Subscribe free to our newsletters via your
. Farming News .




CYBER WARS
Cyber failures spark search for new security approach
by Staff Writers
Washington (AFP) May 24, 2014


With cybersecurity's most glaring failures in the limelight, many experts say it's time for a new approach.

In recent weeks, the security community has been rocked by news of a massive breach at online giant eBay affecting as many as 145 million customers, following another that hit as many as 110 million at retailer Target.

A US indictment earlier this month accused members of a shadowy Chinese military unit for allegedly hacking US companies for trade secrets, a charge denied by Beijing.

The incidents highlight huge gaps in cybersecurity, or the ease in which malicious actors can break into a single computer and subsequently penetrate a network or cloud.

"The old model (for cybersecurity) doesn't work," said James Lewis of the Center for Strategic and International Studies.

"It is getting worse and getting out of control... One of the dilemmas is that when people have a choice between security and utility, they often choose utility."

A survey released Wednesday by the security firm Trustwave said it identified 691 breaches across 24 countries last year, with the number of incidents up 53.6 percent over 2012.

"As long as criminals can make money by stealing data and selling that sensitive information on the black market, we don't expect data compromises to subside," the report said.

Much of the problem stems from so-called "phishing" attacks in which emails are disguised as coming from a trusted person.

When links are opened, hackers can install malicious software allowing them to control a computer, and potentially an entire network.

A report by security firm Symantec found a 91 percent increase in targeted "spearphishing" attacks in 2013 and said more than 552 million identities were exposed via breaches.

IBM recently unveiled a new cyber defense system aimed at thwarting attacks before they happen, with predictive analytics.

Symantec suggests a similar approach touting its platform "that aggregates and correlates unfiltered alerts from a diverse set of technologies, harnessing global threat intelligence to detect traffic patterns associated with malicious activity," according to a blog post by Symantec's James Hanlon.

- Hardware security approach -

But others in the cybersecurity community dispute that approach.

The idea of predicting and halting attacks "is utter nonsense," said Simon Crosby co-founder of the security firm Bromium, which uses a hardware-based solution that isolates computers to prevent the spread of an infection.

Crosby told AFP he views as unlikely "the ability to pick through the noise to find a bad guy before he does bad thing."

He said Bromium offers a better solution "by making the system defend itself by design."

Johannes Ullrich, a researcher with the SANS Institute, said hardware isolation "is a solid approach," but just one of many new options being explored.

Ullrich said that in hunting for malware, "you cannot come up with a list of everything that is bad, but what you can do is enumerate what is supposed to be there."

This "white list" approach has a higher chance of success, Ullrich said.

- 'Hunting ghosts' -

The old notion of using anti-virus software, which updates itself based on new malware "signatures," is rapidly losing credence.

A 2012 study by the security firm Imperva said most software only detected around five percent of malware. Another firm, FireEye, concluded last year that 82 percent of malware disappears after one hour and 70 percent exists just once.

"With the half-life of malware being so short, we can draw the conclusion that the function signature-based AV (anti-virus) serves has become more akin to ghost hunting than threat detection and prevention," said a blog post by FireEye's Zheng Bu and Rob Rachwald.

Ullrich said that over time, companies need to invest more in information security and develop strategies before the problems subside.

"Security will never prevent every single breach," he said. "You want to keep it at a manageable level, to stay in business. That's what security is all about."

rl/oh

FIREEYE

SYMANTEC

IBM

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Information-sharing set for Cyber Squared clients in Europe
Arlington, Va. (UPI) May 22, 2013
U.S. Security technology company Cyber Squared Inc. is establishng a users community of European organizations using its ThreatConnect intelligence platform. The ThreatConnect European Community is to facilitate a public-private industry partnership for working with other members to aggregate knowledge of common cyber threats for a proactive defense against them, the company said. ... read more


CYBER WARS
Airbus partners with BAE for radar satellite imagery

MMS Narrated Orbit Viz: Unlocking The Secrets of Magnetic Reconnection

New Japan satellite to survey disasters, rain forests

Earth Science Applications Travelogue: Maury Estes

CYBER WARS
Russian space agency set to resume Glonass talks with US

Sixth Boeing GPS IIF Spacecraft Reaches Orbit, Sends First Signals

British MoD works on 'quantum compass' technology to replace GPS

Iran to Host Russian Satellite Navigation Facility

CYBER WARS
International standards reducing insect stowaways in wood packaging material

Canadian forestry firm sues over environmental audit

Emissions From Forests Influence Very First Stage of Cloud Formation

Emerald ash borers were in US long before first detection

CYBER WARS
New, fossil-fuel-free process makes biodiesel sustainable

NASA's Alternative Fuel Effects Research Showcased

Growing Camelina and Safflower in the Pacific Northwest

Boeing, Embraer team for biofuel use

CYBER WARS
Chemists challenge conventional understanding of how photocatalysis works

Planting the 'SEEDS' of solar technology in the home

Main Street Breaks Ground on 5MW Solar Project in Virgin Islands

Solar energy prospects are bright for Scotland

CYBER WARS
German energy company RWE Innogy starts turbine installation at mega wind project

Irish 'green paper' outlines transition to a low-carbon economy

U.S. moves closer to first-ever offshore wind farm

Offshore wind supported with U.S. federal funding

CYBER WARS
China consumes almost as much coal as the rest of world combined

China coal mine death toll rises to 20: report

Rescuers race to save 22 trapped coal miners in China: Xinhua

U.K. Coal may close two deep mines

CYBER WARS
Practice tai chi? Then you can handle China censors: Jia Zhangke

China detains rights lawyer ahead of Tiananmen anniversary

'Thin Ice' director sees China's art-house scene breaking through

China youth suicides blamed on education system: study




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.