Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

“Yes We Can’t!” – On Kleptography and Cryptovirology

This is a study conducted by computer scientists and well-known cryptographers Moti Yung and Adam Young on the two-way relation between cryptography and malicious software. The research was presented by Moti Yung at 26th Chaos Communication Congress (26C3) in Berlin. Yes, we can’t! Yes, we can or yes, we...

Mikko Hypponen on Cyber Warfare 4: Challenges of the Cyber Arms Race

This part encompasses Mikko Hypponen’s thoughts on why sophisticated viruses like Stuxnet and Flame are so hard to detect using the regular security technology. If you look at Miniflame which was found recently, one of the files actually contains country information, which tells us in which country that...

Mikko Hypponen on Cyber Warfare 3: Stuxnet as an Offensive Attack Weapon

Mr. Hypponen now draws attention to the process where computer science basically turned into an offensive weapon capable of killing people, namely Stuxnet worm. Stuxnet is the only one which actually does physical damage. It controls the PLC gear inside the Natanz nuclear enrichment facility, blowing up...

Mikko Hypponen on Cyber Warfare 2: Types of Governmental Attacks

Shifting the focus over to governmental attacks, Mikko Hypponen breaks nation states’ cyber warfare down into several types, depending on the objects targeted. Within attacks coming from governments we have a range of stuff. We have espionage. You might have heard about what is often characterized as APT...

F-Secure’s Mikko Hypponen on Cyber Warfare at Wired 2012

Chief Research Officer at F-Secure and true computer security guru Mikko Hypponen outlines the state and scope of today’s cyber threatscape at Wired 2012 event. My name is Mikko Hypponen, and his name is “Arashi”. He is one of the examples of Russian organized cyber criminals who create...

Offensive Threat Modeling for Attackers 8: Confusing the Adversary

This is the final part of the presentation dedicated to nuances of exploiting various components of an adversary’s defensive posture for a successful attack. So, now we want to directly engage the defenses. A very effective thing is false flag operations. Does everybody knows what a false flag is? False...

Offensive Threat Modeling for Attackers 7: Utilizing Different Infiltration Vectors

Shane MacDougall and Rafal Los explicate herein the issues of offensive modeling from the perspectives of company’s human component and time windows for attack. Shane MacDougall: A big tool in determining your targets within a company is company sentiment. You really want to identify as many users at risk...

Offensive Threat Modeling for Attackers 6: Insight into Points of Attack

Presenting their subject further, Shane MacDougall and Rafal Los stick to the objectives and key constituents of the points of attack modeling process. To model the points of attack, obviously, our key objective is to break everything down into the tiniest pieces possible. If you’re familiar with the...

Offensive Threat Modeling for Attackers 5: Modeling the Defender

It’s now turn for Shane MacDougall to contribute to the presentation and focus on the different aspects of modeling the defender for offensive purposes. Shane MacDougall: Now we’re going to get into the meat of the matter of how we’re actually going to break this down. So, modeling the defender (see...

Offensive Threat Modeling for Attackers 4: Executing the Attack the Right Way

HP Software’s Rafal Los now highlights the finishing touches to perform before the attack can be executed, and summarizes the entire offensive threat scenario. I hope you guys get the irony of hanging a piece of Swiss cheese in the Posture slide (see image). Identifying asset’s defensive posture: how...