The Cost of Security

1. Direct costs

-> Software, equipments, procedures.

2. Indirect costs

->Reduced efficiency due to additional procedures

3. Savings

-> Avoiding possible, expensive damage.

-> Potentially: optimisation of procedures.

Posted in Uncategorized | Leave a comment

Security Mechanism

Types of security mechanism

1. Pervasive mechanisms:

  • Protect against a number of threats. Example -> Firewall
  • Protect individual computers or whole networks. Example -> Virus Checking Programs

2. Specific mechanisms

  • Protect against a specific threat. Example -> Data integrity protection.
  • Protect an individual data or a piece of hardware. Example -> Controlling access to individual data items.
  • More accurate, less economical
Posted in Security Tips | Leave a comment

The most common malwares and attack techniques

Common malwares and its definition:

Trojan Horse: Code doing what it is supposed to do, plus something else

Trapdoor: Access to services by non-standard methods

Logic Bomb: Dormant malicious code, waiting for triggering event

Easter egg: “Cute” but harmless behaviour triggered by special input

Continue reading

Posted in Security Notes | Leave a comment

US blocks online fraud schemes linked to India

WASHINGTON: US officials said Wednesday they shut down a series of so-called tech support scams, mostly operating from India, which duped consumers into paying to clean their computers of bogus virus infections.

The Federal Trade Commission said a US judge has ordered a halt to six “scareware” operations and has frozen their assets following an investigation in cooperation with Canada, Britain, Australia and New Zealand.

FTC Chairman Jon Leibowitz said the schemes involved calls to consumers in English-speaking countries from call centers in India, informing consumers of bogus infections. Continue reading

Posted in Internet Fraud | Leave a comment

EFF Reveals How Your Digital Fingerprint Makes You Easy to Track

Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.

The Electronic Frontier Foundation (EFF) has launched a new web app dubbed Panopticlick that reveals just how scarily easy it is to identify you out of millions of web users.

The problem is your digital fingerprint. Whenever you visit a site, your browser and any plug-ins you have installed can leak data. Some of it isn’t very personal, like your user agent string. Some of it is more personally revealing, like which fonts you have installed. But the what if you put it all together? Would the results make you identifiable?

As the EFF says, “this information can create a kind of fingerprint — a signature that could be used to identify you and your computer.”

The EFF’s test suite highlights what most of us probably already suspect — we’re readily identifiable on the web. We ran the test on a Mac using Firefox, Safari and Google Chrome, all of which leaked enough data to make us identifiable according the EFF’s privacy explanations.

The purpose of Panopticlick is to show you how much you have in common with other browsers. The more your configuration mirrors everyone else’s, the harder it would be to identify you. The irony is, the nerdier you are — using a unique OS, a less common browser, customizing your browser with plug-ins and other power-user habits — the more identifiable you are.

Continue reading

Posted in Internet Breach | Leave a comment

Valve Steam service experiences security breach

Valve

Digital game distribution leader Valve just announced there has been a security breach within its Steam database. In a message sent to Steam users, Valve co-founder and managing director Gabe Newell said someone managed to gain access to not only the Steam forums, but to the database containing user information. Continue reading

Posted in Internet Breach | Leave a comment

Anonymous says it hacked 10M PSN accounts; Sony disagrees

Anonymous claims to have struck again as far as the Sony PlayStation Network is concerned, but the whole matter appears to be a hoax.

A tweet posted on Wednesday to the Twitter account of the infamous international hacker group asserted that the PlayStation Network had been hacked again. The tweet has been taken down, but here is a screenshot before it was removed just minutes ago:

Anon to Sony tweets Continue reading

Posted in Internet Breach | Leave a comment