. Energy News .




CYBER WARS
Online sharing helps hackers sharpen 'spears'
by Staff Writers
San Francisco, California (AFP) July 29, 2013


Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.

Spear phishing refers to individualizing deceptive messages sent to people in order to trick them into clicking on links or opening files booby-trapped with viruses.

Public posts on Twitter, Facebook, Instagram, Foursquare and other online venues give hackers fodder to mimic the way people write and the words they use, said Ulisses Albuquerque of the security firm Trustwave.

"I don't think people have any idea what kind of insight that gives to a potential hacker," Albuquerque told AFP.

He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."

The Trustware security consultants created a software tool that "fingerprints" the way people communicate by analyzing online posts.

The tool scrutinizes posts at social networks such as Twitter, Facebook and LinkedIn to ascertain writing styles, right down to hashtags added to indicate subjects of online posts.

A hacker unable to break into a company's computer network could write a convincing email pretending to be from a friend of an employee and include an attachment or link that, once clicked, unleashes malicious code.

"Say a CEO has a Twitter or LinkedIn account and I am able to see those posts," Albuquerque said.

"Then I could produce content that looks like it came from him and send it to his staff, who will be less suspicious of clicking a link."

He said the Trustwave-developed tool was not designed to extrapolate insights into people's conduct or personalities, but that such observations could be made if desired.

"Absolutely, you can show what the people posting are like," Albuquerque said.

The tool provides "spear phishers" with outlines for creating messages likely to hook prey.

It is intended for "ethical hackers" such as security professionals working with companies or organizations to find and patch weak spots in computer network defenses, according to Albuquerque.

It can also be used to help prove when posts claiming to be written by someone are bogus, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





CYBER WARS
Judge weighs Manning verdict after final statements
Fort Meade, United States / Maryland (AFP) July 26, 2013
The military judge overseeing the trial of US soldier Bradley Manning over his massive transfer of secret files to WikiLeaks began considering her verdict after closing arguments Friday. After hearing the final statements at Fort Meade outside Washington, Colonel Denise Lind closed the court. She is expected to give her verdict in the coming days. At Manning's request, the judge - and ... read more


CYBER WARS
NASA's Van Allen Probes Discover Particle Accelerator in the Heart of Earth's Radiation Belts

Seeing Photosynthesis from Space: NASA Scientists Use Satellites to Measure Plant Health

First high-resolution national carbon map - Panama

NASA Releases Images of Earth Taken by Distant Spacecraft

CYBER WARS
Lockheed Martin GPS III Satellite Prototype To Help Cape Canaveral Air Force Station Prep For Launch

Lockheed Martin Delivers Antenna Assemblies For Integration On First GPS III Satellite

GPS III satellite antenna assemblies ready for installation

Lockheed Martin GPS III Prototype Validates Test Facilities For Future Flight Satellites

CYBER WARS
China passes laws to protect country's rare and ancient trees

Mini-monsters of the forest floor

Computer can infer rules of the forest

Boreal Forests in Alaska Becoming More Flammable

CYBER WARS
Microbial Who-Done-It For Biofuels

Microorganisms found in salt flats could offer new path to green hydrogen fuel

CSU researchers explore creating biofuels through photosynthesis

Drought response identified in potential biofuel plant

CYBER WARS
The best of two worlds: Solar hydrogen production breakthrough

KYOCERA and Century Tokyo To Operate Utility-Scale Solar Power Plants

EU, China settle solar panel dispute

UCLA researchers double efficiency of novel solar cell

CYBER WARS
SOWITEC Mexico - strengthening its permitted project pipeline

Sky Harvest To Acquire Vertical Axis Wind Turbine Technology And Manufacturing Facilities

Wind Energy: Components Certification Helps Reduce Costs

Wind power does not strongly affect greater prairie chickens

CYBER WARS
Greenpeace says Chinese coal company exploiting water

Major China coal plant drains lake, wells: Greenpeace

Troubled U.K. Coal enters administration in restructuring move

Report: Alpha Australian coal project is 'stranded'

CYBER WARS
China's Bo Xilai accused of $4m graft: media

China airport bomber formally arrested: lawyer

Work on world's tallest building stopped in China: media

China charges Bo Xilai with corruption, abuse of power




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement