Category Archives: Security
Automation has been part of the production process for many years. In 1947 General Motors created an automation department in their factory. At that time, the technology tools used in industrial automation were largely electrical, mechanical, and hydraulic. Amazingly, in the first 17 years of the department, General Motors doubled their productivity and output. Proving that Industrial Automation is a valuable investment.
In 2012, Bill Gates was quoted as saying, “If GM had kept up with technology like the computer industry has, we would all be driving $25 cars that got 1,000 MPG.” The computer industry has gone through extensive automation. Components continue to get more powerful and smaller. With advanced computing capabilities computers not only lead the market in automation but are now being used to increase productivity and automation in other industries.
Though cloud security has advanced, applications in the public cloud are not as secure as applications stored on servers in enterprises. Even with security issues, cloud computing is becoming a necessity in businesses. Cloud computing is recommended for disaster recovery, for increased mobility and for increased accessibility of applications and data. When risks are reduced, cloud computing becomes a viable solution for many people.
Currently, The Cloud Security Alliance is promoting standards to improve cloud security and help the public feel more secure about hosting applications in the cloud. Future standards will make it easier to evaluate all business’s security based on a pre-selected basis. Currently, each business must be evaluated on a case-by-case basis. This process is time-consuming and difficult. Until standards are more universal, here are some tips for staying safe in the cloud.
What is the Cloud?
Microsoft has declared that the next Operating System that it is going to release shortly will feature an app that will be able to manage several passwords single handedly. According to a post on Microsoft’s Building Windows 8 blog the aforementioned Operating System will enable the users to maintain multiple passwords behind one single major password. The company has also mentioned that users will be able to synchronize their passwords in any other system that runs Windows 8.
Former No. 2 uniformed officer in the U.S. military claims that the United States should be developing offensive cyber weapons so that they could use it whenever some foreigners hack their computer.
Four-star Marine Corps general who retired in August as the vice chairman of the Joint Chiefs of Staff, James Wright says that the US must be open to developing cyber weapons since they got the capabilities. The US must also train people in order to make them credible of fighting this online threat so that the world will know that hacking is criminally liable, and the US will do something about it.
Cartwright, raised the profile of cyber security problem at a time when he was still in uniform, told Reuters in an interview that the rising intensity and occurrence of network attacks by hackers highlighted the need for an effective restriction.
Current and former U.S. officials did not want to talk about any weapons. However, it is widely accepted that the United has both offensive and defensive ways to respond to escalating and increasingly detrimental attacks from overseas.
To underscore the threat, this week an arm of the U.S. intelligence community announced a report that identifies China and Russia as the most active and determined nations, which uses cyber espionage in stealing U.S. trade and technology secrets.
Cartwright said that there is a need to send a strong signal to potential adversaries that the United States viewed that respond to cyber attacks as its “right to self-defense,” even if hackers were using a server in a third country.
He said that they’ve got to get do it, since all is a free shot at them and there’s no penalty for it.
His comments come as the Obama administration discusses the rules of engagement for cyberspace, now seen as a fifth domain for military operations that join air, land, sea and space.
At an earlier time, this year, the White House issued a new cyber strategy that once warranted, the United States would take action to hostile acts in cyberspace as it would to any other threat to their country.
Now the military must work out exactly a way to implement that. Key questions include how forthright Washington is going to be about work on offensive computer network attack weapons; what would signify an act of war; and ready plans for training, testing and using of its electronic arsenal.
Recent attacks on U.S. corporations include Google Inc, the Nasdaq stock exchange, Lockheed Martin Corp, and RSA, the security division of EMC Corp, have given government officials and lawmakers a new sense of urgency regarding how are they going to address threats to U.S. computer networks.
A result of an eight week study found that Facebook‘s fake account detection mechanisms can be easily overcome by 80 percent of the time with the special help of automated tools. The study conducted by researchers from the University of British Columbia (UBC).
Yazan Boshmaf together with some of the of programmers such as Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu created a network of 102 bots designed to pose as real humans on social networks. The researchers then released the bots on Facebook with the intention of befriending as many users as possible so that it could collect private information about the unsuspecting users.
To create a user account on an OSN [online social network] the bots must perform three tasks: providing an active email addresses, creating a user profile, and a little bit of solving a CAPTCHA. [...] They are arguing whether an adversary can fully computerize the account creation process.
The trick that the researchers did is not new since its been used before by Koobface have long used automatically created accounts in spamming malicious links. This persuaded Facebook in developing specialized detection mechanisms over the years.
According to UBC researchers, such defenses are not that effective in fighting those malwares. The social bots the researchers let lose onto Facebook targeted 5,053 arbitrarily selected users to whom they sent friend requests.
The rate at which the embattled individuals accepted these requests were 20 percent on average. The researchers found out that by using female profiles, the bots have a higher success than those bots that have male profiles. However, the rate tripled when the bots started targeting friends of those who had accepted requests.
Following the time that the bots has become a friend with new users the automated programs scraped their profiles, news feeds and wall posts so that it could gather all the pertinent information. The collected data included things like gender, birth date, place of employment, names of attended schools, home city, current city, mail address, email address, phone number, IM account IDs and marital status.
The researcher got forced to stop the test after their servers can not handle the traffic that it is getting from the said test.
During the time of the trial, Facebook’s real-time protection system only manages to block 20 of the 100 fake profiles. However, when they investigate it thoroughly, they discovered that the profiles got flagged as spam by other users.
Malware experts acknowledge Facebook’s efforts in blocking automated account creation efforts on its social network. According to antivirus vendor BitDefender, the number of threats, using the same techniques has decreased considerably in the course of the past two years.
The researchers said that the best way to protect a person’s account is by not accepting any friend invitation from unidentified users. Also, it would be better if users would not click on any links that that users sent on them, even if it comes from someone you know.