Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Online sharing helps hackers sharpen 'spears'
by Staff Writers
San Francisco, California (AFP) July 29, 2013


Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.

Spear phishing refers to individualizing deceptive messages sent to people in order to trick them into clicking on links or opening files booby-trapped with viruses.

Public posts on Twitter, Facebook, Instagram, Foursquare and other online venues give hackers fodder to mimic the way people write and the words they use, said Ulisses Albuquerque of the security firm Trustwave.

"I don't think people have any idea what kind of insight that gives to a potential hacker," Albuquerque told AFP.

He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."

The Trustware security consultants created a software tool that "fingerprints" the way people communicate by analyzing online posts.

The tool scrutinizes posts at social networks such as Twitter, Facebook and LinkedIn to ascertain writing styles, right down to hashtags added to indicate subjects of online posts.

A hacker unable to break into a company's computer network could write a convincing email pretending to be from a friend of an employee and include an attachment or link that, once clicked, unleashes malicious code.

"Say a CEO has a Twitter or LinkedIn account and I am able to see those posts," Albuquerque said.

"Then I could produce content that looks like it came from him and send it to his staff, who will be less suspicious of clicking a link."

He said the Trustwave-developed tool was not designed to extrapolate insights into people's conduct or personalities, but that such observations could be made if desired.

"Absolutely, you can show what the people posting are like," Albuquerque said.

The tool provides "spear phishers" with outlines for creating messages likely to hook prey.

It is intended for "ethical hackers" such as security professionals working with companies or organizations to find and patch weak spots in computer network defenses, according to Albuquerque.

It can also be used to help prove when posts claiming to be written by someone are bogus, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Judge weighs Manning verdict after final statements
Fort Meade, United States / Maryland (AFP) July 26, 2013
The military judge overseeing the trial of US soldier Bradley Manning over his massive transfer of secret files to WikiLeaks began considering her verdict after closing arguments Friday. After hearing the final statements at Fort Meade outside Washington, Colonel Denise Lind closed the court. She is expected to give her verdict in the coming days. At Manning's request, the judge - and ... read more


CYBER WARS
Bad night's sleep? The moon could be to blame

Moon Base and Beyond

First-ever lunar south pole mission could be attempted by 2016

Engine recovered from Atlantic confirmed as Apollo 11 unit

CYBER WARS
Curiosity Mars Rover Gleams in View from Orbiter

Mars Curiosity sets one-day driving distance record

Scientists establish age of Mars meteorites found on Earth

Ancient snowfall likely carved Martian valleys

CYBER WARS
Dutch city patently the world's most inventive

NASA starts building faster-than-light warp engine

Zero Gravity Solutions Commences Trading Of Its Stock

Boeing CST-100 Spacecraft Model Passes Water-Recovery Tests

CYBER WARS
China launches three experimental satellites

Medical quarantine over for Shenzhou-10 astronauts

China's astronauts ready for longer missions

Chinese probe reaches record height in space travel

CYBER WARS
ISS Research Exposing the Salty Truth of Supercritical Water Transitions

NASA launches new probe of spacesuit failure

Space Station ARISS Software Upgraded by Student For Students

Astronaut's helmet leak forces abrupt end to spacewalk

CYBER WARS
Three Soyuz launchers are at the Spaceport for Arianespace's upcoming medium-lift missions from French Guiana

Flawless launch of Alphasat, Europe's largest and most sophisticated telecom satellite

Alphasat Wears Its Color For Alphabus

Both payloads for Arianespace's next Ariane 5 flight are now mated to the launcher

CYBER WARS
Solar system's youth gives clues to planet search

Snow falling around infant solar system

'Water-Trapped' Worlds

A snow line in an infant solar system: Astronomers take first images

CYBER WARS
Perfecting digital imaging

Ancient technology for metal coatings 2,000 years ago can't be matched even today

Controlling friction by tuning van der Waals forces

Carnegie Mellon, Microsoft researchers demonstrate internal tagging technique for 3D-printed objects




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement