Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  (Computer Security)
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Schneier on Security: New Cryptanalytic Results Against SHA-1
Topic: Computer Security 10:06 am EDT, Aug 19, 2005

Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto's rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.)

Shamir presented few details -- and there's no paper -- but the time complexity of the new attack is 2^63. (Their previous result was 2^69; brute force is 2^80.) He did say that he expected Wang and her students to improve this result over the next few months.

Schneier on Security: New Cryptanalytic Results Against SHA-1


Interview with Dan Kaminsky on Microsoft 's security
Topic: Computer Security 2:04 pm EDT, Jul 21, 2005

My name is Dan Kaminsky, and I am a security researcher focusing on applied mechanisms for analyzing and understanding very large scale networks.

Interview with Dan Kaminsky on Microsoft 's security


Microsoft meets the hackers | CNET News.com
Topic: Computer Security 10:19 am EDT, Jun 17, 2005

The random chatter of several hundred Microsoft engineers filled the cavernous executive briefing center recently at the company's sprawling campus outside Seattle.

Within minutes after their meeting was convened, however, the hall became hushed. Hackers had successfully lured a Windows laptop onto a malicious wireless network.

"It was just silent," said Stephen Toulouse, a program manager in Microsoft's security unit. "You couldn't hear anybody breathe."

Matt Thomlinson, whose job it is to help make Microsoft engineers create more secure code, noticed that some of the engineers were turning red, becoming obviously angry at the demo hacking incident. Yet as painful as the lesson was, he was glad to see the crowd of engineers taking things personally.

Lots of links to interesting stories here...

Microsoft meets the hackers | CNET News.com


CRM News: RFID : Chase Bank Rolls Out Contactless Credit Cards
Topic: Computer Security 11:04 pm EDT, Jun 12, 2005

Security experts familiar with the cards' radio frequency identification (RFID) technology, described by Chase as "contactless functionality," expressed some concern over the devices' security strength. Some have suggested that they may make it easy for perpetrators to commit fraud or identity theft.

Saw an add for ChaseBlink tonight. This ought to be interesting... Contactless credit card purchases. No signature. No pin. Just waive it over the reader. I can tell you how I'd have designed it, but I would be suprised if there were no vulnerabilities here.

While this is rather elaborate, a computer controlled rfid device connected to increasingly common cellular wireless internet systems relays the transaction to another reader, maybe taped to a chair in a shopping mall foodcourt.

CRM News: RFID : Chase Bank Rolls Out Contactless Credit Cards


An interesting approach to phishing scams
Topic: Computer Security 2:17 pm EDT, Jun  1, 2005

] Bank of America (Research) will require Internet clients
] to register their computers and assign a digital image,
] such as a photo of a pet, to their accounts in an effort
] to cut down on fraud, the bank announced.
]
] The image will appear on the site every time a customer
] has to enter a password.

I think this is a pretty good idea, and quite simple.

An interesting approach to phishing scams


CryptoVirus
Topic: Computer Security 12:35 pm EDT, May 25, 2005

] A ransom note left behind included an e-mail address, and
] the attacker using the address later demanded $200 for
] the digital keys to unlock the files.

It was inevitable that someone would finally actually try cryptovirology. It doesn't work too well when you don't have a way of picking up the money...

CryptoVirus


Mac malware door creaks open | CNET News.com
Topic: Computer Security 10:50 am EDT, May 10, 2005

] One widget, he says, will automatically install itself on
] users' desktops when his "Zaptastic" Web site is visited
] using Apple's Safari browser.

Why would I want Safari to allow web pages to do stuff without asking me?

Link: (This will install a widget if you open it in Safari)
http://stephan.com/widgets/zaptastic/

Mac malware door creaks open | CNET News.com


BBC NEWS - Malaysia car thieves steal finger
Topic: Computer Security 11:09 am EST, Mar 31, 2005

] Police in Malaysia are hunting for members of a violent
] gang who chopped off a car owner's finger to get round
] the vehicle's hi-tech security system.

Biometrics are dumb.

BBC NEWS - Malaysia car thieves steal finger


How To Save The Internet - SECURITY - CIO Magazine Mar 15, 2005
Topic: Computer Security 11:02 am EST, Mar 17, 2005

] "Let's make all end user devices nonprogrammable," he
] says. "No one can connect to the Internet on a machine
] that creates code. If you want a computer to do
] programming, you would have to be licensed.
We could
] license software companies to purchase programmable
] machines, which would be completely traceable along with
] the code created on them."
]
] That would blunt the information security
] problems - suddenly all that intelligence at the edge
] of the network that Amoroso wants to pull back in isn't
] just gone; it's physically stripped. On the other side,
] new levels of accountability and liability are created
] through licensing developers and eliminating anonymity
] from coding.

A collection of ideas for working on the computer security problem. Some are good, some are naive, some are absolutely orwellian, none of them are new. The fact that they are being considered at this level is worth noting. Its all about power. The way the Internet works today, with the end user controllable devices, and the security problems, is the result of a power stuggle with the phone company about who gets to control innovation. Most of the solutions proposed here involve changing that balance of power. In favor of whom, is the question.

All of these things will involve a fight. Some you'll want to fight for, others you'll need to fight against.

The reason DHS can't keep anyone in the computer security czar job for very long is that the people who want that job beleive it should be a peer of the surgeon general and the administration doesn't feel that its THAT important.

Its all about power.

There are a lot of people in this industry who see so red over a few spams that they are ready to lock everyone in a cell. These people need to be checked. My fear is that this list is like Patriot Act ][. A collection of poorly considered authoritarian ideas that is kept close by. Break glass in event of major catastrophy. Then let them all spill out with little or no critical consideration and never get rid of them later.

How To Save The Internet - SECURITY - CIO Magazine Mar 15, 2005


Schneier on Security: The Failure of Two-Factor Authentication
Topic: Computer Security 5:35 pm EST, Mar 16, 2005

] Two-factor authentication isn't our savior. It won't
] defend against phishing. It's not going to prevent
] identity theft. It's not going to secure online accounts
] from fraudulent transactions. It solves the security
] problems we had ten years ago, not the security problems
] we have today.

Schneier has been getting a lot of attention out of this short essay. I don't agree with him. While I seriously doubt Microsoft is really "dropping passwords" from Longhorn, you are going to see two factor authentication systems, likely involving cellphones, get deployed for certain kinds of internet based financial transactions. Its being playtested in Europe instead of here, because they have better cellphone penetration, but its coming.

Schneier is right when he points out that two-factor auth doesn't solve the problem with MiTM. I'd also point out that pencils do not enable space travel. That doesn't make them useless. Two factor auth solves the problem of offline credential stealing (in theory). Offline credential stealing is a real problem, and the only way to solve it is with two factor auth. Even if you solve the MiTM problem, you still need to solve the offline credential stealing problem, and you are going to solve that problem with two factor auth. You'll eventually need to get two factor auth, one way or the other. I hope its not a biometric, because biometrics are crap for totally unrelated reasons.

The way you address the MiTM problem is with better UI design. The banks and other groups who have an interest in computer security need to pay to get people on the Firefox team to really explore stronger methods of indicating certificate status to end users. The way we do this is really bad. Hell, Safari doesn't even let you pull up certificate details!!! Developers seem to make these security messages either annoying or invisible. It is possible to make them attention grabbing and informative while also not requiring user interaction. Its just a matter of getting it done.

As for Schneier's trojan idea, it sounds neat in theory but in practice I don't think its ever been done. There are lots of ways to make it hard. A way to tell browsers never to write a particular cookie to disk is a good start. Another is to log the user out upon cookie replay.

Another thing I'd like to see is a standard for HTTP transactions that supports authentication but not encryption. The reason is that encryption is too expensive for many websites to scale. Auth only could happen more cheaply, and that might spur more people to use it and become familiar with it. Authentication is more important then encryption for most threat models in modern networks. We're not worried about the FBI stealing your credit card number.

Schneier on Security: The Failure of Two-Factor Authentication


(Last) Newer << 3 ++ 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 ++ 31 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0