Weekly Security Roundup #13: Online Attacks and World Politics
This week, we continue to notice how states in conflict with each other use cyber-criminal threats as weapons of distraction from the real issues they have. From USA and North Korea, and from Russia and Ukraine, states use digital weapons to send their messages across.
Our goal is to bring you the latest security news from the digital world. And this is what we do.
These are the 10 security articles of the week that you should read in order to improve your online security.
Security articles of the week
FBI says North Korea is to blame for the Sony Pictures attack. But, apparently the entire case built by the FBI against North Korea is based on some IP addresses used in the attack, IP addresses which haven’t been revealed yet to the public till now. Without providing further evidence, can we still blame the North Koreans?
Is it safe to connect to a public wireless network? No, it’s not. But that’s no surprise, you already knew that. So, let’s see exactly, what can an IT criminal find out about you by analyzing your traffic and how can he use it against you. Can he really find out something important since so many websites are protected and encrypted?
Since we think that a wireless network is not a very secure one, we provided this week an article on how you can secure your home wireless network. Read both articles and decide for yourself.
If FBI said that North Korea was behind the Sony Pictures attack, soon after the White House sanctions followed against 10 North Koreans and three organizations from the country. If they say they didn’t do it and even security experts are not convinced about the North Koreans’ involvement, who is to blame? Is it just another hasty move from the US? Shoot first, ask questions later?
2014 was a bad year for science. For the Internet science. It was the year that saw some of the worst Internet network attacks and security breaches ever. And it will only get worse. Maybe an attitude change could help in preventing these massive security attacks in the future.
Apparently, websites can still follow your moves and your preferences. So, does this mean that no more privacy is available for us? No more “incognito mode”? No mode “porn mode” available? Where is this world going these days?
Some of the worst malware types out there are ransomware, which block your computer and ask for a ransom in return for their decryption key. What can we do to avoid losing our data and money to online criminals? Read the article and follow those rules to sleep for another night.
It is the question every CEO asks the IT department before going to sleep at night. How to defend against people that not only steal your sensitive information, but make sure they destroy it after? Security analysts suspect the human element could be involved and that we should limit employees’ access to company’s data. What else should we limit?
A very good article from Bruce Schneier on how difficult it is to determine the starting point of an online malicious attack, all this connected to the FBI’s attribution of Sony Pictures attack to North Korea. Maybe we don’t have all the necessary data in this case, or maybe the US jumps again fast to draw conclusions, as it has already done in the past.
This interview from Edward Snowden in June 2014 provides important information on how other states, besides the United States, are also developing offensive cyber capabilities and could soon pose major threats to the US. The main idea is that the Americans should be less confident on their cyber skills and get ready for a good defense.
Cyber-criminal attacks and online threats, real or imaginary, are used by states against other states and there seems to be something repeating in this game. States that are already in a state of conflict seem to use these online threats to emphasize their political position. So, who hacked the Germans?
We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?
This post was originally published by Aurelian Neagu in January 2015.