Thursday, February 12, 2009

Website of the Week #14

This week I promised to discuss the notion behind Keyloggers. So let’s get right to it…

Q: What is a keylogger and what can it do?

A: A keylogger is quite simply malware, which most often masks itself via a trojan. Keyloggers capture keystrokes – yes everything that you type it can capture. Some keyloggers are also able to take print screens or "screenshots" of whatever you’re doing. Therefore they not only have a record of your keystrokes, but they also can see what site you are logging into.

Many antivirus companies have developed virtual keyboards to help thwart keylogging technology. However, a well written keylogger can still capture virtual keyboard mouse clicks as well as where exactly on your screen you clicked the mouse.

Keyloggers are used mostly to capture bank account information – for obvious reasons. They send information back to a remote server via a backdoor they’ve opened up in your system. The best methods to prevent this type of malware is to keep your OS regularly patched and update/run your AV software at least once a week.


News of the Week:

Kaspersky’s Black Eye

A group of Romanian hackers used a SQL injection vulnerability to gain access to a Kaspersky site operated within the United States. Kaspersky Labs is a very prominent antivirus company that has been a rising star in the security field over the past several years.

Kaspersky is claiming that the attack did not compromise any data. Reports are suggesting that if the hackers had been slightly more advanced they could have had access to around 2,500 email addresses and product activation codes.

In the end, this is simply a black-eye for Kaspersky Labs. It’s unfortunate that this took place. Kaspersky is a well respected organization and I tend to visit their site quite often for general information. I’m just glad my information isn’t in their database.


New administration = new computers? I would hope so!

Reports are coming through saying that from the time that Obama’s staff entered the White House they suffered from tech downgrades. On the campaign trail, Obama’s team was a “Mac shop”. However, once they entered the Whitehouse they found 6 year old Windows PCs laying around everywhere. One Obama spokesperson characterized the situation as “going from an Xbox to an Atari.”

MSNBC also reported that the White House did approve the use of Gmail accounts and personal cell phones for WH staffers. As far as Wi-Fi goes…word is there’s a strong possibility that pre-approved encrypted wireless will be allowed. In the meantime, Obama continues to use his NSA encryption approved Blackberry. If this doesn’t give every hacker on the planet incentive nothing does. Obama’s tech security risks


Man accused of trying to kill girlfriend with WiiMote.

"But honey…it was only a cookie."

Wii as a deadly weapon



Kindle 2.0

Amazon’s Kindle 2.0 has been released and they are taking orders. Also, here is a PCMag.com article on it if you’re interested.

iWoz

The ‘Woz’ to be on dancing with the stars. Yes, I’m referring to Steve Wozniak --- the Man who basically created the first Apple computer. Woz is also known as… “The other Steve Jobs”, “Apples other co-founder”, and “iWoz”, which he’s titled a book after. Let’s just hope he can dance half as well as he can program. Here’s a link if you’re curious to know more.



Skype 4.0 comes out of beta

I’m still on v3.8 only because the “check for updates” option within the app won’t auto-upgrade the code. Disappointing…because now I’ll have to go directly to the site and download the updates. I know, it’s a minor inconvenience, but I tend take a minimalist approach when it comes to upgrading. Here is a cnet review if you’re interested in learning more.


Gadget of the Week:

Star Trek Communicator using VoIP

If I could only convince my wife that this is worth the price...


Tip of the Week:

Hakin9 IT Security Magazine - This site actually offers free pdf downloads (email registration required)...and I must say the level of detail they outline is quite cool. Some of the downloads contain network topologies that provide robust visual representations of the subject matter. Coincidentally, I was in Barnes and Noble last weekend and saw this magazine on the rack. If memory serves, it was priced around $14.99. My take on all this...just go online and find some articles that interest you for free...why pay 15 bucks?

Idea of the Week:

How would you like to live on the water? I mean literally “live on the water.” A former Google software engineer seems to think he’s come up with a solution.

Cool Web tool of the week

Calculate a websites value: http://www.stimator.com/
And yes...Packets and Ports is valued at $47.00. I wonder if they would consider rounding up and making it an even $50?


Video of the Week:

Joaquin Phoenix on Letterman

If you haven’t seen this yet it’s pretty weird. Watch the 3rd clip titled “The full magilla!”


And Finally the...


Website of the Week:

Maybe you could try this on Valentines Day (Oh, by the way…I hope your not afraid of heights)
Dinner in the Sky














Next Weeks Topic: Gadgets Galore!

Saturday, February 7, 2009

Hacker Ticketing

News reports have stated that hackers are now merging the physical and virtual together to plant malware on user machines. I'll explain this a little further...

Basically, a victim comes back to their parked car to find an official looking parking ticket on the windshield. Apparently, the ticket states that if they visit a certain website they will have access to view footage of the violation from Closed Caption TV (CCTV) footage...which most parts of the U.S. only have in limited use. Once they visit the website, the Vundo Trojan installs itself and tells them they should also download a fake scanner to help remove 'other' bad programs that this site so dutifully discovered.

Their "stop at nothing" attitudes never cease to amaze me. I'm forced to shake my head in disgust at this latest scam.

Thursday, February 5, 2009

iPod storage grows

Storage these days continues to grow larger and cheaper by the minute. Remember the 64GB thumb drive I discussed? (Issue #10)

So I ask you...is there such a thing as too much storage? Well, perhaps not when it comes to an iPod. For roughly $300 bones you can upgrade - yes upgrade - your iPod 5G with a 240GB hard drive. It consists of 1.8-Inch PATA hard drive from Toshiba. Or...if you're trying to cut back during these tough economic times, you can opt for a 120GB drive that will set you back around $180.

Music and pictures shouldn't really be a concern here. It all boils down to how many hours of video you want to keep on your device.

IT Layoff DB

Computerworld is maintaining an IT Layoff database that is tracking major tech companies and their struggles during this harsh economic time.


"Who Is" URLs

Here are a couple of "Who Is" sites that will help you capture a few more details about a web site or IP.

http://whois.domaintools.com/

http://www.whoishostingthis.com/

Monday, February 2, 2009

Website of the Week #13

Last week, I mentioned that I’d be discussing both Rootkits and Keyloggers in this issue. However, due to the unexpected size of the Rootkit Q&A, I’m going to defer the keylogger topic to next week. With that being said, let’s jump right into it!


Q. What is a rootkit and can I purchase one at the local Wal-Mart?
A. I seriously doubt that you’d be able to purchase one at your local Wal-Mart. However, if you’re not careful, you can certainly pick one up for “free” over the World Wide Web.

First, let’s be clear that rootkits are designed for malicious intent. They are a form of malware – which is a broad term that describes Trojans, Viruses, Worms, Ad-Ware, Spyware and the like. Typically, a rootkit takes the form of a Trojan. In its simplest form a Trojan is a malicious program that masks itself as something else in order to get you load it onto your system. You’ve probably heard of the Windows Anti-Spyware 2009 program that’s been corrupting computers for the past several months. This is actually a Trojan. It tells you that it found X number of spyware programs on your machine and if you download the program, it will wipe away all of your problems…how nice. Actually, Malwarebytes (a free anti-malware program) was one of the first and easiest ways to remove this Trojan from a computer. http://www.malwarebytes.org/

Okay, now back on topic…

Next, let’s discuss what the term “Root” actually means. Back during the dawn of the personal computing the term “root” was used to identify the highest level of administrative access within the UNIX operating system. When I say “administrative access” I’m referring to a user that has maximum privileges throughout the entire operating system. The reason that I bring up UNIX is because it was one of the first (early) widely used operating systems (pre-Windows era). In fact, UNIX beat the Windows OS to the internet by over a decade.

Therefore, when a hacker wanted to gain access to a UNIX machine it was difficult for them to install a file and run a procedure without being easily noticed. In order to escape detection they had to become stealthier and become totally invisible to the administrator or user of the to-be compromised machine. The process of gaining access with full administrative privileges is called “getting root”. Thus, rootkit technology is a stealthy or hidden process that runs “under the radar”.

To translate this into Windows terms…a rootkit sinks deep within the OS and adds malicious code to registry entries, .dlls, system files and so forth. There are many rootkits that even if you knew their file name and searched for it - you would not be able to find it. More on this later…

Q. How would I suspect that a rootkit might be installed on my computer?
A. Immediate changes in your computers behavior patterns would be one cause for alarm. A couple examples might include:


• You start seeing CPU spikes and are unable to identify the process that’s responsible

• The fan on your computer runs so often you no longer rely on your furnace to keep warm during the winter

• Your computer becomes slower than it already is (I know – this a daily occurrence for many of us) This could mean that your CPU, RAM, and bandwidth is getting “shared” by an intruder

• You suddenly begin to see pop-up/warning messages from your outbound firewall stating that an unknown program is attempting to access the internet (depending on your firewall, you may/may not be alerted)

• The send/receive lights on your router or modem start flashing like the 4th of July and you aren’t causing it

• Law enforcement arrives at your front door with a warrant and mentions something about investigating you as a Spammer


Q. What is a rootkit actually capable of doing to my system?

A. Many rootkits install a backdoor daemon, which is a program that runs under someone else’s control. This backdoor creates an opening (opens a port) allowing the hacker to take control of the computer whenever you have connectivity. Once inside your system, they have access to everything you do and more. Many times they’ll load other “helper” programs to catch your keystrokes (such as a keylogger) or send information back to their server surrounding what bank sites your hitting, etc.

In a nutshell…once a rootkit is installed on your computer the only limit lies in the imagination of the hacker. One thing to note is that there are several variations of a rootkit and each program has its own unique purpose.


Q. How can I protect myself from rootkits?
A. Basically, there are two ways: Common sense computing and software. (And sometimes doing both might not matter). I’ll explain what I mean about both in the list below:


• Keeping your OS updated with current patches. Microsoft now updates and runs their Malicious Software Removal Tool (MSRT) http://tinyurl.com/5lyxe during Patch Tuesday that searches for rootkits on your machine. This is done behind the scenes after you install the updates. You must then restart your computer for the scan to begin. No manual intervention is required by the user and this only runs once per update. You will not even be able to tell that this processes is running – but it is.

• Using antivirus software on a regular basis. Note: AV software has been losing the battle with rootkits mostly because the malware identification logic is based mostly on ‘signatures’ and heuristics. A rootkit might mask itself as a ‘normal’ system file and the AV software will skip right over it.

• Using a software firewall, preferably one that has strong ‘outbound’ protection (Vista is OK, XP not so good – try something like Comodo). The reason you want good outbound protection is to keep malicious programs from ‘calling home.’ A rootkit is only effective when it’s able to send the information that its captured back to the hacker.

• Stay behind a router to stealth your IP and you will also benefit from the routers hardware firewall.

• If you’re really concerned about malware you can use Host Intrusion Protection System (HIPS) software – I’ll be talking more about this in a future issue.

• Browse the Web using Sandboxie www.sandboxie.com/ (see issue #8). Out of all the programs that I’ve ever used – this is my personal favorite security tool for browsing.

• Don’t open any attachments from senders that you don’t know (this is where the common sense piece comes into play)

• Copy and paste hyperlink/URLs (from emails) into your browser versus clicking the stand alone link

• Be cautious when you’re on social engineering sites like Facebook, twitter, MySpace etc. Due to the massive number of users, malware writers love to “test” new code on these sites.

• Most major antivirus companies have some level of rootkit detection included in their software. However, it might not always be “on” by default, so check and make sure the settings are properly configured properly before running it.
• Don’t save any important passwords in your browser’s cache, i.e. bank account passwords ‘n such

• Use Secunia’s PSI application (free) to keep other 3rd party apps up to date. http://secunia.com/vulnerability_scanning/ (I highly recommend this!)

• Be cautious when downloading free applications from unfamiliar sites – many of these programs carry rootkits along with them


Q. Couldn’t I spot the rootkit process in the Windows Task Manager Utility or find it by doing a search?

A. Great question, but the answer is no. You typically won’t see a well written rootkit in Task Manager. Even if you downloaded a more robust tool such as Process Explorer (from Sysinternals) it still wouldn’t show up.

http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx

As I stated earlier, the MO of a rootkit is to remain stealthed/cloaked so that it can perform the evil bidding of its creator.

Also, since a rootkit compromises the operating system kernel, it can intercept the search response coming back to you and essentially “skips” the rootkit file name that you’re searching for. Therefore, you would never be able to find it by using the Windows search feature.

More on how it works –
A rootkit digs deep down into the operating system level and creates its own running process at that level. Ultimately, it alters how the OS behaves and can even mask itself as valid program. Some rootkits are so deeply embedded within the OS that if you do happen to remove them, it could break other critical pieces of functionality and you might be forced to completely reinstall Windows.


Q. What’s the easiest and quickest way for me to see if I have a rootkit installed? I don’t want to spend a lot of time on this, so I’m looking for the simplest path.

A1. Download Avira's free anti-virus application.
http://tinyurl.com/8m2cc8

Avira provides you with as much protection as any other software product on the market today.

A2. Use Rootkit Revealer from Sysinternals
http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx

One of the reasons that Rootkit Revealer is so effective is that is actually uses rootkit technology. “It takes a rootkit to find a rootkit.”

Rootkit Revealer is a free tool and is only around 230KB in size. The link above also provides a page full of rootkit information. The only downside to this application is that once the scan finishes, you might not be able to immediately tell if a rootkit has been installed. (might take some 'Googling' to research the returned results).

There are numerous other rootkit detection software options on the Web, but to keep it simple, free, and most importantly effective…go with Avira.

Comments from Mark Russinovich's blog at technet.com


“Rootkits are cloaking technologies that hide files, Registry keys, and other system objects from diagnostic and security software, and they are usually employed by malware attempting to keep their implementation hidden.”


I think this is about as far as I want to take the topic of rootkits – at least for now. The bottom line is that since rootkits are so difficult to detect and they open up a backdoor into your system, they are probably one of the worst pieces of malware that you can get on your computer.



News of the Week:


AVG notes:
200,000-300,000 NEW sites (per day) are hosting malicious code
http://tinyurl.com/cp8959

100-0 basketball victory…and the winning coach gets FIRED!

http://tinyurl.com/bjf2tc

White House email crash

http://tinyurl.com/bwodrd

Internet tops 1 billion users
In December 2008, more than one billion people used the internet. That's according to comScore an internet marketing research company. China represented the largest online audience with 180 million users, followed by the United States and Japan. No word on how many of those users were on compromised machines.


Microsoft delays release of SP2 for Vista

Microsoft will deliver a Release Candidate of Windows Vista Service Pack 2 in March and not in February. Also, Microsoft will send the service pack build to OEM (original equipment manufacturers) and retailers only in the second quarter of 2009 and not in April.

Update---Additional details on the Microsoft layoffs
Microsoft is planning to reduce its workforce by 5 percent over the next eighteen months, starting with a reduction in force of 1,400 by the end of Jan. But the roughly 5,000 jobs are far less than the 15,000 job cuts rumored prior to the announcement over a week ago.

What isn’t being mentioned is the rate of employee growth in recent years. Since 2005, Microsoft has grown its staff more than 12 percent each year. In fact, Microsoft plans to continue hiring in what it considers strategically important areas.
Other changes announced are pay freezes, reduction in the contractor force of up to 15 percent, delayed construction projects, and budget cuts in a number of “discretionary” areas.


Tip of the Week:


Create RSS feed for any website
http://feedity.com/



Gadget of the Week:


USB 3.0
The specs for USB 3.0 are officially been complete. This now paves the way for manufacturers to begin building and releasing these devices. Some new features include:

• Greater data transfer rates – 480Mbps was the ceiling for USB 2.0, however; 3.0 will support transfer speeds up to 4.8Gbps (10 times faster than 2.0) Quite impressive I must admit.
• Backward compatible with USB 2.0
• Simultaneous read/write capability
• Power management – allowing devices to sleep, idle, suspend, etc.
• It will also include larger cables that are capable of carrying more power. Translation: your iPod, cell phone, or whatever else you charge won’t take as long to power up!
• Look for devices to be released in early 2010



Free Tool of the Week:

Ad-Aware

Ad-Aware celebrates 10 years of Malware protection. Get the free anniversary edition as they are boasting the following numbers:

• Uses 74% less memory than Ad-Aware 2008.
• Uses nearly 60% fewer resources than the previous version, and considerably less than each competitor product tested, including AVG, Kaspersky, Norton, and PC Tools.
• Scans 36 MB per second – faster than each competitor product tested, and over 4 times faster than AVG’s.

Okay, so I’m sure that most of you have heard of this tool and many you have probably used it at some point. Personally, I’ve been running Ad-Aware for over a year and it has always been a resource bear. My CPU use would shoot through the roof whenever I’d run a scan. After trying out the newest version I was quite impressed. My “Smart Scanning” run time decreased from 28 to 10 minutes. CPU use was never higher than 7% and I hardly could tell it was running. Overall, I’m much happier with Lavasoft’s new version and feel comfortable recommending it as a free Anti-Spyware tool.

http://www.lavasoft.com/products/ad_aware_free.php



Random Facts of the Week: (for your next Trivial Pursuit game)

Did you know?

• The current land speed record for a manned rocket car is 763 mph
• The current land speed record for an unmanned rocket sled (on rails) is 6,453 mph or Mach 8.5
• During re-entry back into the Earth’s atmosphere the Space Shuttle reaches speeds up to 17,500 mph. This makes it the fastest manned vehicle in the world.



Videos of the Week:

Rufus the slingshot master!

http://tinyurl.com/8zw72l

The secret megalopolis of the ants
(the farm was abandoned)
It starts off a little slow, but it gets much better after about 1 minute in.
http://tinyurl.com/9fbtkk

Bushisms
Regardless of whether you love him or hate him…‘W’ has assembled some “pretty darn good” Bushisms that will entertain the YouTube generation for years to come.
http://tinyurl.com/7dfvy5




And finally the…

Website of the Week:


Sitonomy – The Anatomy of a website.
Tells you what underlying technologies are used on each site.
http://www.sitonomy.com/