• Shortcuts : 'n' next unread feed - 'p' previous unread feed • Styles : 1 2
aA :  -   + pdf Infos Unsubscribe

» Publishers, Monetize your RSS feeds with FeedShow:  More infos  (Show/Hide Ads)


Date: Wednesday, 09 Jan 2008 18:39
So, about a month ago, I did a post on Hoff owning Mogull's house.

I figured I'd relay the conversation that I had with Rich about a week later:

Me: So, that whole "Hoff owning your house" thing must have sucked, huh?

Mogull: What?

Me: Hoff. Your house.

Mogull: Ohh... yeah. You didn't see the post?

Me: Uhh... no. Haven't been reading. What post?

Mogull: The post where I admitted it was all a hoax. Yeah, we thought it was pretty funny that you believed it.

So, in reality, it wasn't Mogull that got pwned. It was me.

Funny that the guy who spends so much time talking and writing about social engineering got social engineered by those two pranksters.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, hoff, mogull, pwned, security,..."
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 08 Jan 2008 18:04
So, is anybody else following the whole Fortinet and Zango fight? This is one of the most amusing "responsible disclosure" debates I have ever seen. For those who haven't seen it, let me introduce the combatants:

In the red corner, fighting out of California, there's Fortinet - an internet security company who generally do a decent job of making products that help. They've got their issues, but so do most companies.

In the blue corner, from Washington, there's Zango. They make spyware. That's right. You heard me. They make spyware.

So the fight started when Fortinet put out this advisory claiming that Zango was using a Facebook widget to install their spyware. (Remember - they make spyware.)

So, Zango gets all up in their face. They're delighting in calling Fortinet "opportunistic". They roll their PR team in action, even to the point of getting this Wired News article. From the article:

"Zango's associate corporate counsel Kevin Osborne called the report "reprehensible" in a phone interview Friday, saying Fortinet had just piled together the hot buzzwords "Facebook," "Widgets" and "Spyware" to make a splash."

Well, it turns out that Zango has now "proved" that Fortinet was wrong.

Okay, so let's recap this. Fortinet makes a mistake calling b.s. on a known spyware vendor, and we're supposed to be feeling sympathetic for Zango? Who's the opportunistic one here?!?!

If I were Fortinet, I'd probably send the following (open) letter to Zango's CEO:

Dear Kevin Smith,

We're really sorry that we made a mistake on our advisory (if we actually did). However, if you weren't such a pathetic company that makes a plague that infects the world's computers without providing any real value, we probably wouldn't have been so worried about it.

Clean up your act, and we'll promise not to screw up ever again.

Yours truly,
Fortinet (on behalf of the security community at large).


Okay, rant over. This one just activated my "that's dumb" circuitry.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, career skills, fight, Fortinet..."
Comments Send by mail Print  Save  Delicious 
Date: Friday, 28 Dec 2007 16:44
Sometimes, I'm moved to blog because I am reminded of how unfair the world is. I suppose it's something that most people are already aware of, but I usually forget that most of the world isn't as enlightened as most of the people who I'm lucky to associate with on a daily basis.

This morning, my friend Jason twittered about Brazen Careerist Penelope Trunk getting fired from Yahoo. Now, that in itself isn't that big a deal. People lose jobs all the time. It was when I read the entry that I found this wonderful quote:

Here’s what my boss’s boss’s boss said: “You should write for Lifestyles. That is more women oriented.”

This is a senior manager at a major public company. And I know that this happens. A friend of mine was once fired from a similarly major corporation because she reported sexual harassment.

But this is 2007, and it's ridiculous that we still have to put up with this ignorance and stupidity in the world. The thing about it is, it's Yahoo's loss. Penelope is brilliant, funny and a wonderful thinker when it comes to careers. And she's going to land on her feet, because she's so talented.

But if companies like Yahoo continue to treat their talent like this, soon enough, they won't have any talent. Their short-term ignorance will cost them the talent.

This is why these companies are having such trouble attracting the young "GenNext" employees. More and more, the people who are under-30s today are looking for places that respect the talent around them. This often appears to be a "sense of entitlement" to the old fogeys (yes, I just called everybody older than 35 a fogey). But it isn't... it's about respect for skill and talent.

And the understanding that disrespecting someone's talent because of what they look like, how they dress, or their gender is stupid and shouldn't be rewarded.
Author: "nospam@example.com (Mike Murray)" Tags: "Career Skills, brazen careerist, career,..."
Comments Send by mail Print  Save  Delicious 
Date: Monday, 17 Dec 2007 16:41
So, I spent the weekend in Boston helping to organize Source Boston, a new security conference that is taking place in March.

And, while I'm a bit biased because I'm helping organize, I have no doubt that this one's going to be amazing. We've got an amazing group of advisors - I spent the weekend hanging around with Raffy, Adam, Oliver, the 3 Chris's from Veracode, and our fearless and effervescent leader Stacy (who really, really needs to get a blog I can link to). It's always fun to be the dumbest person in the room by a pretty wide margin.

But here's what's cool about the conference - our goal is to put on the kind of speaker list that you'd only get at Blackhat or RSA, but do it in a really intimate venue. We agreed that the conference should have the same sort of vibe as you get when a huge rock-band (that usually sells out an arena) comes and plays a small local club.

There's a disadvantage to having such an intimate setting, though - you have to get your tickets soon - we're capping attendance at 450, and they're going to move quickly.

To me, it's all about access to the speakers - you can really get the chance to ask questions, meet people, and be part of the discussion. Which is rare with the speakers we have (more announcements on the speaker list in the coming days - it's amazing, and I can't wait to be able to talk about it more).

Oh, and I'm pretty excited about an activity on the final day of the conference - we're going to have a reunion of the L0pht - having a large number of the members in one place to talk about their experiences and their thoughts on the industry that, in many minds, they were a large part of starting.

Aside: we're doing some super-secret registration mojo that I think is pretty cool. Email me and I'll tell you about it.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, boston, cool people, hanging o..."
Comments Send by mail Print  Save  Delicious 
Date: Friday, 14 Dec 2007 15:34
Okay, so I've been seriously remiss in posting for, oh, say the last six months, but I couldn't resist mentioning this one.

Recently, Mogull posted an article on Dark Reading decrying the nature of security predictions. Shortly after writing the article, and while out of the country, Rich's house automation went crazy.

Well, Hoff took umbrage to the article, and decided to make one of his own predictions come true... and owned Mogull's house.

Hats off to the Hoff... and to Mogull for showing us all that even the most security aware of us can get owned.

(Of course, it's always easier to get pwned by somebody who can drop you an email and ask you to collaborate on something, but that's a topic for another post...)
Author: "nospam@example.com (Mike Murray)" Tags: "Security, chris hoff, rich mogull, secur..."
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 06 Sep 2007 15:51
I heard through a rumor that a talk I gave last year was mentioned on Alex Jones' radio show yesterday. If you came here looking for information on my talk on Hacking the Mind, feel free to follow that link for my own impressions of the talk, as well as a link to the slides I presented.

The MP3 of the talk is also available on the HOPE Number Six website here.

If you have any questions about my talk, or just want to shoot the breeze about hypnosis in all its forms, feel free to drop me an email.
Author: "nospam@example.com (Mike Murray)" Tags: "Hypnosis, alex jones, hacking the mind, ..."
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 01 Aug 2007 17:50
It's Wednesday morning and I woke up in Vegas with a bit of a headache - something tells me that's going to be a common occurrence this week. Yes, it's Blackhat time again. There's almost 4000 in town for Blackhat, and probably even more for Defcon later this week. I'll be blogging as much of the conference as I can.

The partying got started early this year - last night was both an absolutely fantastic party hosted by Qualys - it was held in the Absolut suite at Caesar's, and was a total blast. It's the first time (that I'm aware of) that Qualys has done an event here, and they did a great job.

Half way through the party, I ran into trouble, however. The trouble came in the form of Hoff, Amrit and Rothman all being in one place. It was around then that the drinking kicked into high-gear - trying to keep up with Amrit and Hoff is usually a recipe for disaster, and last night was no exception. Hence this morning's headache.

More soon...
Author: "nospam@example.com (Mike Murray)" Tags: "Security, career skills, security"
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 25 Jul 2007 15:07
Jason had a great post today about what I would call "second order networking" - the concept of using someone you are networked to to network to someone that they don't know. This is the equivalent of making a "3rd" connection on LinkedIn, because the request goes from you to someone you know, ultimately to a person that they don't know (through another contact).

From Jason's post:

"In each case I was asking for my network contacts to hook me up. Here’s the interesting thing: in every case they did not know the person that I needed to talk to.

This presents an interesting decision....

But here is what I would do. I would take the opportunity to grow my own network and try and make the connection. Why? It’s easier to go to someone that you don’t know with a purpose...


It's a great point - not only does this type of networking allow you to expand your own network, but helps your network expand theirs.

I loved the concept so much that I think I'm going to send a few emails... I could use an introduction or two.
Author: "nospam@example.com (Mike Murray)" Tags: "Career Skills, career skills, jason alba..."
Comments Send by mail Print  Save  Delicious 
Date: Friday, 20 Jul 2007 16:00
That's the punchline to an old physics joke about horse racing - it reflects the often-times unrealistic expectations we make when creating academic models for real-world performance.

I got thinking about this after
http://www.bloginfosec.com/2007/07/18/email-from-dr-lawrence-gordon-security-roi-possible-but-not-optimal-use-other-metrics/">Ken emailed me about his blog post
after reading my previous post on ROI. I think that
http://www.bloginfosec.com/2007/07/18/email-from-dr-lawrence-gordon-security-roi-possible-but-not-optimal-use-other-metrics/
">his post
definitely ends the ROI debate with some very smart (and diplomatic) comments from Larry Gordon.

More importantly, I spent some time with the Gordon-Loeb model for cyber-security investment after reading Ken's post, and it reminded me of the afforementioned joke. While it's an interesting paper from the perspective of provoking thought, I think there's a lot more to security investment than the model suggests. For example:

"The parameter λ represents the monetary loss to the firm caused by a breach of security of the information set.... Even though we initially assume that this loss is a fixed value, we will investigate how changes in the value of the loss affect the firm’s security investment decision."

This is where I get frustrated by a lot of infosec economic models (and why I was so simplistic in my own post) - we miss the point that information security does not only prevent loss, but (in most cases) has the side benefit of reducing operating risk. Think about it for a second... a vulnerability in a system is as much an issue of product quality as it is an issue of security vulnerability. (This can be discovered by a thought experiment: imagine a perfectly designed and perfectly implemented product with no defects - would vulnerabilities exist?)

In such, remediating the risk presented by security issues also reduces operating risk, leading to higher up-time, more environmental awareness, and better monitoring of system state. These aren't just loss-prevention activities, but actually lead to increased efficiencies and better effectiveness of technology.

I've yet to see a model take this into account - yet I see CISOs make decisions on that criteria (usually intuitively and without conscious understanding of why they're doing it) often.

Which is why I hate the whole argument from formal economic terms. The fundamental question is always a simple one:

How much does my business increase its net profit because I have purchased this technology/implemented this process/bought more toilet paper/hired this person/etc.?

Ask that question, and the debate about whether you call it ROI, IRR, Rate of Return, Cost Reduction, or any number of other things goes away.

And you're left with the only thing that really matters - a real horse that wins the race in the real world, not a spherical horse in a vacuum.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, security"
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 18 Jul 2007 15:04
So, over at Anton's blog, there's a good roundup of the discussion of ROI in security. And Anton (among others) comes to the conclusion (with the help of his Economic Ph.D. wife) that there's no way to have ROI from a product in security.

And I have to say, he's right, because what he's talking about isn't ROI in economic terms.

And he's wrong. Because the question of whether bringing in a product enables a business to make more money (whether by top-line growth or bottom-line cost reduction) is what's important, whether we call it "return on investment", "rate of return", "cost savings", or whether we call it cash in the bank.

Let's create an example that Anton can't help but love.

Suppose we have a business that's just breaking even - the company isn't making money or losing money. But they employ a team of 15 people to read the logs on their systems, each of whom are paid (fully-loaded) $100K/year.

Now, suppose the brilliant CISO of our fictional organization calls Anton, and brings in Log Logic at a cost of $100K. Our CISO then fires 14 of the 15 log watchers.

Over the course of the year, the company now posts a profit of $1.3 million dollars (by not paying the salaries of the 13 fired people). (Note: this ignores severance, etc. for simplicity).

Now, did the product produce a return on the investment of $100K into it? You'd be hard-pressed to say that increasing company net profit by $1.3M as the result of a purchasing decision is not a return on the investment.

But the pedantic ones out there are right: it's not strict "ROI".

But I don't care about ROI. I care about $1.3M profit. Call it whatever you want - whenever you invest in something that enables you to bring in more money or reduce costs, it's a smart decision, whether you can calculate it as strict ROI or not
Author: "nospam@example.com (Mike Murray)" Tags: "Security, anton chuvakin, economics, inv..."
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 17 Jul 2007 14:27
I've referenced my new job a couple of times recently without actually saying what I'm doing - I figure it's time to explain where I ended up. But I'll do that by way of a story about where the industry is and what I'm focusing on in my new role.

As you probably know, I've spent time in a whole bunch of different roles within the security community - vendor side, customer side, service provider, product vendor, consultant, etc. Most recently, I was spending time at a large insurance company on the east coast, working as a security architect in a particularly dysfunctional security organization. And I wouldn't have traded it for anything - the dysfunction allowed me to see clearly a whole bunch of management and career strategies that wouldn't have been evident otherwise.

But one thing in particular really started to bother me. We were an under-resourced group (what security team isn't?), and we had to maximize the effectiveness of our investments. So we did a good amount of due diligence on products - there weren't any paper evals. We were really bringing in products and putting them through their paces to make sure that they worked.

And even in that type of organization, I was seeing project completion rates of 20-30%. I had heard the statistics before that the IT industry completes less than 20% of its projects, and I was seeing even a relatively well-disciplined project management organization do not much better than that.

The main reason? Product inadequacy or unfriendliness.

A great example of this was seen when we were deploying an enterprise desktop application. This particular product is a market leader and has a great reputation for usability and some great reference customers. And it passed pilot incredibly easily, so we made the decision to deploy it on 40,000 desktops and laptops throughout the organization. Of course, we didn't have the resources or testing equipment to pilot the product on more than a few machines in a test environment. So, before moving forward, the project manager asked the sales engineers whether 40,000 machines was going to be a problematic deployment.

"Oh, no", they replied. "Our architecture can handle that perfectly well."

So, we went forward. And, when roll-out day came, we found out (the incredibly hard and painful way) that the machines could be deployed only 900 at a time. Our 1-week roll-out became a 2-month roll-out. There was much wailing and gnashing of teeth, and abusing the vendor. But nothing could be done - that was all the product could do.

That was just a single example, and, having spent time on the vendor side of the world, I know it's not even a particularly egregious example of vendor sales exaggeration. I've seen sales people completely misrepresent product functionality to clients to get business.

To me, this type of exaggeration and misrepresentation is one of the biggest risks that information security teams face today - in the face of budgets that aren't ever high enough, a 7-figure purchase of a product that doesn't perform as advertised just isn't acceptable. It's the kind of thing that gets CISO's and their direct reports fired, and gives security a black eye within their organizations.

So, when I got a call from Greg Shipley at Neohapsis talking about a vacancy at the top of the Neohapsis Labs organization, I got incredibly excited. Because I saw immediately the opportunity to help stem the tide of crappy information out there. Neohapsis has always had an amazing reputation for their product testing - from the old Network Computing reviews to the work that we do for individual clients, helping them validate that the product that they're about to deploy actually works in the way that it's supposed to, to helping vendors prove that their product works as they're about to advertise (hint: most of the time, they have to fix something after we look at it), the work that I'm getting to do right now allows me to help fight bad product.

As I look at it, I've seen a few too many multi-million dollar security product engagements fail to be anything but cynical about it - the customers that use the lab before they deploy at least know that the product works as advertised. Or that it doesn't. (If only I had known as a customer all of the things that I've learned in the first 3 weeks reviewing the old lab reports here, I'd have been able to avoid my team a lot of headaches and steer clear of some big mistakes)

So, if you're about to spend a few hundred thousand or a few million dollars on a product, a good idea might be to drop me an email before you do... we might be able to keep you from making a really big career limiting move.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, big mistake, career limiting m..."
Comments Send by mail Print  Save  Delicious 
Trances   New window
Date: Monday, 16 Jul 2007 13:14
Trances are going to be my other topic at Defcon this year. I'm really excited to be speaking with one of my favorite security bloggers and also a master NLP Practitioner Anton Chuvakin - we're going to be talking about how NLP and hypnosis can enhance social engineering.

But what made me think of blogging this is that I'm currently reading a copy of The Illuminatus Trilogy - to understand the workings of a master hypnotist, one need only read the first 15 pages. Just about every brilliant hypnotist trick and hypnotic language pattern is present in those 15 pages.
Author: "nospam@example.com (Mike Murray)" Tags: "Hypnosis, hypnosis, nlp"
Comments Send by mail Print  Save  Delicious 
Date: Friday, 13 Jul 2007 16:32
In this case, the Jason I'm talking about is Jason Alba of JibberJobber, and the security he's talking about isn't information security, but Job Security. From the post:

" Look folks, here’s the deal. There is no job security! YOU need to take care of your career, not just your job! Do you find yourself doing any career stuff, outside of your job? Don’t have time? Fine - you’ll have plenty of time since a job search can take so long. Trust me, start doing a little every day, and it will add up. Do not wait until you are terminated to get moving. A little big-picture career stuff every day will go a long way."

Usually, I'd comment here. But there's nothing else to say.

(Except perhaps that, if you're going to Defcon, you should come see my talk with the brilliant and funny Lee Kushner about how to create the real type of job security that Jason talks about in his post... we're speaking on Saturday afternoon.
Author: "nospam@example.com (Mike Murray)" Tags: "Career Skills, career, career skills, de..."
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 12 Jul 2007 15:56
Andy wrote recently about urgency in security. And I think he brought up some really good and really important points:

"There is a trend in information security... to tackle the urgent issues first. These are the issues that users are screaming about, management is on you about, auditors have written you up about and then things that get you noticed. No one gets noticed for the security flaw or vulnerability that they found, patched and as a result prevented a breach. You get noticed when you put out a fire that other people see. Even if that fire is in the middle of an field and is surrounded by a mote full of water. People see you out there jumping up and down putting out that fire and they applaud you."

He goes on to talk about the importance of proactivity and having a plan, but, in my experience, a plan survives only until the first person who has the authority to quash the plan has their own pet fire that needs to be put out.

What is far more important than a plan for getting things done is a definition of what constitutes an emergency in your world. My thinking on this has been shaped a great deal by some of the ideas in the 4-Hour Work Week (which everyone on the planet should read... it's that good).

We have a tendency to escalate to urgent a huge number of things that simply don't need escalation. The questions you need to ask before jumping off into fire-fighting mode:

1. Who will be seriously injured if I don't do this right now?
2. How much will it cost (in real $$$) if I don't do this right now?
3. What opportunities would I be giving up to do this right now?

Obviously, if it's a matter of injury to self or others, it really is a fire. In this case, injury doesn't have to be physical - if you have a compromise in progress, there's a pretty serious injury going on (as well as a loss of real $$$), and it's worth moving on right away.

Unfortunately, most often the "injury" in a given situation is the minor annoyance of someone deemed to be "important". In that case, it's appropriate to ask the person the prioritization question...

"I'm currently working on X, which will save/make us X number of $$. Would you like me to delay that task in order to help you right now?"

Realize, the answer may often be yes. But at that point, the importance (i.e. priority) of the decision has been made. For those who have read Covey's The Seven Habits, this is enough to move from Quadrant 3 to Quadrant 1 - from just urgent to "urgent and important".

Which is how you determine what's a real fire anyways. (The 3 questions above are a guide to end up in Q1).
Author: "nospam@example.com (Mike Murray)" Tags: "Life Management, 4 hour workweek, covey,..."
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 11 Jul 2007 15:40
... or I should be submitting a whole pile of talks to next year's Blackhat. I just read the latest article over at Dark Reading about Matasano's upcoming Blackhat talk where they take apart a protocol that is used for financial transactions that is GASP badly designed and implemented!

I don't know if this is just Dave & Thomas going on their reputation as security bad-asses (which they are), but any time I've seen a protocol designed for use in a particular vertical, it had many of the same design flaws described in Kelly's article. Whether in insurance, finance, health care, or whatever, this type of error abounds.

I remember a particular engagement at a large hospital that was running on one of these specialty protocols. The protocol was incredibly secure - if you connected to the appropriate port on any number of their systems, and issued a single byte command, it would send you the next patient record on its record stack. And if you issued a different (but equally complex) command, the system would allow you to input or modify whatever patient records it contained. No authentication, no authorization. No encryption.

And did I mention that this travelled over a wireless network?

I don't know that what Dave & Thomas are presenting is that unique - it's cool that they're going to do it, and I'm excited to see the talk. But they're just scratching the surface of the tip of a very, very, very large iceburg.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, blackhat, daveg, matasano, pro..."
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 11 Jul 2007 00:34
Umm...

Did Chris Isaak just get the lyrics to the Star Spangled Banner wrong?

I swear, he just said: "Whose broad stripes and bright stars, through the perilous night".
Author: "nospam@example.com (Mike Murray)" Tags: "all star, baseball, chris isaak, chronic..."
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 10 Jul 2007 16:21
One of the most important things that was drilled into me when studying hypnosis was the concept of ecology. That is, that a person is a whole and complete system, and that, when making significant change to one part of that system, it was absolutely important to ensure that the system as a whole was not adversely affected.

Linda's words came back to me a lot when I heard on the radio today about Propranolol, a drug that supposedly affects the ability to recall bad memories. From the Slashdot article:

"They treated 19 accident or rape victims for ten days, during which the patients were asked to describe their memories of the traumatic event that had happened 10 years earlier. Some patients were given the drug, which is also used to treat amnesia, while others were given a placebo. A week later, they found that patients given the drug showed fewer signs of stress when recalling their trauma."

This is significant - as we start to learn more and more about neuroscience, we will be given more opportunities to affect our ecology as a system. But we need to remember that we are systems by nature and that taking the bad memories out of the system won't necessarily make the system perform better. It's the same problem that was faced by prohibition - the intent was that, by taking the alcohol out of the system, the system would improve. Instead, taking the alcohol out of the system created an entirely new business for people who were willing to break laws.

Imagine, for a second, how the world would be different if Ghandi, while riding on the train back to India pondering the hateful treatment that he had recently seen of people in South Africa, would have simply popped a pill and forgotten? Or if Mandela, upon leaving prison, forgot all about the treatment that his tormentors gave. Or if we, as a people, could simply forget atrocities like the Holocaust.

Would the system be better for never remembering the bad things?
Author: "nospam@example.com (Mike Murray)" Tags: "Hypnosis, ecology, erase memory, forget,..."
Comments Send by mail Print  Save  Delicious 
Date: Monday, 09 Jul 2007 14:13
No, I'm not calling blackhats lazy. But I was reading Dave G's post about WabiSabiLabi, where he talked about the idea that by having an auction site that gives enough detail about the vulnerabilities, there's enough detail that a smart researcher can go out and find the bug themselves.

Which is absolutely true.

But it reminds me of when I was all excited about Napster, and I was having a talk with my dad. I was, at the time, an idealistic (if misguided) youth, and I was expounding on the whole "information should be free"/"music just wants to be heard"/"the future won't have a place for the RIAA" (okay, the last one's still true). And he made an incredibly good point that has stuck with me to this day:

"The point of the lawsuits", he said, "isn't to make music sharing go away. The point is just to make it hard enough for the average user that they'll use something slightly more expensive. And if the music can be offered in an easy format at a somewhat cheap cost, but it's hard to use the free way of doing it, most people will use the legitimate way."

Of course, this was years before iTunes came along, but my dad called that one - even I find BT, Limewire, etc. to be more of a hassle than they're worth. I'll happily pay $0.99 for a song.

And that's the point around things like Wabisabilabi - it's not that there aren't researchers out there who will go find the vulns themselves. It's that, at a low enough cost, most won't. I mean, think about it - if you're a company doing vuln research, are you going to spend a day of a single researcher's time (at $50-$70/hour fully loaded) to have them try to go find the vuln themselves? Or are you going to spend $500?

It comes down to a smart business decision - if you can buy it cheaper than you can build it, with less effort (and with less opportunity cost, because that researcher can be working on something else), you probably will. It's the same reason that Dave's tools and Metasploit are so popular - they allow the community not to have to go do it themselves.

If they can buy it cheaply enough, most people won't go to the trouble of doing it themselves. It just doesn't make sense.
Author: "nospam@example.com (Mike Murray)" Tags: "Security, auction, itunes, napster, rese..."
Comments Send by mail Print  Save  Delicious 
Date: Friday, 06 Jul 2007 13:47
A friend recently sent me an email that warned me that I had my phone numbers on the bottom of my email signature - she was worried for me because "you can't be too careful with all the identity theft going on". And, while I've yet to really think of a threat scenario where someone knowing my Skype-In number could cause the compromise of my NPPI, I knew I had to reflect on ID theft for a minute.

And then I read this post over at Sunnet Beskerming about a recent major ID breach. From the post:

"Continuing a trend of employees stealing valuable data, an employee at a Fidelity National Information Services subsidiary at some time prior to May 2007 stole more than 2 million records that contained a range of personal, financial account, and credit card data for users of Fidelity services."

With all the people who worry about technical ID theft (like the TJX breach), I think that this type of theft is likely far more prevalent. It reminds me of an article that Schneier wrote a few years ago in Dr. Dobbs on Attack Trees. It was a relatively overcomplexificated article for a really simple theme:

Intelligent and rational attackers will always use the lowest cost, least complex attack vector.

Thus, if you're trying to steal data, and you have two choices: 1) Do a major Sneakers-level social engineering attack, or; 2) just pay the insider a few hundred bucks; a decent attacker will always pay the few hundred bucks.

The technical attack is always cool, but it's the simple attack that takes the day almost every time.
Author: "nospam@example.com (Mike Murray)" Tags: "Security"
Comments Send by mail Print  Save  Delicious 
Jobs 6:15   New window
Date: Thursday, 05 Jul 2007 13:42
So, anybody who has ever gone out for a drink with Amrit knows that he's a genuinely funny guy. I have to point to an absolutely great blog post that he just put up on the iPhone, security threats and driving in the Bay Area. Absolutely hilarious stuff. From the post:

"So what does the iPhone, mobile security and bad driving have to do with each other? First they shouldn’t mix - that is mobile devices and driving. It is a bad combination, bad like Ike and Tina, or Michael Jackson and young children, or Dick Cheney and Democracy."

Check it out.
Author: "nospam@example.com (Mike Murray)" Tags: "Amrit, Amrit Williams, iPhone, security"
Comments Send by mail Print  Save  Delicious 
Next page
» You can also retrieve older items : Read
» © All content and copyrights belong to their respective authors.«
» © FeedShow - Online RSS Feeds Reader