Tuesday, December 30, 2014

Surveillance, cyber crime and censorship sign off 2014

"They cannot kill me, my country will react, it will send a letter." James Bond defended himself this way in Casino Royale, in relation to the alleged response that his government would take following his death. But Bond was a spy, and therefore he knew that if he had problems, he will be alone.

Spy movies were very popular in the 80’s and 90’s. Now they are back in fashion, although they are not just movies. The German chancellor has found out that it was being spied more than onceit has been spied. This time they did almost by chance thank to a smart antivirus software that detected a USB memory infected by Regin, which is a spyware linked with British intelligence and the US national security agency (at least in the beginning).

While some Internet providers blocked access to Uber app and web service by DNS, the China’s Great Firewall blocks IP servers of Wikipedia and some Google services such as GMail. However these two types of barriers are easily bypassed with proper tools and knowledge.

The expected new version of HTML5 web language got the approval of the W3C in October, making it one of the web languages ​​with better prospects. But this attracts cybercriminals, who see this new code as a perfect tool to infect Android devices with malware by developing webapps.

It is a widely profitable "business" indeed. Spies and cyber criminals do not always are required to have a very specialized profile. They can easily multiplied the initial investment by 20 doing their misdeeds. With only $ 150, which is the average cost for a phishing campaign on social networks, you can earn up to $ 10,000. The business of ransomware is one of the most lucrative since they could make around $ 100 per infected device. This figures threat our information because they attract unscrupulous people, whose leaders are difficult to catch due to the current decentralization of crime.

Surveillance, cyber crime and censorship. A terrifying trio. A challenge for all security researchers. And a serious reason to become cautious users.


Post a Comment