Ei ole luotettavia lähteitä. Vain norjalainen blogisivu.
Onko the register epäluotettava lähde?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Ei ole luotettavia lähteitä. Vain norjalainen blogisivu.
Se viittaa vain juuri siihen norjalaisblogiin.Onko the register epäluotettava lähde?
Olisko kauhean foliopipoista väittää, että tulevaisuudessa (5-10v) kännykkä leipoo 4K/8K-tasoisesta videosta reaaliajassa esiin vaikkapa juuri FB-profiilin käyttäen kasvokuvia?
http://www.theregister.co.uk/2016/04/18/ai_bot_spots_hacking_attacks/Eggheads at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) claim they have trained a machine-learning system to detect 85 per cent of network attacks.
To reach that level, the software, dubbed AI2 [PDF], parsed billions of lines of log files, looking for behaviors that indicate either a malware infection or a human hacker trying to get into a network. If it spotted any suspicious connections or activity, it alerted a human analyst, who identified whether the software got it right or wrong.
After 3.6 billion log lines were scanned and three months of training passed, the AI2 system was able to hit 85 per cent accuracy in detecting malicious activity, we're told.
"This brings together the strengths of analyst intuition and machine learning," said Nitesh Chawla, the Frank M. Freimann Professor of Computer Science at the University of Notre Dame.
"This research has the potential to become a line of defense against attacks such as fraud, service abuse and account takeover, which are major challenges faced by consumer-facing systems."
"You can think about the system as a virtual analyst," added CSAIL research scientist Kalyan Veeramachaneni.
"It continuously generates new models that it can refine in as little as a few hours, meaning it can improve its detection rates significantly and rapidly. The more attacks the system detects, the more analyst feedback it receives, which, in turn, improves the accuracy of future predictions – that human-machine interaction creates a beautiful, cascading effect."
This kind of software has been what security companies have spent over a decade trying to get right. So-called heuristic systems are plagued with false alerts and can miss key attacks. MIT's AI2 system is certainly an improvement, but it's not there yet – after all, it lets through 15 per cent of attacks, and only one needs to succeed. And as attacks change, the AI's knowledge will become useless unless it is continuously trained, just like a normal person has to keep learning.
At this year's RSA security conference, AI security systems were very much this year's trick, with plenty of companies putting forward so-called smart systems that use machine learning for detection. RSA president Amit Yoran warned attendees to remain skeptical, and many in the industry agree.
http://www.wired.com/2016/04/mits-teaching-ai-help-analysts-stop-cyberattacks/Most of AI2‘s work helps a company determine what’s already happened to it can respond appropriately. The system highlights any typical signifiers of an attack. An extreme uptick in log-in attempts on an e-commerce site, for instance, might mean someone attempted a brute-force password attack. A sudden spike in devices connected to a single IP address suggests credential theft.
Other machine-learning systems dig through mountains of data looking for suspicious activity. But only AI2 uses regular input from analysts to turn that mountain into a molehill. A machine lacks the expertise to do the job alone.
In fact, without human input AI2 wouldn't be possible.
AI2 honed its skills reviewing three months’ worth of log data from an unnamed e-commerce platform. The dataset included 40 million log lines each day, some 3.6 billion in all. After 90 days, AI2 could detect 85 percent of attacks. Veeramachaneni says the unnamed site saw five or six legitimate threats a day during that time, and his system could pinpoint four or five.
Not a perfect sore, but Veeramachaneni says achieving an 85 percent detection rate using unsupervised machine learning would mean having analysts review thousands of events per day, not hundreds. Conversely, pulling 200 machine-identified events each day without an analyst’s input yields a 7.9 percent success rate.
AI2 also can help prevent attacks by building predictive models of what might happen the following day. If hackers use the same method over the course of a few days, a business can bolster security by, say, requiring additional confirmation from customers. If you know someone’s trying to swim across your moat, you can throw a few more alligators in there.
Though the tech shows great promise, it cannot replace human analysts. Security is just too important, and the threats too varied. “The attacks are constantly evolving,” Veeramachaneni says. “We need analysts to keep flagging new types of events. This system doesn’t get rid of analysts. It just augments them.”
http://www.theguardian.com/world/20...cies-collected-bulk-personal-data-since-1990sBritain’s intelligence agencies have been secretly collecting bulk personal data since the late 1990s and privately admit they have gathered information on people who are “unlikely to be of intelligence or security interest”.
Disclosure of internal MI5, MI6 and GCHQ documents reveals the agencies’ growing reliance on amassing data as a prime source of intelligence even as they concede that such “intrusive” practices can invade the privacy of individuals.
A cache of more than 100 memorandums, forms and policy papers, obtained by Privacy International during a legal challenge over the lawfulness of surveillance, demonstrates that collection of bulk data has been going on for longer than previously disclosed while public knowledge of the process was suppressed for more than 15 years.
http://www.theregister.co.uk/2016/04/21/restricted_locks_picked/A group of Melbourne lock-pickers have forged a creative method for popping so-called restricted locks by 3D printing keys found on freely-available designs on patent sites.
The feat demonstrated at the BSides Canberra security conference last week is a combination of opportunistic ingenuity and lock-picking mastery, and will be warmly-received by red team penetration testers and criminals alike.
Lock-picking is common within the information security industry, is a staple at hacker conventions, and is becoming an increasingly used skill as part of anything-goes attempts to access controlled areas wherein computers can be found.
Restricted keys are controlled by limiting manufacture to expensive specialist locksmiths who require licences and specific machinery to produce the keys.
Locks using the keys are used across enterprises to secure sensitive areas such as offices and data centres.
Now a Loop security consultant known as "Topy", and his fellow lockpickers say restricted keys have become skeletons in the security closet.
Their plastic, 3D-printed blank keys are sufficiently strong to be used multiple times without breaking.
With such keys in hand, a lock-picker can obtain the cylinder from a vulnerable lock - say one at the external gate of a targeted facility - to learn the master key pattern which can then be applied to the 3D printed blank restricted key.
"The restricted keys have 'do not copy' stamped on them, but unfortunately it doesn't really mean anything," Topy told hackers.
"In Melbourne you can't get restricted keys from locksmiths no matter how nicely you ask them … so we decided to make them ourselves.
"The shape of the keys is patented and that means you can go online and search the database for very high quality images."
The key blanks are often scalable vector images with precise measurements that allowed Topy and his colleagues to create computer-aided designs of many restricted keys.
Cracking restricted keys enables an attack whereby a restricted lock is removed from a gate - which takes just two well-placed cuts of a rotary tool - and a replacement that accepts any key is inserted. The attack therefore goes undetected.
The lock picker can then extract the original lock's cylinder and tap out the pins within. Each can be measured and used to build the respective restricted master key.
Topy says master keys are used in scores of businesses, utilities, and government buildings where separate levels of physical access are required for staff with different levels of security clearance.
There are some scenarios in Australia where highly-sensitive master keys can be derived from extremely vulnerable environments, but the details of those attacks are being kept under wraps until the situation can be resolved.
Topy and his colleagues developed the attack in a hired warehouse dubbed HackHouse, and are working on new methods to overcome high-security locks.
His attacks, like many other emerging information security exploits, are not needed to break into many secured areas since businesses and individuals typically buy cheap and easily-poppable locks.
Lock-picking is a staple of security conferences. Hang around and you'll see ATMS, wafer and tumbler locks and every type of handcuff on the market picked apart.
Even rudimentary lock-pickings skills sometimes aren't needed to access secure areas, as many organisations use key safes to store master keys. But those safes can be opened using weakly-protected combination locks. ®
http://www.theregister.co.uk/2016/0..._kids_winners_under_oz_govt_infosec_strategy/The Australian Government has today launched an information security strategy under which AU$230 million will be spent over four years to improve critical infrastructure defences through private and public sector information sharing, innovation security centres, and by bankrolling support for 5000 security tests for businesses.
Speaking at the Cyber Security Strategy launch in Sydney today Prime Minister Malcolm Turnbull outlined the investments in new information sharing hubs, university skills, and ambassadors to help bolster engagement with the private sector and regional allies.
He also acknowledged the long-suspected, never-acknowledged offensive hacking capability within the Australian Signals Directorate.
Turnbull said Australia only conducts such attacks for defense and deterrence purposes, sometimes directed against criminals, and did not acknowledge Australian efforts to hack for intelligence purposes on its own behalf or to assist fellow members of the Five Eyes security alliance.
http://www.reuters.com/article/us-nuclearpower-cyber-germany-idUSKCN0XN2OSA nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility’s operations because it is isolated from the Internet, the station’s operator said on Tuesday.
The Gundremmingen plant, located about 120 km (75 miles) northwest of Munich, is run by the German utility RWE (RWEG.DE).
The viruses, which include “W32.Ramnit” and “Conficker”, were discovered at Gundremmingen’s B unit in a computer system retrofitted in 2008 with data visualization software associated with equipment for moving nuclear fuel rods, RWE said.
Malware was also found on 18 removable data drives, mainly USB sticks, in office computers maintained separately from the plant’s operating systems. RWE said it had increased cyber-security measures as a result.
W32.Ramnit is designed to steal files from infected computers and targets Microsoft Windows software, according to the security firm Symantec. First discovered in 2010, it is distributed through data sticks, among other methods, and is intended to give an attacker remote control over a system when it is connected to the Internet.
Conficker has infected millions of Windows computers worldwide since it first came to light in 2008. It is able to spread through networks and by copying itself onto removable data drives, Symantec said.
RWE has informed Germany’s Federal Office for Information Security (BSI), which is working with IT specialists at the group to look into the incident.
The BSI was not immediately available for comment.
Mikko Hypponen, chief research officer for Finland-based F-Secure, said that infections of critical infrastructure were surprisingly common, but that they were generally not dangerous unless the plant had been targeted specifically
http://www.zdnet.com/article/nsa-whistleblower-overwhelmed-with-data-ineffective/In a lunch meeting hosted by Contrast Security founder Jeff Williams on Wednesday, William Binney, a former NSA official who spent more than three decades at the agency, said the US government's mass surveillance programs have become so engorged with data that they are no longer effective, losing vital intelligence in the fray. That, he said, can -- and has -- led to terrorist attacks succeeding.
http://www.theregister.co.uk/2016/0..._10000_bounty_not_to_eliminate_justin_bieber/The record for the youngest security researcher getting paid by Facebook’s bug bounty scheme has been smashed by Jani, a 10-year-old Finnish lad who found a major flaw in Instagram.
http://www.theregister.co.uk/2016/05/05/jaku_botnet/Security researchers have spotted an on-going global botnet campaign seemingly linked to North Korea.
The Jaku botnet has an unusual split personality. On the surface it’s spreading en masse through pirated software (warez) or poisoned BitTorrent trackers to notch up around 17,000 victims at any one time.
However, a six month investigation by Forcepoint Security Labs has revealed that on closer inspection, it “targets and tracks a small number of specific individuals”.
These individuals include members of International Non-Governmental Organisations (NGOs), engineering companies, academics, scientists and government employees.
“The victims are spread all over the globe, but a significant number of victims are in South Korea and Japan,” Forecepoint reports.
The security firm describes Jaku as a “multi-stage tracking and data exfiltration malware”. These “narrow, highly-targeted attacks on individual victims, seeking to harvest sensitive files, profile end-users and gather valuable machine information” take place behind a smokescreen of routine mass-market malfeasance.
Forcepoint has determined that the botnet command and control (C2) servers it's identified are also located in the APAC region, including Singapore, Malaysia and Thailand. The hackers appear to be native Korean speakers. All this, circumstantially, points to North Korea or less probably Chinese hackers posing as Pyongyang.
This is El Reg inference rather than Forcepoint’s.
Attribution is notoriously difficult in cyberspace, as best evidenced by the Sony Picture assault, now widely regarded as the work of the NORKS following months of doubt and speculation. It’s safer to say that Jaku represents an evolution in cyber-tradecraft.
It demonstrates the re-use of infrastructure and TTP [tactics, techniques, and procedures] and exhibits a split personality. JAKU herds victims en masse and conducts highly targeted attacks on specific victims through the execution of concurrent operational campaigns. The outcome is data leakage of machine information, end-user profiling and incorporation into larger attack data sets. Forcepoint said it had coordinated with various law enforcement agencies throughout the investigation, which began in October 2015. Its customer have been protected since then. More details on the malware can be found in a white paper from Forecpoint here (pdf) (main findings summarised in an infographic here)
http://www.theregister.co.uk/2016/0...months_house_arrest_for_yanking_us_army_docs/A former People's Liberation Army soldier turned US defence contractor has been handed six months home detention after transferring classified material to a USB stick and deleting logs.
Wei Chen, 62, of Massachusetts, was charged in July 2015 with making a false statement and damaging army computers after he was found transferring classified documents onto a thumbdrive, using security clearance he gained by lying on an application form about his involvement with China's PLA.
Chen deleted logs in a bid to cover up the document siphon, the US Department of Justice says.
He was also handed five years probation and a fine of US$8000 after pleading guilty in December.
Chen faced up to 15 years in prison.
The Department explained that Chen was assigned as a system administrator to the Camp Buehring army posting in Kuwait after receiving his clearance.
"On June 15 and 16, 2013, Chen connected one or more of his own thumb drives to computers at Camp Buehring that were connected to the Army’s unclassified network and the classified Secret-level network.
Chen then made an effort to cover his tracks and hide his security violation. Specifically, he cleared network logs on the server that would have documented the connection of the thumb drive to the network server. Chen also copied a computer file, containing saved e-mail and documents, from his Secret-level workstation onto his thumb drive."
The Department did not detail if simply clicking 'no' to the question'have you ever served in a foreign country’s military?' was sufficient to obtain security clearance in the US Army, but noted Chen did so with knowledge that false answers can lead to jail time.
https://wp.me/p3AjUX-uGbA Twitter business partner, whose service sifts through Twitter’s so-called fire hose of tweets as well as data from other sources to ascertain patterns in breaking news events, has been told to no longer provide its services to the U.S. intelligence community.
The Wall Street Journal on Sunday reported that the arrangement between Dataminr—Twitter owns five percent of Dataminr—and the intelligence community is over. Twitter said in an email to Threatpost that it is against its policy to sell data to the IC for surveillance, but the Journal reported that the business arrangement ended after the conclusion of a test program arranged by In-Q-Tel, the investment arm of the CIA.
https://thestack.com/world/2016/05/10/judge-rules-in-favor-of-hacktivist-love/A judge in Westminster has ruled that alleged hacktivist Lauri Love cannot be forced to provide encryption keys to the National Crime Authority. This move has been called a "victory for all who use encryption in the UK" and a "great decision for privacy and personal freedom." The NCA's request was widely regarded as an attempt to circumvent the Regulatory of Investigative Powers Act of 2000, which specifically legislates police power to compel subjects to hand over encryption keys. The NCA originally tried to force Love to turn over encryption keys under RIPA in 2014 but were unsuccessful. So Love, whose property was seized two years ago, made an application to have it returned under the 1897 Police Property Act. In response, the NCA attempted to legally force decryption under the same act. The NCA argued, in the ruling documents, that they could only ascertain the contents of the devices if Love was forced to provide the encryption key. The district judge was not persuaded by this argument, saying, "The case management powers of the court are not to be used to circumvent specific legislation that has been passed in order to deal with the disclosure sought." Legal experts have noted that this case represents a civil action being put forth in a magistrate's court, which normally only deals with criminal issues.