Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:You know it's not going to work (Score 1) 260

I just wonder where the point of pushback is. For example, one reason I see kigurumi becoming popular is because it allows people to interact with each other, except FB and other pictures only have the person's doll masks as photos. Yes, wearing masks and zentai suits can be made illegal, but it only ensures people will push back harder, especially here in the US where prohibition, and the War on Drugs have showed that making something illegal only makes it more popular... basically a long term Streisand effect.

I'm also noticing that physical gaming at stores is resurging, so people are trending away from stuff like WoW, and going back to Warhammer or just playing pencil and paper AD&D or Pathfinder. Having people not interested in doing every bit of communication electronically is a positive step.

Comment Re: Our saving grace, perhaps? (Score 1) 36

For now that is. Right now, malware writers are going for low hanging fruit, who don't even know what a VM was, or if they ran one on their desktop, would complain about performance (not knowing the VM disk images belong on a SSD, or at least their own spindles to not contend with the host desktop OS [1].

Once VMs gain traction (say someone combines dedupe with COW and applications wind up with their instance of an OS with just the footprint of the application so VMs become as common as applications with their own separate stack/heap are now), it will be a different story. We will start seeing attacks on hypervisors start being attempted [2], but since hypervisors have historically been built from the ground up for security, this will help mitigate things. Of course, as stated elsewhere, the bad guys can always have their code pull chaff such as a fake malware instance to lead researchers on rabbit trails.

[1]: Desktop OS. This isn't as big an issue with ESXi, especially with compute nods and big fat disk caches on the HBAs or CNAs.

[2]: Mixed bag. I'd like to see hypervisors get hardened, but if there is some sort of attack at the CPU level, that means malware in one VM has it made on the entire machine... and there would be no way to ever address that short of tossing the CPU or entire machine.

Comment Our saving grace, perhaps? (Score 2) 36

This may be our saving grace, something as simple as doing one's work in VMs, using the bare metal OS pretty much as a hypervisor and method to back up the VM images. With SSDs, this makes the job easier (because booting an OS isn't that I/O intensive, but you have multiple instances fighting for the drive head on conventional HDDs, which causes I/O slowdowns across the board.)

VMs are one of the few tools that can fight ransomware effectively. If the software doesn't play and deletes itself, no major loss. When hypervisors start getting "smarter" and are able to use heuristics to detect zero day infections that are hidden to the OS in a VM, this will raise the barrier significantly. Of course, the ability to roll back to a known, good snapshot in seconds completely negates ransomware's ability to destroy stuff, forcing the software to have to be inactive for a long period of time to hide its functioning.

Comment Re:BECAUSE IDIOTS PAY IT! (Score 1) 36

I'm reading this as basically creating a tar file of the machine and documents, throwing it to a remote machine's incoming directory, and that incoming machine moving the file to somewhere inaccessible to the client?

This is a way to do it, but might be better to just have the NAS or other appliance initiate the pull so the data can be better stored in snapshots.

Comment Re:Not a Federal priority (Score 2) 36

Now that's the rub. All it takes is for the trail to hit a country that is overtly hostile to the US, or just not willing to cooperate, and the trail goes cold. For example, if the perp who made malware tools was situated in Yemen, Brazil, or Venezuela, the local government would be giving the person accolades for doing such a thing.

As for Bitcoins, they are definitely traceable. However, efforts like tumblers and CoinJoin may be new and holes found, but they are getting better, and if combined with an exchanges that would trade BTC for another currency, that would leave the trail cold. If worse comes to worst, there will be someone who makes a BitCoin 2.0 that has anonymity built in.

US law enforcement can't really fix this problem, just because it is almost invariable that any investigation will lead outside of the country's borders, forcing any police work to become an international effort, and other countries tend to really not care if a foreign citizen gets taken for a ride, as opposed to investigating domestic issues.

This is a problem that has to be fixed by technical means. Legal means will not really work here.

Comment Re:You know it's not going to work (Score 5, Interesting) 260

It also is going to backfire.

Take SSL/TLS. Are they going to demand both parties stash the session key, or do their handshaking through a proxy logging each packet? The first time some intruders nail that data store and find out a bunch of banking passwords, the cost of that breach will be incredible. If they alter the SSL/TLS algorithm, will it bring unexpected changes that destroy the algorithm's security, or the code used not implement the changes in a secure fashion?

As for outlawing it, it -could- be done, but it would require far-reaching internal and external controls, with very sophisticated algorithms to detect unauthorized encryption, and pull that machine from the net. However, this is a cat and mouse game... and ultimately, the bad guys are just going to do like Daesh, and AQ before them... and go back to couriers, dead drops, and burner phones. Yes, it doesn't give as fast results as the Net, but it is a lot tougher to intercept. So, it an be done... but it is doubtful that even the British people would tolerate this much interference in their lives.

Comment Re:BECAUSE IDIOTS PAY IT! (Score 5, Informative) 36

Unfortunately, as it stands right now, even with rapid growth, ransomware is approaching its infancy. I'm not going to be surprised when the next CryptoWall releases go after Active Directory and enterprise-level resources, as opposed to local items and the network share or two.

Three reasons why this is:

1: There are no SOHO backup systems to defend against it. If you can get the user to not restore in 30 days with most cloud backups, their data is gone... and some cloud backups may just only keep the latest (useless) version. Plugging in a USB flash drive, backup drive, using a NAS, or using a Time Capsule works against disasters like HDD failure or accidental microwaving of a laptop... but all ransomware has to do is zero out the backup drive... or just punch random holes in stored files so they are worthless. A lot of newer machines don't have optical drives, much less decent backup software to get the user to back up to them.

If you want a real defense against ransomware, it takes an external backup server which pulls data, stores it where the client machine cannot access or destroy it, and can store images for weeks to possibly years (because as ransomware evolved [1], it will be running longer before it gets detected.) However, not many home users will buy a PC with some drives, slap Windows Server 2012 R2 Essentials on it (which replaces Windows Home Server), and use that to pull backups from their desktops. There are appliances that do this... if you want to pay $50,000 to Symantec for a NetBackup appliance, and have the rack space for it.

What is really needed is a standard, cross platform backup client that not just allows for files, but snapshots (so open files can be copied) and entire machines, so bare metal restores are easy to accomplish, be it a restore to a local drive, or via the network. For authentication, something similar to SSH. This way, a user can buy an appliance, log onto the console, set up backups (perhaps RSA key exchanges), set up schedules, and call it done. More features (encryption, deduplication) can be added... but the main thing is getting backups going in the first place.

2: The infection vectors are still there. For example, a malware writer might write code to take advantage of a compromise/buggy browser add-on, it goes through an ad server, and winds up nailing people visiting even mainstream sites.

Even ten years later, the Web browser is still the primary infection vector. Even with virtual machine and container technology, if an add-on gets nailed, there is a good chance it can seize the entire browser, and thus a user context. Even with just the context of a browser add-on, it likely can read and write to any documents the user has access to. Add a few more exploits, it can run unfettered as a user, or even get admin/root rights so it can reflash the firmware on drives, video cards, keyboards, and other items.

This can be limited by running the browser in a VM or sandbox, but most users won't be doing this, so it is only a matter of time before the next add-on has 0-days, and just visiting a site results in compromise.

3: Not as bad as drive-by compromises, but Trojans are still an issue. On Linux, BSD, and OS X, this is less of an item, since users are conditioned to use a repository. Windows still is wild and wooly when it comes to this, and even if one does visit the right download site, it might be a mirror decided to pack some additional "functionality" into the installer, and re-sign that with their own Authenticode key, so it passes the signature check test.

The possible fix? MS having a store that allows for more than just Metro applications to be installed and updated, preferably with active, brutal curation. That way, if a user wants a copy of WinZip, they just fetch it from the store, rather than risk a compromised website, mirror, CDN, or app installer.

Ransomware is going to be with us a long time, just because it does well at going after the low hanging fruit, and with what is available (domain admin rights, for example), just encrypting files is just the initial salvo in this battle.

[1]: It pretty much a fact that malware, as a whole, is the absolutely best code when it terms of quality, robustness, and updates.

Comment Re:Industrial accidents happen (Score 1) 342

With how many robots are in use, it was just a matter of time before some freak accident would happen. Even if one set of chances are one in a million that something would be overridden at the right time, coupled with the one in a million chance of being in the wrong place, eventually someone is going to roll all "1s".

This is what insurance is for.

Were it not a robot, this would be dismissed as another accident at work, the worker (or next of kin) recompensed, and life would move on.

Comment Re:Shoeboxes (Score 1) 121

What I don't get is why FB doesn't just use tape. Tape drives are expensive, but the media itself is cheap -- LTO-4 cartridges are $15 apiece, and tape is a true archival grade media.

Plus, with tape, you copy it to that, yank the tapes out of the autochanger, and toss them in an unused corner of a room. Tapes take 0 watts in storage (other than what it takes for HVAC), so other than physical access concerns, they are easily stashed and will remain usable for quite a long time.

If any industry needs a kick in the pants with regards to capacity improvements, it is the tape media industry. A tape has far more area to put data on than a HDD platter, so there is a lot of room to add capacity, as well as reduce price with cartridges and drives, especially if mass produced so economies of scale kick in. Back in the 1990s, almost any business had some form of tape drive, which worked fairly decently for backups (although 4mm/8mm drives are nowhere near as reliable as a LTO drive.)

No, tape isn't trendy... but it functions well, and with WORM media or hardware write protection, it is resistant to malware. With hardware encryption in newer revs (LTO-4 and newer), it is trivial to just set a password and call it done when it comes to that security... that way, if a tape falls off the Iron Maiden truck, it is just a hardware loss... no worry about compromised data.

Comment Re:Meh (Score 1) 75

I've found that EQ1 is still pretty good... but you have two choices:

Play on a timelocked server, where there is relatively not that much content... but it winds up grindy.

Play on a regular server and get your levels and AAs so you can group/raid.

Timelocked servers have nostalgia value... but it might be too slow and quirky for someone new, and one can wind up hitting a dead-end (can't really solo, no groups), especially when the newness wears off.

There are also plenty of other MMOs still around. DAoC is still twitching, DDO, Neverwinter, and LOTRO are still going. Rift is still an alternate to WoW (except minus the mini-game of garrisons [1])

IMHO, what kills MMOs for me are the cash shops. Daybreak does it right -- you can buy gewgaws, pets, mounts, and bags... but other than XP potions, there isn't anything that can affect game play. Rift, on the other hand, I wound up pulling my sub for good (I used to subscribe yearly) because people just hit the shop, and buy a set of raid-tier armor. Rift was great in customization, but the fact that you can toss cash and wind up with all the endgame stuff has put the game into the same category as the junk (IMHO) F2P/P2W "MMOs" found on Android and iOS.

[1]: Oddly enough, the garrison mini-game is one of the nice things about WoW. Cycle missions on alts in the morning, cycle missions later on, and they wind up at a point where they can still run the circus of LFRs, if not normals.

Comment FB hardware may be lucrative... (Score 1) 121

It might be that using Blu-Ray autochangers may be a very useful thing to have, especially for something that can fill the gap between HDDs and LTO tapes for backups [1].

The pathetic thing is that this technology isn't new. We used to have 100, 200, even 400 disk CD and DVD carousels. By replacing the CD reader with a burner, and using 128 GB BDXL media, that means tens of terabytes of tamper-resistant (important with all the ransomware out there) WORM storage.

The trick is getting BD media into the terabytes and getting it at a price point where it is decently affordable. For example, a 100 GB BDXL disk is $65, but it should be about 10% of that price in order to be a viable backup medium.

[1]: The cloud isn't an option in a number of cases (WAN bandwidth isn't cheap), and it is only a matter of time before a major provider gets hacked.

Comment Private networks (Score 1) 33

Thank you for the answer on private WANs or government extranet firewalls. If used properly, even a private IP MPLS shared between a few businesses would add a layer of security. However, if not used correctly, it provides little to no protection. Just one machine with IP forwarding turned on can negate the protection.

It might just be that the core of security against hacks will continue being the core/edge network fabric, because it is a lot harder to secure individual devices than it is to lock down network appliances. The fundamental "heavy armor" just at the firewall will fundamentally change to a fabric that assumes an attack can come from any network segment... well, pretty much any network segment but the management network. The management network will be ever more prized for a target of attack, since that is where the SAN controllers live, and dumping logical disks and destroying data may become part of a security breach as hacker groups with the will, but not the way (extremist groups) make deals with groups with the means (the 0-days), but not the interest to wreak havoc.

Or, it might be that we return to a mainframe and glass-house IT architecture for security reasons. Even though the IRS had a breach, it wasn't their systems specifically that allowed it, but was an unauthorized query through an authorized source. The equivalent of someone seeing a key in the car's ignition and driving off, even though the ignition key has a state of the art transponder system. The IRS is still running on a mainframe architecture, and this seems to have provided a decent amount of security because all the data is in one place, and unless an authorized query takes place that shouldn't, it is pretty well secured.

Long term, I can see businesses moving to a system where all data is physically stored in one (or perhaps two locations using async replication), the data manipulation is all done by a server in the glass room, and access to the data is done by the next generation of JavaStations/X terminals/VT100s, which provide a monitor and HIDs, and that's it. I would not be surprised to see this happen, as it is the other end of the pendulum, as we swing away from cloud computing as the buzzword choice. It has been a while since thin clients have been touted at the Next Best Thing (tm), so I will be genuinely surprised if I don't see a return to having Citrix, RDP or some other remote desktop access done for a work desktop. Even though it isn't a fad, VDI has been gaining steam, so it wouldn't be surprising to wind up with physical terminals on the desktop, access going to the HP MoonShot farm with 45 VDI blades, and from there, RDP or App-V sessions going to where the data is.

Comment How about IoT devices use a LAN? (Score 2) 77

TFA was "meh" at best, but why not design a secure architecture where the $50 device communicates to some type of secure hub (or hubs if one wants redundancy), and the hub is what communicates on the Internet. This way, only one device has to be hardened against attack via the Net. Yes, it doesn't stop attacks done at the LAN level... but any security is better than none, and it would help lock out all intruders except those close by in physical proximity.

This can be done a number of ways, by the central hub being a Wi-Fi AP, or just part of a BT PAN pairing.

To boot, if devices need to communicate with a remote site, there are many ways to communicate via secured link.

A hub topology is the proper way to do IoT. Letting every device go out via 3G or whatnot is only asking for compromise.

Realistically, if the device is "smart", it should just get passed up. If we don't pass up on these devices, we will be seeing fridges demands one sit through a 30 second ad before it unlocks the door, or the oven to allowing Slurm brand turkeys to be baked in it.

Comment Re:Good luck with that... (Score 2) 23

True. Right now, -anything- is better than what we have now, as it is hard to fall off the floor.

The only real way I see security improving is if insurance companies start mandating some security guidelines. May not be PCI-DSS3 strict, but with some semblance of auditing and accountability. Businesses have basic guidelines for physical asset protection (alarm on building, sprinklers, locks on the door, deposit safe), and if insurance demands they have computer and network protection, it would be one of the few ways we might see security happen.

Slashdot Top Deals

One small step for man, one giant stumble for mankind.

Working...