Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Online sharing helps hackers sharpen 'spears'
by Staff Writers
San Francisco, California (AFP) July 29, 2013


Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.

Spear phishing refers to individualizing deceptive messages sent to people in order to trick them into clicking on links or opening files booby-trapped with viruses.

Public posts on Twitter, Facebook, Instagram, Foursquare and other online venues give hackers fodder to mimic the way people write and the words they use, said Ulisses Albuquerque of the security firm Trustwave.

"I don't think people have any idea what kind of insight that gives to a potential hacker," Albuquerque told AFP.

He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."

The Trustware security consultants created a software tool that "fingerprints" the way people communicate by analyzing online posts.

The tool scrutinizes posts at social networks such as Twitter, Facebook and LinkedIn to ascertain writing styles, right down to hashtags added to indicate subjects of online posts.

A hacker unable to break into a company's computer network could write a convincing email pretending to be from a friend of an employee and include an attachment or link that, once clicked, unleashes malicious code.

"Say a CEO has a Twitter or LinkedIn account and I am able to see those posts," Albuquerque said.

"Then I could produce content that looks like it came from him and send it to his staff, who will be less suspicious of clicking a link."

He said the Trustwave-developed tool was not designed to extrapolate insights into people's conduct or personalities, but that such observations could be made if desired.

"Absolutely, you can show what the people posting are like," Albuquerque said.

The tool provides "spear phishers" with outlines for creating messages likely to hook prey.

It is intended for "ethical hackers" such as security professionals working with companies or organizations to find and patch weak spots in computer network defenses, according to Albuquerque.

It can also be used to help prove when posts claiming to be written by someone are bogus, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Judge weighs Manning verdict after final statements
Fort Meade, United States / Maryland (AFP) July 26, 2013
The military judge overseeing the trial of US soldier Bradley Manning over his massive transfer of secret files to WikiLeaks began considering her verdict after closing arguments Friday. After hearing the final statements at Fort Meade outside Washington, Colonel Denise Lind closed the court. She is expected to give her verdict in the coming days. At Manning's request, the judge - and ... read more


CYBER WARS
Rafael gears up for Israel's new defense era

Early hardware delivery enables deployment of crucial missile defense radar

Israel deploys Iron Dome near Red Sea resort of Eilat

Missile plan to go ahead despite test failure: US

CYBER WARS
Raytheon demonstrates high-definition, two-color Third Generation FLIR System

Raytheon, Chemring Group plan live missile firing for next phase of CENTURION development

Panama says suspected missile material found on N. Korea ship

Lockheed Martin Completes Captive Carry Tests with LRASM

CYBER WARS
First Upgraded MQ-8C Fire Scout Delivered to U.S. Navy

US drone strike kills two militants in Pakistan

Northrop Grumman, U.S. Navy Complete First Arrested Landing of a Tailless Unmanned Aircraft Aboard an Aircraft Carrier

US drone lands on carrier deck in historic flight

CYBER WARS
New Military Communications Satellite Built By Lockheed Martin Launches

US Navy Poised to Launch Lockheed Martin-Built Secure Communications Satellite for Mobile Users

Northrop Grumman Moves New B-2 Satellite Communications Concept to the High Ground

Canada links up on secure U.S. military telecoms network

CYBER WARS
Novel Hollow-Core Optical Fiber to Enable High-Power Military Sensors

US jets drop unarmed bombs on Australia's Great Barrier Reef

Northrop Grumman Awarded Contract for LITENING Targeting System Sustainment

Raytheon's advanced uncooled thermal technology preferred by international land forces

CYBER WARS
Iraq seeks FMS deals worth more than $1.9B

Rheinmetall, MAN announce military deal in Australia

Israeli defense industry exports under scrutiny

EU to unveil plans to integrate defence industry

CYBER WARS
JFK's sole survivor named ambassador to Japan

China coastguard raises Japan island row temperature

Chinese firm to build $1.4 bln Sri Lanka city complex

France, Germany call for closer EU military cooperation

CYBER WARS
New NIST nanoscale indenter takes novel approach to measuring surface properties

Desktop printing at the nano level

New nanoscale imaging method finds application in plasmonics

York Nanocentre researchers image individual atoms in a living catalytic reaction




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement