Saturday, January 21, 2006

Hotspot, blog antara sasaran baru penceroboh

BEBERAPA kelemahan dikenal pasti sebagai sasaran utama penceroboh sistem rangkaian komputer untuk masuk ke dalam sistem rangkaian dan seterusnya menguasai komputer berkenaan, iaitu menerusi sistem rangkaian tanpa wayar setempat, capaian internet menggunakan hotspot, kafe siber dan server (web, mel elektronik dan sistem nama domain).

Peningkatan bilangan hotspot di seluruh dunia turut mengundang penceroboh sistem rangkaian komputer untuk memanfaatkannya kerana banyak kelemahan yang ada boleh di eksploitasikan.

Antaranya sistem konfigurasi yang tidak selamat dan pelaksanaan aspek keselamatan seperti WPA yang masih menjadi pilihan kepada pengguna. more....

SecurityFocus - Google vs. government

In a move to bolster its case against pornography, the Bush administration requested an order from a federal judge yesterday which would force Google to reveal information about surfing habits. The court papers detail Google's refusal to reveal...

http://www.securityfocus.com/brief/111?ref=rss

BBC - PC viruses hit 20 year milestone

The 20th anniversary of the first PC virus falls this month. It was during the opening weeks of 1986 that the first PC virus, called Brain, was discovered in the wild. Though it achieved fame because it was the first of its type, the virus was not...

http://news.bbc.co.uk/1/hi/technology/4630910.stm

Sunstar - Military mulls hacking website of escaped mutiny leader

Chief Hermogenes Esperon Jr. Wednesday said he is looking at some ideas on defacing the personal website of escaped Oakwood mutineer Captain Nicanor Faeldon to cut off his communication to the public and prevent him from recruiting anyone to his...

http://www.sunstar.com.ph/static/man/2006/01/19/news/military.mulls.hacking.website.of.escaped.mutiny.leader.html

Rising security threats

THREATS to enterprise information systems will continue to be more allusive next year, using more sophisticated and covert techniques. These techniques include blended social engineering and technical subterfuge attacks, automated systems based on Trojaning schemes, session hijacking systems, Trojan-type phishing systems and spyware, according to the National ICT Security and Emergency Response Centre (Niser).

Also on the rise will be wireless-based threats, where the privacy of information transmitted will be intercepted illegally at hotspot centres and other related installations of wireless communications, said Niser’s director Lt Col Husin Jazri.

Poorly secured Web servers will become easy targets for intrusion activities while worm and Trojan attacks will mainly be a technique integrated into phishing attacks and spamming, he said, adding that another major concern for next year is the unrelenting growth of spam.

“Spam continues to grow by an average of 30 per cent per month and comes in many forms, carrying threats such as adware and spyware with it, and shares techniques borrowed from other malware and phishing e-mail.”

Mobile security, according to Husin, is another area enterprises need to look into.

“As more organisations are equipping employees with Palm-based personal digital assistants and Windows CE devices, including smartphones, the possibility of virus infections is there. Even though reported infections have been low to date, the increased functionality of the phones will change the situation,” he said.

Attackers are increasingly able to monitor, capture and hijack sessions taking place over wireless networks, and these illegitimate activities are made easier by poor configuration of these devices, lack of encryption and inadequate authentication requirements.

Over the past couple of years, the number of local wireless local area networks (WLANs) in enterprises and other locations has increased noticeably. It is now common to find WLAN connections in such places as coffee shops, airports and hotels.

“While such initiatives provide an alternative method for users to connect to the Internet, they often neglect important security implications of wireless deployment. The growing number of people using wireless connectivity has brought a corresponding increase in the number of concerns posed by insecure wireless access points,” Husin said.

Nonetheless, he believes that many local organisations will have proper security measures in place to safeguard against the above-mentioned threats next year.

“Companies, organisations and corporations are no longer taking ICT security for granted as in previous years, and they are aware of the risks associated to security threats.

“However, local corporations must take note that more sophisticated techniques will be used in cyber attacks in the coming years in addition to traditional attacks. Thus, they need to be prepared in defending against new types of attack techniques,” he said.

Meanwhile, security solutions provider Trend Micro has estimated that by end of next year almost 80 per cent of all e-mails will either be unwanted advertising or virus-ridden.

“This glut of e-mail requires enterprise clients to deploy better filtering services and comprehensive anti-virus and anti -spyware software solutions. Spam volume is driving down staff productivity, limiting the availability of bandwidth, and putting undue pressure on e-mail infrastructure and resources,” said its country manager Wong Joon Hoong.

For Symantec Malaysia, current as well as future threats will be motivated by profit rather than just a desire to show off technical virtuosity. Based on the Symantec Internet Security Threat Report Volume 8, the number of phishing attempts increased by 90 per cent from June to December 2004 to January to June 2005.

“Phishing e-mails are evolving to evade anti-spam and anti-phishing filters. This is driving new innovation in methods of evasion, particularly in the use of randomised changes in phishing messages,” said its general manager C.M. Woon.

In terms of investment trends, he said enterprises will continue to invest heavily in hardware and software security solutions to protect their IT infrastructure.

“Companies need to focus on building a resilient IT infrastructure. This infrastructure must take into account access to information (availability) and risk (how secure the information is, and how safe it is from attacks or mishaps).”

To balance access and risk, Woon said chief information officers and IT managers have to take a holistic approach and manage information security and information availability together to ensure the integrity of business information.

Among the areas of priority for enterprises to look at next year are secure content management,

path management and policy enforcement, end point security and administration control, and iden-

tity and access management.