25.12.15

ESET predictions and trends for cybercrime in 2016f




It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months. These lists usually range from the mundane to the bizarre, to the lighthearted and the dire (perhaps depending on the predictors’ consumption of eggnog and/or dystopian sci-fi media). Many have about as much accuracy as one might expect of people who are experts but not psychics. Still, you never know.
As regular readers of We Live Security will know, every December the ESET researchers put together their own predictions and trends for the coming year. In 2014, the emphasis was on APTs (advanced persistent threats) and attacks targeting the corporate world. This year, we’ll be offering a deeper analysis on a variety of topics such as IoT, ransomware, crimeware, haxposure, Windows 10, and critical infrastructure among others.
The full article will be released soon and you’ll be able to download the full version directly from our white paper section. What now follows is a brief, occasionally tongue-in-cheek view from a number of ESET researchers on what they expect 2016 will bring.
·         More convergence between tech support scams and real malware, especially ransomware.
·         Increased targeting of platforms other than Windows for pop-up fake alerts and for ransomware.
·         In the UK at least, NHS sites will continue to be slammed by security bloggers for squandering their pitiful resources on direct healthcare instead of upgrading computer systems.
·         More toys will follow the Pink Fink (aka Hello Barbie) into the Internet of Things (IoT), despite concerns about privacy and the continued attention of researchers probing for scareworthy vulnerabilities.
·         Understandable panic about terrorist attacks and other manifestations of physical violence will be translated into calls for the weakening of encryption and the abolishing of privacy.
·         We will see an increase in the usage of virtualization technology by home and SOHO (small office/home office) users, followed by an increase in attacks on them.
·         Adobe Flash, PDF and Oracle Java will remain targets of opportunity. (Keep ‘em patched, folks!)
·         Web frameworks (Drupal, Joomla, Typo3, WordPress, etc.) will also be targeted, and exploits for them will increase in value.
·         Web performance, optimization, analytics, personalization and other related service networks (think Newrelic, Optimizely, Parsely, etc) will be increasingly targeted via both sophisticated attacks (i.e. code injection of specific customers) and unsophisticated attacks (DDoS).
·         Windows will still be a target.
·         High-visibility breaches will continue. This will be across all sectors, of course, but the press (and hence the public) will probably pay the most attention to the ones in retail and healthcare. The organizations affected will take restorative and preventative measures in the short run — then they will revert to NIMBYism.
·         Elsewhere, there will be lots of corporate board handwringing and, in some businesses, perhaps even occasional increases in security funding.
·         Unaffected end users will be anxious, until the next news cycle. Afflicted users, of course, will stay anxious longer, when they realize their identities have been stolen, or funds drained, or that they can’t get health insurance because …
·         Regrettably, if 2016 unfolds like previous years, not enough will happen, as far as end users and businesses actually doing anything to protect themselves.
·         Legacy devices will continue to be used in healthcare, because there is a perception, real or imagined, that it is not viable to move away from them. New devices will not have anywhere near sufficient security baked in until long after the 2016 timeframe. The exceptions will be few and far between — but we should do everything we can to encourage those vendors who ‘do it right’.
·         In 2016, healthcare IT managers will be under pressure from 3LAs on three sides: fresh OCR HIPAA audits and penalties; more aggressive FDA action on vulnerable medical devices and pseudo-medical apps; and at least one FTC action against a wearable or IoT device or app used in wellness programs.
·         2016 may also see the responsible disclosure debate hit healthcare IT, just like the live Jeep hack demo hit the automotive industry in 2015. Many security experts oppose risky public demonstrations, but there is no denying the power of a video showing a car being disabled on the highway, which accomplished what several previous parking lot demos did not: a whole new level of public and congressional attention.
·         IoT security will continue to make headlines, but if your digital ‘e-bear’ toy gets hacked you are in no certain peril, aside from a trip to the store to return it. Expect 2016 to be the year of the full-frontal assault on all things IoT though, where cybercriminals will find new ways of attacking unsuspecting victims through their new flock of ‘digital doo-dads’. But it will still take more time to find the ‘killer bad app’ nemesis for the IoT.
·         SCADA (supervisory control and data acquisition) hacking becomes nation state day job for more people. After years of tinkering and poking the doors of unsuspecting industrial players, nations will pride themselves on having SCADA digital chops.
·         Credit cards will still get hacked – despite EMV. Where’s there’s money, there will be hackers, no matter the technology. Still, EMV raises the bar a bit and makes hacking more expensive, which is good.
From Lysa Myers:
·         Governments around the world will continue to pass laws that belie an understanding of technology, especially encryption and networked communication.
·         Companies will continue to pump out toys, fitness devices, ‘smart home’ devices, apps, etc, that leak personal information like Snoqualmie Falls in an El Niño year.
·         Healthcare companies will continue to lead the Breach Parade, as medical device manufacturers continue selling equipment with woefully outdated software and operating systems, and electronic health records are implemented without sufficient risk assessment.
·         (Hopefully) more device manufacturers will publish responsible disclosure procedures for reporting vulnerabilities in their products.
·         More devices and accounts will add simple – and perhaps novel – authentication techniques that allow people to increase their security
·         More chip and signature terminals will come online in the US, and be closely followed by complaints from retailers that they’re significantly slower than magstripe cards.
Each of us had our own area of concern, according to our particular specialties, but we all predict many of the same outcomes for next year. From the 10,000 foot view, this could best be summarized as ‘things will continue along the same trajectory’. This could be considered a fairly pessimistic view, and yet a rather obvious one.
That said, the upcoming year – as with all years – brings the possibility for many learning opportunities, which offers plenty of scope for improvement. Unspoken jokes about job security aside, we very much hope this coming year yields greater transparency and understanding of security issues, which generates more and substantial improvements in privacy and security for everyone. Please stay tuned to We Live


22.12.15

Quantum cryptography ‘is vulnerable to attack’

By Narinder Purba posted 22 Dec 2015

Quantum cryptography, considered to be one of the most complex and unbreakable methods of encryption, has been found to be vulnerable to attack, according to a major new study.
Published in Science Advances, the paper concluded that energy-time entanglement, which underpins many forms of quantum cryptography, is exploitable.
Researchers from Stockholm University and Linköping University observed in theoretical models and later in actual experiments that the critical security flaw could allow for attackers to “eavesdrop on traffic without being detected”.
“The energy-time entanglement technology for quantum encryption studied here is based on testing the connection at the same time as the encryption key is created,” the experts highlighted in an official press release.
“Two photons are sent out at exactly the same time in different directions. At both ends of the connection is an interferometer where a small phase shift is added. This provides the interference that is used to compare similarities in the data from the two stations.
“If the photon stream is being eavesdropped there will be noise, and this can be revealed using a theorem from quantum mechanics – Bell’s inequality.”
All that said, if the connection is actually secure – and therefore “free from noise” – the photons can be used as an encryption key. This ensures that your communication remains inaccessible and unreadable.
“If the photon stream is being eavesdropped there will be noise, and this can be revealed using a theorem from quantum mechanics – Bell’s inequality.”
What the researchers have therefore deduced from their experiments is that if the photon source is substituted with what they call a traditional light source, a particularly informed attacker can extract the code string.
Armed with that insight – i.e. they now know what the key is – the snoop can access the encrypted data surreptitiously, rendering Bell’s inequality-inspired security test redundant.
Writing about quantum cryptography last year, the information security consultant Rob Slade said that while he appreciates the idea behind it, “it is just another form of key exchange”.


21.12.15

Vous ne savez pas quoi offrir à vos enfants pour Noël? Le Père Noël pourrait venir d’une galaxie très lointaine


Il ne reste que quelques jours avant Noël et vous ne savez toujours pas quoi acheter pour votre enfant ? Pas de soucis : nous avons une liste de cadeaux high tech afin de vous donner des idées… 

Votre petit dernier aime jouer? Choisissez parmi les jeux créatifs qui aideront votre enfant à grandir. Un bon exemple, très populaire en ce moment auprès de millions de jeunes, c’est Minecraft. Il permet de faire des tas de choses depuis la construction de châteaux  jusqu’à creusement de catacombes sans oublier de partir à l’aventure avec des amis dans un monde de réalité virtuelle. Mais avant de le laisser jouer, parlez-lui des risques possibles de sécurité (possible security risks) et expliquez lui clairement que les gens qu’il rencontre en ligne ne sont pas nécessairement des amis une fois qu’ils sont  déconnectés.  Il doit aussi savoir que s’il a la moindre question ou s’il rencontre quelque chose de suspect, votre porte et votre esprit seront ouverts.

Il fut un temps où les téléphones mobiles étaient réservés aux riches. Aujourd’hui, la technologie moderne est tellement répandue qu’un enfant sans téléphone est considéré par ses camarades comme ‘dépassé’. Mais si vous décidez de lui acheter un appareil mobile, vous ne devez pas choisir un appareil haut de gamme très coûteux dont il est évident qu’il n’utilisera pas toutes les possibilités. Choisissez plutôt un appareil  Android d’entrée de gamme. Cela vous permettra de rester en contact avec votre enfant et vous fera économiser de l’argent. Si vous êtes inquiet au sujet des risques d’un téléphone mobile continuellement connecté, choisissez un outil de contrôle parental (parental control tool) qui vous permettra de créer une liste noire avec des sites inappropriés ou de limiter le temps de navigation et le temps passé à jouer.

Cette liste ne serait pas complète sans mentionner les consoles de jeux. Mais, ici aussi, vous ne devez pas dépenser des fortunes pour avoir le dernier cri. Vous pouvez, par exemple, choisir un modèle de PlayStation, Xbox ou Nintendo plus ancien qui sera moins cher mais avec lequel vous pourrez jouer certains des derniers jeux en date tout comme des titres datant des débuts de ces plates-formes.

Pour les fêtes, le dernier Star Wars vient de sortir dans les salles et l’Internet en est rempli. Cette folie a aussi pris une forme physique : avez-vous vu la vaste gamme de jeux et de jouets, tels que les éditions spéciales de Lego ou les figurines représentant les principaux personnages du film ? Il y en a une qu’on voit partout sur les réseaux sociaux. Nous parlons du robot qui a remplacé le légendaire R2-D2 et qui s’appelle  Sphero BB-8 Droid. Ressemblant à un ballon high-tech avec une tête, ce petit bonhomme qui vient d’une galaxie très éloignée pourrait être celui à acheter pour Noël. Vous avez le choix entre la version à câliner ou  celle avec commande à distance.

Avez-vous un petit ingénieur à la maison? Il y a des kits de construction – tels que le Haynes V8 Moteur à Combustion ou les  LittleBits (Gadgets & Gizmos) - qui apprendront à votre fils ou votre fille les bases de la mécanique ou de l’électronique et pourraient être leurs premiers pas vers un avenir dans un secteur industriel en pleine croissance.

Préférez-vous  les jeux de société ancien style alors que vos enfants ne rêvent que de tablettes, smartphones et autres gadgets ? Aujourd’hui vous pouvez avoir les deux en même temps: il vous suffit de choisir la version virtuelle des jeux. Vous les trouverez pratiquement tous, depuis le Monopoly classique jusqu’aux tout derniers titres comme TicketTo Ride.


Vous songez à une tablette ? Alors, gardez à l’esprit l’âge de votre enfant avant de faire votre achat. Bien que les iPads ou Samsung soient très populaires auprès des ados, vous avez d’autres options si vous désirez avoir quelque chose correspondant mieux  à l’âge d’un plus jeune. Un exemple, Amazon Fire Kids Edition, qui permet aux enfants de jouer avec des jeux et de visiter des sites correspondant à leur âge spécifique. L’autre façon d’imposer des limites  c’est d’installer un outils de contrôle parental (parental control tool), comparable à celui utilisé pour les smartphones, qui vous permettra de bloquer des applis et sites inappropriés et de décider combien de temps votre enfant peut passer à naviguer ou à jouer.