Ignorance, arrogance and greed, together, shape the world.
As Andersen’s fairy tale clearly states, power, money and the fear of loosing them make people at any level behave in stupid, blind, immoral, and dangerous ways.
Only those who have nothing to gain from not telling the truth, from not misbehaving, will do it.
In our case, an Australian 16 yo boy was able to crack the new Government-made 89 million dollars worth anti-porn family filter, in 30 minutes. His technique ensures the software’s toolbar icon is not deleted, leaving parents under the impression the filter is still working.
Then he called the press and showed them how easy it was to crack it. The Emperor is naked, he said.
Last days brought to whole world really interesting news. After Mrs. Merkel visited China and spoke about hacker attacks against German ministries, also Financial Times revealed, that Pentagon was target of such attacks from China. If this is not enough, also Guardian recently reported about such attacks on governmental networks in UK. Titan Rain — as US called the raising Chinese hacking activities, seems to be stronger than we could imaginne.
General assumptions from specialists are, that behind these attacks is PLA — People’s Liberation Army — or if you want: Chinese army. This assumption is supported by the several facts, like target selection, attack levels (even IT security world would for sure invite more details on how the attacks were performed). It is also another known fact that China trained hackers already years ago. Then why this all is surprising some of us?
Latest reports indicate that in the first half of 2007 spam reached 59% of all the monitored email traffic, a substantial increase compared to the 54% of q4-2006.
A scaring 0,68% of these emails had a security threatening payload, in the form of a malicious attachment, which corresponds to a malware-based attack every 140 spam messages sent.
Since a few years now, crackers and criminal organizations that operate in the digital domain have been using a mix of social engineering and software exploiting techniques.
If you follow news related to IT security then you already know that using VoIP services, that use SIP isn’t the safest way to guarantee communication for your home or company. Session Initiation Protocol (SIP) devices can be vulnerable to eavesdropping. That’s a fact.
There are tons of hardware and software using SIP, and many of our and your internet providers are also using it. Let me explain how potentially harmful and dangerous this can be for us, the end-users.
Eavesdropping for adversarial purposes is the less danger, and possibility that this will happen, is low. More possible is, that these vulnerabilities will be used in espionage in industry, since these devices are well used in companies.
Powerful weapons are being studied, developed and deployed on the Middle East battlefield. They are lethal, and meant to destroy the opponent’s morale thanks to a well-known “shock and awe” tactic.
But they do not require explosives, nor they require expensive training to be launched or operated: on the contrary, they’re so cheap compared to the damage they can impose on the enemy, that they are more and more spread every day.
To build these weapons is also very easy: it just takes a few chicks and guys in need of some easy cash, a camera, and a web server.