05.02.2013 Views

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Analysis of 32 million breached passwords<br />

Imperva released a study analyzing 32 million<br />

passwords exposed in the Rockyou.com breach.<br />

The data provides a glimpse into the way that users<br />

select passwords and an opportunity to evaluate the<br />

true strength of these as a security mechanism. In<br />

the past, password studies have focused mostly on<br />

surveys. Never before has t<strong>here</strong> been such a high<br />

volume of real-world passwords to examine.<br />

(www.net-security.org/secworld.php?id=8742)<br />

Hiding from Google<br />

Using spam to beat spam<br />

Worried about Google tracking your online activity? Not satisfied with Tor's<br />

speed? A (partial) solution to your problem has been set up by Moxie Marlinspike,<br />

a hacker that has a history of bringing to light SSL protocol weaknesses<br />

and a member of the Institute for Disruptive Studies, a group of hackers<br />

based in Pittsburgh. He put together an proxy service he calls GoogleSharing,<br />

that aims to anonymize all your searches and movements inside and from<br />

Google online services that don't require you to login into your Google account.<br />

(www.net-security.org/secworld.php?id=8738)<br />

How to make a spam filter that will not block any legitimate email? A team at<br />

the International Computer Science Institute and the University of California<br />

researched the ways that spam tricks existing filters and realized that spam<br />

sent by botnets is usually generated from a template that defines what the content<br />

of the email and the changes it goes through to fool filters. They worked<br />

under the conviction that this template might be discovered by analyzing the<br />

multitude of emails sent by a bot. (www.net-security.org/secworld.php?id=8765)<br />

Data breach costs increase<br />

The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations<br />

after experiencing a data breach. Results represent cost estimates for<br />

activities resulting from actual data loss incidents. Breaches included in the survey<br />

ranged from approximately 5,000 records to more than 101,000 records from 15 different<br />

industry sectors. (www.net-security.org/secworld.php?id=8766)<br />

US oil industry targeted by cyber attacks<br />

ExxonMobil, Marathon Oil and ConocoPhillips are just three of the US companies<br />

that have been breached in the last few years by cybercriminals that left some<br />

clues pointing in the direction of the Middle Kingdom.<br />

(www.net-security.org/secworld.php?id=8774)<br />

www.insecuremag.com ! ! 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!