<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security in Computing and Information Technology</title>
	<atom:link href="http://azrelsecit.6te.net/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://azrelsecit.6te.net</link>
	<description>Azrel&#039;s WordPress site</description>
	<lastBuildDate>Fri, 05 Oct 2012 13:25:09 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.1</generator>
		<item>
		<title>The Cost of Security</title>
		<link>http://azrelsecit.6te.net/?p=38</link>
		<comments>http://azrelsecit.6te.net/?p=38#comments</comments>
		<pubDate>Fri, 05 Oct 2012 13:25:09 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=38</guid>
		<description><![CDATA[1. Direct costs -&#62; Software, equipments, procedures. 2. Indirect costs -&#62;Reduced efficiency due to additional procedures 3. Savings -&#62; Avoiding possible, expensive damage. -&#62; Potentially: optimisation of procedures.]]></description>
			<content:encoded><![CDATA[<p>1. Direct costs</p>
<p>-&gt; Software, equipments, procedures.</p>
<p>2. Indirect costs</p>
<p>-&gt;Reduced efficiency due to additional procedures</p>
<p>3. Savings</p>
<p>-&gt; Avoiding possible, expensive damage.</p>
<p>-&gt; Potentially: optimisation of procedures.</p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=38</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Mechanism</title>
		<link>http://azrelsecit.6te.net/?p=36</link>
		<comments>http://azrelsecit.6te.net/?p=36#comments</comments>
		<pubDate>Fri, 05 Oct 2012 13:19:37 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Security Tips]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=36</guid>
		<description><![CDATA[Types of security mechanism 1. Pervasive mechanisms: Protect against a number of threats. Example -&#62; Firewall Protect individual computers or whole networks. Example -&#62; Virus Checking Programs 2. Specific mechanisms Protect against a specific threat. Example -&#62; Data integrity protection. &#8230; <a href="http://azrelsecit.6te.net/?p=36">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><span style="text-decoration: underline;"><strong>Types of security mechanism</strong></span></p>
<p>1. Pervasive mechanisms:</p>
<ul>
<li>Protect against a number of threats. Example -&gt; Firewall</li>
<li>Protect individual computers or whole networks. Example -&gt; Virus Checking Programs</li>
</ul>
<p>2. Specific mechanisms</p>
<ul>
<li>Protect against a specific threat. Example -&gt; Data integrity protection.</li>
<li>Protect an individual data or a piece of hardware. Example -&gt; Controlling access to individual data items.</li>
<li>More accurate, less economical</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=36</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The most common malwares and attack techniques</title>
		<link>http://azrelsecit.6te.net/?p=30</link>
		<comments>http://azrelsecit.6te.net/?p=30#comments</comments>
		<pubDate>Fri, 05 Oct 2012 07:54:23 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Security Notes]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=30</guid>
		<description><![CDATA[Common malwares and its definition: Trojan Horse: Code doing what it is supposed to do, plus something else Trapdoor: Access to services by non-standard methods Logic Bomb: Dormant malicious code, waiting for triggering event Easter egg: &#8220;Cute&#8221; but harmless behaviour &#8230; <a href="http://azrelsecit.6te.net/?p=30">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><em>Common malwares and its definition:</em></p>
<p>Trojan Horse: Code doing what it is supposed to do, plus something else</p>
<p>Trapdoor: Access to services by non-standard methods</p>
<p>Logic Bomb: Dormant malicious code, waiting for triggering event</p>
<p>Easter egg: &#8220;Cute&#8221; but harmless behaviour triggered by special input</p>
<p><span id="more-30"></span></p>
<p><em>Attack Techniques:</em></p>
<p>Injection attacks: Exploiting the input vulnerability of data not being checked or sanitised properly</p>
<p>Rootkits: Malware that hides its presence via modifying system data</p>
<p>Social Engineering: Exploiting human gullibility to extract confidential information</p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=30</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>US blocks online fraud schemes linked to India</title>
		<link>http://azrelsecit.6te.net/?p=18</link>
		<comments>http://azrelsecit.6te.net/?p=18#comments</comments>
		<pubDate>Thu, 04 Oct 2012 05:24:28 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Internet Fraud]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=18</guid>
		<description><![CDATA[WASHINGTON: US officials said Wednesday they shut down a series of so-called tech support scams, mostly operating from India, which duped consumers into paying to clean their computers of bogus virus infections. The Federal Trade Commission said a US judge has ordered &#8230; <a href="http://azrelsecit.6te.net/?p=18">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p>WASHINGTON: US officials said Wednesday they shut down a series of so-called tech support scams, mostly operating from India, which duped consumers into paying to clean their computers of bogus virus infections.</p>
<p>The Federal Trade Commission said a US judge has ordered a halt to six &#8220;scareware&#8221; operations and has frozen their assets following an investigation in cooperation with Canada, Britain, Australia and New Zealand.</p>
<p>FTC Chairman Jon Leibowitz said the schemes involved calls to consumers in English-speaking countries from call centers in India, informing consumers of bogus infections.<span id="more-18"></span></p>
<p><img class="alignnone" src="http://economictimes.indiatimes.com/thumb/msid-16658821,width-310,resizemode-4/us-blocks-online-fraud-schemes-linked-to-india.jpg" alt="Internet Fraud" width="310" height="233" /></p>
<p>The groups also used online ads which informed computer users of the infections, and then sold &#8220;fixes&#8221; at prices ranging from $49 to $450.</p>
<p>&#8220;In these outrageous and disturbing cons you get a call from someone pretending to be from a major computer company who dupes you into thinking you have a virus on your computer,&#8221; Leibowitz told a news conference, which also played an audio tape of one of the calls.</p>
<p>&#8220;At one level, it&#8217;s like a bad Bollywood movie, but at another level it&#8217;s a ripoff of consumers.&#8221;</p>
<p>The FTC six firms with deceptive commercial practices and other violations and asked the court to permanently halt the scams and order restitution for consumers.</p>
<p>The FTC cases targeted 14 corporate defendants and 17 individuals in six separate legal filings. The companies included Pecon Software Ltd., Finmaestros LLC, Zeal IT Solutions Pvt Ltd, Virtual PC Solutions, Lakshmi Infosoul Services Pvt Ltd, and PCCare247, Inc.</p>
<p>Canada&#8217;s top telecom regulatory official, Andrea Rosen of the Canadian Radio-Television and Telecommunications Commission, said two related enforcement actions were filed in Canada.</p>
<p>Leibowitz said the FTC was sending a delegation to India to help work with authorities in such cases.</p>
<p>Source: <a href="http://economictimes.indiatimes.com/tech/internet/us-blocks-online-fraud-schemes-linked-to-india/articleshow/16658801.cms">http://economictimes.indiatimes.com/tech/internet/us-blocks-online-fraud-schemes-linked-to-india/articleshow/16658801.cms</a></p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=18</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>EFF Reveals How Your Digital Fingerprint Makes You Easy to Track</title>
		<link>http://azrelsecit.6te.net/?p=15</link>
		<comments>http://azrelsecit.6te.net/?p=15#comments</comments>
		<pubDate>Thu, 04 Oct 2012 05:21:29 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Internet Breach]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=15</guid>
		<description><![CDATA[Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again. The Electronic Frontier Foundation (EFF) has launched a new web app dubbed Panopticlick that reveals just how scarily easy it is to identify &#8230; <a href="http://azrelsecit.6te.net/?p=15">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p>Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.</p>
<p>The Electronic Frontier Foundation (EFF) has launched a new web app dubbed Panopticlick that reveals just how scarily easy it is to identify you out of millions of web users.</p>
<p>The problem is your digital fingerprint. Whenever you visit a site, your browser and any plug-ins you have installed can leak data. Some of it isn’t very personal, like your user agent string. Some of it is more personally revealing, like which fonts you have installed. But the what if you put it all together? Would the results make you identifiable?</p>
<p>As the EFF says, “this information can create a kind of fingerprint — a signature that could be used to identify you and your computer.”</p>
<p>The EFF’s test suite highlights what most of us probably already suspect — we’re readily identifiable on the web. We ran the test on a Mac using Firefox, Safari and Google Chrome, all of which leaked enough data to make us identifiable according the EFF’s privacy explanations.</p>
<p>The purpose of Panopticlick is to show you how much you have in common with other browsers. The more your configuration mirrors everyone else’s, the harder it would be to identify you. The irony is, the nerdier you are — using a unique OS, a less common browser, customizing your browser with plug-ins and other power-user habits — the more identifiable you are.</p>
<p><span id="more-15"></span></p>
<p>For example, say you’re running Firefox on Ubuntu with the Gnash plug-in instead of Flash — way to stick it to the man — but you’re also showing up with a unique configuration of browser, OS, installed fonts, plug-ins and more which can be combined to identify you via a unique online fingerprint.</p>
<p>So what can you do to make yourself less identifiable? Well, by disabling cookies, the Flash plug-in, the Java plug-in and most of our extensions we were able to blend in better. Actually, the fact that we didn’t have Java or Flash turned on made us more identifiable in those categories, but it also denied the test access to our installed fonts and other bits of data, so overall, less identifiable.</p>
<p>Obviously that approach has a downside — without Flash there’s not much in the way of online video, a lack of cookies will cause issues with logins, and without Java, you won’t be able to crash your browser or cause it to get hung up for hours.</p>
<p>In short, the disabling method isn’t much fun. Strange though it may seem, the best way to lose the unique online fingerprint is to blend in with the herd. As the EFF points out, mobile browsers are hardest to identify since there are few customization options and, for the most part, one version of Mobile Safari looks just like another.</p>
<p>By the same token, if you want to blend in, stick with stock system fonts, run Windows XP, use Firefox with no add-ons and turn off cookies. You’ll be much harder to identify.</p>
<p>We should point out that, no matter how well you blend in the fingerprint test, you are of course still identifiable by your ISP. Advertisers and websites generally can’t access the information your ISP has on you, but of course governments — with the cooperation of your ISP — always can. So don’t think just because you’ve eliminated your fingerprints no one knows who you are.</p>
<p>Source: <a href="http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/">http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=15</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Valve Steam service experiences security breach</title>
		<link>http://azrelsecit.6te.net/?p=12</link>
		<comments>http://azrelsecit.6te.net/?p=12#comments</comments>
		<pubDate>Thu, 04 Oct 2012 05:15:50 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Internet Breach]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=12</guid>
		<description><![CDATA[Digital game distribution leader Valve just announced there has been a security breach within its Steam database. In a message sent to Steam users, Valve co-founder and managing director Gabe Newell said someone managed to gain access to not only the &#8230; <a href="http://azrelsecit.6te.net/?p=12">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><img class="alignnone" src="http://venturebeat.files.wordpress.com/2011/11/steam-logo1.jpeg?w=558&amp;h=9999&amp;crop=0" alt="Valve" width="558" height="348" /></p>
<p>Digital game distribution leader Valve just announced there has been a security breach within its Steam database. In a message sent to Steam users, Valve co-founder and managing director Gabe Newell said someone managed to gain access to not only the Steam forums, but to the database containing user information.<span id="more-12"></span></p>
<p>Newell adds that the passwords were hashed and salted, and credit card information is encrypted. Currently, there is no sign of data being stolen, but he urges users to keep a close eye on their statements and credit card activity as the company continues to investigate.</p>
<p>Here is the official statement from Valve:</p>
<blockquote><p>Dear Steam Users and Steam Forum Users,</p>
<p>Our Steam forums were defaced on the evening of Sunday, November 6.  We began investigating and found that the intrusion goes beyond the Steam forums.</p>
<p>We learned that intruders obtained access to a Steam database in addition to the forums.   This database contained information including user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information. We do not have evidence that encrypted credit card numbers or personally identifying information were taken by the intruders, or that the protection on credit card numbers or passwords was cracked. We are still investigating.</p>
<p>We don’t have evidence of credit card misuse at this time. Nonetheless you should watch your credit card activity and statements closely.</p>
<p>While we only know of a few forum accounts that have been compromised, all forum users will be required to change their passwords the next time they login. If you have used your Steam forum password on other accounts you should change those passwords as well.</p>
<p>We do not know of any compromised Steam accounts, so we are not planning to force a change of Steam account passwords (which are separate from forum passwords). However, it wouldn’t be a bad idea to change that as well, especially if it is the same as your Steam forum account password.</p>
<p>We will reopen the forums as soon as we can.</p>
<p>I am truly sorry this happened, and I apologize for the inconvenience.</p>
<p>Gabe.</p></blockquote>
<p>This is not the first time a gaming service has been targeted in such a breach. Earlier this year, Sony’s online services were hit and shut down in April and remained down partway through the month of May. Back in October, Microsoft’s Xbox LIVE service also suffered an attack that forced Microsoft to put a freeze on some accounts.</p>
<p>VentureBeat has contacted Valve for further comment and we will update as information becomes available.<br />
Read more at <a href="http://venturebeat.com/2011/11/10/valve-steam-service-experiences-security-breach/#jkji6wCeOx7xbqMv.99">http://venturebeat.com/2011/11/10/valve-steam-service-experiences-security-breach/#jkji6wCeOx7xbqMv.99</a></p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=12</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anonymous says it hacked 10M PSN accounts; Sony disagrees</title>
		<link>http://azrelsecit.6te.net/?p=9</link>
		<comments>http://azrelsecit.6te.net/?p=9#comments</comments>
		<pubDate>Thu, 04 Oct 2012 05:02:51 +0000</pubDate>
		<dc:creator>azrelrahiman</dc:creator>
				<category><![CDATA[Internet Breach]]></category>

		<guid isPermaLink="false">http://azrelsecit.6te.net/?p=9</guid>
		<description><![CDATA[Anonymous claims to have struck again as far as the Sony PlayStation Network is concerned, but the whole matter appears to be a hoax. A tweet posted on Wednesday to the Twitter account of the infamous international hacker group asserted &#8230; <a href="http://azrelsecit.6te.net/?p=9">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><strong>Anonymous</strong> claims to have struck again as far as the Sony PlayStation Network is concerned, but the whole matter appears to be a hoax.</p>
<p>A tweet posted on Wednesday to the Twitter account of the infamous international hacker group asserted that the PlayStation Network had been hacked again. The tweet has been taken down, but here is a screenshot before it was removed just minutes ago:</p>
<p><img class="alignnone" title="Anon to Sony tweets" src="http://cdn-static.zdnet.com/i/story/70/00/002695/zdnet-anonymous-tweet-august-2012.jpg" alt="Anon to Sony tweets" width="464" height="301" /><span id="more-9"></span></p>
<p>Kotaku also linked to a tweet that reportedly read 10 million PSN accounts were at risk, but that tweet has since been deleted.</p>
<p>However, it&#8217;s possible that these tweets were deleted because the claims were unsubstantiated.</p>
<p>Shane Bettenhausen, who works in Sony&#8217;s business development unit retaliated on his on Twitter account, retorted by arguing that the claims were false. Bettenhausen&#8217;s tweet has also been deleted, but here&#8217;s a screenshot:</p>
<p><img class="alignnone" src="http://cdn-static.zdnet.com/i/story/70/00/002695/zdnet-anonymous-sony-tweet-august-2012.jpg" alt="Shane claims" width="484" height="282" /></p>
<p>However, note that there hasn&#8217;t been an official statement from the Sony Corporation itself yet.</p>
<p>There has been bad blood &#8212; to say the least &#8212; between Sony and Anonymous for more than a year now.</p>
<p>Last spring, Sony&#8217;s PlayStation Network was hacked, putting millions of accounts with sensitive and personal data worldwide at risk. Sony took a lot of flack for not coming forth with answers for its customers sooner, and many members signed off from the Network for good &#8212; some of whom went so far as to sell their PlayStation 3 consoles altogether.</p>
<p>However, a few weeks after the security breach, Sony revealed that it found a file tied to Anonymous on Sony Online Entertainment servers. It eventually broke out into an international war between Anonymous and Sony, including one incident in Spain in which three people were arrested for allegedly being involved in the PSN security breach. Anonymous retaliated by hacking the official website of Spain&#8217;s national police force.</p>
<p>By that point, the damage had been pretty much done between this debacle and the earthquake in Japan last March as Sony faced a $3.2 billion loss for the 2010-2011 fiscal year.</p>
<p>Source: <a href="http://www.zdnet.com/anonymous-says-it-hacked-10m-psn-accounts-sony-disagrees-7000002695/">http://www.zdnet.com/anonymous-says-it-hacked-10m-psn-accounts-sony-disagrees-7000002695/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://azrelsecit.6te.net/?feed=rss2&amp;p=9</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
