Friday, June 27, 2008
Quote of the day
New IT Term of the day
New IT Term of the day
pluggable authentication module (PAM)
A UNIX programming interface that enables third-party security methods to be used. By using PAM, multiple authentication technologies, such as RSA, DCE, Kerberos, smart card and S/Key, can be added without changing any of the login services, thereby preserving existing system environments.
1 Million Chinese PCs Hijacked by Criminals
FIRST told of Chinese PC hijack explosion
Frank Wintle
WEBWIRE
June 25, 2008
http://www.webwire.com/ViewPressRel.asp?aId=68776
VANCOUVER, CANADA, JUNE 25. The number of innocent individuals in China whose personal computers were hijacked by criminals rose by a staggering 2125 per cent between 2006 and 2007, delegates were told here today at the 20th annual conference of FIRST, the Forum of Incident Response and Security Teams.
During sessions when the need for sophisticated approaches to combat the increasing sophistication of Internet crime rode high on the conference agenda, Dr Minghua Wang [MINGHUA WANG] who heads China’s Computer Emergency Response Team Co-ordination Centre, revealed that while the number of PC’s hijacked for remote Trojan hosting was already relatively high at 44,717 at the end of 2006, twelve months later the number had exploded to nearly a million – 995,154.
“Malicious websites have become a major threat to normal Internet users in China,” he said.
“We now have web-based Trojan networks, driven by economic profit and launched by experienced and well organised black hats, with hundreds of malicious hosts at different locations within China, and even abroad.
“We need co-operation between computer emergency response teams and law enforcers.”
UK Gov calls on white hat hackers to spot data leaks
By Chris Williams
25th June 2008
http://www.theregister.co.uk/2008/06/25/cabinet_office_data_handling_report/
The civil service's systems will be subjected to new attacks by independent white hat hackers in a bid to spot weaknesses in government data handling before catastrophic losses occur, it was announced today.
The white hat programme is one of a suite of targets, training and scrutiny measures that Cabinet Secretary Gus O'Donnell hopes will bring about a "culture change" across the civil service and restore public faith in the government's competence in handling sensitive data.
He said: "The risk we must counter is that citizens and business lose trust in the Government to handle their data effectively. It would be foolish not to acknowledge that the lapses in data security have affected this confidence."
O'Donnell revealed the new programme as he published his office's final report on data handling in government. The internal inquiry ran parallel to the independent Poynter report, also published on Wednesday.
Both investigations were launched in the wake of a series of government data losses last year. The blundering run was topped by HMRC's disappearing unencrypted CDs, which contained 25 million child benefit records. Poynter looked specifically at the HMRC incident, while the Cabinet Office report sets a strategy for improving data handling throughout government.
O'Donnell argued that the government's stores of personal data have brought great benefits to the public. "Yes we have lots of data on individuals," he protested to reporters. "And that is, for individuals, good."
All government departments are in the process of scrambling laptop hard drives after the Cabinet Office, which oversees the civil service, banned unencrypted machines in January.
O'Donnell also said the government's many outsourced data contracts would be amended to insist that private contractors abide by the new data regime. He claimed the response from outsourcing firms to the new rules had been positive.
Proposed new data-based public services will be subject to a Privacy Impact Assessment, which will judge the risks that collecting or sharing the necessary data could have. The UK's privacy watchdog, Information Commissioner Richard Thomas, is planning his first use of new civil service spot check powers granted to him following last year's embarrassing rash of data losses.
Announcing formal action against HMRC and the MoD (over laptop losses, reported on today by Sir Edmund Burton) Thomas described the government's handling of data as "deplorable". He said: "Whilst these breaches have been highly publicised and involve big numbers, sadly they are not isolated cases. It is deeply worrying that many other incidents have been reported, some involving even more sensitive data. It is of fundamental importance that lessons are learned from these breaches."
ICO enforcement notices have been issued to the MoD and HMRC requiring them to follow the Burton and Poynter's recommendations respectively - failure to comply is a criminal offence.
Yet another ongoing review of how the government handles information, this time on paper, is currently being led by Sir David Ormand. He was asked to investigate after top secret intelligence documents were left on a Surrey commuter train.
The Cabinet Office today said it will report government progress on data handling to parliament annually. You can read the full report here (pdf) (http://www.cabinetoffice.gov.uk/~/media/assets/www.cabinetoffice.gov.uk/csia/dhr/dhr080625%20pdf.ashx).
Fired IT Director of Organ Bank accused of hacking
By CINDY GEORGE
June 24, 2008
http://www.chron.com/disp/story.mpl/headline/metro/5854484.html
The fired technology director of a Houston organ donation company has been accused of hacking into its computer system and deleting records.
A federal indictment alleges that over two days in November 2005, Danielle Duann illegally accessed and damaged LifeGift Organ Donation Center's database.
The agency recovers organs and tissue from the deceased for distribution in 109 Texas counties. Recipients live in a broad swath of the state including Houston, Fort Worth, Lubbock and Amarillo.
After Duann, 50, was fired as the agency's director of information technology, she is accused of accessing the system and issuing commands that wiped out organ donor information and accounting files.
"There was no interruption in clinical operations as a result of the deletion of files, therefore no lives of transplant candidates were in jeopardy," LifeGift spokeswoman Catherine Burch Graham said Tuesday afternoon.
The agency recovered the information from a backup system.
"All of the files were back within several months of the hacking and clinical operations were not affected in any way," Graham said.
Duann is charged under a statute that makes it a federal crime to use technology to impair, or potentially impair, medical examination, diagnosis, treatment and care.
Graham said she could not elaborate on the reason why Duann was fired after a 2 1/2-year tenure.
The intrusion cost the center, which coordinates organs and tissue donations to 200 hospitals in the Southwest, $70,000.
The case is being prosecuted by lawyers from the local U.S. Attorney's Office and the Justice Department's computer crime and intellectual property section.
Duann's face was wet as she was escorted by a U.S. Marshal Tuesday afternoon and she was unable to respond to questions.
If convicted, the former computer chief faces up to 10 years in prison and a $250,000 fine.
Cyber Attack on Pacific Island Internet Infrastructure
Marshalls internet still affected after cyber attack
25 June, 2008
http://www.rnzi.com/pages/news.php?op=read&id=40547
http://www.yokwe.net/index.php?name=News&file=article&sid=2211/
The general manager of the Marshall Islands National Telecommunications Authority, the NTA, says it may be a few days yet before its email system is back to normal.
An unprecedented cyber attack on the monopoly Internet provider this week caused a complete shutdown of email traffic to the country.
A local information technology expert said someone person unleashed infected computers to flood the NTA with mail leading to the shutdown of the system.
The NTA’s general manager, Tony Muller, says technicians are still working on the problem.
“We were able to, sort of, bring it back to normal, we are seeing that out traffic is back to normal, when four times it was before, and they are still working on it.”
Tony Muller says in the meantime, they have built two-back up servers to avoid this problem again.
Vista, Internet Explorer and Outlook tips
In the Tools menu, select Internet Options. In the General tab, under Tabs, click the Settings button. Uncheck the topmost checkbox, which is labelled Enable Tabbed Browsing (requires restarting Internet Explorer), and click OK. To enable the tabbed browsing function later, just go back and select this option, and save your preferences.
If you want to search for a particular word or phrase on the web page you�re viewing and can�t be bothered to read through every paragraph just press Ctrl and F together and type the word or phrase you want.
A handy short cut to display the address bar history on the Internet Explorer is to press F4.
To open the Organize Favourites Dialog box, press Ctrl and B together.
One of the ways to search for a file on Windows is the Search box available in every folder. You can type in any word associated with the file you�re looking for; Windows will look for that word in the file names, file contents, and file properties of all the files in the current view. To filter your search, say by files modified on a particular date, you can type �modified:
Starting up an application was never easier or quicker. No need to go through the Start menu and then several sub-menus. Just start typing the name of the program into the bar at the bottom and have Vista bring up the name of the program you need instantly!
Windows Vista assigns shortcuts to all the items in your Quick Launch toolbar, on its own, depending on the icons� positions in the sequence. So if you want to open the program whose icon is the fourth in your Quick Launch bar, just press the Windows key + 4.
Is your Sidebar cluttering up your life? To get in a little breathing room, right-click gadgets that you don�t use frequently and change their opacity settings to 40 percent. These gadgets will now fade out of view when you are not using them.
To change your Windows Vista theme, right-click your desktop and select Personalise. Next, click Themes; in the dropdown menu, choose the theme you want, and click Apply.
If you�ve recently been doing something with your computer that generates a lot of temporary files, you may want to make sure all those files are cleaned out of your system to free up precious space. To do this, just enter %TEMP% into your Start menu search box and press Enter. The temporary files folder will open, allowing you to delete files and prevent unnecessary clutter.
Is your PC running slowly? Go to your Power Options control panel and look for the Power Saver setting that is set at 50 percent (default setting in Vista). Change this setting to High Performance and let your PC run faster.
Worried about memory defects in your PC? You can use Vista�s in-built tool to diagnose issues. Enter the word �memory� into your Start menu search box, and you will be taken to the Memory Diagnostics Tool. A dialog box will open and ask you whether you want to reboot your PC immediately or later. Vista will then run the Memory Diagnostic Tool while starting up.
If you want to resize the icons quickly in Windows Vista Explorer, press and hold the Ctrl key, and scroll up or down with the mouse wheel.
Go to the Control Panel and search for the term �underline�. In your search results, you�ll get a link for Underline keyboard shortcuts and access keys. Click this, and in the next screen, go to the checkbox for Make it easier to use keyboard shortcuts. Select this. Now, whenever you go to any menu, the access keys for each function will be underlined. Pressing Alt with this key would enable the function.
If you�ve sent out an important e-mail and want to ensure that the recipient has received and read it, you can set an option in Outlook to do so. Once you�ve composed the message in Outlook 2007, go to the Options tab and the Tracking group. To know that your message was delivered, click Request a Delivery Receipt. To know that the message was read, click Request a Read Receipt.
From an open email message, you can add the name and email address of the sender to your Contacts. Right-click the name of the sender in the message and click Add to Contacts in the menu that appears.
The Mini toolbar in Word, Excel, PowerPoint and Outlook (2007) helps you to format selected text in these programs�you can work with fonts, alignment, bullets, and other features. The toolbar is semi-transparent when you select text in any of these programs. You can take your pointer to the toolbar and click the option that you want to use.
Do you have to strain your eyes to read your email headers in Outlook 2003? Click on the View menu. Under Arrange by, select Current View, and then Customize Current View. Now click on Other Settings. Select Row Fonts and change the font to the one that you desire. Click OK.
E-mail signature in Outlook
Go to the Tools menu and select Options. Under Options, click on the Mail Format tab. Go to the Signatures tab. Click New and type in a name for the new email signature you are creating. Click on Next. Type in your desired email signature; choose the font style and sizes. Click OK.
Once you�ve scheduled a meeting or event using Outlook 2007, you can change its subject, location or time if needed. This can be done for a standalone event, for a whole series of recurring events, or one event of a series of recurring events.
You may like your Outlook 2007 Calendar to display holidays for the current year. You can do this for not only your own region, but also the region in which key business partners operate.
There are several ways in which you can add an RSS feed to Outlook 2007. If you use Internet Explorer 7, you will see the RSS feed icon next to the Home button on the browser. Clicking the RSS feed icon will display the list of available feeds on the Web page. Click the feed that you want to add.
New webcams from Microsoft
Wednesday, June 25, 2008
Quote of the day
It's not that I'm so smart, it's just that I stay with problems longer.
Albert Einstein
(1879-1955)
New IT Term of the day
New IT Term of the day
platform security
A security model that is used to protect an entire platform and secures the entire span of software or devices on that platform, removing the need to incorporate individual or multiple security measures for different programs on the system. Security at the platform level makes the security process simplified for IT and developers. However, once the security is cracked the entire platform is vulnerable. Trusted Platform Module, designed to secure an entire notebook is a type of platform security.
Smart Phone Viruses – a threat to your network?
John Cox
Network World
June 23, 2008
All evidence points to the fact that smart phone viruses will be a threat to your network even though they aren't at this moment. After all, the latest mobile devices are packed with more and more applications and corporate data, are enabled for real Web browsing and online collaboration, and can access corporate servers. What's more, they live outside your firewall and often make use of three wireless networks (Bluetooth, Wi-Fi and cellular).
"It's definitely something I worry about a lot," says Sam Lamonica, CIO of Rulph & Sletten, a Redwood City, Calif., general contractor. "With the proliferation of smart phones throughout our business, it poses a great risk if and when hackers get good at pumping malware through those devices."
A 2007 survey of 450 IT managers found Lamonica is not alone. Eighty percent had antivirus products installed. Yet about 40% had been hit by a worm or virus in the past 12 months Of those that were hit, 30% said that being unable to reach mobile users who were disconnected from the network contributed to the intrusion or failure that allowed a virus onto their network.
"The phone has advanced exponentially, while users have not caught up and realized that they are walking around with a computer," says Mark Olson, Manager, Beth Israel Deaconess Medical Center in Boston.
That's shown by the success of Apple's iPhone. Its users are among the first to do intensive and extensive mobile Web browsing, enabled by the performance of the phone's Safari browser. But Web browsing also enables a range of malware for smart phones in general.
"If you go to Twitter [on the Web], you have to rely on Twitter security," says Tom Henderson, a Network World Clear Choice tester, and managing director for ExtremeLabs in Indianapolis. "You can get cross-site exploits that can dive down into the phone's browser. Then, it's a problem."
"Anything that is network connected and can be altered is a potential threat," says Rob Enderle, principal analyst for Enderle Group, a technology advisory firm in San Jose. The growing "socialableness" of smart phones, via everything from e-mailing to instant messaging and even texting, all provide opportunities for tricking users into downloading malware, he says.
To date, major malware outbreaks on smart phones, on the scale of PC infections of past years, are almost unheard of. Early mobile phone viruses, such as Cabir, Skulls and Fontal, targeted a specific operating system, usually Symbian, and required users to accept a download and then actually install files. Infections were limited to a few score of devices typically.
But if those few score smart phones are all yours, it's actually worse than some malware romping through millions of PCs. As companies standardize on a specific smart phone platform, they run a growing risk of malware reaching a significant percentage of those devices, Olson says.
"Most of the known viruses and Trojans will propagate through Bluetooth or Multimedia Messaging [MMS]," Olson says. "So all it takes is one person walking into a meeting with an infected device, and the rest of the room now needs a dose of 'penicillin.'"
Now is the time to start thinking systematically about these issues, because there is no simple, formulaic solution to the problem of smart phone security.
"It's really important in planning a mobile deployment of devices outside your firewall, that you establish a mobile security strategy, including application security," says Scott Totzke, vice president of the Global Security Group for Research in Motion. That means creating a comprehensive security scheme that can be monitored and enforced through a collection of software products, enforceable policies, and user awareness and training.
A key element in this strategy is handling the software that users can, or can't, load on these devices, Totzke says. "You create an approved list of applications, and the privileges they have when they're running on the handset," he says.
Unauthorized downloads can be blocked, and so can unauthorized actions by "legal" applications.
One emerging option, already established in Europe, says Stan Schatt, vice president for wireless connectivity at ABI Research, is a managed service for mobile security, such as the one recently unveiled by Sprint. For a monthly fee, the carrier pushes out regular patches and security fixes. Some vendors, such as Fiberlink Communications, offer a managed service for mobile security.
88% businesses failing on PCI data security standard
Long term commitment needed to tackle problem, survey says
By Leo King
24 June 2008
http://www.computerworlduk.com/management/security/data-control/news/index.cfm?newsid=9731
The vast majority of businesses are still failing to comply with the Payment Card Industry’s data security standard, over two years after it became compulsory, according to a report.
Some 88 percent have not complied with the rule, and over half are unable to say when they will be compliant, says a survey by security management software vendor NetIQ.
The PCI DSS standard concerns security management, policies, procedures, network architecture, software design and other protection measures.
Many companies were set to be left even further behind, NetIQ said, because on 30 June version 6.6 of the rule will come into place, concerning new security measures to protect web applications. All merchants accepting payment card transactions will be expected to either use a specialised firewall or have completed a web application software code review for finding and fixing vulnerabilities.
Europe is behind the US in DSI compliance, where a similar NetIQ survey showed nearly twice the proportion of companies were compliant, at 23 percent.
But, according to the European survey of 65 IT managers, firms found that the road to compliance was complex. Nearly half had been working for over six months to become compliant. Some 93 percent felt fines would either not typically be issued, or exceptions would be made.
Adam Evans, senior security specialist at NetIQ, said compliance required “a significant long-term commitment of resources”, but warned that the cost of a security breach and reputational damage “could be far greater”.
Millions Stolen from Citibank ATM using Stolen Data
A unique breach of bank information has hit one of the world's largest banks.
Chuck Miller
June 19 2008
http://www.scmagazineus.com/ATM-hackers-net-millions-using-stolen-information/PrintArticle/111499/
According to a federal grand jury indictment, two hackers, using bank accounts and PINs stolen over the internet, managed to steal millions of dollars from Citibank.
The two charged were a Ukrainian immigrant named Yuriy Ryabinin, and Ivan Biltse. The pair are alleged to be part of a worldwide scam that has made 9,000 fraudulent ATM withdrawals, according to court documents. The money was drained from ATMs in the New York area, authorities said.
“On or about February 1, 2008, Citibank representatives informed the FBI that a Citibank server that processes ATM withdrawals at 7-11 convenience stores had been breached," according to an affidavit filed with a New York federal court by Albert Murray, an FBI special agent.
There were hundreds of ATM withdrawals in New York from October 2007 to March of this year, all using the breached information, authorities said. Some of the illicit withdrawals were videotaped. The criminals used ATM cards encoded with Citibank customer account information to withdraw the money.
Specifically, the indictment charged that the criminals “received over the internet information relating to the bank accounts of multiple Citibank customers, which information had been previously stolen from Citibank.”
A spokeswoman for Citibank did not respond to a request for comment.
WIth correct information, it is very easy to create a counterfeit card, Avivah Litan, Gartner vice president and distinguished analyst, told SCMagazineUS.com on Thursday
"All you have to have is the PIN and enough customer information," she said. "And the criminals have figured out how to get that."
This kind of fraud is becoming an enormous problem for banks, said Litan.
“Criminals have found ways to basically bypass many of the controls that banks have in place," she said. "So ATM and debit card fraud is expected to rise. In our surveys, banks themselves expect the rate of fraud to double over the next two years."
Web browsers face crisis of security confidence
By Dan Goodin in San Francisco
23 June 2008
http://www.theregister.co.uk/2008/06/23/marginal_browser_security_protections/print.html
User beware. Today's web browsers offer more security protections than ever, but according to security experts, they do little to protect people surfing the net from some the web's oldest and most crippling threats.
Like nuclear stockpiles during the Cold War, new safety features amassed in Firefox, Internet Explorer and Opera are part of an arms-race mentality that leaves online criminal gangs plenty of room to launch attacks. What's more, the new protections often take years to be implemented and months to circumvent. Meanwhile, shortcomings that have bedeviled all browsers since the advent of the World Wide Web go unaddressed.
Earlier this week, Mozilla patted itself on the back for adding a security feature to Version 3 of Firefox that's of only marginal benefit its users. It prevents users from accessing a list of websites known by Google, and possibly others, to be spreading malware. Opera Software, in a move its CEO proclaimed "is reinventing Web-based threat detection," added a similar feature to version 9.5 of its browser released two weeks ago, and Microsoft engineers are building malware blocking into IE 8.
Here's the rub: According to our tests over the past week, the Firefox anti-malware feature frequently failed to block sites compromised by one of the most prevalent SQL injection exploits menacing the web. Outcomes varied from minute to minute, but clicking on results returned from searches led us to dozens of compromised websites even with Firefox's gee-whiz malware protection feature turned on.
Firefox 3 does block nihao11.com and the half-dozen or so other domain names that are referenced in the injection attack, so there is some benefit to the feature. But its inability to flag a huge number of websites that have been compromised shows the limits to such an approach. Similarly, researchers from Websense report that they "found multiple phishing pages that still made it through" anti-phishing mechanisms that have existed for more than a year in Firefox. Because they're based on static blacklists based on behavior reported weeks or months earlier, these features often fail to detect quick-moving threats.
"These little anti-phishing things and anti-malware things, I'm not buying them," says Jeremiah Grossman, CTO of web application security firm WhiteHat Security. "Are we less likely to get hacked as a result of these features? No. If I was really the evil guy, I'll send you to a hacked up blog page with Firefox 3 and you won't have a good day."
Meanwhile, within hours of Firefox 3 being released, researchers reported a security bug that could allow miscreants to execute hostile code on machines running the new browser.
Like IE, Opera and every other browser on the planet, Firefox also remains vulnerable to a variety of attacks that are as old as the World Wide Web. They allow miscreants to inflict all kinds of damage, including stealing a user's browsing history, spoofing trusted websites through cross-site scripting attacks (XSS), stealing user authentication credentials to banking sites and providing easy access to corporate intranets and end-user machines.
Of course, browser makers are by no means alone in shouldering responsibility for these weaknesses. Sharing equal amounts of blame are the eBays, MySpaces and Facebooks of the world for failing to resist the allure of untested features based on Adobe Flash and JavaScript, even when they deliver only minimal convenience over more traditional methods of delivering content. Also culpable are netizens everywhere, who collectively reward all these websites for adding bells and whistles that put our safety in jeopardy.
"I wouldn't tell you not to use the internet, but I would certainly never tell you you're safe, which is a pretty horrible thing to say to someone," says Robert Hansen, CEO of secTheory, a security firm that specializes in security of web applications. "I really don't think people are in a good position from a technology perspective to defend themselves with what they're given by default in a browser."
Crisis of confidence
The situation is so dire in the minds of many security experts that they no longer trust any browser to keep them safe without taking extraordinary security measures. Grossman, for example, uses Firefox with the NoScript, Flashblock, SafeHistory, Adblock Plus and CustomizeGoogle add-ons for most of his web surfing, all to improve on the less-than-ideal state of today's web. When visiting financial sites, he switches to an obscure browser that he refuses to name. By treading off the beaten path, he says, he's less likely to get hit by an exotic zero-day exploit, which can sell on the underground market for tens of thousands of dollars if it targets a popular browser.
The obscure browser "is technically not more or less secure, it's just less targeted, which is the only thing I care about," Grossman says. As extreme as it may sound to some, Grossman says his browsing regimen is less hardcore than other people he knows in the security industry. Indeed, some of the more paranoid have entire physical machines reserved solely for sensitive transactions, employ boot-only browsers via CD-ROMs, or use virtual machines with limited features for the same purpose.
"I have very low confidence in any of the browsers' ability to keep me safe," says Don Jackson, a researcher with security provider SecureWorks. "What I have confidence in is the bad guys." One of the chief problems Jackson identifies with browser design these days: "Functionality is implemented first and security is tacked on."
Monday, June 23, 2008
Quote of the day
The most effectual engines for [pacifying a nation] are the public papers... [A despotic] government always [keeps] a kind of standing army of newswriters who, without any regard to truth or to what should be like truth, [invent] and put into the papers whatever might serve the ministers. This suffices with the mass of the people who have no means of distinguishing the false from the true paragraphs of a newspaper.
Thomas Jefferson
New IT Term of the day
New IT Term of the day
PKI
Short for public key infrastructure, a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. PKIs are currently evolving and there is no single PKI nor even a single agreed-upon standard for setting up a PKI. However, nearly everyone agrees that reliable PKIs are necessary before electronic commerce can become widespread.
A PKI is also called a trust hierarchy.
China arrests hacker spreading quake rumor
2008-06-15
http://news.xinhuanet.com/english/2008-06/15/content_8373570.htm
NANNING, June 15 (Xinhua) -- Police in Guangxi Zhuang Autonomous Region in south China have detained a man who allegedly spread earthquake rumors by hacking a government website after the May 12 disaster in Sichuan Province.
The suspect, surnamed Chen, who is from Taicang City in the eastern province of Jiangsu, admitted he had hacked into the official website of the Guangxi earthquake administration and posted quake rumors on its news page, said Tang Bin, vice director of the Public Security Bureau of Nanning, the regional capital.
Chen, 19, worked in a technology company after graduating from junior middle school. He said he hacked the site to show off his computer skills and have "fun," according to the police.
The administration website was found to have been hacked on May31. A notice mourning the victims of the 8.0-magnitude quake had been revised to read: "Please prepare for an earthquake with a magnitude of more than 9.0 in Guangxi," Tang said
The news scroll, meanwhile, had been replaced with a single phrase: "Experts warn of earthquake in Guangxi in the near future," he said.
The hacker also re-entered the website on June 1 and 2, wiping out all the data, police said.
A team was set up immediately to prevent the rumor from sapping public confidence amid quake-relief efforts. Public security bureaus from six provinces and regions co-operated to break the case on June 4, Tang said.
The regional earthquake administration updated its software to avoid further attacks, said Li Weiqi, the administration vice director.
Teen Hacker Hacked Grades - Could Get 38-Years in Jail
By Katherine Noyes
E-Commerce Times
June 19 2008
http://www.technewsworld.com/story/security/63483.html
They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
Two Orange County, Calif., teens have been charged with breaking into their school late at night and using stolen log-ins to hack into its computer system and change their grades.
Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
He faces a maximum sentence of 38 years and four months in prison if convicted.
Tanvir Singh, 18, a student at the same school, is charged with one felony count each of conspiracy, burglary, computer access and fraud, and attempted altering of a public record. He faces a maximum sentence of three years in prison if convicted.
Multiple Accusations
Kahn is accused of unlawfully breaking and entering into locked rooms at Tesoro High School, where he was a senior, on several occasions late at night and on weekends between January and May of this year to access school computers to change his grades.
He allegedly stole personal log-ins from teachers in order to gain access and alter his test scores from Advanced Placement (AP) classes and school records from previous semesters, often changing grades of "C," "D," or "F" to "A," according to the Orange County District Attorney's Office.
He also allegedly altered the permanent transcript grades of 12 other students, according to the charges.
Spyware Installation
Khan was also accused of cheating on an English test in April, resulting in a failing grade and confiscation of the test. The following weekend, Khan allegedly broke into the school and stole the test back in an attempt to conceal the evidence that he had cheated.
Khan is accused of installing spyware Free Trial. Security Software As A Service From Webroot. on the school computer as well to allow him to access the system from other locations.
On April 21, 2008, Khan allegedly changed his transcripts to increase his grade point average. The next day, he allegedly requested a copy of his official transcripts in order to appeal a denial of admission to the University of California for the fall semester.
Cover-Up Attempt
Late that night, Khan is accused of breaking into the school again, changing additional grades, and backdating the date and time stamp on the grade changes to cover up his crimes.
School administrators alerted law enforcement after noticing a discrepancy in Khan's grades when he requested a copy of his official transcripts. An investigation revealed that Khan was in possession of original tests, test questions and answers, and copies of his altered grades. Khan allegedly stole master copies of tests, some of which were e-mailed to dozens of AP students.
Meanwhile, Singh, who was also a Tesoro High School senior, is accused of exchanging several text messages with Khan in May detailing how the two planned to break into the school that evening to steal a test in preparation for an exam the following day.
Singh and Khan are accused of meeting at the school, breaking into a classroom and fleeing the scene before accessing the test after a night custodian discovered them, according to the District Attorney's office New HP LaserJet P4014n Printer Starting at $699 after $100 instant savings..
Potential Damage
"As computers form the backbone of commerce and hold countless billions of secret, private and confidential bits of information, it is not surprising that the penalties are becoming higher and reflect the potential damage to society," Washington technology attorney Raymond Van Dyke told the E-Commerce Times.
"Here, there were multiple physical and electronic break-ins of a sophisticated nature, involving dozens of distinct felonies, each of which has a severe penalty -- perhaps some with mandatory sentencing guidelines," Van Dyke added. "Hopefully, the age and immaturity of the parties will mitigate a harsh sentence."
Indeed, hacking into school computers isn't new, but it is a serious crime, Parry Aftab, cybercrime lawyer and executive director of WiredSafety.org, told the E-Commerce Times.
'A Grown-Up Crime'
"Ever since 'War Games' and 'Ferris Bueller's Day Off,' we've seen young people using school computers to improve their grades," Aftab said.
Since those early days, however, the criminal aspects of such activity have become more clear, she added.
"If someone's going to do this -- and especially if they're 18 -- they need to recognize that this is a grown-up crime," she said.
Rather than a prison sentence, however -- which may or may not be plea-bargained, Aftab noted -- there could be other punishments that better fit the crime and take the defendants' technical skills into account, she said.
At WiredSafety.org, for instance, "whenever kids do these kinds of things, we put them to work trying to hack parental control programs" with the permission of the companies involved, she said.
"This is a sad event, but it has to be a serious event," Aftab concluded. "If these kids have gotten into this computer -- these are government databases -- they could have destroyed it all. The potential harm is serious, so we need to teach kids that this is a serious crime."
One In Three IT Staff Snoops On Colleagues
One in three IT professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal e-mails, or board-meeting minutes, according to a survey.
by Georgina Prodhan
By Reuters
June 19, 2008
http://www.informationweek.com/story/showArticle.jhtml?articleID=208700605
FRANKFURT, June 19 - One in three information technology professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal e-mails, or board-meeting minutes, according to a survey.
U.S. information security company Cyber-Ark surveyed 300 senior IT professionals, and found that one-third admitted to secretly snooping, while 47 percent said they had accessed information that was not relevant to their role.
"All you need is access to the right passwords or privileged accounts and you're privy to everything that's going on within your company," Mark Fullbrook, Cyber-Ark's U.K. director, said in a statement released along with the survey results on Thursday.
"For most people, administrative passwords are a seemingly innocuous tool used by the IT department to update or amend systems. To those 'in the know' they are the keys to the kingdom," he added.
Cyber-Ark said privileged passwords get changed far less frequently than user passwords, with 30 percent being changed every quarter and 9 percent never changed at all, meaning that IT staff who have left an organisation could still gain access.
It added that seven out of 10 companies rely on outdated and insecure methods to exchange sensitive data, with 35 percent choosing e-mail and 35 percent using couriers, while 4 percent still relied on the postal system.
Organised e-crime targets students for recruitment
20 Jun 2008
ZDNet UK
http://news.zdnet.co.uk/security/0,1000000189,39437068,00.htm
Criminals moving from more traditional to online crime are recruiting from universities and security conferences, according to police and security sources
As organised criminals move from more traditional crimes, such as armed robbery, towards e-crime, there is evidence that they are targeting university students, graduates and the tech savvy for recruitment, according to security experts and the Serious Organised Crime Agency.
"We are aware of anecdotal evidence of organised criminals [who are] moving into e-crime targeting people at an academic level," a Serious Organised Crime Agency (Soca) spokesperson told ZDNet.co.uk on Friday.
According to Paul Simmonds, chief information security officer for AstraZeneca, one of the root causes of computer security issues is funding. According to Simmonds, computer criminals are in a far more lucrative trade than security professionals, and are in a position to fund people's computer science courses at university in return for hacking expertise after the course has finished.
"The root cause of the issue is that the bad guys are better funded than we are," said Simmonds. "They have research and development programmes, they are putting people through university, they are calculating return on investment and they have better quality assurance. By comparison, the legitimate security industry is under-funded, under-resourced and constantly on the back foot."
Security vendor Trend Micro told ZDNet.co.uk that it has also seen hacker recruitment in universities, including in China.
"We do see recruitment in universities — so-called 'companies' recruiting talent for hacking," said Eva Chen, chief executive officer of Trend Micro. "They call themselves 'consultancy companies'. We've seen them recruiting in China."
Trend Micro's chief technology officer, Raimund Genes, told ZDNet.co.uk that security conferences also provide recruitment opportunities for organised criminals.
"Yes, they put them through university, and they are clearly recruiting at [security conferences]," said Genes. "Competitions like 'capture the flag' showcase talent. As a forum, there are security specialists, geeks who are not sure whether they want to go to the dark side, and guys [recruiting] who are definitely on the dark side."
Soca said that, while it was "not willing to go into specific detail about which techniques" criminals are using, it was also aware of hacker recruitment at security conferences.
"If [organised criminals] need to employ specialist skills, they will go to sources that cover specialist skills," said the Soca spokesperson.
Sunday, June 22, 2008
Trick To Increase Browsing Speed for IE and Firefox
You really don’t need to tweak your browser in case you are using Firefox because it is a browser which has been specially designed for optimized and fast browsing but if you can make it even a little more fast that would certainly be a treat for you. Likewise there is a trick to make Internet Explorer 6 fast too. Browsers are designed to work with fast connections but with this trick even dial-up users can experience fast and smooth browsing.
Optimize Firefox and IE Browsing Speed
I shall be teaching you two tricks which work separately on Firefox and Internet Explorer. It doesn’t require you to be some expert rather all you have to do is change some registry values and you are done. I have also included a video tutorial for those who want to see it step by step visually. This is perhaps one of the oldest tricks to optimize Firefox and IE but it still works great.
Trick to Increase Firefox Speed
1. Open firefox and in the address bar write about:config and press enter
2. Double click network.http. pipelining and set it to True
3. Double click network.http. pipelining. maxrequests and set value to 10 from 4
4. Right click and create a new string nglayout.initialpai nt.delay and set its value to 0
You are done. Enjoy lightning fast Firefox browsing and now for IE.
Trick to Increase Internet Explorer Speed
1. Go to Start –> Run and type regedit
2. Select HKEY_CURRENT_ USER –> Software –> Microsoft –> Windows –> Current Version –> Internet Settings
3. Increase the values (DECIMAL) from default to a higher value e.g. 10
See the difference in speed of IE
Understanding IP addresses in computers
Understanding IP addresses in computers
Cyber crime helplines
A victim of Cyber Crime? Here's help
This Day in History
Thanks for your Visit