Chris Brook

About

"Distrust and caution are the parents of security" - Benjamin Franklin

Hackers from China Target, Hit U.S. Chamber of Commerce

A band of hackers from China was able to gain access to the U.S. Chamber of Commerce and retrieve information on the organization’s employees for over a year before they were discovered in May 2010, according to a report in the Wall Street Journal today.  

Stuxnet Part II, III and IV

The nation-state sponsored malware arms race is on. Stuxnet may have been the “Shot heard round the world” but we think its likely that 2012 will witness a number of other skirmishes, with malware linked to foreign governments hostile to (or allied with) U.S.


Adoption of Google’s Android operating system is accelerating faster than a run-away train. That’s good news for Google, which always saw Android as a potential iPhone killer. But the events of the past year also make it clear that the company will be forced to deal head on with a dirty little secret: both the Android operating system and the Android Marketplace have become the preferred platform for malicious software authors interested in compromising mobile devices.

Pre-Owned Hardware

Counterfeit and “certified pre-owned” hardware is nothing new, but we think 2012 will see this issue morph from a sideshow in the cyber security world to center stage, with new revelations about contamination of the global supply chain by hardware and software components of dubious origin and possibly malicious intent.

User backlash against Facebook’s ever-evolving but always overreaching data privacy plans is almost as old as the site itself. But there’s good reason to believe that 2012 will mark a turning point for the fast growing social network. For one thing, Facebook is on track for an IPO (initial public offering), possibly before the end of 2011. Valuations for the 800 million person social network range as high as $100 billion in private markets. With an IPO looming, Facebook is under more pressure than ever to generate outsized revenue from its massive, 800 million strong user base.

The past year saw the emergence of a series of cleverly named hacking groups like Anonymous, LulzSec, and TeaMp0isoN. In 2011, these groups brought the fight to corporate America, crippling firms both small (HBGary Federal) and large (Sony). As the year drew to a close these groups noticeably shifted from prank-oriented hacks for laughs (or “lulz”), aligning themselves with political movements like Occupy Wall Street and using their skills to lend material and virtual support to the protests in various cities.

Stuxnet and the specter of sophisticated, state-sponsored attacks were still dominating the news a year ago, as 2010 ended and we welcomed the New Year. Soon enough, however, there would be a new phenomenon to contend with: hacktivists. As the attack on HBGary Federal and Sony showed, faceless online activists or anarchists can do plenty of damage to even sophisticated and well protected firms.

Not Again! Duqu Hits Iran

Pity poor Iran. They can’t catch a break. After cleaning up the mess Stuxnet wreaked on their nuclear ambitions, the Middle Eastern country admitted in November that a number of machines across multiple industries were infected with Duqu. While academic arguments raged over whether similarities in source code proved Duqu was the spawn of Stuxnet, researchers digging around under the worm’s hood discovered some interesting and unique characteristics.

Mobile Madness

Admit it. It would scarcely break your heart if the legions of slack-jawed smartphone Facebook and FourSquare gawkers were forced to confront their own digital mortality – however briefly – with a few scary exploits made just for them. In 2011, the untethered among us saw several mobile security challenges to be concerned about. High on the mobile hackers’ hit list is Android, the market-leading smartphone OS.