Do the bare security necessities

April 2009 News & Events

The BBC recently took a break from dishing up its usual preapproved gruel to do something interesting. The broadcaster’s technology programme bought a botnet of over 20 000 infected PCs to send out spam to preset e-mail addresses, and it worked like a dream. Of course, in the real world a botnet like this could be used to send spam, distribute malware disguised as an image or launch a denial of service attack.

These PCs belonged to anonymous consumers that were not adequately protected and were not aware of the risks of certain online activities. Or they may have been aware of the risks and decided to take a chance anyway. The result is they were infected by some malware (malicious software) that gave control of the PCs to the criminals – invisible to the user and independent of whether the user wanted his/her/its (it may be a company’s PC) bandwidth and technology used in this way.

We print a report in this issue showing that cybercrime is not a bunch of hooligan teenagers playing around and trying to be smart between downloading porn, it is an organised and profitable criminal activity. And you or your company could be contributing to its profitability if you do not take a few simple precautions.

The security industry is in the throes of a convergence wave which is seeing IP-based technology becoming ubiquitous. While IP undoubtedly delivers tremendous improvements, if not secured, it also delivers tremendous vulnerabilities.

If your fancy multifunctional printer/copier/scanner/fax is as vulnerable as an unprotected PC, how vulnerable are parts of the security network that are connected wirelessly? A wireless IP camera is a great benefit, easily installable and moveable as required, but how secure is that wireless network?

Hi-Tech Security Solutions is testing a new fancy wireless camera at the moment. Great product, fantastic functionality, easy to set up and use, but it cannot access hidden wireless networks. In other words, to use this camera you need to broadcast your wireless network to the world. You can, naturally, secure the network, but you cannot hide it from people on the lookout for free bandwidth or a way to access your corporate network. But let us be serious, how many security people will think of learning how to secure their wireless network – no matter how simple the process is?

This is nothing new. Four years ago, USA Today reported that a PC running Windows XP could be compromised in minutes after connecting to the Internet. “Simply connecting to the Internet – and doing nothing else – exposes your PC to non-stop, automated break-in attempts by intruders looking to take control of your machine surreptitiously. … While most break-in tries fail, an unprotected PC can get hijacked within minutes of accessing the Internet. Once hijacked, it is likely to get grouped with other compromised PCs to dispense spam, conduct denial-of-service attacks or carry out identity-theft scams.”

And it is not only PCs. ZDNet carried a report in March this year in which “Sophos Principal Virus Researcher, Vanja Svacjer, posted an analysis of Troj/Skimer-A, a malware affecting Windows-based Diebold cash machines and capable of intercepting credit card details and their associated PINs.” And you were worried about giving a Nigerian waiter your credit card!

Converging security solutions are as vulnerable. If they can get into a bank’s ATM, they can compromise your IP CCTV installation in a heartbeat – unless you take sensible precautions. As any security-savvy person knows, if they want to get in they will, so getting paranoid about IP security is not the answer. Simple precautions ensure the amateurs are stymied, while the professionals need to do some work, so take some simple precautions.

If you want to know more, the Diebold report is at http://blogs.zdnet.com/security/?p=2908 and the Sophos report is at http://www.sophos.com/security/blog/2009/03/3577.html. You can read up on the BBC’s adventure at http://news.bbc.co.uk/1/hi/programmes/click_online/7932816.stm, or at http://www.scmagazineuk.com/BBC-Click-botnet-attack-criticised-by-industry-experts/article/128686/. The USA Today article is at http://www.usatoday.com/money/industries/technology/2004-11-29-honeypot_x.htm.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.