Dennis Fisher

About

Dennis Fisher is a journalist with more than 13 years of experience covering information security.

The 2010 Threat Landscape

Costin Raiu, chief security expert at Kaspersky Lab in Romania, discusses the state of the threat landscape for the year ahead, including botnets, malicious PDFs and targeted attacks.

Anatomy of a Targeted, Persistent Attack

A new report published today sheds light on the
steps ultra-sophisticated attackers take to gain a foothold inside
governments and company networks and remain entrenched in order to
steal intellectual property and other data. The bad news is these
attacks — including the recent ones on Google, Adobe, and other
companies — almost always are successful and undetectable until it’s
too late.
Read the full article [Darkreading.com].


The recent attack on the PlayStation 3 hypervisor has gotten a tremendous amount of attention, but there has not been much in the way of detailed analysis of the actual exploit itself. However, a prominent cryptographer and security researcher has looked at the exploit and found that it is a cleverly implemented attack that is quite difficult to defend against.

It’s been more than two weeks now since the cyber-end of the cyber-world caused by the cyber-attacks on the cyber-networks of Google, Adobe and several other high tech companies, and amid all of the noise and hand-wringing there has been precious little in the way of cool, logical analysis of what lessons might be drawn from the incidents.

Tor Servers Hacked

Two of the seven directory authority servers that the Tor Project uses to run its anonymous browsing service have been compromised, along with a new server that the project uses to host metrics and graphs.

Although the first known attacks using the Aurora malware that compromised Google weren’t discovered until late last year, some parts of the malware codebase has been in existence in China for nearly four years, raising questions about how many other attacks it might have been used in during that time frame.

Security researchers are continuing to delve into the details of the malware that’s been used in the attacks against Google, Adobe and other large companies, and they’re finding a complex package of programs that use custom protocols and sophisticated infection techniques.