Subscribe free to our newsletters via your
. Space Travel News .




CYBER WARS
Online sharing helps hackers sharpen 'spears'
by Staff Writers
San Francisco, California (AFP) July 29, 2013


Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.

Spear phishing refers to individualizing deceptive messages sent to people in order to trick them into clicking on links or opening files booby-trapped with viruses.

Public posts on Twitter, Facebook, Instagram, Foursquare and other online venues give hackers fodder to mimic the way people write and the words they use, said Ulisses Albuquerque of the security firm Trustwave.

"I don't think people have any idea what kind of insight that gives to a potential hacker," Albuquerque told AFP.

He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."

The Trustware security consultants created a software tool that "fingerprints" the way people communicate by analyzing online posts.

The tool scrutinizes posts at social networks such as Twitter, Facebook and LinkedIn to ascertain writing styles, right down to hashtags added to indicate subjects of online posts.

A hacker unable to break into a company's computer network could write a convincing email pretending to be from a friend of an employee and include an attachment or link that, once clicked, unleashes malicious code.

"Say a CEO has a Twitter or LinkedIn account and I am able to see those posts," Albuquerque said.

"Then I could produce content that looks like it came from him and send it to his staff, who will be less suspicious of clicking a link."

He said the Trustwave-developed tool was not designed to extrapolate insights into people's conduct or personalities, but that such observations could be made if desired.

"Absolutely, you can show what the people posting are like," Albuquerque said.

The tool provides "spear phishers" with outlines for creating messages likely to hook prey.

It is intended for "ethical hackers" such as security professionals working with companies or organizations to find and patch weak spots in computer network defenses, according to Albuquerque.

It can also be used to help prove when posts claiming to be written by someone are bogus, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Judge weighs Manning verdict after final statements
Fort Meade, United States / Maryland (AFP) July 26, 2013
The military judge overseeing the trial of US soldier Bradley Manning over his massive transfer of secret files to WikiLeaks began considering her verdict after closing arguments Friday. After hearing the final statements at Fort Meade outside Washington, Colonel Denise Lind closed the court. She is expected to give her verdict in the coming days. At Manning's request, the judge - and ... read more


CYBER WARS
Three Soyuz launchers are at the Spaceport for Arianespace's upcoming medium-lift missions from French Guiana

Flawless launch of Alphasat, Europe's largest and most sophisticated telecom satellite

Alphasat Wears Its Color For Alphabus

Both payloads for Arianespace's next Ariane 5 flight are now mated to the launcher

CYBER WARS
Curiosity Mars Rover Gleams in View from Orbiter

Mars Curiosity sets one-day driving distance record

Scientists establish age of Mars meteorites found on Earth

Ancient snowfall likely carved Martian valleys

CYBER WARS
Bad night's sleep? The moon could be to blame

Moon Base and Beyond

First-ever lunar south pole mission could be attempted by 2016

Engine recovered from Atlantic confirmed as Apollo 11 unit

CYBER WARS
SciTechTalk: Grab your erasers, there are more moons than we thought

NASA Hubble Finds New Neptune Moon

NASA finds new moon on Neptune

A Giant Moon for the Ninth Planet

CYBER WARS
Solar system's youth gives clues to planet search

Snow falling around infant solar system

'Water-Trapped' Worlds

A snow line in an infant solar system: Astronomers take first images

CYBER WARS
Test confirms NASA manned capsule can land even if one parachute lost

N. Korea halts work at long-range rocket site: website

Angular rate sensors at crashed Proton-M rocket were installed 'upside down'

Upside down sensor behind proton rocket explosion

CYBER WARS
China launches three experimental satellites

Medical quarantine over for Shenzhou-10 astronauts

China's astronauts ready for longer missions

Chinese probe reaches record height in space travel

CYBER WARS
NASA's Hubble: Galaxies, Comets, and Stars! Oh My!

NASA's Wise Finds Mysterious Centaurs May Be Comets

Spitzer Observes Gas Emission From Comet ISON

Gas, dust observed streaming from 'soda-pop' comet approaching Earth




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement