker attacks.
Instant messaging from wireless devices, migrating
between email packages, switching messaging servers to
Linux, and using mainframes as email servers are among
the issues generating the least amount of concern
among survey respondents, while email budget issues
such as total cost of ownership are not among the top
10--an unexpected conclusion given how cost-conscious
the CIOs are. Robert W. Reeg of MasterCard
International reports that respondents generally frown
upon switching email platforms partly because of the
problems and costs inherent in such a migration, such
as training and the loss of email archives. "I don't
see any business case [that would justify migrating],
unless someone's on a really antiquated, unsupported
package," he argues. Click
Here to View Full Article
From ACM
News, January 14, 2004
"Is the Tide Turning in Battle Against
Hackers?" IT Management (01/04); Robb,
Drew
- Despite the Internet and computer systems
appearing to be under constant assault by ever
craftier hackers, security safeguards are progressing
faster, as demonstrated by a documented slowdown in
exponential damage increases in 2003, compared to
previous years. According to a joint Computer Security
Institute/FBI report, the percentage of companies
experiencing unauthorized computer use fell from 60
percent in 2002 to 56 percent in 2003; furthermore,
significant security incident totals remained about
the same, but financial losses reported by respondents
fell from $455 million in 2002 to $202 million in
2003. The greatest losses in 2003 were attributed to
theft of proprietary information, but damages were
again significantly lower than in the previous year.
However, fewer numbers of organizations experiencing
Denial-of-Service attacks were countered by an
increase in damage, from $18 million in 2002 to $66
million in 2003; the third biggest threat was viruses,
whose collective damage last year totaled $27 million,
almost half that of the year before. Symantec's most
recent Internet Security Threat Report indicates
significant growth in the number of blended threats
and a shrinking interval between the discovery of
vulnerabilities and the launch of exploits. Odds are
more favorable toward network security right now
because companies are regarding threats with more
seriousness, according to the results of a Business
Software Alliance/Information Systems Security
Association poll released last December. Seventy-eight
percent of respondents claimed their companies were
better fortified against major attacks than they were
12 months earlier. However, these positive reports are
not an excuse for companies to relax their vigilance
or their deployment of cyber-defenses, given the
increasing sophistication and speed of hacks, as well
as indications that such attacks are the work of
organized groups sponsored by enemy governments. Click
Here to View Full Article
From ACM
News, January 12, 2004
"Security Threats Won't Let
Up" InformationWeek (01/05/04) No. 970, P.
59; Hulme, George V.
- The state of information security, which took a
hammering last year, is expected to worsen this year
as security vulnerabilities increase in severity, the
use of spyware grows, and spammers adopt hacking tools
and techniques to distribute junk email. To bolster
themselves against these threats, businesses may have
to add commercially available intrusion-prevention
applications to an arsenal that includes fast
patching, firewalls, regularly updated antivirus
software, and strict remote-user security regulations.
A Yankee Group poll of 404 security decision-makers
finds that over 50 percent of respondents expect their
security budgets to grow significantly over the next
three years. Gartner VP John Pescatore notes that
virus writers are getting craftier and launching
spyware attacks, many of which are designed to fool
users into thinking they are dealing with trustworthy
parties so that they will give out confidential
information that can be exploited. The good news is
that more and more effective anti-spyware tools are
available from software vendors, while antivirus
vendors are enhancing their offerings with
spyware-detection and -removal software. In addition,
anti-spyware legislation such as an overhauled
Safeguard Against Privacy Invasions Act is slated to
be introduced in 2004. Meanwhile, Vincent Weafer of
Symantec anticipates that spammers will continue to
employ Trojan horses and viruses to hijack computers
and use them as spam launching platforms; experts also
believe hackers will start taking advantage of popular
peer-to-peer networks and instant-messaging services,
and target cell phones, handhelds, and emerging
operating systems as well. Though well-publicized
"zero-day" worms are of less concern to security
analysts, Pescatore points out that more worms are
appearing within one to two weeks after a software
flaw is discovered. Click
Here to View Full Article
From ACM
News, January 7, 2004
"Security: From Bad to
Worse?" InformationWeek (12/29/03); Keizer,
Gregg
- A TruSecure study issued Dec. 29 indicates that
spyware and peer-to-peer file-sharing software will
make 2004 just as bad as 2003, if not worse, for
businesses beleaguered by cybersecurity woes. Bruce
Hughes of TruSecure's ISCA Labs reports that
"perimeter killer" worms that attack networks directly
through software flaws and unprotected Internet ports
experienced a 200 percent increase in 2003, and such
worms will constitute the biggest danger to businesses
in 2004; he predicts that such worms will incur at
least $1 billion in damages in the coming year. Hughes
also projects a rise in "zero day" attacks, in which
exploits appear prior to the disclosure of a software
vulnerability. "Some hacker is going to release
exploit code ahead of the patch and create significant
damage to those unprepared," he warns. Hughes notes
that spyware may be relatively less malign than
viruses, but the two have begun to overlap, so
companies should be vigilant for more malevolent
spyware iterations. He foresees peer-to-peer (P2P)
software as an especially frustrating headache for
businesses, and has learned through analysis of
hundreds of files shared on Kazaa that almost half
include worms, viruses, and Trojan horse programs.
Hughes urges companies to limit P2P usage on their
networks, audit the enforcement of such regulations,
and familiarize workers with the risks of P2P. Hughes
sees the collaboration between government and the
private sector in catching and prosecuting virus
authors as a hopeful sign. Click
Here to View Full Article
From ACM
News, December 29, 2003
"Device Guards Net Against
Viruses" Technology Research News
(12/24/03); Patch, Kimberly
- The communicability of computer viruses is often
related to people's unwillingness to install and
regularly maintain virus-filtering software on their
systems, and Washington University and Global Velocity
researchers have devised a new, hardware-based
countermeasure called the Field Programmable Port
Extender. The reconfigurable device scans data packets
passing through a network byte by byte, blocking any
packets that contain an Internet worm or computer
virus signature. The Field Programmable Port
Extender's reliance on hardware rather than software
makes the system sufficiently speedy to scan
high-speed backbone Internet traffic for viruses.
Global Velocity co-founder John Lockwood says the
device boasts a data-filtering rate of 2.4 billion
bits per second, and claims the network-level
protection offered by the Field Programmable Port
Extender could make the system more effective at
stopping worms and viruses than software running on
end-users' computers. The hardware produces an
abundance of specially-tailored circuits that
individually scan data for a specific virus or worm
type, and Lockwood notes that network managers can
easily update the system's worm or virus signature
database via a Web-based interface. He explains that
the viability of the Field Programmable Port Extender
stems from the construction of protocol processing
circuits capable of scanning high-speed TCP/IP traffic
as well as recognizing malware even when it is
fragmented and distributed among multiple data packets
and traffic flows. Click
Here to View Full Article
"DARPA Evaluates Proposals for
Self-Regenerative Systems" Computerworld
(12/22/03); Anthes, Gary H.
- The goal of the Defense Advanced Research Projects
Agency's (DARPA) Self-Regenerative Systems (SRS)
initiative is to develop next-generation security and
survivability technologies enhanced with
coarse-grained diversity so as to minimize the impact
of any given vulnerability, which is key to waging
network-centric warfare. The agency says that such
systems must be capable of self-optimization,
self-diagnosis, and self-repair through self-awareness
and reflection, and will use biological processes and
human cognition as templates. DARPA program manager
Lee Badger comments that the introduction of
computerized diversity based on natural systems could
help reduce the security vulnerabilities stemming from
an electronic monoculture, a problem due to the
widespread use of common software because of current
economies of scale. Badger remarks that there are
several possible strategies to achieving software
diversity: In a rewriting approach, an existing
software component could be specialized by passing it
through a filter, or the code could gradually drift
within its functional specifications via a genetic
algorithm strategy. In talking about why such
approaches work better than making a larger effort to
write better code, Badger explains, "Our strategy has
been to find and remove defects in software, but as
software grows to a very high level of complexity, our
chances of actually finding and removing all
flaws...are getting very small." The program manager
notes that defensive systems that learn to combat
threats by updating their virus or attack signature
databases can only fight new, unforeseen attacks by
employing "anomaly detection," which is inherently
flawed because of the potential to tag valid behavior
as anomalous. Badger hopes that biologically inspired
systems could become capable of learning about their
environment over time so they can anticipate threats,
in the same way that the immune system learns and
adapts its defenses from exposure to germs. DARPA will
assess proposals from universities and companies to
develop technologies for its SRS program. Click
Here to View Full Article
"We Hate Spam, Congress Says (Except When It's
Sent by Us)" New York Times (12/28/03) P. 1;
Lee, Jennifer 8.
- The federal spam control law that goes into effect
on Jan. 1 does not extend to members of Congress who
send out unsolicited messages to constituents in order
to attract voluntary subscribers to the legislators'
email lists; these messages are not subject to House
rules that bar taxpayer-supported congressional mass
communications 90 days before an election, although
free postal mail from House members to voters is still
banned. Many congressional members laud the policy,
passed by House Administration Committee vote in
September, for enabling less expensive and more
efficient correspondence with constituents, but
consumer advocacy organizations claim the measure may
give an unfair edge to incumbents over challengers,
adding that such bulk emails constitute spam when they
are sent to constituents without their permission.
"They are regulating all commercial spam, and at the
same time they are using the franking privilege to
send unsolicited bulk communications which aren't
commercial," observes David Sorkin of Chicago's John
Marshall School. "When we are talking about
constituents who haven't opted in, it's spam." Prior
to the institution of the policy, messages sent to
over 500 constituents had to be approved by the
franking commission and was subject to a 90-day
blackout before an election, while individual
responses to citizens were free of such strictures.
Congressional officials criticized the old policy as
unwieldy, but the unsolicited messages they send to
constituents to build their email lists under the new
policy still must be approved by the franking
commission and must halt 90 days before an election or
primary. House members insist that their unsolicited
emails are not spam, since they are directed to
constituents who have the right to opt out. However,
critics note a striking similarity between the
technology behind both political and commercial bulk
email. Click
Here to View Full Article
From ACM
News, December 17, 2003
"The Spies Who Come in Through the
Keys" Financial Times (12/17/03) P. 15;
Morrison, Scott
- Snoopware--software that can be installed
surreptitiously on victims' computers and record their
keystrokes, emails, passwords, chatroom postings, and
Web site visits without them knowing--is thought by
security experts such as Earthlink VP Matt Cobb to be
"the next big threat" to both corporate and individual
privacy. There are various snoopware programs
currently available, promoted mainly as tools for
employers to monitor Internet use in the workplace or
for parents to keep track of their children's computer
activity. But the products' potential for
abuse--potential that has only recently come to light
by real-world instances of such abuse--is even
greater. For instance, a New York hacker confessed
this year that he installed keylogging software on
public computers at 13 Manhattan Kinko's outlets so
that he could record and purloin personal data from
over 450 people, which he sold online and also used to
divert money from his victims' bank accounts into new
accounts he set up in their names. Most snoopware
victims have been individual users, but corporations
have recently become targets. Snoopware is often
innocently downloaded by unsuspecting victims off the
Internet, as well as buried in email attachments,
viruses, and pop-up ads that trigger snoopware
downloads when users click on the "close" button.
Though Symantec and other computer security
organizations have begun to offer snoopware detection
programs, Network Associates' Ryan McGee believes
snoopware authors will inevitably make their software
harder to identify. People at the greatest risk of
being victimized by snoopware are users of public
computer terminals, while broadband users also have a
high degree of vulnerability.
From ACM
News, December 24, 2003
"Digital Defense" Computerworld
(12/22/03); Anthes, Gary H.
- Hackers and malware authors may currently have the
upper hand thanks to the growing number of
vulnerabilities stemming from increasing software
complexity, a rise in computer connectivity, and the
emergence of sophisticated and simple-to-use digital
weapons. But computer security experts meeting at the
Santa Fe Institute's recent Adaptive and Resilient
Computing Security workshop believe new defensive
concepts may turn the tide: Such concepts--some of
which are biologically inspired--can identify new
kinds of attacks by eliminating reliance on
predetermined definitions (virus signatures, attack
scenarios, vulnerability exploits, etc.); they are
supposed to continue to operate even when an attack is
underway, though their effectiveness may be somewhat
reduced; they are adaptable to changing attack
strategies; and they reduce false alerts. Dipankar
Dasgupta of the University of Memphis' Intelligent
Security Systems Research Lab reports that there is no
one computer safeguard capable of defending systems
against all kinds of attacks, but his facility's
Security Agents for Network Traffic Analysis combines
neural networks and "fuzzy rules" to enable mobile
software agents to detect network intrusions.
Stephanie Forrest of the University of New Mexico
notes that biodiversity makes systems stronger and
tougher, and she is developing "automated diversity
for security" whereby uniqueness is instilled within
each system by arbitrary random changes. Using a
measure known as Kolmogorov Complexity, GE Global
Research scientist Scott Evans has learned that
attacks can be predictably quantified as less or more
complex than normal behavior, which makes a tool for
attack identification and blockage feasible.
Meanwhile, Steven Hofmeyr has created Primary
Response, a commercial defense product that uses
agents to profile an application's normal behavior
based on the code paths of a running program, so that
abnormalities in those paths are easy to spot. Click
Here to View Full Article
From ACM
News, December 3, 2003
"Computer Security in
Focus" SiliconValley.com (12/03/03);
Ackerman, Elise
- Lobbyists, elected representatives, business
leaders, and security experts are worried that the
White House has lost focus on the implementation of
its National Strategy to Secure Cyberspace, and plan
to use the National Cyber Security Summit on Dec. 3 to
spur the Bush administration to take a more proactive
stance. The national cybersecurity initiative has been
plagued by a lack of forward momentum and the
resignations of two cybersecurity czars--Richard
Clarke, who left two weeks before the strategy was
adopted by President Bush, and Howard Schmidt, who
departed just two months after his appointment. Their
responsibilities now reside in the Department of
Homeland Security's National Cyber Security Division,
whose director, former Symantec executive Amit Yoran,
has only been in office since mid-September. Yoran
calls the National Cyber Security Summit "a call to
action" that will inform the public that his division
is up and running, and initiate dialogue between both
industry and government and security technology users
and academic experts. Greg Garcia of the Information
Technology Association of America says that five
industry-backed task forces will present several
recommendations at the summit, including making
computer users more aware of the need to regularly
update their software and deploy security measures;
establishing best corporate and business cybersecurity
practices; lowering the number of computer
vulnerabilities; and setting up a national
cybersecurity response system. Among those expected to
attend the summit are Homeland Security chief Tom
Ridge and Homeland Security Department assistant
secretary of infrastructure protection Robert
Liscouski. "Our goal has been to really encourage the
senior people in the department to make sure a high
priority is given to this aspect of security," says
TechNet CEO Rick White. Click
Here to View Full Article
"Rules to Address Holes in Software" Los
Angeles Times (11/28/03) P. C1; Menn,
Joseph
- Major technology companies, working under the
aegis of the Organization for Internet Security (OIS),
are formalizing rules to determine the best time for
hackers and researchers to publicly disclose software
bugs so that vendors should not have to worry about
malicious parties exploiting these vulnerabilities.
The guidelines outline what someone should and should
not do after discovering a software security hole, as
well as how the software's authors should respond.
According to the plan, a hacker who finds a bug must
report it to the software maker and give the company
time to study the flaw and develop a patch; it is
recommended that the software maker keep the hacker
apprised of its progress. Around a month is the
prescribed time a software maker should have to devise
a patch, while the hacker ought to wait another month
before publicly disclosing the patch. The OIS advises
hackers never to broadcast details of the
vulnerability if a patch cannot be developed. Few
hackers who work for tech companies or on their own
are fans of the guidelines: Many contend that software
firms would lie about their failure to build a patch
just to prevent flaws from being exposed, while
experts are concerned that patches will be
reverse-engineered by talented virus writers so they
can learn the holes they are designed to fix and
develop malware to take advantage of them. The major
tech companies feel they must take some kind of
action, especially with pressure building for Congress
to pass legislation making them liable for shoddy
software. Some hackers are trying to mobilize into a
trade group to fight the OIS guidelines, which PivX
Solutions researcher Thor Larholm claims would
endanger the livelihood of hackers who are paid to
discover and help repair software bugs. Click
Here to View Full Article (Access to this site is
free; however, first-time visitors must register.)
"A Two-Pronged Approach to
Cybersecurity" CNet (12/01/03); Lemos,
Robert
- Amit Yoran, who was recently appointed director of
the National Cyber Security Division of the
Information Analysis and Infrastructure Protection
Directorate at the Department of Homeland Security,
plans to bolster the security of the United States and
its cyberinfrastructure during his tenure. He believes
that cyberterrorism is something people must always be
aware of, and sees little difference between
safeguards used to thwart cyberterrorists and those
used to shield against other threats. Yoran advocates
a two-pronged strategy to combat outbreaks of worms
and viruses such as Code Red, Slammer, and Nimda. The
first part of the approach involves implementing
long-term projects such as the improvement of software
engineering and the invention of better software
development processes, and the second part is the
pursuit of short-term objectives such as boosting
cybersecurity awareness, and improving the national
response system and coordination with critical
infrastructures. Yoran says the key players in this
effort--critical infrastructure owners, software
developers, and the system operators--can receive
government advice, guidance, and aid through a secure
communications infrastructure. Although Yoran says the
level of security called for by the National Strategy
to Secure Cyberspace has yet to be reached, he has
been encouraged by what he has seen in his first month
in office, as well as the private sector's enthusiasm
to contribute to the cybersecurity effort. He notes
that the National Strategy cannot succeed without
coordinated public-private collaboration. How the
country can better deal with future cyberattacks will
be the focus of a talk Yoran will give in Silicon
Valley this week. Click
Here to View Full Article
"Fighting the Worms of Mass
Destruction" Economist (11/27/03) Vol. 369,
No. 8352, P. 65
- A lot of fear is circulating that viruses and
worms could be used by terrorists to threaten entire
societies with destruction and anarchy, but fewer than
1 percent of recent cyberattacks originated from
terrorist-sympathetic nations, and the majority were
conducted by hackers within the United States. Hackers
are more likely to be money-hungry thieves or
techno-savvy adolescents hoping to disrupt networks to
satisfy their egos than terrorists; network security
expert Bruce Schneier also notes that terrorists face
greater difficulties than seasoned hackers in
penetrating computer systems, while physical attacks
remain a more effective technique of hurting people
than disrupting networks. The Internet must become
more trustworthy in order to reach its full potential,
but the growing frequency, intensity, and speed of
cyberattacks, along with hackers' increasing use of
self-propagating worms, is eroding Net security--and
this threat will only escalate as users move from
dial-up access to broadband and connect even more
devices to the Internet. Nor is cybercrime limited to
worms and viruses: Brand spoofs, counterfeit Web
pages, and "phishing" are just a few of the fraudulent
practices running rampant online. Though cybersecurity
measures such as firewalls, intrusion-detection
systems, and anti-virus software are effective to a
degree, experts such as Stanford University professor
Lawrence Lessig contend that legislators need to
pressure companies to make their software more secure.
Former @Stake executive Dan Geer blames most of the
Internet's security problems on Microsoft's operating
system monoculture, and adds that the complexity of
the software only makes it harder for users to secure
their systems. Schneier says that software vendors
must be made accountable for insecure products, which
sets up an economic incentive to fortify their
software against cyberattacks. Another strategy calls
for Internet users to become better versed in good
security practices while making it easier to trace
online criminals, a development that will require a
reduction of online anonymity. Click
Here to View Full Article
From Edupage,
December 3, 2003
New Computer Worm A Friend Of
Spammers Reuters, 2 December 2003
- A new e-mail computer worm appears to be the work
of spammers trying to defeat anti-spam forces. The
W32/Mimail-L worm replicates as do other worms, by
e-mailing itself to those in an infected computer's
address book, but it also sends a second message
promising delivery of a CD with pornographic content.
The link to supposedly prevent delivery of the CD in
fact sends an e-mail to one of eight anti-spam
organizations. Steve Linford of the Spamhaus Project
said his organization is being flooded with complaints
from computer users who believe Spamhaus is
responsible the CDs. In addition, the worm can turn
infected computers into drones that can be used in
denial-of-service attacks against the same eight
organizations. Security experts commented that this
latest worm provides further evidence that virus
writers and spammers are working together. http://www.reuters.com/newsArticle.jhtml?storyID=3925183
From eWeek
Security Update, December 4, 2003
Researchers Find Serious Vulnerability in
Linux Kernel by Larry Seltzer
- It's become very ho-hum to find major
vulnerabilities in Windows, but it's not the only
imperfect operating system out there. Recent
developments remind us that Linux admins also need to
be on the alert for known vulnerabilities and ready to
patch quickly.
- Several weeks ago the maintainers of the respected
Debian Linux distribution revealed that the main
server for the project had been compromised. Last week
they revealed that the attack came through a
vulnerability in the Linux kernel itself, patched in
very recent versions. The vulerability doesn't
directly give root access, but it gives the attacker
access to all of memory, through which other evils may
be perpetrated. Today a similar attack was announced
against Gentoo Linux's servers.
- Debian Linux Under Attack by Hackers http://eletters.eweek.com/zd1/cts?d=79-347-5-8-168492-41600-1
- Researchers Find Serious Vulnerability in Linux
Kernel http://eletters.eweek.com/zd1/cts?d=79-347-5-8-168492-41603-1
- Crackers Strike Gentoo Linux Server, Code Unharmed
http://eletters.eweek.com/zd1/cts?d=79-347-5-8-168492-41606-1
- The Debian attack wasn't exactly a zero-day
exploit, in which the vulnerability is discovered
through an already existant attack, but as with
Windows the time frame is getting shorter. Whatever
your operating system, you must be dillegent if you're
going to stay ahead of the bad guys.
From ACM
News, November 26, 2003
"Taking Cues From Mother Nature to Foil
Cyberattacks" Newswise (11/25/03)
- A National Science Foundation-supported
cyberdefense project operates on the premise that many
computer systems are vulnerable to viruses, worms, and
other forms of malware because they use identical
software that has the same vulnerabilities, in much
the same way that genetically similar individuals are
susceptible to the same diseases or disorders. The
project, which enlists collaborators from Carnegie
Mellon University and the University of New Mexico
through a $750,000 NSF grant, is investigating how
"cyber-diversity," like biodiversity, can bolster
systems' resistance to dangerous agents. "Our project
seeks to reduce computer vulnerability by
automatically changing certain aspects of a computer's
software," explains Carnegie Mellon researcher Dawn
Song. "Adapting this idea in biology to computers may
not make an individual computer more resilient to
attack, but it aims to make the whole population of
computers more resilient in aggregate." Earlier
attempts to diversify software had independent teams
develop different versions of the same software in the
hopes that different sets of vulnerabilities would
evolve from each version, but researchers call such an
approach time-consuming and economically costly.
University of New Mexico computer science professor
Stephanie Forrest says they are exploring ways to
automate the diversity process, which could be more
effective and less economically taxing. NSF program
director Carl Landwehr says the Carnegie Mellon-New
Mexico collaboration represents the kind of innovative
research his organization expects to encourage through
its CyberTrust program. Click
Here to View Full Article
"Q&A: Improved Security Requires IT
Diversity" Computerworld (11/24/03);
Vijayan, Jaikumar
- Security guru and author Bruce Schneier contends
that physical security is not a function of technology
but a function of people: Technology by itself cannot
make people safer because that is not its purpose;
safety comes from how people implement and use
technology. Schneier argues that his report
"CyberInsecurity: The Cost of Monopoly" is not a
condemnation of Microsoft's operating system per
se--it is not the operating system that lies at the
core of IT security problems, but rather the
prevailing monoculture, which carries greater risks
than benefits. Schneier explains that bad patching and
the lack of secure software is attributable to
economic rather than technical problems, and claims
that the solution is to essentially hack the business
climate. He suggests that software manufacturers
should be made liable for the damages users suffer as
a result of insecure software, which will give them a
direct economic incentive to fix those
vulnerabilities. Full public disclosure of security
holes is also forcing software companies to take
security seriously, while virus and worm
outbreaks--and the publicity they generate--is an
additional source of pressure for CEOs. Schneier says
that patching is a useless gesture, given that there
is an overabundance of patches marked by generally
poor performance--and what is more, companies cannot
catch up with the rate of vulnerability disclosure.
His argument is to shift focus from threat avoidance
to risk management, and achieving this requires that
the CFO be placed in charge of security, since
security people have too narrow a view to make such
decisions. Schneier admits that measuring effective
security is difficult, because "there is no standard
benchmark against which to measure your own security."
Click
Here to View Full Article
From ACM
News, November 24, 2003
"Computer-Security Experts Challenge
Researchers to Focus on Long-Term
Solutions" Chronicle of Higher Education
(11/21/03); Carnevale, Dan
- Purdue University's Eugene Spafford was one of
five speakers at a recent Virginia conference who
suggested strategies computer scientists could follow
to implement long-term cybersecurity solutions.
Spafford declared at a news conference that computer
networks should be rethought to include embedded,
effective, and easy-to-use security. However, he
remarked that "Near-term needs are so pressing that
they have soaked up most of the resources and most of
the funding and left little for long-term thinking.
It's an ongoing arms race in cyberspace." Spafford,
who predicted that better network security will
encourage people to engage in more online activity and
create better services, identified four "grand
challenges" that researchers should address within a
decade: The halt of spam, viruses, worms, and
denial-of-service attacks; the development of tools to
build large-scale, highly trustworthy networks; the
creation of systems that give users the ability to
comfortably control their privacy and security; and
the design of risk-management analyses for computer
systems that offer just as much reliability as
financial investment risk-management analyses.
Spafford also expressed hope that the federal
government will allocate more funds to network
security research. Other speakers at the forum
included Sun Microsystems' Susan Landau, who noted
that medical care could be significantly enhanced if
security and reliability were incorporated into
computer networks. The Virginia conference was held by
the Association of Computing Machinery and the
Computing Research Association, while the National
Science Foundation used the event to announce that it
would soon start accepting research proposals for
improving computer security under its CyberTrust
program.
"Proposed Spam-Blocking Technology Is a Long
Way Away" InternetWeek (11/21/03);
Gonsalves, Antone
- The Anti-Spam Research Group (ASRG), an alliance
of consumer email providers, and other organizations
are attempting to control spam by developing and
implementing sender-authentication solutions, but many
are finding the challenge much more difficult than
previously anticipated. ASRG co-chair John R. Levine
admits that his predecessor Paul Judge's May forecast
that some ASRG technologies would be ready for
deployment within a few months was "too optimistic."
The ASRG has no personnel and no budget--Levine says
it is merely a coordinating body of anti-spam
researchers affiliated with the Internet Engineering
Task Force (IETF). Levine says that three major
sender-authentication schemes are currently under
consideration by his organization: Reverse MX, Sender
Permitted From, and Designated Sender Protocol. All
three proposals would permit a mail server receiving a
message to query the email's originating domain as to
whether the server that transmitted the message has
authorization to send from that domain; at least a
year will pass before the ASRG will be able to submit
one proposal to the IETF as a suggested international
standard. Meanwhile, a commercial alliance that
includes Yahoo!, America Online, Microsoft, and
Earthlink was established in April to develop
technology ahead of the ASRG's efforts. Their proposal
calls for ISPs and any other body that owns its own
domain name system (DNS) to use a private key in their
mail servers to embed an encrypted code in the header
of each outgoing email message; upon the mail's
arrival at its intended destination, the receiving
mail server would get its sender's key from its DNS
server to decode the header and authenticate the
email's origin, while spam and other unwanted messages
would cause that DNS to be automatically blocked.
"What we really want to do is make sure that the
Internet community is in agreement that this is a good
solution, and an appropriate solution," says Yahoo!
Mail's Miles Libbey. But the technology is in an early
developmental stage and no general release deadline
has been set. Click
Here to View Full Article
"EU Cybercrime Agency Gets the
Go-Ahead" IDG News Service (11/20/03);
Meller, Paul
- A plan to form a European Network and Information
Security Agency (ENISA) that would ease cooperation
and data exchange pertaining to network and
information security has gained the approval of
European telecommunications and communications
ministers. ENISA will receive $39 million for its
first five years, and act to back the internal
European Union market. The group is set to start
operations in January in Brussels, but will be placed
in a permanent location later. ENISA will act as an
advisor on security concerns for member states and the
European Commission, deal with the necessity of higher
awareness about Internet security issues, and manage
activities centered on assessing and managing risk.
Telecommunications interests are pressing for ENISA to
work with private groups. "Until today there has been
no systematic cross-border cooperation or information
exchange between the EU Member States," notes the
European Commission, adding that the various states
have made progress to different degrees with different
approaches. "This is the challenge that the ENISA is
set to meet," the commission states. Click
Here to View Full Article
"The Future of Open Source in
Security" EarthWeb (11/19/03); Bourque,
Lyne
- Open source tools help network administrators
develop more robust defenses against electronic
infiltration, according to academic and industry
attendees at the second annual Open Source Symposium
held at Seneca College in Toronto. Though proprietary
applications have benefits such as support agreements,
open source technology provides security-minded
administrators with the tools necessary to innovate. A
presentation on wireless security highlighted the
number of open source accessibility testing tools
available, including wavemon, airtraf, and wave
stumbler, as well as network vulnerability tools such
as Kismet, Air Snort, and Moxy. Using these tools,
network administrators can view their wireless network
from an outsider's perspective and adjust accordingly.
Open source and computer security have a long shared
history as many existing tools have open source roots,
including Nmap, SATAN, SAINT, SARA, GnuPGP/PGP, and
OpenSSL. Open source tools exist for virtually every
security topic, and the ease at which these tools can
be obtained has also brought more people into the
computer security field, and avoided in many instances
the building up of a high-cost proprietary system.
Support for these technologies is available on mailing
lists and forums, and often rivals that offered by
traditional technical support. Integrating open source
security technology into the system also means greater
diversity and protection against particular
vulnerabilities; attacks that exploit one
vulnerability will more likely be isolated to a single
server or service, unlike in a monoculture environment
where products often share vulnerabilities. Click
Here to View Full Article
From ACM
News, November 17, 2003
"The Virus at 20: Two Decades of
Malware" silicon.com (11/11/03); Sturgeon,
Will
- The twentieth anniversary of the first computer
virus, created by U.S. student Fred Cohen as a Unix
research project, has established malware as an
important--if unfortunate--part of the IT landscape.
MessageLabs' Alex Shipp, Computer Associates' Simon
Perry, Sophos' Graham Cluley, and Roger Levenhagen of
Trend Micro say the spread of personal computing, the
Internet, and technical sophistication of viruses and
worms have marked two decades of malware development.
Cluley cites the first PC virus, Brain, as a
significant milestone, as well as Tequila and Concept,
which were the first multipartite and
document-infecting viruses, respectively. After those,
Melissa was the first truly successful email virus,
while The Love Bug and Kournikova email viruses
established social engineering tactics. TruSecure's
Bruce Hughes says the ability of viruses such as Nimda
to spread via multiple vectors was a significant
advance in malware, while Levenhagen says more recent
viruses such as SQL Slammer have shown how fast some
malware can spread worldwide--to the point of clogging
Internet traffic and even affecting ATM networks.
Clearswift's Peter Simpson says hybrid variants have
been an important malware milestone, because they
allow viruses to accept updates in the field and
sometimes operate beneath anti-virus radar. The
continuing SoBig Project attacks have also been
significant as it signals malware technology joining
with illegal activities such as spam, identity theft,
and denial-of-service attacks. Over the next 20 years,
Perry believes a major war or terrorist attack will
include a serious computer-based component. Cluley
says security technology is also getting much better
and is learning to use the Internet to its advantage,
while Shipp sees new, costly technology that can
eliminate most security threats but also exclude
poorer nations. Click
Here to View Full Article
"Spam Nation" InformationWeek
(11/10/03) No. 963, P. 59; Claburn, Thomas
- Twenty-five percent to 60 percent of all email is
spam, and an October Pew Internet & American Life
Project survey estimates that 70 percent of email
users do not like spam. Though national laws such as
the Can-Spam Act and state statutes such as the
recently enacted California anti-spam law are designed
to target bulk commercial emailers, tracking them down
and prosecuting them is difficult; for one thing, they
often obscure their identities through various
techniques and operate outside the United States,
beyond the reach of anti-spam enforcement. This
tendency to hide also puts spam trackers at a
disadvantage for lack of insight into spammers'
motivations, notes Brightmail's Francois Lavaste.
EPrivacyGroup.com chief privacy officer Ray
Everett-Church places spammers into two camps: Naive
Internet users who think spamming is a fast route to
easy riches and become quickly discouraged, and
"professional criminals." Laura Atkins of the Word to
the Wise anti-spam software and consulting firm says
that spammers are in it for the challenge, while
others believe they have the right to market to
anyone, regardless of recipients' desires. There are,
however, email marketers who take offense at being
classified and hounded as spammers: OptInRealBig.com
owner Scott Richter argues that his company is
legitimate because, unlike spammers, it does not cover
up its existence, and it is generating profits as a
direct result of email marketing. Richter goes on to
say that many people who complain of spam have given
marketers permission to send them email without
realizing it by registering for prizes at Web sites,
for instance. Companies such as CNet, which retain
lists of customers for communication and marketing
purposes, demonstrate clear value for clients and work
closely with ISPs to stay in their good books, says
CNet's Markus Mullarkey. Click
Here to View Full Article
From ACM
News, November 17, 2003
"Encryption Revolution: The Tantalizing
Promise of 'Unbreakable' Codes" Associated
Press (11/16/03); Bergstein, Brian
- Supposedly uncrackable quantum encryption has
begun to emerge in the wake of two decades of
research, as signified by a new system MagiQ
Technologies began to sell commercially this month.
MagiQ CEO Bob Gelfond says the new system, dubbed
Navajo, offers a major advantage over current
encryption schemes: In addition to using individual
photons to transfer encryption keys--which are highly
sensitive to interference or monitoring
attempts--Navajo changes the keys 10 times every
second, making the keys useless to anyone who acquires
them. Navajo is comprised of black boxes that produce
and read quantum-encrypted signals over a fiber-optic
line across a maximum distance of 70 miles. Similar
efforts are underway in the United States, Europe, and
China--Switzerland's id Quantique has a Navajo-like
system in the pilot phase; IBM researchers are
investigating how to reduce the size of quantum
systems so they can mesh more smoothly with existing
computing and communications networks; and Britain's
QinetiQ and the Los Alamos National Laboratory are
exploring the wireless transmission of quantum keys.
Quantum encryption operates on Heisenberg's
Uncertainty Principle, which decrees that subatomic
particles exist in multiple potential states
simultaneously until something interacts with them.
Researchers expect to be able to harness these states
and interactions to build a quantum computer, which
would boast exponentially more power than current
supercomputers; Peter Shor of AT&T Labs
demonstrated in the 1990s that quantum computers would
be able to decrypt any code--except that produced via
quantum cryptography. Click
Here to View Full Article
"Spammers Target Instant Message
Users" TechNews.com (11/13/03); McGuire,
David
- Unsolicited commercial messages are not restricted
to email or pop-up ads; now spammers are exploiting
instant messaging to annoy users with an even more
intrusive form of advertising called "spim." Spim is
even more aggravating for users because it can appear
at any time, and there is more risk of embarrassment
because, unlike email, users cannot check instant
messages at their leisure. Although unmasking the
culprits behind spim and the methods they use is no
easy task, users can take solace in the fact that IM
spammers will find it difficult to send such messages
in bulk, as AOL, Yahoo!, and other companies are
already taking action to ensure that spim never
becomes as overwhelming as spam. "I don't think IM
spam has become anything on the scale of the problem
that regular spam is," says AOL's Andrew Weinstein,
whose company employs rate limiting and other kinds of
spim-blocking measures. Though IM does not produce a
lot of revenue, companies have a vested interest in
curbing the appearance of unwanted content such as
spim, since IM is often regarded as a gateway service
that helps attract customers to paid Internet
offerings. Patricia Faley of the Direct Marketing
Association reports that her organization intends to
adopt an IM marketing policy within the next six
months, and says there is little interest among
established vendors to use IM for marketing purposes.
FTC staff attorney Brian Huseman assures that the
commission is keeping tabs on spim, even though
consumer complaints have been small. Grant Toomey, a
representative of CAN-SPAM Act sponsor Sen. Conrad
Burns (R-Mont.), says the congressman is also tracking
the spim problem and may take a legislative course of
action in 2004. Click
Here to View Full Article
From the Crabby
Office Lady: Crabby's
Top 10 Spam-Fighting Tips, including Spam Laws and National
e-mail Opt-Out List.
From ACM
News, November 17, 2003
"Could Antivirus Apps Become Law?" IDG
News Service (11/06/03); Gross, Grant
- Rep. Charles Bass (R-N.H.) suggested at a Nov. 6
congressional committee hearing that the nation's
critical infrastructure could be bolstered by a
federal mandate for all U.S. computer users to deploy
antivirus software on their PCs. His proposal was
sharply criticized by computer experts, who cited both
ethical and technical reasons why such a measure would
not work: VeriSign's Ken Silva said that such a law
would be "tantamount to trimming a little fat off the
Constitution" and that users would balk, while
Internet Security Alliance CEO Bill Hancock noted that
computers used for factory automation or power plants
are not antivirus-enabled and would lead to an
infrastructure collapse. There was also a lack of
consensus over other ways the government could
encourage cybersecurity--Richard Pethia of Carnegie
Mellon University's CERT Coordination Center suggested
that software vendors should be pressured to write
more glitch-resistant code, a goal Silva claimed is
unattainable. Silva and Hancock supported
congressional promotion of cybersecurity education,
while Pethia was skeptical that enough computer users
could be reached through such an initiative, insisting
that vendors must be held liable for security flaws in
their products. Rep. Gene Green (D-Texas) declared
that "The combination of email spam and viruses is
like putting a SARS patient on every airline flight in
the country," and argued that his Anti-Spam Act of
2003 would be an effective antivirus measure. A
greater commitment of law enforcement resources to
anti-cybercrime efforts was supported by Hancock and
Business Software Alliance (BSA) President Robert
Holleyman, with the latter also lobbying for
international accords for cybercrime law enforcement
and the creation of a global "culture of security."
Hancock pointed out that American statutes will not
curb cybercrime by themselves, since hackers and
spammers will still find safe havens outside the
United States. Click
Here to View Full Article
From ACM
News, November 11, 2003
"Spammers Can Run But They Can't
Hide" New York Times (11/09/03) P. 3-1;
Hansell, Saul
- The Spamhaus Project, based in England, is a nexus
in the battle against spam: Founded by activist Steve
Linford in 1998, Spamhaus.org compiles the most
reputable nonprofit list of known spammers and is used
by many second-tier and smaller U.S. ISPs to identify
spammers operating from their networks. Large ISP
organizations such as Time Warner and Microsoft's
Hotmail use commercial anti-spam services. Linford's
team of 15 volunteers has been credited with
preventing up to half of all sent spam from reaching
its intended target, but new spam techniques have
degraded Spamhaus' ability to track and identify
sources of spam. A common technique Linford uses to
identify spam is to find the IP address of a Web site
cited in the spam email and check if it has been added
to Spamhaus' block list already. Other Spamhaus
members conduct deeper investigative work, sometimes
lurking in chat rooms or actively engaging spammers in
an effort to dissuade them from continuing their work.
Spammers have been actively increasing their abilities
too, joining with crackers, or hackers with malicious
intent, to propagate spam through Internet viruses and
worms; harnessing large numbers of zombie machines,
these spam-allied crackers route spam messages and
conduct distributed denial-of-service attacks against
Spamhaus.org and other anti-spam groups. Linford, who
personally finances Spamhaus with funds from his Web
design and hosting firm, says he does not intend to
give up the fight against spammers and is making
headway, such as newfound respect from Chinese ISPs
which are loath to have their email traffic on
Spamhaus' block list. Linford praises a recently
passed European Union law that makes spam illegal, but
thinks the U.S. Can Spam Act is too weak and will
eventually be replaced. Click
Here to View Full Article
From ACM
News, October 24, 2003
"Senate Votes 97-0 to Restrict E-Mail
Ads" Washington Post (10/23/03) P. A1; Krim,
Jonathan
- The Senate yesterday unanimously passed an
anti-spam bill from Sens. Conrad Burns (R-Mont.) and
Ron Wyden (D-Ore.), after amendments were made that
clear the way for the establishment of a national
no-spam registry similar to the do-not-call list. The
legislation bans unsolicited commercial emails that
promote bogus body-enhancement wares, financial scams,
and pornography, while provisions proposed by Sens.
Orrin G. Hatch (R-Utah) and Patrick J. Leahy (D-Vt.)
outlaw methods spammers use to evade detection. Under
the bill, the FTC has six months to develop a
do-not-spam registry system and outline the technical
challenges. The registry, proposed by Sen. Charles E.
Schumer (D-N.Y.), has been criticized by FTC Chairman
Timothy J. Muris, who argues that such a measure would
make little difference to spammers, who would simply
ignore it. The Burns-Wyden bill itself has also come
under fire from several consumer and anti-spam groups
because it only allows ISPs, not individuals, to sue
spammers; the legislation would also preempt all state
spam control laws, some of which are regarded as
draconian by members of the business community. The
bill is backed by the marketing, retailing, and
Internet-access industries, which have long lobbied
for a federal law that does not prohibit legitimate
enterprises from sending commercial email to customers
who desire such messages. Entities that have endorsed
the bill, with varying degrees of commitment, include
the White House, the Coalition Against Unsolicited
Commercial Email, Yahoo!, and Microsoft. The House
Energy and Commerce Committee is debating a similar
measure, and the differences between it and the Senate
bill will need to be resolved; both bills allow
consumers to opt out of receiving email if they so
wish. Meanwhile, a new poll from the Pew Internet Life
Project found that 25 percent of respondents say they
have reduced their use of email due to spam.
"Carnegie Mellon to Launch New Initiative to
Ensure Cybersecurity" EurekAlert
(10/22/03)
- The expertise of over 50 researchers and 80
students from Carnegie Mellon University's College of
Engineering, School of Computer Science, H. John Heinz
III School of Public Policy and Management, and the
CERT Coordination Center will be combined under
Carnegie Mellon CyLab. CMU President Jared L. Cohon
says the CyLab facility "is designed to work with
speed and great efficiency to shore up security
breaches that can compromise the Internet-based
electronic ties that enhance communications and
services that bind so many enterprises together into a
network that is the foundation of our economic
prosperity." Another of CyLab's goals is to nurture
government-business collaboration to bolster the
security of the cyber-infrastructure. CyLab
co-director Pradeep Khosla says the center will be a
convergence point for CMU's information assurance
specialists, including those working in the fields of
research and development, public policy, response, and
prediction. Much of CyLab's research funding is coming
from a sizable federal investment shepherded by Rep.
Mike Doyle (D-Pa.). The Internet's vulnerability to
malicious software, hackers, and cyberterrorism will
spur CyLab to concentrate on the development of
state-of-the-art technologies designed to keep
information private and fortify the security of
distributed systems and wireless and optical networks.
The facility will also be dedicated to sustaining
CMU's CyberCorps program and its effort to boost
cybersecurity competence among 10 million home users.
Cisco CTO Greg Akers says, "We look forward to helping
CyLab craft a focused research initiative centered on
tools, technologies and practices to improve
dependability, secure the Internet, embed security in
computer and communications systems, and design a
public/private partnership to accelerate outreach
training and education." Click
Here to View Full Article
"Spammers Clog Up the Blogs" Wired
News (10/24/03); Ulbrich, Chris
- A recent spate of aggressive spamming on Weblogs
(blogs) has raised questions about what tradeoffs
bloggers may be willing to accept to rid their sites
of this growing nuisance, and what strategies they can
employ to stave it off. Blog-spamming often takes the
form of links embedded in key phrases such as "diet
pills" or "buy viagra" placed in bloggers' comment
threads by spambots, while a more insidious method
involves spambots posting seemingly harmless comments
with spammers' URLs embedded in the signature. Dealing
with comment spam can be even harder than dealing with
email spam--comment spam is more difficult to
recognize and delete, while removing the spam once it
has been spotted can be an onerous and laborious job.
Spammers apparently hope that such a massive amount of
URLs cropping up in blog comments will convince search
engines that such products interest the blog
community, and cause spammers' sites to be ranked
highly in search query results. The most recent
blog-spamming wave targeted Six Apart's Movable Type
publishing system, which does not require registration
to post comments and only allows bloggers to refuse
comments according to IP address. Six Apart founders
Ben and Mena Trott say upcoming versions of Moveable
Type and their TypePad hosted blogging service will
feature improved comment handling, and may include
mass deletion of comments originating from a specific
IP address, or a way to remove comments directly from
notification emails. SearchEngineWatch.com editor
Danny Sullivan doubts that comment spam will affect
search-engine results for very long. "They may work
for a very short period of time, but search engines
come back, and it's another step in the constant arms
race between search engines and the people who
optimize for them," he observes. Click
Here to View Full Article
From ACM
News, October 29, 2003
"Antispam Methods Aim to Merge" CNet
(10/24/03); Festa, Paul
- A new subcommittee established in October by the
Internet Research Task Force's Anti-Spam Research
Group (ASRG) seeks to reconcile and merge competing
email sender verification protocols. Proposed measures
include Reverse Mail Exchange, Sender Permitted From
(SPF), and the Designated Mailers Protocol, which are
designed to verify the identity of an email's sender
without replacing the Simple Mail Transfer Protocol.
All of these schemes are based on the revision of the
Domain Name System database so that email servers can
post associated IP addresses, enabling ISP recipients
to instantly confirm a message's origin. Such a system
would certify that email servers and individual
address owners are not spamming. "We can solve spam
with a technical solution, rather than by going
through the Congress or by implementing
micropayments," declared Meng Wong, CTO of ASRG
subcommittee member Pobox.com, which supports the SPF
protocol. He added that sender verification systems
must operate in tandem with a reputation system that
would allow recipients to identify the domains of
established spammers. "Once you have reputation
systems that work on the basis of domains, which
spammers cannot forge, then no matter how many
machines you hack into, you still have to use the
spammer's domain," Wong explained. ISPs and antispam
firms agree that halting the spread of spam is a
difficult challenge because of the prevalence of email
address spoofing. Click
Here to View Full Article
From ACM
News, October 29, 2003
"Patchy Years Ahead for Software
Users" IDG News Service (10/23/03); Pruitt,
Scarlet
- Network administrators are finding most of their
time taken up with deploying software patches to fix
network vulnerabilities or upgrade features, and there
appear to be few signs of relief on the horizon,
despite announcements from patch vendors that they are
aware of the problem and are working to simplify the
patching process. Ecora CEO Alex Bakman estimates that
applying a patch to each machine in a company's system
takes half an hour on average, and notes that recent
outbreaks of worms such as Slammer and Blaster have
exacerbated the situation. He also says that many
companies are not installing essential patches out of
concern that they might "break" applications, and they
refuse to deploy them during critical times in the
fiscal year, such as prior to a major retail or
holiday season. Gartner analyst John Pescatore
declared at the Gartner Security Summit that patching
on the desktop, and its associated problems, have at
least two more years of life. Gartner analysts
recommended in March that companies institute a patch
management strategy in which the most critical
security patches are prioritized and the patch
installation requirements are thoroughly assessed.
Gartner advised companies to test all patches before
implementation and to define server and desktop
configurations as standard and nonstandard so they can
be patched according to their particular requirements;
it was also recommended that enterprises only accept
official patches and give the patch management
infrastructure the same level of protection as their
outward-facing Web and application servers. Users say
the patching situation is symptomatic of wider
software problems, in which new security flaws that
must be patched are continuously discovered, adding to
the total cost of ownership. Writing flawless software
is an impossible goal, since human coders are
inherently vulnerable to error. Click
Here to View Full Article
From ACM
News, October 17, 2003
"Anti-Spam List Wouldn't Fly, Experts
Warn" Investor's Business Daily (10/17/03)
P. A5
- Experts argue that fundamental distinctions
between phone and email systems and the marketers who
use them will be insurmountable barriers to the
usability of a do-not-spam list, while even antispam
advocates admit that such a measure would not cure the
spam problem. The FTC is skeptical that a do-not-spam
list run by the government would be effective: The
phone network is strictly regulated and features
central control and strong anti-spoofing measures, but
email systems are decentralized and information about
spammers is not difficult to falsify. A no-spam list
can quickly become outdated because people switch
email addresses more often than phone numbers. In
addition, Direct Marketing Association CEO Bob
Wientzen doubts that spammers, who already regularly
violate consumer-protection statutes, will adhere to
any lists. Critics note that spammers based overseas
would be difficult to track down, while the existence
of a no-spam list raises questions of what would
happen if the security of that list is compromised.
Still, Sen. Charles Schumer (D-N.Y.) has introduced
legislation calling for the creation of a national
no-spam list, and similar bills have been passed by
State Senates in Michigan and Louisiana. Furthermore,
the Direct Marketing Association and at least three
private firms have instituted do-not-spam lists, but
critics charge such measures as toothless.
From ACM
News, October 15, 2003
"Lawmakers Hammer on Spam" Medill News
Service (10/14/03); Chang, Rita
- The spam problem has inspired a raft of antispam
proposals, but most of the half-dozen spam control
bills currently making the rounds in Congress
legitimize junk email, according to Spamcon Foundation
executive director Andrew Barrett. "Frankly, they
protect the status quo, and the language in the bill
tends to frame spam as fraud," he explains. Two
bills--the Criminal Spam Act and the CAN-SPAM
Act--have cleared committee in the Senate, but lack
the support of Sen. Charles Schumer (D-N.Y.), who
wants the bills to include a provision for a national
do-not-spam list; critics decry the measure as cost
prohibitive, and the FTC has doubts about its
practicability. The CAN-SPAM Act gives federal
prosecutors and ISPs the right to sue emailers who use
misleading subject lines, do not let recipients opt
out of emailing lists, or spam via dictionary attacks,
while the Criminal Spam Act outlines stiff fines and
prison sentences for spammers. The progress of
antispam legislation in the House of Representatives
has stalled because of conflicts between the
Wilson-Green bill and the RID-SPAM Act; both proposals
require users to opt out of receiving unsolicited
email, but Rep. Heather Wilson's (R-N.M.) bill
includes enforcement by state attorneys, a provision
opposed by the author of the RID-SPAM Act, Rep. Billy
Tauzin (R-La.). Wilson's proposal also bans corporate
affiliates and subsidiaries from sending spam to users
who have opted out once. Tauzin's bill prohibits
deceptive messages and email address harvesting, and
allows ISPs to sue spammers for damages, but Barrett
says the legislation cedes a certain degree of
legitimacy to spam. He says Wilson's bill is not much
of an improvement, and adds that all the proposals
give spammers complete freedom to spam until users opt
out. Ari Schwartz of the Center for Democracy and
Technology says, "There is no one piece of legislation
that will solve the [spam] problem overnight." Click
Here to View Full Article
From KSDK
News, October 10, 2003
- Two lawsuits filed in St. Louis today by Missouri
Attorney General Jay Nixon alleging violations of the
state's new anti-spam law. The suits seek injunctions
to prevent both defendants from further violations, as
well as civil penalties of up to five thousand dollars
for each violation. One lawsuit names Phillip Nixon of
Palm Beach, Florida, claiming he sent unsolicited
e-mails advertising the sale of an architectural plan.
The second suit was against Fundetective.com of Boca
Raton, Florida. Nixon says the company sent several
spam messages advertising payday loans and other
services. He says none of the e-mails were labeled as
required. (Copyright 2003 by The Associated Press. All
Rights Reserved.)
-
The full rules are complying are at http://moago.org/nospam/nospam.htm.
- "To comply with the law, senders of spam must
provide a valid method for you to get your e-mail
address removed from the sender's list. Once you
have asked to be removed, the sender must stop
sending you spam."
- You have to email the spammer asking them to
stop, and CC: nospam@moago.org
on that email. If you then get more spam from that
person, you can complain to spamcomplaint@moago.org.
- You can also complain if they use a false
identity, don't have "adv:" or "adv:adlt" as the
first characters in the subject line, don't give you
a way to opt out, or send child pornography. In
these cases, you forward the message to spamcomplaint@moago.org.
From Edupage,
October 13, 2003
Survey Shows How Users Deal With
Spam Internet News, 13 October 2003
- A new survey by DoubleClick shows some of the
methods that consumers are using to deal with the
growing tide of spam in their inboxes. Most users
agreed that spam is the biggest problem with e-mail,
though 90 percent acknowledged they have received
permission-based commercial e-mail. Users tended to
favor "common-sense" approaches to dealing with spam
rather than technological ones. Only 16 percent of
respondents said they use a software filter for
e-mail. Most users said they inspect e-mail,
particularly the "from" line, and will simply delete
mail they suspect of being spam. Respondents to the
survey also complained about the frequency of
permission-based messages. "Even permission based
e-mail can be offensive if it's received too often,"
said Scott Knoll, vice president and general manager
of market solutions at DoubleClick.http://www.internetnews.com/IAR/article.php/3090961
From ACM
News, October 6, 2003
"Outwitting Spammers" Network World
(09/29/03) Vol. 20, No. 39, P. 48; Bort,
Julie
- The growing spam glut is a source of frustration
for enterprises, which lose precious productivity in
order to deal with unwanted emails. Spam filters are a
popular anti-spam tool, but they come with their own
drawbacks: Keeping networks up-to-date with the latest
filters means frequent upgrades, while the risk that
such tools will mislabel legitimate emails as spam
increases as more filters are activated.
"Machine-learning" technologies such as Bayesian
filters and neural networks are being heralded as much
more effective anti-spam measures, although they are
not perfect. Users of Bayesian filters place spam and
non-spam messages into two separate folders, and the
filter trains itself to distinguish between the two by
analyzing the unique identifying characteristics of
the folders' contents; any errors the filter makes are
sent by the end user to the appropriate folder, so the
filter can note them. In this way, Bayesian filters
can adapt to spammers' changing tactics, but the
technology's chief disadvantage is its client-side
orientation, making it unable to relieve the pressure
that spam exerts on network processors. Some vendors
are calling for Bayesian-like solutions that run at
the email gateway to prevent both network clogging and
false positives. Meanwhile, some vendors tout neural
networks as a safer machine-learning alternative. The
networks' spam-training software is placed on vendors'
sites rather than on users' clients, and the email the
network trains on is culled from bogus in-boxes set up
for the express purpose of capturing spam. Neural
network-enabled products function best when users
update the gateway software at least once daily. http://www.nwfusion.com/buzz/2003/0929spam.html
"Ruling Over Unruly Programs" CSO
Magazine (09/03); Garfinkel, Simson
- Sandstorm Enterprises CTO Simson Garfinkel writes
that technical rather than legal issues make it
theoretically impossible to write a program that can
analyze any given suspect program to ascertain whether
it contains friendly or unfriendly code. He explains
that "The mathematics of computing make it impossible
to write software that can figure out what other
programs can do, prior to execution," and notes that
current antivirus systems label programs as clean or
infected by scanning them for known virus
signatures--an approach that is ineffective when
confronted with unknown viruses. Mathematician Alan
Turing proved almost 70 years ago that the actions of
even the simplest type of hostile program cannot be
predicted. A popular strategy people use to "solve"
the desktop security conundrum is to modify the
operating systems so they will only run programs
certified by publishers such as Adobe and Microsoft;
but Turing's research demonstrates that even those
programs may contain vulnerabilities. "Just about the
only way to take back computer security from the
morass that Turing created is to restrict what
computer programs can do--that is, make computers less
general-purpose," writes Garfinkel, who adds that a
program's behavior can be made incalculable with very
little effort. Another theoretically insurmountable
barrier is computers being unable to crack truly
complex "NP" problems such as code-breaking by
deactivating the mathematics that support the
problem's complexity. Brute-force search--the longest
and most arduous technique--is the only way people
know to search for a solution. Garfinkel acknowledges
that solving an NP-complete problem, unlikely as that
may seem, could facilitate the reverse-engineering of
practically all encryption schemes that have ever been
developed. http://www.csoonline.com/read/090103/shop.html
From eWeek,
September 29, 2003
- "Just Can the Spam", by Cameron Sturdevant: Read
the Article
- "Six Spam Fighters Face Real-World Test:
Benchmarking Anti-Spam Tools", by Cameron Sturdevant:
Read
the Article
From New York
Times, October 6, 2003
- "Spam Fighters Turn to Identifying Legitimate
E-Mail", by Saul Hansell: Read
the Article
From ACM
News, October 3, 2003
"E-Mail Is Broken" Salon.com
(10/02/03); Mieszkowski, Katharine
- Four computer scientists--Carnegie Mellon
University's Dave Farber, Brandenburg Consulting
principal Dave Crocker (a former student of Farber's),
Electronic Frontier Foundation chairman of the board
Brad Templeton, and Nielsen Norman principal Jakob
Nielsen--separately discussed the sorry state of email
and what can be done to solve the spam problem.
Templeton observed that "Computers amplify both the
good and the bad we can do, and spam is yet another
example." Farber declared that email's reliability has
gone downhill because more and more people are
installing poorly performing spam filters, and he
warned that time is running out to staunch the growth
of spam; Crocker noted that many people are frustrated
by spam because its sheer volume makes it hard to find
legitimate email. Nielsen said he thinks an anti-spam
law is a good idea, but this would do little to deter
spammers based overseas, while Templeton characterized
most anti-spam legislation as "worse than useless."
Farber commented that a Massachusetts law permitting
people to sue spammers is unlikely to be effective,
given the difficulty in tracking spammers down, but
said that an enforcement scheme set up by the FTC or
FCC would at least rein in spamming by big companies.
Technical solutions suggested by the computer
scientists include authentication standards, but
Farber pointed out that no one appears to want to
invest in deploying such a solution; Crocker favored
incremental email revisions coupled with non-onerous
methods of locating spammers, and an increase in
accountability. Nielsen considered a radical and
unpopular solution--to wipe the slate clean and phase
out all existing email protocols. This would involve a
global upgrade by all companies simultaneously, which
Nielsen called an impossible task. Crocker concluded
that people should stop wasting time looking for a
magic bullet, for there is no single solution to the
spam problem.
From ACM
News, September 24, 2003
"Davis Signs Bill to Ban Online
Spam" Los Angeles Times (09/24/03) P. A1;
Ingram, Carl
- California Gov. Gray Davis signed Sen. Kevin
Murray's (D-Calif.) anti-spam legislation into law
Sept. 23, thus criminalizing the sending of
unsolicited commercial email to Californians and
allowing state Attorney General Bill Lockyer, ISPs,
and individual residents to file civil suits against
spammers and their advertisers. Spam marketers and
advertisers exempt from the law, which imposes a
$1,000 fine for every unsolicited message, are those
who get specific requests from recipients to send them
email or who have previous business relationships with
recipients. In addition, a fine of up to $1 million
can be charged against bulk emailers who conduct blitz
campaigns, in which hundreds of thousands, sometimes
millions, of unsolicited messages are sent out on a
daily basis. Murray, who called his legislation "the
toughest [anti-spam] bill in the nation," said the
measure is the first to target advertisers as well as
spam marketers. Some legislators foresee problems in
recovering damages from out-of-state or overseas
spammers that do business in California, though Murray
said that practically all online transactions involve
the use of four U.S.-based, internationally
acknowledged credit card firms, thus making spammers'
bank accounts traceable. Still, industry observers
insist that the most infamous spammers, who reside
outside the United States, would be immune from the
California law. Davis declared that he had or would
soon pass other bills as part of a package that aims
to uphold Californians' privacy and shield them from
identity theft, although he cautioned against pushing
for federal legislation that could roll back new state
privacy safeguards and already existing identity-theft
laws. In a letter to leaders on Capitol Hill, Davis
proclaimed that "Congress should consider California
legislation as a model for the rest of the nation." Click
Here to View Full Article
From Edupage,
September 19, 2003
Latest Virus Masquerades As Virus
Patch Internet News, 19 September 2003
- A new virus making the rounds on the Web pretends
to be a security patch in an e-mail. Security experts
worry that the recent spate of high-profile, damaging
viruses will encourage many users to open the
attachment in the new virus e-mails, which have
subject lines such as "Microsoft Internet Update Pack"
and "Microsoft Critical Patch." The new virus, called
the Swen/Gibe virus, was described as "highly
virulent" by Ken Dunham of iDefense. The .exe
attachment to the e-mail reportedly has the ability to
auto-execute on computers that have not been patched
against a known Microsoft vulnerability, and, when
started, the virus can steal users' names, passwords,
and server information. Symantec Security Response
reports that the virus also attempts to defeat
antivirus and firewall applications when it infects a
computer. http://www.internetnews.com/dev-news/article.php/3080001
From ACM
News, September 19, 2003
"Self-Policing Added to Spam
Bill" Washington Post (09/18/03) P. E1;
Krim, Jonathan
- A provision recently inserted into antispam
legislation sponsored by Reps. Richard Burr (R-N.C.),
W.J. Tauzin (R-La.), and F. James Sensenbrenner Jr.
(R-Wis.) would make bulk emailers exempt from
penalties if they agree to regulate themselves. The
requirement would involve the formation of a
self-regulatory organization that uses an independent
third party to give "legitimate" senders of commercial
email an electronic seal of approval, but certain
consumer groups, legislators, antispam organizations,
and state prosecutors balk at the prospect. "[Bulk
emailers] are writing the law so that it places them
where they think they belong: Above it," declared
Jason Catlett of Junkbusters. The bill the provision
has been added to requires bulk emailers to comply
with consumer requests to stop receiving unsolicited
commercial messages and criminalizes both the
electronic "harvesting" of email addresses and the
masking of spammers' locations. Tauzin representative
Ken Johnson argued that the provision is an
improvement because it allows individual consumers to
direct complaints to an authorized body rather than
attempting to contact law enforcement agencies that
may not respond. But a representative of Rep. Heather
A. Wilson (R-N.M.), who is pushing for stricter
antispam legislation, declared that the provision
"continues to protect spammers at the expense of
consumers." The antispam bill was drawing criticism
even before the addition of the self-regulation
provision: Some lawmakers and consumer organizations
are worried that the bill would displace more
stringent state regulations and prevent consumers from
launching civil suits against spammers. Click
Here to View Full Article
From ACM
News, September 15, 2003
"China Joins Global Fight Against
Spam" IDG News Service (09/10/03); Lemon,
Sumner
- China has had particular problems with spam,
partially because network administrators in the
country are not as stringent in overseeing systems as
are administrators in other nations-says Justin Mallen
of Silk Road Technologies--and partially because
telecommunications companies such as China Telecom
Corp. are so large. The Internet Society of China
(ISC) has decided to address the problem of spam by
preventing emails from 127 servers known to have been
points of origin of spam from reaching its members.
The organization also has put forth a group of steps
for the purposes of blocking spam and preventing
problems that result from placing blocks on email
service providers in China. The ISC's Anti-Spam Email
Coordination Team was responsible for determining the
group of servers associated with spam, which includes
90 servers in Taiwan, just eight servers based in
China, 16 servers based in the United States, and six
servers in South Korea. The ISC's proposed steps for
improving China's handling of spam would ask for
tougher laws for preventing the spread of spam, urge
Chinese ISPs to employ anti-spam measures, ensure that
ISPs block spammers from using email, teach users
about spam, and maintain a list of entities with "evil
intentions" that send unsolicited email. Still,
according to the Spamhaus Project, 633 servers at
Chinese ISPs act as spam sources--some of them members
of the ISC. Previously, the ISC located spam from many
more servers than the current list indicates. http://www.idg.com.hk/cw/printstory.asp?aid=20030910006
From Knowledge@Wharton,
September 10, 2003
System Alert: You've Got ... Worms
- With names like Sobig, Blaster, and Welchia,
computer viruses have been wreaking havoc around the
world. No longer confined to e-mail attachments, the
latest bugs can spread through the Internet, as they
take advantage of vulnerabilities in exposed
computers. Was the recent spate of attacks just more
of the same – or are virus writers beginning to infect
computers with other gains in mind? Experts at Wharton
and elsewhere weigh in on possible motives, what
businesses should do to protect themselves, and which
industry sectors stand to gain from the chaos. Read
Article
From ACM
News, September 5, 2003
"Computer Antivirus Strategies in
Crisis" New Scientist (09/03/03);
Graham-Rowe, Duncan
- Malware such as viruses and worms has overtaken
antivirus software, according to a study that
Hewlett-Packard researcher Matthew Williamson will
present at a Toronto conference in September. Although
most antivirus software that identifies virus
"signatures" can eventually stop the spread of
malicious code, it cannot effectively prevent viruses
from inflicting damage because malware propagates
faster than patches can be issued. Williamson finds
that the proliferation of a virus cannot be stopped
even if the viral signature is available from the
moment of its release, if the virus breeds quickly
enough. Furthermore, he notes that antivirus software
checks for updates no more than once an hour, which is
not fast enough to combat the type of viruses that
have caused so much trouble recently; too much
checking can be misconstrued as an attack. Moreover,
signature-based antivirus measures have to scan
incoming email for all documented viruses, an unwieldy
procedure that can cause system bottlenecks.
Williamson thinks signature-based approaches still
have value as a way to purge infected computers, but a
more effective antivirus tool must be able to take
action before signatures become available. The HP
scientist based his research on a computer model that
simulates the spread of viruses using a model that
tracks the propagation of biological viruses as a
template, and added specifications to represent the
response pattern of antivirus software.
Netherlands-based McAfee Avert is developing a
heuristic antivirus approach that is very effective at
detecting new viruses, but it can also generate false
positives. Click
Here to View Full Article
"Many More Worms Will Wriggle Into Our
Future" San Francisco Chronicle (09/04/03)
P. B1; Kirby, Carrie
- Lawrence Livermore National Laboratory chief
cybersecurity officer Mark Graff posits that a lack of
incentive for software companies to design secure
products means that software and the Internet will
suffer worse virus and worm attacks in the near
future. He says that future viruses could cause
massive power outages similar to the recent East Coast
blackout if the cyber-infrastructure is not better
protected. However, Graff is convinced that embedding
flawless security in software will not become an
industry habit until an even worse hacker-driven
catastrophe transpires. He declares that until then,
"The attacks are going to come faster and faster,
closer together...Eventually, as far as we're
concerned, it will be one constant attack." Graff
notes that major technological advances are often
partly spurred by tragedy. To fend off constantly
evolving viruses, networks will need to take combative
action automatically and become self-repairing. "We
have to look at the network as an immune system that
can defend itself with intelligent agents--software
that can react and is highly mobile inside the
network, that can go to the trouble spot just like
white blood cells are transported to a wound spot by
the bloodstream," Graff notes. He adds that
reliability and security will become even more
essential as computers and the Internet spread
practically everywhere, including the human body. Click
Here to View Full Article
"Email Updates Six Degrees
Theory" Technology Research News (09/03/03);
Patch, Kimberly
- Columbia University researchers have validated the
small-world phenomenon first discovered by Stanley
Milgram's famous 1967 sociology study, but have shown
some of the associated hypotheses to be wrong. Rather
than starting letter chains aimed at finding a
specific individual, the Columbia researchers
recruited 24,163 volunteers to send emails to
acquaintances who they thought might know the target
or someone close to that person; out of the 24,163
original chains, only 384 reached the 18 target
persons by way of 166 countries and a total of 61,168
email messages. The researchers surveyed participants
to find out why they did or did not forward the email,
and why they chose their contact if they did forward
it. The successful chains reached their target in five
to seven steps, on average, similar to Milgram's
study; but analysis of those successful chains showed
participants chose contacts based on geography and
their field of work, not on their social
connectedness, as was hypothesized in Milgram's work.
Cornell University applied mathematics professor
Stephen Strogatz says the study confirms the basic
tenet of a small-world model, but reveals methods that
Milgram did not have the resources to investigate.
Other conclusions show that more numerous, weak
friendships are better for connectedness than close
friendships that are insular. Ohio State University
sociology assistant professor Jim Moody says the study
will help understand widespread email communication
and the proliferation of viruses. Columbia research
scientist Peter Sheridan Dodds says a similar study is
being designed that will allow participants to send
the message to more than one contact and will ask more
questions about their methods. He says the research
has implications for peer-to-peer networks and
knowledgebases, as well as social, pathological, and
economic fields of study. Click
Here to View Full Article
"Outsmarting Spam" InformationWeek
(09/01/03) No. 953, P. 18; Kontzer, Tony
- Growing animosity toward unsolicited commercial
email and the productivity losses associated with it
is making the battle against spam a priority for many
businesses, although most respondents to a recent
InformationWeek survey report that their
spam-filtering controls leave a lot to be desired,
while over 50% do not even know how much spam they
receive. Approximately one-third of the 550 polled
business-technology executives say their companies
have made the elimination of spam a high priority,
while most consider it a moderate priority. The
Radicati Group just issued a study estimating that a
10,000-employee company without spam-fighting tools
will spend $49 per user on server resources to deal
with spam in 2003, and the firm expects the per-user
cost to skyrocket to $257 by 2007. Fifty percent of
the InformationWeek survey's respondents are resigned
to spam becoming a routine part of everyday life,
while companies that do not monitor spam in their
in-boxes blame their lack of vigilance on the
ineffectiveness of filtering tools as well as the
speed at which spam methods change. Some companies are
also frustrated that handling spam eats up time that
could be put to better use. However, Osterman Research
principal analyst Michael Osterman thinks
spam-fighting technology has improved significantly
over the last 12 months, while the general level of
satisfaction with such tools is rising. Daiwa
Securities America co-CIO Stephen McCabe adds that
third-party firms can relieve internal IT staff of
some of the burden of tackling spam by scanning
inbound email for unsolicited commercial messages. IT
groups that are able to successfully reduce or control
spam may be able to get senior executives in their
corner to support other projects. Click
Here to View Full Article
"Does IM Have Business Value?" Business
Communications Review (08/03) Vol. 33, No. 8, P.
40; Bellman, Bob
- Instant messaging is valued among enterprises for
its presence, which allows users to know ahead of time
who is available and unavailable to chat;
near-real-time message delivery, which offers a higher
level of interaction than email; and multiple
correspondence, which enables users to be more
efficient and productive. "IM lets you work more
effectively in an information-rich, time-critical
world," declares Jon Sakoda of IMLogic. Other benefits
of IM include significant savings in international
phone calls and other forms of communication--a
February report from Osterman Research estimates that
almost 81% of responding companies lowered phone use
and 67% reduced email use through IM. In addition, IM
does not cause network congestion, nor does IM inhibit
network operations. Though some IM services are free,
the companies that offer them expect to realize new
revenue by bundling IM with other products and
value-added services, or via IM "bot" applications.
However, IM's availability to anyone worries managers
concerned with upholding network security; viruses and
hacks can piggyback on IM-enabled file transfers, and
IM easily allows business transactions to be carried
out and proprietary data to be disseminated without an
audit trail. Other drawbacks to IM include
incompatible IM applications, the intense difficulty
in deactivating IM once it is activated, and IM's
potential to interrupt important tasks. A number of
years will pass before IM standards are mature enough
to facilitate interoperability, and before companies
understand the best ways to leverage IM. Click
Here to View Full Article
From ACM
News, September 3, 2003
"Spamming Sleazebags Ruining
E-Mail" SiliconValley.com (08/31/03);
Gillmor, Dan
- Dan Gillmor places the blame for email's declining
appeal mainly on the shoulders of unscrupulous,
corrupt virus authors and spammers who exploit poor
software and oblivious users, ISPs, and systems
administrators. He notes that spammers would be undone
if enough people would stop purchasing things in
response to their unsolicited entreaties, but the
futility of this gesture prompts the need to institute
more stringent legislation. Yet Gillmor estimates the
chances of resolving the spam dilemma relatively
quickly are "next to zero." He adds that virus and
worm writers, who cover their tracks in much the same
way spammers do, are exacerbating the situation, and
they have found unwitting help in companies such as
Microsoft, whose software architecture is notoriously
exploitable and homogeneous. Worse, Gillmor severely
doubts that Microsoft will voluntarily strive to
overcome the business model that fosters the continued
support of consistently lousy software. He lays better
odds of more systems administrators and users
prevailing against their own laziness and updating
their systems, but does not think enough are doing so.
Meanwhile, chances are higher that ISPs will improve
their security measures by providing firewalls and
email virus protection to customers as standard
service features. Gillmor acknowledges the potential
of a radical new email architecture that would track
miscreants through authentication and other
safeguards, but warns that deploying it would be very
difficult, and would cost users their anonymity. His
own strategy is to not open email attachments under
any circumstances unless he has foreknowledge of the
message contents or is very sure it does not contain
malware; relegate critical communications to private
email addresses Gillmor hands out to a small group of
people; and use instant messaging or other alternative
Internet communication options. Click
Here to View Full Article
From ACM
News, August 29, 2003
"Fight Against Viruses May Move to
Servers" Washington Post (08/28/03) P. E1;
Duhigg, Charles
- Many security experts contend that desktop
anti-virus software and firewalls may soon not be
enough to thwart increasingly crafty and sophisticated
computer viruses, and they expect the server to become
the new front line of defense. "[Virus writers] are
making viruses that are as difficult as possible to
analyze, and they are crafting attacks so that
anti-virus people can't download malicious code to
neutralize it before it is executed," says Mikko
Hypponen of F-Secure. Viruses and worms proliferate at
such speed that predictive systems are the only
effective deterrent, but desktop computers do not have
the computing capability to support such systems,
according to the computer security industry. Mark
Sunner of MessageLabs says computer security will
shift from desktops to large databases at key Internet
exchange points; he insists that "Our databases know
what an outbreak looks like, and can identify it much
faster and more aggressively [than desktops]." Adding
fuel to this migration are growing demands from
consumers and security experts that Microsoft and
other major software providers beef up the security of
their products. Ken Dunham of iDefense reckons that at
any one time at least 100,000 Internet-connected home
computers in the United States are infected with
malware that allows hackers to launch attacks from the
compromised machines. Worse, security experts caution
that worms are being designed to change tactics in the
middle of an attack; another fear on experts' minds is
the emergence of "superworms," though Lurhq security
researcher Joe Stewart claims that user awareness is
currently so poor that hackers do not necessarily have
to resort to such highly intelligent malware. Experts
place most of the blame for poor computer security at
the feet of two trends: Software standardization and
too much emphasis on system performance. Click
Here to View Full Article
"Software Self-Defense" ABCNews.com
(08/27/03); Eng, Paul
- Computer security experts say that users are the
weakest link in the defense against computer viruses
and worms, and that automated security updates and PC
scanning are needed to fill the gap. The SoBig virus,
which has infected over 100,000 PCs since Aug. 18, is
only activated when users open an email attachment.
Central Command COO Keith Peer says the software
security industry's continual drumming about not
opening suspicious email attachments is not working
because users are "glazing over." Furthermore, the
MSBlaster virus could have been stopped if many users
had updated their Windows systems with a new software
patch. Microsoft is considering shipping Windows XP
with Auto Update on by default, so that non-technical
users would not have to figure out what software
patches do and how to install them. Network
Associates' McAfee VirusScan and Symantec's Norton
AntiVirus already use automatic updates and might even
scan users' computers for suspicious activity
signaling an unidentified infection; any program
collecting email addresses from the hard drive or
changing Web browser settings would be flagged and
possibly disabled remotely by the software firm.
Electronic Frontier Foundation technologist Seth
Schoen says taking control away from the user is
dangerous, and suggests security companies might
introduce code that would discourage use of
competitors' products. In addition, license agreements
often waive manufacturers' responsibilities in case of
defects. Schoen would approve of intrusive security
measures if vendors give users a clear understanding
and choice to reverse updates. However, Network
Associates' Bryson Gordon warns that even with
stringent software protections, viruses will continue
to proliferate by way of social engineering tricks
rather than technical prowess. Click
Here to View Full Article
"Saving Private E-mail" IEEE
Spectrum (08/03); Vaughan-Nichols, Steven
J.
- Winning the war against spam requires
eliminating--or at least dramatically reducing--the
likelihood of false positives, which no automatic
filtering or blacklisting technique currently in use
is able to do. However, some programmers are hoping
that Bayesian filtering strategies will be an
effective solution. A Bayesian filter uses statistics
and probability theory to analyze the entire message
instead of focusing on key terms, and it does not rely
on an artificial scoring system. The user teaches the
filter to recognize spam by classifying emails as
such, while the filter itself extracts rules from
those classifications that enable it to evaluate new
messages. Self-employed software engineer Paul Graham,
who developed a practical open-source deployment of
the Bayesian filter, says the program's accuracy is
boosted because it takes into account not just words
that frequently pop up in spam, but those that do not.
The Bayesian filter was also incorporated into the
MSN8 Internet reader from Microsoft, and will be
included in the upcoming version 11 of Microsoft
Outlook. Steven Curry of EarthLink states that the
elimination of false positives is more likely if
humans are kept within the equation, and advocates an
approach in which people study email first and confirm
if it is spam, adding such recognition to the
filtering protocol. Alternative strategies to
controlling spam, such as anti-spam legislation, are
hampered by the lack of a clear definition over what
constitutes spam, while Jupiter Research analyst Jared
Blank argues, "The true problem is that spam is
effective."
From ACM
News, August 25, 2003
"Could Spam One Day End Up Crushed Under Its
Own Weight?" Wall Street Journal (08/25/03)
P. B1; Berman, Dennis K.
- Dennis K. Berman offers a ray of hope to people
frustrated and demoralized by the spread of spam:
Spamming could eventually burn itself out by becoming
a victim of its own proliferation, he muses. Thousands
of people are becoming spammers because operating
costs are virtually nonexistent, an especially
attractive lure in a down economy; another easy road
to profit for spammers is to fool small businesses to
pay for "electronic marketing campaigns." Author
Robert L. Fitzpatrick is confident that an upturn in
the economy will result in the disappearance of casual
spammers as well as the gullible people and businesses
they rely on. Berman adds that many spams are business
propositions without a hope of success, which means
eventual burnout. One of the biggest problems is that
the spam model works, but Berman partly attributes its
success to inexperienced Internet newcomers. He writes
that the continued maturation of the Net population
will dampen spam's power. Berman insists that spam
could be hobbled even further through a broad
educational campaign as well as "downright social
coercion" to stop supporting spammers. He suggests
that the companies losing money while they struggle to
control spam could help sponsor an anti-spam
public-service campaign. Berman recommends that
everyone follow a strategy to curb spam by refusing to
buy products through spam advertisements; never
clicking on a Web link contained in spam; and never
posting their email addresses on public Web pages.
"Spam Wars" Technology Review
(08/03) Vol. 106, No. 6, P. 32; Schwartz, Evan
I.
- The Internet is plagued with over 13 billion spam
emails each day, and Ferris Research estimates that
spam will add up to $10 billion in lost U.S.
productivity this year, while Microsoft Research
analyst David Heckerman predicts that spam could
account for 90 percent of all email in a short time.
There are three combat tactics against spam: Spam
blockers and filters, anti-spam legislation, and a
dramatic reworking of basic email and Internet
operations; the most effective strategy may be found
in concurrently employing all of these solutions.
Critical to any spam filter's effectiveness is its
filtration and false-positive rates, which vary among
popular filters such as Brightmail, heuristic filters
such as SpamKiller, and Bayesian-model-based filters.
However, some people note that more effective filters
only encourage spammers to send even more spam, as
well as tweak spam to appear more "friendly."
EarthLink's Mark Petrovic argues that curbing spam
will "require a cooperative solution to augment the
basic way email works." Examples of this type of
solution include IP address books listing companies
determined to be spammers or associated with spamming
(black lists), address books listing parties who are
authorized to send email (white lists), a proposed
email tax designed to cripple the medium's use to
spammers, and special license codes distributed by
email providers in return for royalties; key to
deploying such measures is making future email
traceable by fundamentally changing the Simple Mail
Transport Protocol (SMTP). Thus far, legal recourse in
both the United States and Europe has done little to
dam the flood of spam: A pan-European law upholding
opt-in licenses was passed, but most spammers operate
in the United States, where the law has no
jurisdiction. Meanwhile, recent U.S. opt-in anti-spam
legislation has died in Congress, while other bills
have stalled because legislators cannot agree on
whether a federal spam ban would be effective, or even
appropriate. http://www.technologyreview.com/articles/schwartz0703.asp
From ACM
News, August 22, 2003
"Record Computer Infections Slow U.S., Private
Work" Washington Post (08/22/03) P. E1;
Duhigg, Charles; Krebs, Brian
- Computer viruses that have proliferated at record
rates over the past 10 days appear to be tapering off
slightly, according to security firms such as
MessageLabs. However, this news hardly breeds optimism
for federal agencies--the Small Business
Administration, the Department of Commerce, and the
FCC among them--reporting productivity and operational
slowdowns, computer outages, and unprecedented numbers
of infected emails attributed to worms such as
Sobig.F, Blaster, and Welchia, whose global reach
encompasses at least 1 million residential, business,
and government computers. Department of Commerce CIO
Tom Pyke says that his department's virus-defense
systems intercepted 40,000 Sobig.F-laden messages
before Commerce computers were compromised on Aug. 21,
and between 500 to 750 emails are being quarantined
every hour. Though the damage caused by these viruses
is repairable, computer experts say the worms could
easily be programmed for more malevolent tasks, and
are worried about the next epidemic. Sallie McDonald
of the Homeland Security Department notes that both
her agency and Microsoft warned of the Windows
vulnerability the viruses are exploiting in July, but
the record spread of the worms is a clear indication
that few people took advantage of the warning, or the
patch that was issued. She adds, "If industries and
agencies don't start regulating themselves, Congress
may put in legislative requirements." Click
Here to View Full Article
"Strong Attackers, Weak
Software" Washington Post (08/21/03) P. E1;
Duhigg, Charles
- Computer security experts posit that the recent
upswing in fast-spreading virus epidemics is the apex
of a long-gestating trend as the skills and daring of
virus programmers increased, while the quality of
software security decreased. A rise in virus activity
at this time of year is often attributed to college
students on summer break who are out to make a name
for themselves, but Ken Dunham of iDefense says the
motivation of virus authors is changing: No longer
content with notoriety, some programmers are writing
malicious code to be used for ID theft, financial
scams, or to make political statements. MessageLabs
CTO Mark Sunner thinks that profit may be one of the
motives behind the Sobig.F worm, which installs a
Trojan horse program that spammers could use to
distribute their spam from infected machines. Fred B.
Schneider of Cornell University's Information
Assurance Institute warns that even more insidious
viruses may be on the horizon. "There's nothing
stopping someone from taking Blaster or Sobig.F and
making it delete all your files or change software on
your computer so it no longer works," he explains. But
even more helpful to virus writers is the prevalence
of poorly designed software, which results from a lack
of thorough testing and vendors' eagerness to add
bells and whistles. But though companies such as
Microsoft hope to address this problem by slowing down
software development, there is a trade-off: Schneider
observes that more secure software is harder to use.
Analysts also note that building more security into
software could add to consumer costs, and slow the
pace of technological innovation. Technology adviser
David Sklar predicts that, should a "software
Chernobyl" take place, "We'll start putting up more
walls, and thinking that computers should have the
same level of reliability we demand from food or cars
or fire-retardant pajamas." Click
Here to View Full Article
"Spam Technology Seeks
Acceptance" TechNewsWorld (08/15/03);
Fontana, John
- Sieve, a proposed IETF standard filtering
technology designed to organize email and mitigate
message overload, is being tapped by vendors such as
Brightmail and ActiveState as a tool that enables
customers to write personalized spam filters. Sieve
author Tim Showalter explains, "Email overload has not
been the result of receiving too much legitimate
email. It has been because of spam." Nevertheless, he
is surprised that some vendors altered Sieve for use
with their anti-spam engines. Vircom, for example,
employs Sieve as the cornerstone of its ModusSieve
product, and the company reports that it has devised
13,000 lines of Sieve scripts that are updated 24-7
and enhanced by scripts from clients who have
organized into the Vircom Anti-Spam Coalition. "We can
quickly modify scripts to react to spammers and share
those scripts throughout the coalition," notes
ModusSieve product manager Daniel Roy. Rockliffe has
deployed Sieve in the Web-mail interface of its
MailSite Express messaging server, and Sieve will be
included in an upcoming Rockliffe anti-spam filtering
product featuring a policy editor extracted from
ActiveState's PureMessage anti-spam software. The
policy editor boasts a GUI interface designed to make
Sieve scripting easier for users. Brightmail CTO Ken
Schneider says that Sieve is not a core ingredient of
the company's anti-spam engine, but is used to address
more site- or platform-specific problems. http://www.technewsworld.com/perl/story/31350.html
From ACM
News, August 20, 2003
"Head of FTC Opposes Bills To Curb
Spam" Washington Post (08/20/03) P. E1;
Krim, Jonathan
- In a speech to attendees at a yearly
technology-policy forum in Colorado, FTC chief Timothy
J. Muris sharply criticized a number of anti-spam
measures currently being debated in Congress,
describing them as "largely ineffective." He placed
special emphasis on Sen. Charles E. Schumer's (D-N.Y.)
proposal for establishing a do-not-spam registry, and
argued that enforcing such a registry would be futile
because the most notorious spammers conceal their
identities. Schumer declared, "A do-not-spam list
isn't going to solve all the problems with spam, but
it's the most broad-based and aggressive approach we
know." Thus far, a Senate committee has passed one of
the bills Muris finds fault with, a proposal from
Sens. Ron Wyden (D-Ore.) and Conrad Burns (R-Mont.)
advocating an increase in penalties for deceptive or
fraudulent spammers. Muris also harbors strong doubts
about the anti-spam community's desire that no
consumers should receive any unsolicited commercial
email unless they specifically request it. ISPs and
marketing companies prefer an opt-out policy in which
consumers receive commercial email unless they request
not to. Muris said that it is impossible to determine
if most consumers would favor an opt-in or opt-out
system, meaning proposals including such ideas are
inappropriate for anti-spam legislation. Bills that
companies favor also fell under Muris' scrutiny. He
contended that the language in some of the proposals
would blunt the FTC's ability to guarantee that
marketers conform to consumers' requests to opt out.
Such bills, he claimed, would make it the commission's
responsibility to prove that companies using
third-party marketing firms to distribute email ads
were aware that consumer opt-out requests were being
disregarded. Click
Here to View Full Article
"Grappling With Virus Invasion" Wired
News (08/20/03); Delio, Michelle
- Security experts such as Sophos' Chris Belthoff
speculate that the rapid spread of the Blaster worm
has inspired other virus authors to wreak havoc on the
Internet by unleashing their own malicious code, as
evidenced by recent outbreaks. Analysts contend that
the opportunity for hacker mischief has only been
amplified by carelessly written Microsoft code and end
users' slowness to patch their vulnerable systems. The
experts concur that the only effective strategy for
curbing these computer epidemics is to develop better
applications, institute more ethical behavior, and
boost threat awareness through education. The most
critical step, they argue, is for Microsoft to
dramatically improve the security of its applications
and operating systems, while Microsoft recently
advised users in newspaper ads to bolster their PC
protection with regular patching, firewalls, and
antivirus software. Microsoft security program manager
Stephen Toulouse admits that his company must "do a
better job of educating and informing our users and
delivering patches to them." However, security experts
note that Microsoft has created a climate of distrust
among users, which is why most are unlikely to accept
automatic patch updates. Virus researcher George Smith
considers antivirus companies' strategy of
continuously advising users to update their security
themselves to be pointless, arguing, "People who are
not susceptible to viruses and worms don't need the
advice and those who are susceptible just aren't
reachable." Meanwhile, security researcher Robert
Ferrell doubts that security issues will fully
disappear, given people's creativity and the fact that
morality and ethics will never be observed equally.
Still, he believes a secure Internet is a reachable
goal if the worldwide online community can unite to
solve the security problem. Click
Here to View Full Article
"Are You a Good or a Bad Worm?" Wired
News (08/19/03); Delio, Michelle
- Machines affected by the recently released
MSBlaster worm are being cured and patched by a
variant, AntiMSBlaster, but although many computer
users welcome this development, experts warn that
there is no reason to think the new worm is
benevolent. "Some may call this a good worm, but it
can cause all sorts of problems when patches are
applied to a computer unbeknownst to the administrator
of a network or the owner of that computer," notes
iDefense's Ken Dunham, who adds that AntiMSBlaster
could install back doors that leave computers
vulnerable to future hacker intrusions. AntiMSBlaster
and MSBlaster share a similar modus operandi: Both
enter systems via a network connection rather than as
an email attachment, and only Windows 2000 and Windows
XP machines that have not been patched for the RPC
DCOM buffer overflow security vulnerability are
susceptible. MSBlaster was designed to exploit
contaminated computers to launch a denial-of-service
attack against Microsoft's Windows Update Web site on
Aug. 16, but Microsoft was able to fend off the attack
by removing the windowsupdate.com domain name, which
was specified in the worm's code. MSBlaster is
relatively easy to purge, leaving some security
experts curious as to why users seem incapable of
fixing their own computers. However, certain users
bemoaned the lack of any clear-cut information about
removing the worm. "These virus and worm removal
advice I see are obviously written by nerds for
nerds," says user Paul Pacifico. Systems administrator
Mike Fergamo admits that Microsoft needs to find a
more effective way of notifying users of security
flaws and distributing patches. Click
Here to View Full Article
"Patching Becomes a Major Resource Drain for
Companies" Computerworld (08/18/03);
Vijayan, Jaikumar
- Keeping computer systems secure against worms and
viruses through regular software patching is putting a
strain on companies' limited resources. Banner Health
System security analyst Dave Jahne warns, "The thing
about patching is that it is so darn reactive. And
that can kill you." Art Manion of Carnegie Mellon
University's CERT Coordination Center notes that
larger and more expansive companies have the added
burden of testing each new patch prior to deployment.
Testing is important because patches do not always
work properly and can interfere with the applications
they are supposed to safeguard, according to
TippingPoint Technologies CTO Marc Willebeek-LeMair.
Ramping up patch testing and implementation is vital
as virus proliferation is accelerating, argues
Arlington County, Va., infrastructure technologies
director Vivek Kundra. He explains that his county can
no longer afford to spend three or four days to fully
patch its networks; the job should be done in a matter
of hours, if not minutes. Possible solutions Arlington
County is investigating include handing the patch
management process over to an outsourcer and adopting
a more automated patch testing and deployment
procedure. "There will be times when you may need to
make a judgment call balancing risk, appropriate
testing [and] mitigating factors," explains Online
Resources security officer Hugh McArthur. Meanwhile,
Tessenderlo Kerle CIO Bruce Blitch maintains that
software patching is still the best strategy for
companies, for lack of a way to guarantee absolute
code security. Click
Here to View Full Article
"Profile of the Superworm: SoBig.E
Exposed" TechNewsWorld (08/13/03); Germain,
Jack M.
- Internet security experts say that the SoBig.E
variant poses a serious long-term threat to the
Internet because it has opened up so many computers to
hackers. SoBig.E, which is primarily spread via shared
files on corporate networks and secondarily through
email, opens a large back door on infected machines
and contains a built-in maintenance channel where the
hacker can update code. Cable & Wireless chief
security officer William Hancock says SoBig.E is the
first worm to exploit hacking technology to deploy
spam tools en masse. The maintenance channel poses an
extra threat in that other hackers could
reverse-engineer the code to create their own SoBig
variants. To date, each version up to SoBig.E has been
timed out by the worm's author and followed up by
another version, but so far, SoBig.F has not appeared.
Once the worm is written to network users' startup
folder, only possible if people leave write access
open, or opened in a ZIP email attachment, SoBig.E
sends itself to all contacts in the user's address
book as well as to all email addresses stored in other
documents on the computer. In the email mode, the live
part of the virus is called details.pif, but copies
itself into winssk32.exe once opened and creates a
MSRRF.DAT file some analysts say is a foothold for
remote control. Hancock estimates that SoBig.E will
increase the amount of spam sent over the Internet by
a factor of 10 because of the number of
unsophisticated victims whose computers have been
hijacked. http://www.technewsworld.com/perl/story/31321.html
"Patching Things Up" CIO (08/01/03)
Vol. 16, No. 20, P. 79; Violino, Bob
- The growing number of software patches released
every year is threatening to become a costly
administrative nightmare for companies, which are
turning to automated patch management products to ease
the process--but these tools can only work in tandem
with an organizational effort to bring computing
environments under control. Patch management products
are designed to search for and study new patches,
check network-connected devices for security holes,
and implement the appropriate fixes; expected benefits
include less downtime due to software failures,
reduced vulnerability to hack attacks, and lower costs
than manually deploying patches. However, customers
are often forced to buy multiple products to cover all
software and systems, for lack of a one-size-fits-all
patch management tool. Paccar CIO Patrick Flynn notes
that coupling patch tools to existing software can be
difficult, and advises companies to employ a patch
management software supervisor to guard against
inefficiencies. To stabilize computing environments
and boost patch management software's effectiveness,
Forrester Research analyst Laura Koetzle recommends
that enterprises choose and standardize on a handful
of standard configurations. Some companies, Qualcomm
being one, are attempting to spur vendors into
streamlining patch management. "We're pushing Oracle
to simplify the patching process and either help us
provide a better patch solution or adopt [technology
from a vendor] like Kintana as a standard," explains
Qualcomm's Tom Fisher, who emphasizes the importance
of logs that track patch distribution status. "Give me
a log that tells me [the status of a patch
distribution], so I know that it only happened on this
machine, and I don't have to worry about the 18 other
machines I pushed to today," he says. http://www.cio.com/archive/080103/et_article.html
From ACM
News, August 11, 2003
"Should E-mail Still Be
Free?" Technology Review (08/06/03); Shein,
Barry; Crocker, Dave
- In response to Vipul Prakash's observations and
suggestions about spam control, Barry Shein finds
fault with his position that there should be no
per-message charging for email. Shein writes, "charges
should be incurred to help pay for the resources being
used and to inject some reality into decision-making
about that usage," adding that a combination of
statistical sampling and reasonable business
relationships can help iron out hard usage problems
that traditional network resource accounting is not
equipped to handle. Shein notes that credible
businesspeople realize how spam is hurting email, and
believes that they could be persuaded to accept paying
usage fees, provided the fee system is fair. Dave
Crocker counters Shein's argument, claiming that
usage-based charging would entail "astronomical"
intrinsic costs, while setting up such a system would
be a huge undertaking. Crocker reiterates Prakash's
conclusion that the spam dialogue is overlooking three
major issues: Every spam control solution is
inherently limited and is not an end-all panacea for
the spread of junk email; anti-spam mechanisms are
likely to be more effective when combined; and email
has accrued key features in the past three decades
that people do not wish to give up. Crocker recommends
caution, lest any changes to the email model,
ostensibly to control spam, devalue Internet
messaging. http://www.technologyreview.com/articles/dialog0703.asp
From ACM
News, July 2, 2003
"Multiple Attack Only Hope in Spam
Battle" New Scientist (07/01/03); Knight,
Will
- The problem of rapidly growing spam can only be
defeated through a multi-pronged strategy, one that
combines new technology, new legislation, and user
awareness, according to speakers at Britain's
first-ever "spam summit" on July 1. U.K. e-commerce
minister Stephen Timms told attendees that legislation
alone is not a panacea for spam, but technical experts
noted that new laws are still an important ingredient
of an effective anti-spam approach. Steve Linford of
spam-tracking organization Spamhaus warned that
proposed American legislation--specifically the Reduce
Spam Act and the Can Spam Act--would backfire and
generate a huge surge in spamming. The bills would
require users to opt out of receiving unsolicited
commercial email; the European Union, by contrast,
passed a law requiring bulk emailers to get
recipients' permission before sending them spam, a
policy known as opt-in. Linford argued that spam would
be legitimized by the passage of an opt-out law, and
give some 23 million small businesses the legal right
to send spam. Linford also stressed the importance of
international cooperation, because many spammers are
based outside the countries where recipients live, and
more will probably relocate if threatened by
prosecution. Technological measures such as spam
filtering can slow spam's progress, but cannot halt
it: No filter can identify spam with 100 percent
accuracy, while spammers are fiercely dedicated to
subverting every new anti-spam technology. Piper
Marbury Rudnick & Wolfe's Jim Halpert warned that
spammers are becoming more crafty, using
computer-hijacking Trojans and viruses to distribute
their wares. Click
Here to View Full Article
|