Monday, September 14, 2015

The Big Brother could be closer than you think

"Every Breath You Take... Every Move You Make...". Not many songs as this one from Police, could describe in such detail the Big Brother who sees everything. But if some thought that our telephone and surveillance activity came only from internautical sewers states were wrong: anyone can be watching. An Australian journalist just learned it. We will also talk today about a study of ENISA on large security incidents, the Tor network and a story of cyberwar.

Natalie O'Brien
Natalie O'Brien reported in 2011, in an article for the "Sun-Herald" serious vulnerabilities in the Vodafone systems, telephony provider, she casually consumes. According to a Vodafone internal investigation revealed just now, an employee accessed to the text messages and call logs from the journalist in order to discover who had passed information. So be careful because the Big Brother may be just around the corner.


Service cuts

However and oddly enough, given the fanfare that we give to cybercriminals acts, they are not the perpetrators of the most serious incidents according to the annual ENISA study. Last year there were 134, which resulted in severe service cuts. The main causes were failures in software and hardware, especially in switches and routers, highlighting the software updates as the greatest impact in lost hours. Human error also appears in the top of the ranking.

Tor, safer

Who is expected to improve in security is the Tor network thanks to the recent recognition, by the Internet Engineering Task Force and the Internet Assigned Numbers Authority, for .onion domain, which is already part of the list of Domain Name for Special Use. This will make it harder to locate their users, in between other technical improvements to allow the Tor ecosystem benefit from the same level of security that the rest of the Internet.

I read your mail, minister
  
We ended up with a film history, cyberwarfare film of course: British NSA, GCHQ, has publicly complained that jihadists would have spied on email of high rank British but has denied that they have assaulted any of the networks. How did they do it then? The answer would be Junaid Hussain, famous British hacker who became jihadism and led the operation. There is only one problem: a drone killed him in Syria in late August.

Not even John Le Carré. Blessed Internet and blessed Monday.

0 comments:

Post a Comment