Quantcast

Archive: Apr 2013

Employ Bees to Protect Your Servers: Honeypots That Bite Back

Alexey Sintsov graduated from Saint Petersburg State Polytechnical University. Since 2001 Alex has been working on practical questions in the field of security analysis and vulnerability detection, as well as exploit development. He works for Nokia as a Senior Security Engineer. Alexey also writes for...

Criminal Education 3: Disrupting the Adversarial Market

This part of Art Gilliland’s keynote encompasses his view of the measures for preventing breaches, and the highlight of the role of intelligence for this. I think we need to define a new defense in depth for us. And part of that is building our capabilities at each stage of their value change (see...

Criminal Education 2: The Cybercrime Ecosystem

Art Gilliland’s focus in this part of the keynote is on the analysis of why enterprises are vulnerable and how the data breach cycle typically takes place. So let’s start by understanding a little bit more about us. Let’s discuss a little bit about how we are seen by the adversary. We are incredibly...

Criminal Education: Preventing Corporate Data Breaches

Art Gilliland, Senior Vice President & General Manager of HP Software Enterprise Security Products, expresses his vision of corporate information security during RSA Conference 2013 keynote speech “Criminal Education”. Thank you very much and good afternoon! My name is Art Gilliland, and...

The Effect of Password Strength Meters 5: Questions & Answers

Blase Ur’s presentation at USENIX ends with a Q&A part which is reflected in this entry and sheds yet more light upon the details related to password meters. Question: I really liked the study and I applaud your large sample size. I’m wondering if you had any way of measuring user tendency to...

The Effect of Password Strength Meters 4: What Makes Meters Matter?

Blase Ur provides herein the results by metrics affecting time of password creation, user sentiment, memorability, and summarizes the study overall. Let’s move on to the password creation process. In particular, I’ll highlight the time it took the participants to create a password, and also how...

The Effect of Password Strength Meters 3: Password Composition and Guessability

In this entry Blase Ur walks us through the first two metrics for the study, namely the relation of password length and meter type, and results by guessability. Before I jump into our results, I’ll tell you a little bit about our participants. We had 2,931 of them recruited on Amazon’s Mechanical Turk...

The Effect of Password Strength Meters 2: Visual and Scoring Differences

Blase Ur proceeds with describing the workflow of the password meters study, highlighting here the impact of visual and scoring elements upon password strength. So, I just showed you a number of different features, and we, of course, wanted to know what each of these features is contributing. All of our...

The Effect of Password Strength Meters

During his USENIX talk “How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation” Blase Ur, computer security and privacy researcher with Carnegie Mellon University, presents a thorough study of password strength meters in terms of their effect on password creation...

Windows Desktop Gadgets are Dangerous: Interview with Mickey Shkatov

Privacy PC came across an interesting topic raised by Mickey Shkatov and Toby Kohlenberg at the last Black Hat USA conference. The researchers were talking about comparatively rare but potentially very hazardous attack vector dealing with Microsoft Windows desktop gadgets. We have contacted Mickey Shaktov...

Hacker’s Guide to Stay out of Jail 8: Questions and Answers

This is the final part of the Grugq’s presentation at HITB SEC event, where he takes questions from the audience about OPSEC for online freedom fighters. The Grugq: So, are there any questions? Question: What’s, in your estimation, the average cost per persona? Answer: In terms of time, you probably want...

Hacker’s Guide to Stay out of Jail 7: VPNs vs. TOR

The Grugq dwells here on the issues of anonymity and privacy for freedom fighters, paying a particular attention to the tools for maintaining those. In terms of technologies that you can use to help ensure that you maintain good OPSEC, on the subject of VPN vs. TOR, a lot of people seem to have thought that...

Hacker’s Guide to Stay out of Jail 6: Anti-Profiling

Further explicating OPSEC guidelines for freedom fighters at HITB SEC Conference, The Grugq now focuses on the various ways to prevent personal profiling. In terms of staying anonymous, briefly, if we go over some guidelines, you want to avoid revealing personal information about yourself. Any personal...

Hacker’s Guide to Stay out of Jail 5: Anonymity and Defense

Here The Grugq describes some of the techniques to use for building layers of anonymity and defense which will guard personas from getting associated with you. So, techniques – basically, you need to put in the plumbing. Plumbing is all of the stuff that you’re going to use to maintain your cover...

Hacker’s Guide to Stay out of Jail 4: Be Paranoid and Never Contaminate

In this part of the presentation, The Grugq continues exemplifying the common violations that freedom fighters should under no circumstances make. In this case palladium was insufficiently paranoid (see image). After he got busted, they took him to an interview and they showed him logs that they had...

Hacker’s Guide to Stay out of Jail 3: LulzSec Failures

Highlighting the typical mistakes to avoid, The Grugq provides real-world examples where actual hackers got busted due to unacceptable indiscretion. If you’re trusting people to keep their mouths shut, which you should never do, they won’t. This is why VPNs are not actually secure. VPNs would only be...

Hacker’s Guide to Stay out of Jail 2: Do’s and Don’ts

Covering practical tips for doing OPSEC, this part of The Grugq’s talk makes it clear what you should and should not do when freedom-fighting on the Internet. One methodology for doing OPSEC is, basically, you need to think about how to put the plumbing in first, so you need to set up your environment for...

Hacker’s Guide to Stay out of Jail: OPSEC for Freedom Fighters

During his talk ‘OPSEC for Hackers by The Grugq: because Jail Is for wuftpd’ at HITB 2012 Conference, The Grugq, a well-known information security guru specializing in studying anti-forensic techniques, advises online freedom fighters out there on how to avoid getting busted. This is going to be...

SUPERAntiSpyware Professional 5.6 review

$29.95 SUPERAntiSpyware Professional 5.6 is a user-friendly and agile solution that readily confronts and eliminates a vast range of spyware threats. Usability:  Features:  Efficiency:  Support:  Overall:  Download Analyzing all the different products aimed at protecting...

Open Everything – Interview with Robert David STEELE Vivas. Part 6

In the final part of our interview Robert Steele comments on today’s security industry, identity theft, and highlights his view of the future without secrecy. – How would you characterize the present-day security software? How will it develop in future? – Not a good question for me other than...

Open Everything – Interview with Robert David STEELE Vivas. Part 5

This part of the interview reflects Steele’s thoughts on computer security, biohacking, cyber warfare exemplified by Stuxnet, and online authenticity models. – How would you characterize the current state of things around computer and Internet security? Are you seeing any good new tendencies? Do you...

Open Everything – Interview with Robert David STEELE Vivas. Part 4

Moving on with the discussion, Robert Steele dwells on pros and cons of the present-day online search, primary OSINT challenges, and technical surveillance. – What type of search engines do we need? Will Google stay or go? – One of the great things about nurturing OSINT has been the quality...

Open Everything – Interview with Robert David STEELE Vivas. Part 3

This part encompasses Mr. Steele’s view of collective intelligence, hackers’ role in facing information security challenges, and several other relevant matters. – At The Fifth HOPE in 2004, you predicted an explosion in on-demand tailored intelligence during the following 5 years – to what extent...

Open Everything – Interview with Robert David STEELE Vivas. Part 2

This section of our interview with Mr. Steele is dedicated to a retrospective insight into the past of OSINT, terrorism, and today’s top high-risk technologies. – Mr. Steele, is there anything you regret about or would have done differently if you could just go back to the 80s and start it over? ...

Open Everything – Interview with Robert David STEELE Vivas

Robert David STEELE Vivas is a native New Yorker who has lived practically all over the world. He is best known for promoting the ubiquitous use of Open-Source Intelligence (OSINT), and more recently for his latest book, “THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth &...