. Medical and Hospital News .




CYBER WARS
Online sharing helps hackers sharpen 'spears'
by Staff Writers
San Francisco, California (AFP) July 29, 2013


Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.

Spear phishing refers to individualizing deceptive messages sent to people in order to trick them into clicking on links or opening files booby-trapped with viruses.

Public posts on Twitter, Facebook, Instagram, Foursquare and other online venues give hackers fodder to mimic the way people write and the words they use, said Ulisses Albuquerque of the security firm Trustwave.

"I don't think people have any idea what kind of insight that gives to a potential hacker," Albuquerque told AFP.

He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."

The Trustware security consultants created a software tool that "fingerprints" the way people communicate by analyzing online posts.

The tool scrutinizes posts at social networks such as Twitter, Facebook and LinkedIn to ascertain writing styles, right down to hashtags added to indicate subjects of online posts.

A hacker unable to break into a company's computer network could write a convincing email pretending to be from a friend of an employee and include an attachment or link that, once clicked, unleashes malicious code.

"Say a CEO has a Twitter or LinkedIn account and I am able to see those posts," Albuquerque said.

"Then I could produce content that looks like it came from him and send it to his staff, who will be less suspicious of clicking a link."

He said the Trustwave-developed tool was not designed to extrapolate insights into people's conduct or personalities, but that such observations could be made if desired.

"Absolutely, you can show what the people posting are like," Albuquerque said.

The tool provides "spear phishers" with outlines for creating messages likely to hook prey.

It is intended for "ethical hackers" such as security professionals working with companies or organizations to find and patch weak spots in computer network defenses, according to Albuquerque.

It can also be used to help prove when posts claiming to be written by someone are bogus, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





CYBER WARS
Judge weighs Manning verdict after final statements
Fort Meade, United States / Maryland (AFP) July 26, 2013
The military judge overseeing the trial of US soldier Bradley Manning over his massive transfer of secret files to WikiLeaks began considering her verdict after closing arguments Friday. After hearing the final statements at Fort Meade outside Washington, Colonel Denise Lind closed the court. She is expected to give her verdict in the coming days. At Manning's request, the judge - and ... read more


CYBER WARS
Sandy's offspring: baby boom nine months after storm

Malaysia says will get tough on illegal immigrants

More steam in Fukushima reactor building: TEPCO

Fukushima steam still baffling: TEPCO

CYBER WARS
Lockheed Martin GPS III Satellite Prototype To Help Cape Canaveral Air Force Station Prep For Launch

Lockheed Martin Delivers Antenna Assemblies For Integration On First GPS III Satellite

GPS III satellite antenna assemblies ready for installation

Lockheed Martin GPS III Prototype Validates Test Facilities For Future Flight Satellites

CYBER WARS
First human tests of new biosensor that warns when athletes are about to 'hit the wall'

Hot flashes? Thank evolution

World's first IVF baby born after preimplantation genome sequencing is now 11 months old

Extinct Ancient Ape Did Not Walk Like a Human

CYBER WARS
US zoo to breed rhino siblings

Cracking how life arose on earth may help clarify where else it might exist

Researchers unravel secrets of mussels' clinginess

Of bears and berries: Return of wolves aids grizzly bears in Yellowstone

CYBER WARS
Burundi's longest cholera epidemic kills at least 17

New viruses said unlike any form of life known to date

China H7N9 survivor gives birth: report

Huge viruses may open 'Pandora's' box: French study

CYBER WARS
China's Bo Xilai accused of $4m graft: media

China airport bomber formally arrested: lawyer

Work on world's tallest building stopped in China: media

China charges Bo Xilai with corruption, abuse of power

CYBER WARS
Global gangs rake in $870 bn a year: UN official

Mexican generals freed after cartel charges dropped

Mexicans turn to social media to report on drug war

Sydney customs officers ran drugs ring, report says

CYBER WARS
China's central bank injects $2.8 bn to add liquidity

China to maintain steady growth in second half: govt

Emerging Europe set for next growth curve: analysts

Walker's World: Brexit or Grexit




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement