greg hughes - dot net
Note that the contents of this site represent my own thoughts and opinions, not those of anyone else - like my employer - or even my dog for that matter. Besides, the dog would post things that make sense. I don't.
 Sunday, 30 July 2006
This could be very bad... In a news.com article published Friday, a couple of security companies (it's the good guys this time, at least - but they are planning to present it at Black Hat this week...) discuss how they've discovered a way to use your web browser and its built-in JavaScript engine to access information and resources inside the network where the browser resides and send it off to someone else or to launch attacks that appear to come from inside the network. This may be the next big wave of attacks.
SPI Dynamics is one of the companies mentioned in the article. They're discussing the results of their research at the Black Hat event this week, but they have also posted the article and a sample ("proof of concept" as they say) web page that does some of what they've discovered for all to see, use... and copy for that matter.
SPI Dynamics, by the way, has a quality set of expert articles, white papers, webcasts, and more on their web site.
Not sure how I feel about publishing this kind of stuff, but in the real world the bad guys will figure it out quickly enough anyhow, and I imagine they already have. The key to keeping this from becoming a major security event will be making sure cross-site scripting attacks cannot happen on web servers and using protective systems that catch malicious script on client machines before it gets run. Ultimately, JavaScript really needs to be revisited, but to do that probably means changing the way web sites work and coming up with a whole new standard.
JavaScript opens doors to browser-based attacks By Joris Evers http://news.com.com/2100-7349_3-6099891.html
Malicious JavaScript embedded in a Web site can let a miscreant map a home or corporate network and attack connected devices ...
... "We have discovered a technique to scan a network, fingerprint all the Web-enabled devices found and send attacks or commands to those devices," said Billy Hoffman, lead engineer at Web security specialist SPI Dynamics. "This technique can scan networks protected behind firewalls such as corporate networks" ...
... Both SPI Dynamics and WhiteHat Security came up with the JavaScript-based network scanner at about the same time, he said. The companies plan to talk about their findings at next week's Black Hat security event in Las Vegas.
 Friday, 28 July 2006
Tell me what you think, share what you know... In large part, I help catch bad guys for a living. So I have my own perspective and base of experience, but please share yours.
You may already be familiar with the term "phishing" and possibly you have a good idea of what it means. If you're not familiar with the term, you should be. Essentially, bad guys set up fake "phishing" web sites, typically by copying an online banking or other e-commerce site. The bad guys then send out emails or use other means to try to get you to visit the fraudulent web site they've set up, in hopes you'll think it's legitimate and "update" your banking or other private information there. In reality you're not communicating with the actual bank or e-commerce company at all, and you're not really updating anything - Rather, you are providing confidential identity and financial information to cyber-criminals. The bad guys then use that information to steal money, defraud you and others, and to create a new identity or leverage yours for their own gain. They're good at what they do, and the fact of the matter is, it works well enough for those who are the best in their "industry" (and it is its own micro-industry, as we'll discuss) to be motivated to make a career of it.
The general technique of convincing you via trickery to give up your private and sensitive information is called "social engineering." Bad guys act in ways that cause you think you're communicating with a legitimate business, but in reality you're being defrauded of information and - in turn - your financial and identity assets. More recently even myspace.com and similar sites have been faked, so we know these criminals are creative and go after us where we live. Whether it's a phone call from someone who sounds like a legitimate business person or a web site that looks like it's the real thing, it's all social engineering - tricking you into believing you're communicating information to a legitimate person or business when you're not.
You've likely seen emails show up in your in-box that pretend to be from ABC Bank or XYZ Credit Union. Beware any email that request information from you. The emails typically say something has happened to your account or that they;re verifying information, and you need to update your information by clicking a link to go to the bank's web site. But those emails are fakes, and so are the sites that load when you click the link. They're sent (well, spammed really) to anywhere from a few thousand to millions of people at once. Even when only a very small percentage of victims actually take the bait (hence the term phishing, eh?) , the bad guys win and come out ahead - big time.
Unfortunately, people do take the bait. I see it every single day in my work. Just the other day I dealt with a situation in which someone who provided their information to a phishing site fraudster was ripped off for $19,000. We're talking about serious stuff here... Now, when you lose money it's sometimes recoverable (but not always - you can sometimes be held responsible for giving away security secrets, after all). But if someone steals your private identifying information - things like driver's license numbers, dates of birth, social security numbers and the like - it's bad news. You're in trouble. Recovering from a stolen identity can be nearly - and oftentimes completely - impossible. You can get a couple thousand dollars back if you get tricked into giving up a password, but you can't take back your social security number once someone knows it.
You get the picture.
So, phishing is when someone sends an email and tries to get you to provide your secret information on a web site that looks like a legitimate one, but which is really just a fake copy that some bad guy controls. A lot like walking into what you think is your favorite coffee chain and walking out with a Strychnine latte, really. And on top of that, you paid the bad guy who you thought was your friendly barista $5 for it - and left a tip.
We've covered some of the basics of phishing fraud - just the first thin layer of the problem, actually. Over the course of some future posts, we'll dig a bit deeper into the details of what makes up a phishing campaign and what can be done about it. We'll also discuss pharming, spear-phishing and other cute terms that start with "ph" but which are really just about the farthest thing from cute you can imagine.
There are solid reasons for this madness that plagues the financial service and e-commerce industries. But truly understanding the problem means more than just knowing what phishing emails look like and avoiding fake sites. The fact that the sites are even there in the first place, that the email actually reaches your in-box, that you can't tell a fake site from the real one - all of these things are problems in and of themselves. To truly prevent the problem - and let's face it, prevention is the golden key here - we need to know and understand much, much more.
For instance, do you know why certain banks, credit unions and online retailers are targeted over others? Here's a hint: It's not always about how many customers they have to target or how big a name the bank is, although that can be a factor. Many of the biggest targets are credit unions with just a few thousand customers. And do you know what the phishers actually do with the information they fraudulently trick you into providing?
Do you have any idea who the bad guys are?
That's a taste of what we'll be discussing here over the next few weeks. I'll publish some of my thoughts on these topics and more. Not the secret stuff that lets us catch them, but the information consumers and institutions can use to help combat the problem. It's an opportunity to learn and share information. If you have ideas, thoughts or comments about the phishing problem, or online fraud in general, please leave a comment on this entry, or write about it on your own blog, or alternatively you can email me (but please use the comments if it's safe and reasonable to do so in order to provide the benefit to others - I tend to get a lot of emails that would be much better from a community standpoint if they were posted instead as comments). I'll leverage my own thoughts as well as the thoughts of others like you to help build parts of the future discussion. With hat tips all along the way, of course.
Lots of people get credit card applications in the mail. Recently (possibly as a result of increasing interest rates and therefore the potential to make more and more money) it seems like the number and frequency of credit card applications arriving in my mailbox has gone though the roof. Last week alone I received over 20 of these pre-approved applications. It's just nuts.
Another crazy thing is, one credit card company will send several each week. They're spending lots of money mailing me fancy color-printed paper to try to get me to sign up for a credit card at an interest rate (and a variable one at that) which I'd never touch. The ones with the low fixed rates are more appealing, but I really don't want or need more credit cards.
There's a lot better deals out there. What's the best credit card deal these days? Is there such a thing?
Internet phone service is bad and getting worse, according to a new survey released last week. That's interesting, since I have been using Vonage at home for quite a while now and my experience has been that it's improved significantly over time. These days its much better than the local "classic" wired telephone service. But apparently my VOIP experience might not be the norm, at least if you believe the people doing the testing:
Nearly one in five Internet phone calls are “unacceptable” in quality - with annoying woes ranging from echoes to clicking sounds. The problem is lines clogged with video, audio and other data that interfere with service, said the study by Brix Networks, which makes products that test the quality of so-called Voice Over Internet Protocol...
...Brix arrived at its conclusion after almost one million Internet phone tests were conducted by users at the company’s web site, testyourvoip.com. The tests, started in late 2004, immediately revealed quality problems and Brix continued with the tests through early this year, before compiling and releasing its results...
All I can say is I really like Vonage. Between the call quality I get (very good) and the extra features, not to mention the lower price relative to POTS service, there's no way I'd go back.
(story via the Boston Herald)
 Wednesday, 26 July 2006
Forget "Hello, World." More like "Look Out, World!" Greg's gonna learn how to program. Just enough to be dangerous, I am sure... I mentioned this more than a year ago, but have yet to take advantage of it. And at the time all the content was not yet available.
Microsoft has more than 10 hours of online video training geared toward beginners (that would be me) on how to program using Visual C# 2005 Express. Woah, cool. Dubbed the Absolute Beginner's Video Series, it takes you from "Hello, world" to a RSS reader app. This is totally for me. Not only that, you can choose to stream the video or download it, and the project files are right there to download, as well. Nice - I can spend some airplane time learning how to program!
There's also a C# Windows Forms Controls video series and for those wanting VB.net instead of C#, the same series is also available for that language.
I'm glad to see this kind of content available - it's exactly what getting-old management types like me who wish they'd learned to program a modern language need.
The content of the C# and VB.net tutorials was provided by http://www.learnvisualstudio.net/, which has a whole slew of great looking content available for people wanting to learn programming, from absolute beginner to more advanced level programmers, as well as people in-between.
 Tuesday, 25 July 2006
Jay Rosen at PRESSthink has an idea, and one that is certainly quite interesting. In his post "Introducing NewAssignment.Net," Rosen describes his idea, which would meld the best of what the Internet mob has to offer with the typically-careful approach of professional Journalism, into a new hybrid-type of news gathering and creation process.
What can "networked journalism" do in the real world? What does news without the media look like? Check out Rosen's thought provoking and interesting post for that and more:
Alright, what is it?
In simplest terms, a way to fund high-quality, original reporting, in any medium, through donations to a non-profit called NewAssignment.Net.
The site uses open source methods to develop good assignments and help bring them to completion; it employs professional journalists to carry the project home and set high standards so the work holds up. There are accountability and reputation systems built in that should make the system reliable. The betting is that (some) people will donate to works they can see are going to be great because the open source methods allow for that glimpse ahead.
In this sense it’s not like donating to your local NPR station, because your local NPR station says, “thank you very much, our professionals will take it from here.” And they do that very well. New Assignment says: here’s the story so far. We’ve collected a lot of good information. Add your knowledge and make it better. Add money and make it happen. Work with us if you know things we don’t.
But I should add: NewAssignment.Net doesn’t exist yet. I’m starting with the idea.
© Copyright 2012 Greg Hughes

This work is licensed under a Creative Commons License.
 | This page was rendered at Friday, 13 July 2012 00:14:44 (Pacific Standard Time, UTC-08:00)
newtelligence dasBlog 2.1.8015.804
|
"Computers used to take up entire buildings, now they just take up our entire lives."
- Unknown
"So how do you know what is the right path to choose to get the result that you desire? And the honest answer is this... You won't. And accepting that greatly eases the anxiety of your life experience."
Syndication [XML] and .net Alerts
For lazy, highly-technical or enlightened people, get this site's content without the use of a web browser. I use FeedDemon for this, but you can choose your own. Subscribe - click the icon for my feed... or sign up for Microsoft Alerts to receive updates through your MSN Messenger, e-mail, or mobile device. Click the orange button thingie to sign up with your Passport account: 
Contact
Drop me an email: Phone: 503-766-2258
Add me to MSN Messenger
Monthly Archive
June, 2012 (1) |
November, 2011 (1) |
October, 2011 (7) |
July, 2011 (1) |
May, 2011 (1) |
April, 2011 (1) |
January, 2011 (2) |
December, 2010 (3) |
November, 2010 (2) |
October, 2010 (1) |
September, 2010 (1) |
July, 2010 (1) |
June, 2010 (13) |
May, 2010 (4) |
April, 2010 (10) |
February, 2010 (1) |
January, 2010 (2) |
December, 2009 (1) |
November, 2009 (2) |
September, 2009 (2) |
August, 2009 (1) |
July, 2009 (2) |
June, 2009 (4) |
May, 2009 (7) |
April, 2009 (3) |
March, 2009 (5) |
February, 2009 (1) |
January, 2009 (10) |
December, 2008 (7) |
November, 2008 (7) |
October, 2008 (18) |
September, 2008 (18) |
August, 2008 (18) |
July, 2008 (35) |
June, 2008 (16) |
May, 2008 (12) |
April, 2008 (16) |
March, 2008 (22) |
February, 2008 (32) |
January, 2008 (9) |
December, 2007 (6) |
November, 2007 (4) |
October, 2007 (19) |
September, 2007 (36) |
August, 2007 (19) |
July, 2007 (17) |
June, 2007 (16) |
May, 2007 (13) |
April, 2007 (11) |
March, 2007 (5) |
February, 2007 (14) |
January, 2007 (16) |
December, 2006 (16) |
November, 2006 (4) |
October, 2006 (23) |
September, 2006 (14) |
August, 2006 (21) |
July, 2006 (34) |
June, 2006 (25) |
May, 2006 (20) |
April, 2006 (20) |
March, 2006 (17) |
February, 2006 (34) |
January, 2006 (30) |
December, 2005 (23) |
November, 2005 (39) |
October, 2005 (30) |
September, 2005 (49) |
August, 2005 (31) |
July, 2005 (21) |
June, 2005 (35) |
May, 2005 (53) |
April, 2005 (54) |
March, 2005 (60) |
February, 2005 (27) |
January, 2005 (59) |
December, 2004 (70) |
November, 2004 (58) |
October, 2004 (55) |
September, 2004 (64) |
August, 2004 (53) |
July, 2004 (65) |
June, 2004 (50) |
May, 2004 (49) |
April, 2004 (26) |
March, 2004 (20) |
February, 2004 (26) |
January, 2004 (28) |
December, 2003 (12) |
October, 2003 (8) |
September, 2003 (11) |
August, 2003 (1) |
On this page
Search and Translate this Site
Blog Posting Categories
Navigation Links
Blogroll
Scott Adams' Dilbert Blog
Scott Adams is the creator of Dilbert, and his blog is an incredibly smart, clever and often funny (sometimes very serious) look at the world. Everyone should read this blog. |
Alex Scoble
Alex is a former coworker who blogs about a variety of IT-related topics. |
Brent Strange
Brent is a cool dude and a great QA guy that I used to work with. His blog is, appropriately, focused on QA and testing technology. |
Chris Brooks
Chris was formerly my boss at work and is an avid board gamer and photographer. He always has some new info about top-notch board games you may have never heard of, so if you're into them, you should check out this blog. |
Chris Pirillo
Lockergnome by trade, Chris is always up to something new. If you are not familiar with the Lockergnome newsletters, be sure to check them out, too. |
Matthew Lapworth
Matt's a software developer and friend. He seems to enjoy extreme sports. That's fine as long as he doesn't, like, die or something. |
Milind Pandit
Milind writes about all sorts of interesting stuff. We worked toegther for eight years, and he worked at our employer longer than I, which pretty much makes him old as dirt in company time. :) |
MSFT Security Bulletins [RSS]
RSS feed for all Microsoft security bulletins provides an always-up-to-date list of updates along with complete descriptions of each. |
neopoleon.com
Rory Blyth is one of the funniest and most thought-provoking bloggers I read. And I blame him for everything. Literally. |
Scott Hanselman
Scott's computerzen blog is a popular spot for all things .NET and innovative. I used to work with him, but then he went off to Microsoft. He's one of the smartest guys I know, and arguably the best technical presenter around. |
Sign In
Who Links Here
Total Posts: 1889 This Year: 0 This Month: 0 This Week: 0 Comments: 3450
Android (7) Apple (67) AudioBlogging (42) Aviation (2) Blogging (154) Fireworks (5) Geek Out (130) GnomeDex (20) Google Voice (1) Helping Others (27) Home Servers (5) Humor (144) IT Security (218) Kineflex Artificial Disc Surgery (16) Management (8) Microsoft Office (4) Mobile (139) Movies (31) Mt. St. Helens (13) Office 2003 (52) OneNote (29) Personal Stories (163) Photography (29) Random Stuff (642) RSS Stuff (47) RunAs Radio (28) Safe Computing (39) SharePoint (56) Tablet PC (42) Tech (1036) Things that Suck (69) Windows (6) Windows Media Technology (27)
|