Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Security Predictions of 2004 326

scubacuda writes "Computer World's security predictions for 2004: R.a..n,d,o.,m p,u,,n,c.t,,u_a.t.1..0.n evading spam filters, Internet access filtering, better desktop management, enterprise personal firewall deployment, tools that securely scrub metadata, corporate policies against USB flash drives, Wi-Fi break-ins, Bluetooth abuses, cell phone hacking, centralized control over IM, public utility breakin publicized, government defense against cybercriminals, organized cybercrime, and a shorter time to exploitation."
This discussion has been archived. No new comments can be posted.

Security Predictions of 2004

Comments Filter:
  • Nearly impossible? (Score:4, Insightful)

    by n0nsensical ( 633430 ) on Monday January 05, 2004 @06:06AM (#7879536)
    R.a..n,d,o.,m p,u,,n,c.t,,u_a.t.1..0.n makes it nearly impossible to block spam messages by filtering keywords.

    Can't the spam filters just remove it all? They don't really need the punctuation to check for Viagra advertisements anyway.
  • by dorward ( 129628 ) on Monday January 05, 2004 @06:15AM (#7879558) Homepage Journal
    Spam operators are getting more creative in their efforts to get around spam filters. R.a..n,d,o.,m p,u,,n,c.t,,u_a.t.1..0.n makes it nearly impossible to block spam messages by filtering keywords.

    It doesn't take very much CPU to s/\W//g

    Operators are changing to graphics interchange format images with no searchable text.

    Yeah! Block all email containing only graphics!

    Some spammers send in encoded formats, like Base64, to circumvent keyword filters altogether,

    Base64 isn't hard to decode... or to just bin.

    and relay through IP addresses that have no Domain Name System domains associated with them.

    I've never seen an email with an IP address based URI that wasn't spam. Trash em

    These recent developments are challenging spam-filter vendors and frustrating users.

    Not this user, or this user's spam filter [mirror.ac.uk]. Spams using these techniques get the highest spam scores and when 5 is worthy of trashing, 35 is worthy of laughing at (at least until I get so much spam I'll put it in /dev/null rather then ~/mail/spam)

  • by Stinky Glen20 ( 689507 ) on Monday January 05, 2004 @06:17AM (#7879566)
    I agree - We chatted about something similar in our office the other day.

    If the spelling and grammar of the email were to be checked and weighted as part of the filtering process you'd get around a lot of the deliberate misspelling of words.

  • by wiggys ( 621350 ) on Monday January 05, 2004 @06:20AM (#7879577)
    >Don't put your email address online, period

    That's like saying "Don't go out after 9pm or you deserve to get beaten/raped".

    Sorry, but my instincts are to fight the spamming bastards rather than give in to them.
  • by pe1chl ( 90186 ) on Monday January 05, 2004 @06:22AM (#7879581)
    That means you (or the admins) have not yet fully understood how they can manage desktop systems.
    This is understandable. There is a lot to read.
    But in the end it will be possible to protect the systems against the user (somewhat) and still be able to manage them, even defragment.

    So keep on studying!
  • by dorward ( 129628 ) on Monday January 05, 2004 @06:29AM (#7879601) Homepage Journal
    Don't put your email address online, period. Other solutions like filters only address part of the problem, because you still have to pay for the bandwidth and there's the problem of false positives. I wrote a little Javascript Turing email obfuscator, which prevents renders your email address invisible to bots, even those that can execute javascript.

    It comes down to a choice:

    • Get less spam
    • Make it harder for people to contact you

    I don't want to put barriers in people's ways when they wish to contact me (OK, sometimes I do - 'No I will not fix your computer! I don't even know you!' - but generally I don't). Making people use a JavaScript enabled web browser AND answer a question is a barrier, and I don't want it.

  • by miu ( 626917 ) on Monday January 05, 2004 @06:36AM (#7879622) Homepage Journal
    Why not filter out spam by anything with > 3 periods, and/or commas?

    What seems slightly more workable is to ignore punctuation in the subject when checking for 'spam' words. This would fit more in line with the extremely naive filtering available to Outlook users.

    Going simply by punctuation density could cause a lot of false positives based on acronyms and ellipses.

  • by arvindn ( 542080 ) on Monday January 05, 2004 @06:48AM (#7879665) Homepage Journal
    If you need to keep changing your filter, the spammers have already won.

    It doesn't matter to the spammers if the user's filter can be trivially modified to filter out the spam. If they can get past the currently used filters, that's enough. If they keep doing this constantly, it will mean that users will have to constantly upgrade their spam filters. Many people will get tired after a while and just give up :(

  • by Anonymous Coward on Monday January 05, 2004 @06:50AM (#7879670)
    From the article:
    Second, whenever a new technology comes out, its developers generally do a poor job of designing security into it

    That was true 5 years ago, but in general it's crap today. Most security problems are in re-implementations by Microsoft of old technology.

    Browse through the RFCs issued in the last 5 years, which is where new Internet technology generally appears, and you'll find a generally excellent level of security design.
  • Corporate IM (Score:4, Insightful)

    by ksp ( 203038 ) on Monday January 05, 2004 @06:51AM (#7879673) Homepage
    I used to work in a global virtual team for a software company and I was (once again) shocked at the ignorance of the MIS department. A lot of people just decided to use MSN Messenger and so it suddenly became our standard communication program, so far it was even written into work procedures.

    I expect the new IM worms to be the next major disaster to these tech companies, just like Slammer was for their unmanaged MS SQL installations.

    It surprised me that noone listened to my suggestions on setting up an internal server. OK, not every luser knows IRC, but surely there are many IMs that can be set up to use an internal server and block everything else at the firewall. We tried the Lotus Notes clone of AOLs AIM and it sucked (as everything Notes), apart from using encrypted line data.

    I remember trying to get hold of a senior developer I was working with using plain old talk in a terminal and he didn't know it... He got the notification in his shell and called me instead. Sort of explains the renaissance of these dummy IM clients.

  • by miu ( 626917 ) on Monday January 05, 2004 @06:56AM (#7879686) Homepage Journal
    If you need to keep changing your filter, the spammers have already won.

    If you are stating that Outlook client pass/fail filters are bad because (among other flaws) they need constant updating, then you are preaching to the choir. Until Exchange gets a good scoring filter, it makes sense to at least improve the flawed tools that are available to most corporate users.

  • by the uNF cola ( 657200 ) on Monday January 05, 2004 @07:00AM (#7879694)

    It doesn't take very much CPU to s/\W//g

    tr/\W//d is faster if that's perl :)
  • by BigBadBri ( 595126 ) on Monday January 05, 2004 @07:11AM (#7879728)
    Unlikely.

    Short, broken, or oddly punctuated sentences, such as this, may wrongly trip the rule.

    There are 1,000,000s of examples, of which this is 1.

    Still, it's ugly English, so should perhaps be condemned as such and consigned to the spam-bin anyway.

    More serious is how to define a sentence - if it's a phrase terminated with a period, then random punctuation is likely to generate many short sentences, and a sufficiently dedicated spammer ought to be able to bias the 'random' punctuation to defeat a conservatively set rule.

    I'm not sure that anything can be done 'quite easily' in Perl...

  • by scottj ( 7200 ) on Monday January 05, 2004 @07:12AM (#7879732) Homepage Journal
    Come to think of it, there's nothing to stop somebody with one of these Hard drives
    Come to think of it, this is nothing that I could not have done several years ago with my 20GB laptop. These USB drives are not a new threat in an environment where mobile computing is prominent. Not ALL of us use desktops. In fact, I don't have a single coworker who uses a desktop computer these days.
  • by DerPflanz ( 525793 ) <bart@@@friesoft...nl> on Monday January 05, 2004 @07:12AM (#7879736) Homepage

    What if some tries things like 'fcuk' or the like? Does it work also? Think of that english research done lately where it says it doesn't make much difference in which order the letters are, as long as the beginning and ending letter are correct. More about that here [cam.ac.uk].

  • by Eivind ( 15695 ) <eivindorama@gmail.com> on Monday January 05, 2004 @08:02AM (#7879865) Homepage
    But that's not needed.

    To a Bayesian filter such "cleverness" is even more damning than just stating plain-out what you want to say.

    Probably my legitimate mail *seldom* talks about "viagra" or "refinancing", but the rarity of those words in my mail is nothing agains the unlikeliness that I'd write "v1@gr@" or "r3f|n@nc|ng".

    In other words, such clever tricks migth work. Once.

  • by Ewan ( 5533 ) on Monday January 05, 2004 @08:10AM (#7879887) Homepage Journal
    No, because in another part of the same email they have an image embedded which contains the real spam message - outlook express users (the huge majority) see the image not the text.

    Ewan
  • by Animats ( 122034 ) on Monday January 05, 2004 @08:27AM (#7879955) Homepage
    • Major spammers begin sentence
      Three major spammers began their sentences today at the U.S. Federal Penitentiary at Allenwood, Pennsylvania. Their Romania-based operation had created several well-known viruses to assist in sending spam by breaking into the computers of others. Each was initially charged with 12,346,000 violations of the Computer Fraud and Abuse Act. The leader was also charged with operating an ongoing criminal enterprise. FBI and Homeland Security investigators located the spammers, and the U.S. Department of State arranged for their extradition to the US for trial. All pled guilty to reduced charges after being convinced that they could be put away for life. The leader will serve 25 years, and his assistants will serve 15 years each.
    • National Security Agency releases major enhancements to NSA Secure Linux
      Over the last several years, NSA has quietly been enhancing NSA Secure Linux, and has now released a secure Linux distribution for general use by U.S. Government sites. In this system, information coming in from the Internet is automatically held at a low level of trust, and cannot corrupt other information on the machine. A compatible secure browser, mail server, web server, and DNS server are provided. Free, open source copies of this code are available.
    • Microsoft loses software liability case
      New York State Attorney General Elliot Spitzer announces a $12.6 billion verdict against Microsoft in the "Blaster VIII" case. The court held that Microsoft violated New York's "reckless endangerment" law by distributing web browsers which automatically opened content that might contain viruses, resulting in the distribution of the "Blaster VIII" worm to over 200 million computers worldwide.
    • Dell recalls 1.2 million computers.
      Dell today announced the recall of 1.2 million computers for a security flaw. Fear of a liability lawsuit prompted the move.
  • by Karl Cocknozzle ( 514413 ) <kcocknozzle@NOspAM.hotmail.com> on Monday January 05, 2004 @08:40AM (#7880013) Homepage
    Until Exchange gets a good scoring filter, it makes sense to at least improve the flawed tools that are available to most corporate users.

    I think that's about the only way my company would ever start spam-filtering in earnest: If Microsoft created an "official" (probably easily circumvented) server-side spam filter. It might still be a fight, even then.

    Our "uber"-engineers and PHBs fear these server-side tools... They're afraid we'll get a false positive on the CEO's mailbox that will end up with the company losing money--and all of us losing our jobs. And maybe that could conceivably happen... But the sky could fall tomorrow, too. (This is also a good argument for a TEST ENVIRONMENT, a suggestion of mine that gets laughed down every time I bring it up.)

    Of course, I keep trying to explain to them that very few legitimate customers use the phrase "increase you girth!" in legit business e-mails... But to no avail. As a result, EVERYBODY gets spam-bombed... You see, we finance student loans... And many people grow to loathe the organization that services their loans. We're the ones who send the bills. When they don't get paid, we're the ones who call to ask "Where's the money, doofus?" So you can imagine that our "Customer Service" e-mail addys have been added to every porno/spambag list there is.
  • by Steve B ( 42864 ) on Monday January 05, 2004 @08:48AM (#7880046)
    RTFA. Spammers crack their way through the security measures (filters) designed to prevent their unauthorized access to other people's property. The existing computer security laws need to be enforced against this form of cracking.
  • by Anonymous Coward on Monday January 05, 2004 @10:01AM (#7880436)
    Finally! A simple solution.

    You should hire yourself out as a "Security Consultant" and get some $$$.
  • by mengel ( 13619 ) <mengel@@@users...sourceforge...net> on Monday January 05, 2004 @12:43PM (#7881680) Homepage Journal
    We just need to fix our Bayesian fitlers; to wit
    • count runs of punctuation as tokens
    • run a normal pass, then
    • de-html-tag the text
    • map "w,.o..r!#d_=s" into "words" (de-punctuate)
    • run a second pass
    • use individual words *and* pairs of adjacent words in the statistics database
    Then we'll get even better filtering, and foil about 90% of the current techniques.

    Of course, then the spammers will start poking around for new techniques... But these are really easy to fix.

All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin

Working...