Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Steal Everything, Kill Everyone, Cause Total Financial Ruin

Jayson E. Street, Information Systems security expert and CIO at Stratagem 1 Solutions, describes his real-world intrusion engagements during his Defcon talk to show the flaws of the current security model within enterprises. Hi! This is my talk. I want you to understand I had to start with this slide (see...

From White Hat to Black 5: Darkmarket and Undercover FBI Operation

In the final part of the story, Kevin Poulsen dwells on the undercover FBI operation targeting Max Vision’s carding business, and speaks on where Max’s black hat activities ended up getting him in the long run. What happened next was there was another vulnerability. In fact, his whole career is kind of...

From White Hat to Black 4: ATM Fraud and Point of Sale Hacks

Kevin Poulsen highlights new crime areas Max Vision and his partner got into: ATM fraud based on CVV system vulnerability, restaurant hacks, and running a carder forum of their own. So things changed – I almost forgot this. At the same time that Max was doing this, one of the people that were infected...

From White Hat to Black 3: The Carder Forums

This part of Kevin Poulsen’s talk narrates about a very crafty strategy that Max Vision and his companion Chris Aragon adopted to get hold of stolen credit card data from carder forum users, and monetize it with remarkable efficiency. Chris’ money was running out. So Max did the logical thing and he...

From White Hat to Black 2: The Robin Hood Hacker

Kevin Poulsen now gives an insight about the way Max Vision went distinctly black hat under the pressure of circumstances after completing his jail sentence. The Robin Hood Hacker Getting into Taft turned out to be a very important development, because before – he was kind of a misguided naive white hat,...

From White Hat to Black – The Curious Case of Cybercrime Kingpin Max Vision

Kevin Poulsen, former hacker and currently Senior Editor at Wired.com, gives a captivating talk at RSA Conference on the intricate story of the cyber criminal named Max Ray Vision (Max Butler) who ended up going from white hat to black hat. Thanks for coming, everybody. So, as you’ve heard, I’m a...

Where Are We and Where Are We Going 6: Case Flame

At the end of the keynote, Mikko Hypponen presents his in-depth research into the Flame case, specifying the mechanisms and techniques applied by the virus. I wanted to find some image about flame or fire, or something that would nicely fit into all the talk, and the best image I could find was this....

Where Are We and Where Are We Going 5: Governmental Attacks and Backstage Stuxnet Facts

Shifting the focus of the talk towards governmental attacks, Mikko Hypponen pays particular attention to the situation around Iran, and provides some really interesting facts about the notorious Stuxnet worm. Let’s speak about governmental attacks. Now, like I said in the beginning, it’s quite...

Where Are We and Where Are We Going 4: GPCode, Police and Banking Trojans

Mikko Hypponen’s “Hack In Paris” keynote continues with further analysis of ransom Trojans, ranging from the flagrantly manifested GPCode to the craftier fake Copyright and Police alerts; and provides an overview of banking Trojans industry. So you get hit by Blackhole, your Windows computer is...

Where Are We and Where Are We Going 3: Ransom Trojans

Security guru Mikko Hypponen dwells here on ransom Trojans distribution scheme from an attacker’s perspective, and specifies the susceptibility of applications and browsers in the context of such attacks. One problem in particular, which has been growing just over the last months are ransom Trojans. And...