Sunday, August 3, 2014

Top 5 Infosec links of the week (XXXVI)

"What they have in common the moon and computer security, the dangers of TOR and intelligence agencies, the CIA alleged espionage, cyber criminals posing as Google bots and cyber theft". The five top post this week, directly in the Sunday compilation.


The moon has two faces, as computer security. In one of the articles of CIGTR that has crept into the top of the most watched in recent days, we talked about the secrets of the information security, that like the hidden side of the Moon, keeps surprising side.

"All encryption system, with adequate resources and time, eventually fall”. Words from our partner Pablo F. Iglesias in an article about the new vulnerability that exposes sensitive user information from TOR, and is not due to a technical failure, but the almost unlimited resources at their disposal governments and intelligence agencies.

An example? The CIA itself, which claimed to have spied a team from the U.S. Senate Commission on Torture, and did, as Robert Graham recalls, "spying itself" through a Secure Network for themselves.

The techniques of denial of service attacks evolve forced steps. The last, impersonate Google bots to bypass perimeter defenses pages. An estimated 34% of the 50 million fake bots sessions aim analyzed for malicious purposes, and 24% are used for DDoS.

Because the ultimate goal of such attacks is the same: financial gain. Practices that no longer receive coverage previously received, and using techniques supported by new technologies such as the use of storage systems in the cloud and software hacking "prefabricated" to produce virtual coins without physical computational expense associated. An externalization of the attacks, which no longer require large amounts of initial investment to be made.

Top five topics of the week. News Five drinking from the same source. The value of information.

0 comments:

Post a Comment