Got Hacked? Get even: Using Honeypots, Honeynets, and Sinkholes to Hack the Hackers

If you’ve ever been hacked, you know the feeling of being violated that comes with it. In the simplest and most common scenario, someone has gotten into your email, read your address book, and sent out spam to all of your contacts. Suddenly, ex-girlfriends or boyfriends, ex-employers that you may have hated, or just people … Continue reading Got Hacked? Get even: Using Honeypots, Honeynets, and Sinkholes to Hack the Hackers

Open Backdoors, Broken Windows, and Tainted Chips: A Brief History of the Ongoing Microsoft-China War

When I visited China in 2000, you could buy the newest pirated version of Windows almost anywhere. In fact, you’d be considered stupid if you bought the licensed version. After all, how many Chinese were rich enough, at that time, to afford it? Would you pay a couple of month’s salary for a computer program? … Continue reading Open Backdoors, Broken Windows, and Tainted Chips: A Brief History of the Ongoing Microsoft-China War

Amazon and eBay Stop Sale of Samsung Galaxy 4 Clone: Chinese-Made Star N9500 Found to Contain Pre-Installed Dangerous Spyware

Yesterday, Ebay reported it would no longer be selling the popular Chinese-made Star N9500 smartphone after German security firm, G Data, discovered dangerous pre-installed spyware on the device. Amazon initially refused to comment on the story but, this morning, when I tried to access the page featuring the device, I found that it had been … Continue reading Amazon and eBay Stop Sale of Samsung Galaxy 4 Clone: Chinese-Made Star N9500 Found to Contain Pre-Installed Dangerous Spyware

Made in USA, Remade in China: Part 1: Chinese Cyber Intimidation Spreads Beyond Its Borders

I have a simple way to assess the freedom of the country you’re in. Go to the capital city, stand in a visible public place, and make a speech criticizing the current leadership. If nothing happens besides your getting a few critical remarks from onlookers, you’re in a free country. If, however, you are arrested, … Continue reading Made in USA, Remade in China: Part 1: Chinese Cyber Intimidation Spreads Beyond Its Borders

Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

In the latest Mandiant webinar, consultants Chris Oetting and Mike Middleton explained the difficulty of restoring an organization’s network after it has suffered a serious cyber attack. About 30% of recent cyber attacks that Mandiant has responded to involve organizations that have been compromised by attackers employing backdoors. These are programs installed surreptitiously on a … Continue reading Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, at a later time, to achieve financial gain, but its motivation is somewhat different than … Continue reading Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

An Analysis of a Romance Scam Letter: Implications for Businesses

Today I received a request from a Polish woman that I know. She wanted my advice about an email that she had received from some guy she didn’t know. She was about to respond to it but, knowing that I write on security matters, she decided to check with me first. Luckily for her, she … Continue reading An Analysis of a Romance Scam Letter: Implications for Businesses