Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Friday, April 3, 2009

Keep Your WoW Account Safe

Courtesy of Lifehacker

For World of Warcraft players deadly serious about account security, Blizzard has released the Battle.net Mobile Authenticator for the iPhone. No need to carry a keychain ever again.

The free iPhone app is now available for download through the iTunes App Store, giving World of Warcraft players peace of mind with the power of a unique identifying code. No longer will someone be able to log into your WoW account to see who you're cybering with on your personal time.

It works just like the already-released keychain version, but without the need for unique hardware. All that's required is a simple download and a quick change to your Battle.net account.

If you don't have an iPhone, an iPod Touch with a working wi-fi connection will do. Expect Blizzard to offer a similar Mobile Authenticator for other mobile platforms and providers at some point in the future.

Battle.net Mobile Authenticator Now Available [World of Warcraft]
Battle.net Mobile Authenticator [iTunes]

Wednesday, April 1, 2009

Conficker Worm a Bust


Conficker worm day (aka let's-get-the-world-paranoid-over-nothing day) has come and gone. Reminds me of the Y2k scare back at the turn of the millenium. All talk and no action. Oh well, that's good news anyway... or maybe the Conficker worm's creator(s) are waiting for a more inconspicuous date to perform their assault against the world. MWWAAHHHAAAHHAAA. Probably not though.

What is happening actually, is the worm is "dialing home" but no one is answering. IT Security experts are saying that with all the publicity and people all over the world watching the worm's actions, the boss(es) of the worm do not want to give away their plans or have anyone figuring out who they are. Right now the boss(es) are just lying low and not responding to the ~ 10 million infected computers desperately waiting for new instructions. Unfortunately, everyday in the future could be the day that the boss(es) give the worm an update which could be anything from a practical joke to something that could have seriuos repercussions worldwide. Only time will tell.

Friday, March 27, 2009

Conficker Worm's Fury unleashes on April 1, 2009




The Conficker Worm has been harassing computer network security administrator's for months since it climbed out of the internet underground sometime in 2008. It is about to get a fresh update on April 1, 2009 and security officials are bracing for the impact that the upgrade might have.

Before we get too far you should know what a worm is. Here are some definitions to put it into perspective.

Virus -
a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.

Trojan Horse - a computer program that may be legitimate but has secondary illegitimate objectives. For instance, a computer program that lets you burn DVD's but also opens a backdoor in your computer to let a hacker get in and control the computer of the user.

Worm - a self-replicating computer program. Unlike a virus, it does not need to attach itself to an existing program.

Though they sound similar, they are considerably different. Right now the Conficker worm is tearing through the internet and business computers like the sands of the desert planet Arrakis (Dune). It has infected as many as 10 million business computers with many high profile computers noted such as French Air Force, Royal Navy Warships and Submarines, Sheffield Hospital network, UK Ministry of Defence, and Norwegian Police. It has also infected scores of individual users alike. A simple action such as using a USB drive on an infected computer and then using that same USB drive on another computer will be enough to spread the infection.

The problem with the Conficker Worm is that it is ever evolving, meaning that it gets updates from it's creator(s) periodically so it's always one step ahead of the security "police". For instance, at one point (when the worm was first detected) Microsoft (MS) released a patch to fix the hole the worm was using to wreak havoc. Then shortly after, the worm updated and found a new hole to use to infect systems. What's worst is the worm uses a different site to update out of a list of 50,000. To say the least, security experts are impressed with the Conficker worm's ability to adapt and lead experts on wild goose chases.

What's interesting about this story now, is that the worm has stopped spreading. It is becoming more defensive in nature. Instead of finding ways to infect more computers, the creator(s) are taking measures to ensure that the computers that are infected with the Conficker Worm, stay infected. For instance, an infected computer may not be able to install any anti-virus programs or go to any anti-virus program web sites. It's as if the creator(s) want to protect the worm's install base by removing the worm's ability to replicate itself, which would suggest they believe they already have enough infected computers to accomplish whatever they are planning to do.

Though the worm is believed to have originated in the Ukraine, no one knows for certain. MS is concerned enough about the damages that may ensue (or have been caused), they have put a $250,000 bounty on any information leading to the creator(s) of the worm. I have never heard of a bounty (or such a large one) being put out for the creator(s) of malware. It's interesting to see where this will go.

The bottom line... IT security experts are reluctant to say "the end of the world is at hand", but the worm is set to update on April 1st, 2009, with unknown consequences.