Payment Networks – Invaluable Lessons

image

The troubles we have with our passwords and proper identification required for numerous online services can be overcome based on the experiences from one of the least likely fields in this matter. We are talking about the different payment networks. What they got to do with the identity protection challenge?

Well, for what is worth, the payment networks had the same problems we are facing now. We all know that these systems rely heavily on credit cards. The basic presumptions about the identity protection are absolutely the same. At some point in time someone has figured out that credit cards have to be protected in order for the entire system to work.

This does not mean that we have to hire rocket scientists to solve our password puzzle. All we have to do is to closely evaluate the invaluable experiences and solutions left by the top security experts for some of the most successful payment networks. In our case we pay with something far more valuable than our money.

We trade with our privacy. So, let us do our best to ensure that this is a fair deal where both sides of the process are equally protected and safe from any harm. We should look for more appropriate analogies around us. You never know where you can find a solution for your problem. Right?

How To Hack Your Hotel Room?

 

4_2177_imela_3

Here is one hot topic literally. You are already there or planning to hit the road to a nice looking beach. Here is the catch. With a little bit of patience and nothing more than an iPad 2 you can take control over your hotel room. We are talking about the real control, including all the services your hotel room has to offer, such as cooling system, lights, TV, and others. You name it, you can have it.

However, there is also some bad news. Someone else other than yourself can easily hack your hotel room. Or, as a matter of fact the entire hotel. You can easily end up paying someone else’s hotel bills. Or, even worse, you can be forced to look for another hotel as soon as you arrive. According to the hotel books and computers everything is as it should be, but only you know that is not true.

It seems that the hotel industry has to update itself, as soon as possible. The times when hotel robbers took their tools with them are long gone. Nowadays, you do not have to get your hands dirty in order to rob a hotel. All you have to do is to play smart and use your smartphone or tablet. In this matter, the sky is the only limit you face while you walk down the virtual hotel lobbies.

Well, it is about time for prestigious hotels make some additional investments for appropriate software. It is not enough to have the top booking software. What about the security of hotel in the first place and its guests? The last thing you need is some new virtual hotel’s manager with the dishonest intentions to take over the control. The IT room service is at your door.

Dragonfly Make You Cry

image

Here is something you do not see very often in the world of cybercrime. The Dragonfly is a highly skilled and specialized hacking group, which targets specifically energy related IT infrastructure. According to one of the rumors Russia stands behind this group in both staff and logistics. This is how the Dragonfly got one more name.

The Energy Bear is its other name. You know how it goes, don’t you? The bear is an obvious association for Russia itself. And, the energy is for all the energy facilities under a direct threat of this group. It is worth mentioning that these Russian hackers target exclusively EU and USA based or related energy related companies.

Are they exaggerating? Are they sure these are Russian guys on the run? For what is worth, someone is causing so many troubles to the energy focused corporations. The Energy Bear has very powerful malware claws, that is for sure. On the other hand, after the recent events in Ukraine the energy sustainability is of the greatest importance for the Western Hemisphere.

Let us face it. The war is on. You can call it the continuation of the cold war. It has all the elements of an unprecedented energy conflict. Nowadays, the hackers are wearing government suits or even worse military uniforms. Cyber war is a reality more than ever. There has to be an appropriate answer coming from the West.

Bank Fraudsters World Cup

image

It seems that the German football team was not the only trouble to hit the Brazilians this summer. While they were watching their national team’s unparalleled embarrassment, there were some busy little bees with no interest in football at all. So, what happened?

Well, the most popular online banking system in Brazil called Boleto Bancario suffered a serious damage as a result of a malware doings. Unfortunately, the hackers picked up the moment of the greatest possible vulnerability. Yes, they were working like crazy during a match between Brazil and Germany.

As a result Brazilians lost a little bit of their national pride, and a lot of their money. Now, they have to fight back the ugly memories and unwanted financial losses. Could all of these been prevented in the first place? Well, you can eliminate a threat, but you can certainly diminish it.

Can we predict something like this? Absolutely, you do not have to be a rocket scientist to expect that major events attract major security threats with a magnetic force. Someone has to be always on a watch. If we have to watch a game, our software solutions certainly do not have to.

Cyber Terror. Human Error.

image

According to the recent findings of the Ponemon institute for “The State of Data Centric Security” human errors and attitudes remain to be the biggest problem for the adequate IT security. The statistical percentages in this field are simply too depressing and discouraging to handle.

Although, the companies which took part in this survey recognized the threats and even suffered from cyber-attacks, more than 60% of them missed to take a serious action about it. Really hard to believe, and almost impossible to justify. There are so many excuses to simply paralyze all your efforts instantaneously.

We do not have enough qualified personnel. Our budget is limited. Other projects are our priority right now. We do not have time to do it right now. Do these excuses sound.familiar to you? What kind of a catastrophic damage we have to suffer from in order to come to our senses?

We can create a state of the art security solution all in vain. What is the use, if there is no one to use it properly or on time? Unfortunately, a human error still remains to be cyber-cryme’s most helpful ally. What do we have to do to change all of that? Think about it. Will you?

High-level Talks. High-level Hacking.

image

Well, when it comes to this one we are not surprised at all. For the next high-level talks between the USA and China the issues associated with the IT security will not be treated as the secondary ones. It seems that the time has finally come to treat IT security with some decent respect it truly deserves.

So, what seems to be the problem here? Maybe it is better to ask, are there any areas which are not under the heavy burden of extremely compromised IT security? Hacking, Internet censorship, corporate data theft, cyber espionage, and you name it, they certainlyy have on their list.

So, what can we expect? Well, if you think that the Chinese are going to apologize and correct all consequences of their previous wrongful doings, then you are at least saying naive. China is the only country in the entire world, which has the capacity to run an entirely independent Internet of their own.

Let us be realistic about this one for a change, shall we? To recognize these problems and give them a top priority shoulder to shoulder with other sensitive political, economy, and military related problems is undoubtedly an impressive achievement. Let us hope they can do a little bit more than just talking and smiling for the cameras.

Hackers Hollywood

image

How real and accurate are the Hollywood movies about hackers and hacking? What is your favorite one? Here are some interesting choices and recommendations mentioned by Dark Reading, which specializes for the security issues and news. It is not only enough to mention hacking, the whole movie has to be about it.

Disney’s Tron and Tron Legacy were definitely all about it. Although, we have to add, this was rather a simplified and romantic story about cyber pirates of the modern age. There is one move worth of our attention in this matter. Swordfish with John Travolta. Nevertheless, this movie was not about him at all from the IT perspective.

With all due respect to IT experts all over the world Hugh Jackman was too good looking for a hacker. You simply do not have computer gigs, who look like models. For what is worth, the timeless classic WarGames is still the number one representative for Hackers Hollywood. Its story is far from outdated, as well.

Last but not least, there are so many documentaries, which do not fit strictly into this category, but provide a nice inside view into the world of hackers. For the time being, Hollywood has some troubles of its own. They are still making a movie about online piracy, if you know what we mean.

The Blind Man Who Taught Himself How To Hack

2177_imela_4

Although, you may find this story hard to believe, we are actually referring to a true event, which took place in Zambia. Believe it or nor, a blind hacker is facing a two years imprisonment for his crimes. Yes, you got that one right. He is a blind person. He lives in one of the last countries you could possibly expect for a hacking to occur.

And yes, he was able to successfully hack one of the leading Zambian telecommunication companies. In addition, this extraordinary hacker was able to ensure access to mobile phones used by the Zambian minister of defense and minister of foreign affairs. So, what was the damage caused by his hacking activities?

Well, no more than $4,000 for the period of four years. Pay attention, only for the phone bills on the “borrowed” phones. For what is worth, we do not favor or support crime in any form or situation. However, this remarkable individual, who was able to overcome his disability, definitely deserves a better fate than a jail time.

At least what Zambian government can do in his case, is to offer him a well-paid full-time job in either some telecommunication department or in the police. He has proven his talents already, hasn’t he? A man like him you definitely need to have as your most trusted ally. Never as your worst enemy. Right?