четверг, 29 марта 2012 г.

Distributed-denial-of-service (DDoS) attacks


Distributed-denial-of-service (DDoS) attacks have become a favorite weapon of hacktivists in the past several years, and especially recently. But while such attacks are typically launched from an army of PCs, researchers at McAfee have found a new app for Android that ports the infamous low orbit ion cannon (LOIC) tool over to mobile devices.
LOIC works by sending a large amount of TCP/UDP packets to a specific URL, explained Carlos Castillo, a malware researcher with McAfee. Besides the new Android version, the tool has also been ported to JavaScript to perform a denial-of-service directly from the browser. Porting the tool over to Android was made easy by the fact that it was generated using a free online service that creates Android apps with just a URL, HTML code or document file, Castillo blogged.
"In this case, the attack was created with only the URL of a specific pastehtml website that has a JavasScript version of LOIC to perform a DoS attack against the Argentinian government," he wrote. "The attack is part of the operation, run by an Anonymous cell in South America."
"When it is executed, a WebView component shows the contents of the URL, which is basically an HTML web page with a JavaScript that sends 1,000 HTTP requests with the message "We are LEGION!" as one of the parameters," he added.
‘We are LEGION’ is a common slogan used by members of Anonymous.
Recently, application delivery and security provider Radware released a report that noted that while large DDoS attacks often get the most publicity, many organizations are victimized by less intensive attacks that do plenty of damage. For example, the company found 76 percent of the attacks it analyzed from 2011 were less than 1Gbps in bandwidth, and 32 percent were less than 10 Gbps. Just nine percent of the attacks were more than 10 Gbps in bandwidth.
"Creating Android applications that perform DoS attacks is now easy: It requires only the URL of an active web LOIC–and zero programming skills–thanks to automated online tools," Castillo wrote. "Because the application’s purpose is simply to display any website on an Android system, we classify this hack tool a potentially unwanted program (PUP). If you have enabled PUP detection (our default setting), then McAfee Mobile Security for Android will detect this tool as Android/DIYDoS."

среда, 28 марта 2012 г.

РСС Казахстан


ПОВЕСТКА ДНЯ
16-го заседания Рабочей группы по информационной безопасности взаимодействующих сетей связи
при Совете операторов электросвязи РСС

1.      Информация о деятельности в области обеспечения информационной безопасности от принимающей стороны.
2.      Создание национальных центров безопасности для сетей связи общего пользования (замечания и предложения).
3.      Предложения по взаимодействию операторов связи в борьбе с мошенничеством.
4.      Требования к системе противодействия мошенничеству (antifraud).
Докладчик:  Емельянов Р.С., ЗАО «ТрансТелеКом»
5.      Требования к системе ограничения доступа к контенту
Докладчик:  Стефанович С.М., РУП «Белтелеком»
6.      Что такое кибербезопасность?
Докладчик:  Костров Д.В., ОАО «МТС»
7.      Защита персональных данных. Разработка методических документов. Обмен опытом.
Докладчик:  Тариелашвили Г.Т., ОАО «Укртелеком»
8.      Разное.


суббота, 10 марта 2012 г.

IETF explores new working group on identity management in the cloud


MARCH 09, 2012

IETF explores new working group on identity management in the cloud

Cisco, Salesforce, and Google are among the backers of the SCIM protocol for cloud-to-cloud provisioning

Proponents of a common scheme for managing user identity in cloud-based applications will pitch their idea to the Internet's premier standards-setting body at a meeting in Paris later this month.
specification already exists for Simple Cloud Identity Management (SCIM) that is supported by security software vendors including Cisco, Courion, Ping Identity, UnboundID, and SailPoint. SCIM also has support from key cloud vendors, including Salesforce, Google, and VMware.
[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
At issue is whether SCIM will become an IETF-approved working group and eventually an industry standard.
The IETF is hosting a meeting to discuss the proposed SCIM working group on March 29. In January, the IETF created a mailing list to discuss SCIM.
Proponents of SCIM say the protocol will make it easier for companies to control access to data stored in popular cloud-based applications like Salesforce, Workday, Taleo, Box and others.
Gartner backs the idea of SCIM as a simpler method of provisioning and de-provisioning employees from cloud applications - a process that's currently handled manually in most corporations. Mark Diodati, a research vice president with Gartner, wrote in late February "it appears that SCIM remains on track."
One vendor that's a strong proponent of SCIM is UnboundID, which sells identity management infrastructure software for service providers.
"There is no meaningful way to sling identities from cloud to cloud or from cloud to premises applications," explained UnboundID's CEO Steve Shoaff. "UnboundID is one of the only vendors shipping a commercial version that allows you to broadcast SCIM events and receive SCIM events. It's a modern protocol and a way to share identities between cloud providers. We're building our entire portfolio around SCIM to really build the identity economy."
Proponents say that what's good about SCIM compared with previous identity standards such as SPML is that SCIM is lightweight, it doesn't try to do too many functions, and it uses a Web services approach.
The alternative to SCIM is the proliferation of proprietary APIs for each cloud application. This situation requires security software vendors like Courion and SailPoint to create custom connectors to provision each cloud-based application.
Instead, SCIM would provide a standard way to move identity data from premises-based to cloud applications and from one cloud application to another.