Hass and Associates Cyber Security

Hass and Associates Cyber Security

Communication

20 Supporters

  • What is Tor and why does it matter?

    Communication, Communication Design

    We all live in public, at least as far as the US National Security Agency is concerned. As Internet users and global citizens become more aware of surveillance activities that the US and other countries are doing on the World Wide Web, there are those who seek to ensure that privacy and personal freedoms aren’t trampled upon.

    Tor technology aims to help appease privacy advocates and offer a way in which the Internet can be enjoyed without the prying eyes of surveillance programs or other tracking software. This free piece of software has certainly become mainstream in light of recent events, but what is Tor and why does it matter to you, your family, neighbors, co-workers, and the rest of the Internet?

    Peeling back the onion layers

    It might surprise you that the Tor Project, originally an acronym for The Onion Router Project, was initially funded by the US Naval Research Laboratory and helped launch the development of onion routing (anonymous communication over a computer network) on behalf of DARPA. It had also received the backing from the Electronic Frontier Foundation.

    When users installed Tor software onto their computers, it would conceal their identity and network activity from anyone spying on their behavior. This was accomplished by separating the identification and routing information. The data is transmitted through multiple computers via a network of relays run by like-minded volunteers — almost like how users installed SETI software to look for extraterrest...

  • Hass Associates: Phony Web Traffic Tricks

    Communication, Communication Design

    The website Songsrpeople.com looks a lot like other amateur-video sites. It is wallpapered with clips featuring "the most insane amusement park ever" and "your girlfriend's six friends."

    The site draws tens of thousands of visitors a month, according to audience measurement firms. It also has ads for national brands, including Target Corp., Amazon.com Inc. and State Farm.

    But Web-security investigators at a firm called White Ops contend that most of the site's visitors aren't people. Rather, they are computer-generated visitors, or "bots," designed to fool advertisers into paying for the traffic, says White Ops, which has blacklisted the site—and thousands more like it—so that ads from clients such as Zipcar don't land there.

    An anonymous representative for Songsrpeople declined to discuss the site's traffic but in an email called the White Ops methodology into question.

    State Farm said it was looking into the matter while Target declined to comment and Amazon didn't immediately respond to requests for comment.

    Authorities and Internet-security experts say tens of thousands of dubious websites are popping up across the Internet. Their phony Web traffic is often fueled by "botnets," zombie armies of hijacked PCs that are controlled from unknown locations around the world, according to Internet security experts.

    The sites take advantage of the simple truth that advertisers pay to be seen. This creates an incentive for fraudster...

  • Ob-zc436_botwar_g_20130930212725_177_

    The website Songsrpeople.com looks a lot like other amateur-video sites. It is wallpapered with clips featuring "the most insane amusement park ever" and "your girlfriend's six friends."

    The site draws tens of thousands of visitors a month, according to audience measurement firms. It also has ads for national brands, including Target Corp., Amazon.com Inc. and State Farm.

    But Web-security investigators at a firm called White Ops contend that most of the site's visitors aren't people. Rather, they are computer-generated visitors, or "bots," designed to fool advertisers into paying for the traffic, says White Ops, which has blacklisted the site—and thousands more like it—so that ads from clients such as Zipcar don't land there.

    An anonymous representative for Songsrpeople declined to discuss the site's traffic but in an email called the White Ops methodology into question.

    State Farm said it was looking into the matter while Target declined to comment and Amazon didn't immediately respond to requests for comment.

    Authorities and Internet-security experts say tens of thousands of dubious websites are popping up across the Internet. Their phony Web traffic is often fueled by "botnets," zombie armies of hijacked PCs that are controlled from unknown locations around the world, according to Internet security experts.

    The sites take advantage of the simple truth that advertisers pay to be seen. This creates an incentive for fraudsters...

  • Hass and Associates: Security on the Internet of Services

    Communication, Communication Design

    Book a flight online, perform an internet banking transaction or make an appointment with your doctor and, in the not-too-distant future, the 'Internet of Services' (IoS) will come into play. A paradigm shift in the way ICT systems and applications are designed, implemented, deployed and consumed, IoS promises many opportunities but also throws up big challenges - not least ensuring security and privacy, issues currently being tackled by EU-funded researchers.

    IoS is a vision of the future internet in which information, data and software applications - and the tools to develop them - are always accessible, whether locally stored on your own device, in the cloud, or arriving in real time from sensors. Whereas traditional software applications are designed largely to be used in isolation, IoS brings down the barriers, thereby lowering costs and stimulating innovation.

    Building on the success of cloud computing, IoS applications are built by composing services that are distributed over the network and aggregated and consumed at run-time in a demand-driven, flexible way. This new approach to software will make the development of applications and services easier - so that new and innovative services, not possible today, can be offered. It is likely to make a huge contribution to the EU's strategy to make Europe's software sector more competitive.

    You might want to read

    IoS services can be designed and implemented by producers, deployed by providers, aggregated by intermediarie...

  • Cringe And Reflect: The Internet In 1997 - Sunzu

    Community, Communication Design

    Source

    This morning, like most mornings I sat drinking my coffee browsing my freshly updated list of news feeds and articles. All of a sudden I was floored by a video, my breath lost in a mix of laughter and horror. In it’s wake I was left with a new appreciation for how much technology has changed. Allow me to share this experience with you.

    The ‘Kids Guide To the Internet’ is a wonderful reminder of the early days of the Internet (and educational videos at that). The video may be linked to an infamous satire site, but I found this experience rather enlightening (and really funny at that). My sentiment was further compounded when the person (younger) I first showed the video asked me “what is a VCR?”. Watch this video and be reminded of what technology and our attitude towards it used to be like. Compare it to today where we swim in wireless and are constantly smartphone tethered. Consider how simple technology has become — how many times you have seen a child of only a few years old using an iPad with no effort at all? In only a few years technology changes in astonishing ways, but I for one find I often quickly forget the time before new invention X.

    So how much progress have we made? Clearly technology has developed in amazing ways and as a society we have become much more comfortable with technology in every aspect of our lives. That said, we have some interesting issues this video reminds me of. The digital divide is one such issue. Across different age...

  • Cringe And Reflect: The Internet In 1997

    Community, Communication Design

    Source

    This morning, like most mornings I sat drinking my coffee browsing my freshly updated list of news feeds and articles. All of a sudden I was floored by a video, my breath lost in a mix of laughter and horror. In it’s wake I was left with a new appreciation for how much technology has changed. Allow me to share this experience with you.

    The ‘Kids Guide To the Internet’ is a wonderful reminder of the early days of the Internet (and educational videos at that). The video may be linked to an infamous satire site, but I found this experience rather enlightening (and really funny at that). My sentiment was further compounded when the person (younger) I first showed the video asked me “what is a VCR?”. Watch this video and be reminded of what technology and our attitude towards it used to be like. Compare it to today where we swim in wireless and are constantly smartphone tethered. Consider how simple technology has become — how many times you have seen a child of only a few years old using an iPad with no effort at all? In only a few years technology changes in astonishing ways, but I for one find I often quickly forget the time before new invention X.

    So how much progress have we made? Clearly technology has developed in amazing ways and as a society we have become much more comfortable with technology in every aspect of our lives. That said, we have some interesting issues this video reminds me of. The digital divide is one such issue. Across different age...

  • Ha_177_

    http://technology.inquirer.net/27165/cybercriminals-target-apple-ids-financial-credentials-in-phishing-scams

    MANILA, Philippines – Cybercriminals are using fake Apple sites to try and trick users into submitting their Apple ID credentials, which would enable them to steal the users’ account login and access their personal data, information and credit card numbers stored on their iCloud and iTunes accounts, according to a report that analyzed the increase of cybercriminal campaigns designed to steal Apple IDs by creating fraudulent phishing sites that try to imitate the official apple.com site.

    An average of 200,000 attempts per day by users trying to access the phishing sites were detected from January 2012 through May 2013, a marked increase from 2011, which averaged only 1,000 detections per day, according to Kaspersky Lab, provider of effective digital security solutions for large enterprises, SMBs and consumers.

    Kaspersky Lab’s web antivirus module detected and prevented its users from accessing the sites although the increase in detections showed how these scams were becoming more commonly used by cybercriminals for phishing campaigns.

    The company analyzed the cybercriminals’ behavior and patterns on a daily and monthly basis, noticing that fluctuations and increases in phishing attempts often coincided with large events from Apple.

    For example, on Dec. 6, 2012, immediately following the opening of iTunes stores in India, Turkey, Russia, South Africa and an...

  • Ruling seen Apple e-book warning to tech industry

    Communication, Communication Design

    http://www.politico.com/story/2013/07/apple-ebook-ruling-93974.html

    The U.S. government’s victory over Apple in the e-books antitrust case sends a message to the tech industry, legal observers say: Even popular innovators can’t run roughshod over antitrust laws.

    In a court in New York, Apple had argued unsuccessfully that it was the classic outsider trying to break into and enliven what it saw as a stagnant digital books market dominated by Amazon.com.

    But on Wednesday, a federal judge in New York rejected that view and evoked an earlier era of robber barons and monopolies, ruling that Apple had orchestrated a “horizontal price-fixing conspiracy” with five major publishers that resulted in increased digital book prices for consumers.

    The decision is “an important touchstone,” said Phil Weiser, dean of the University of Colorado Law School and a former deputy assistant attorney general in the Justice Department’s antitrust division. “At times, tech companies want to take the position that they are a fast-moving industry and antitrust law is not an effective means of oversight. There is no technology industry exception.” Apple immediately vowed to appeal the decision.

    Related Articles: http://discussions.nokia.com/t5/Connectivity/How-to-avoid-Facebook-scams-Hass-Associates-Online-Cyber-Review/td-p/1783086 http://www.fanpop.com/clubs/hass-associates-hong-kong-cyber-bugs

  • Källa länk Hass and associates press release # 34912726002 Federal Trade Commission har skrivit till sökmotorer verksamma i USA varning för dem att "klart och tydligt" skilja reklam från "naturliga" söka resultaten, säger att det under det senaste decenniet har sett företag som börjar att blanda två.

    Brevet (PDF) har skickats till de tre största amerikanska sökmotorer – Google, Yahoo och Microsoft Bing - och också till AOL, Blekko, DuckDuckGo och 17 andra specialiserade sökmotorer för shopping, resor och lokala företag vilka visas annonser till användare.

    FTC, inrättats för att skydda amerikanska konsumenternas intressen, nämner inte någon sökmotorföretag i synnerhet som har brutit mot dess regler. Men den varnar företagen att "konsumenterna normalt förväntar att naturliga Sök resultat ingår och rangordnas utifrån relevans för en sökfråga, inte bygger på betalning från en tredje part. Inklusive eller rankning sökresultat helt eller delvis är baserad på betalning en form av reklam. För att undvika risken för bedrägeri, bör konsumenterna kunna enkelt skilja naturliga sökresultat från reklam som en sökmotor ger."

    Det står i det senaste året har tendensen för sökmotorer att sätta annonser omedelbart ovanför "naturliga" resultat – som Google och andra gör – har fått mer än hälften av användarna inte att erkänna dem som annonser. I en undersökning, sade nästan hälften Searchers bakgrundsskuggni...

  • Hass and Associates Cyber Security/ Security-Holes

    Communication, Audio/Visual Design

    As_177_

    http://hassassociates-online.com/articles/security-holes/

    Vulnerabilities

    The larger and more complex information systems are, the greater the possibility of error in logic and loopholes in algorithm.

    These are weak points that could enable hackers to breach a system and compromise the integrity of information stored. Programmers themselves who are not yet adept in writing software code can unknowingly misuse the code and lead to a vulnerability.

    A classic example of vulnerabilities that can be exploited is a weak password or its repeated use on various services or software. There are also websites containing malware that installs automatically once visited. Even legitimate software could be a venue for an exploit due to unknown errors (bugs) generated by the program. The end-user or the human element in information systems is arguably the weakest point that hackers easily utilize.

    0-day exploits

    0-hour or 0-day attack is the exploitation by outside parties of a security hole in a computer program which is unknown from its developers. The term comes from the premise that the attack unfolds on the “day 0, meaning no awareness as of yet from the developers so there is no opportunity and time to issue a fix for the threat. Zero-day exploits are usually shared among hackers even before the developer knew.

    Programmers could use the vulnerabilities via several avenues: on web browsers and email. Web browsers allow for a wider target. Meanwhile, using email, hackers can sen...

hass and associates cyber security

Join This Group

Hass and Associates Cyber Security

Contact Hass and Associates Cyber Security

Moderator: Scarlet Hugh