dimarts, 31 de març de 2009

Espionatge a França

Segons l’agència France Presse, un ex comandant de la policia, un militar sota les seves ordres i un informàtic que treballen per l’empresa EDF (principal subministradora de gas i electricitat a França, haurien entrat als ordinadors de les oficines de GREEN PACE a frança.
La policia ha entrat a les dependències d´EDF i continúa la recerca d´indicis.

dissabte, 28 de març de 2009

Contiguts a la xarxa


Després de la proposició de França de sancionar i tallar la connexió a la xarxa als internautes que descarreguin continguts il•legals, el parlament europeu va votar en contra de la proposició francesa amb 480 vots a favor, 20 abstencions i 20 en contra

Els eurodiputats van manifestar després de la votació que l’accés a Internet és un dret per tothom i cap govern o companyia privada n’hauria de privar-ne l’accés.

El projecte de llei francès "HADOPI" queda de moment en suspens.

Un cas, curiós, vergonyós i greu, va succeir no fa gaires setmanes a França quant van sancionar a una dona que sense cap coneixement informàtic va contractar a una de les companyies existents al país veí un accés adsl.
La companyia l’hi va facilitar un router wifi i a través d’aquest un veí descarregava arxius il•legals per estar sotmesos a drets d’autor.
La dona a presentat un recurs.

**

HP facilita una eina de seguretat Flash gratuïta.
La companyia explica que després d´haver analitzat més de 4.000 webs un 40% té forats de seguretat.
SWFscan descompila i cerca per les vulnerabilitats.

**

CONFICKER,
Veritat o innocentada?.
El compte enrere del virus CONFICKER s’està acabant.
Aquest virus que diuen ha infectat milions d’ordinadors a tot el món, segons una coneguda companyia més de 10.000.000, s’executarà l´1 d’abril.

Aneu en compta.

dissabte, 21 de març de 2009

Operadors "atacats"

Llegit a internet

Carrier Networks Could Face Black Hat Attack

European researchers prepare to highlight what they say is an overlooked risk.

The likelihood for carrier networks to come under attack could signal the creation of a new area of security risk and research for the IT industry, at a time when carrier network traffic is growing at a rapid rate.

During a Webcast on Thursday discussing his upcoming presentation, Rey noted that BGP, MPLS and Carrier Ethernet security all depend on a dangerous trust model.

"Within all those technologies, it's like you're part of some old boys club, where once you're in, you can do all kinds of nasty stuff," Rey said. "They can't be attacked from an Internet perspective, [but] once you belong to the network, it's easy to perform all kinds of disastrous attacks. So far, most of these attacks have been purely regarded as purely theoretical."

One of the theoretical attacks that Rey said he plans on discussing is directly related to the carrier networks' use of MD5 cryptography within their network protocols. MD5 has been criticized on the enterprise side as being vulnerable to attack. Even so, Rey claimed that in his view MD5 is used by at least 40 percent of global carriers in their networks.

"The security impact of MD5 might be debatable, but it's not about MD5," Rey said. "The main problem is once you are somehow part of the club, the MD5 won't help you ... we can brute-force it quickly."

Beyond MD5, Rey noted that carriers are also prone to traffic interference, and has created a tool to demonstrate the flaw. "We have written a tool that can interfere at a given point and inject traffic, redirect traffic and do all kinds of stuff," he said.

For example, Rey said a carrier network with a site in Seattle and one in Washington, D.C. could be susceptible to an attack that could inject another site into the network at an arbitrary location.

So what should carrier network operator do to mitigate the risks?

Rey argued that he believes in full disclosure of security issues, but claimed that to date, the network operators have not seen the issues he's talking about as a problem.

"They say, 'We keep intruders outside of the network, so no one could ever perform this,'" Rey said. "But once that assumption is broken, it will be quite difficult to keep this under wraps."

He noted that carrier networks could do monitoring of their internal networks to try and identify threats, though he said it's not clear whether current methods would be sufficient to track attackers using tools like the one he developed.

Making the matter even more complex, Rey said that the vulnerabilities are not specific to any one hardware vendor. Instead, they're inherent in the protocols themselves, he said -- making the next steps for fixing the security risk even less clear.

March 20, 2009
Sean Michael Kerner
internetnews.com

dilluns, 16 de març de 2009