ransom

So What Should A Secure OS Look Like?

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

Last week, I posted Karl Denninger’s rant on how MS and Apple had dropped the ball on computer security.  The fact is that the current ransomware epidemic is the result of a four decade denial to understand that this problem even existed.  Having had Windows 10 installed on the computer and using it for the last couple of months now I don’t see much effort to take things in the direction I think that the way things are going are going to force them to go.

Frankly this should have been considered a long time ago. We’ve all been spoiled and it’s not as if Hacking and computer security hasn’t been an issue. Yet none of the OS providers, including Linux seem to have invested much effort into creating the tools that make it easy to partition and protect drives and partitions from open access.  That needs to change.  There need to be tools installed and easily accessible to allow users to partition and separate data from the network access.  These days computers are storing immense amounts of irreplaceable personal and corporate data that can be read or destroyed by any Tom Dick or Harry that gets access to the machine. It wasn’t that way before the PC, there’s no true reason, other than “we’ve always done it that way” to set up a system so that it’s not secure.

How might this be done?  Well the old Unix system was set up so that individual spaces could be secured. If people want to know what can be done to partition and fence data so that it can be secured, that’s where I would start.  Get a 1990’s vintage copy of BSD UNIX and play with how it works.

https://en.wikipedia.org/wiki/Berkeley_Software_Distribution

The fact is that unless resource access control becomes THE issue in the next round of OS updates, we will ALL be held for ransom.  There’s no way the security firms can keep up with the infiltration efforts that the cybercriminals come up with and without being able to fence data, the users are going to be helpless.

This week in ransomware:
http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-16-2016-stampado-locky-atom-and-more/

 

Hard Computers And Fuzzy People

I was thinking about ATS systems and how they worked while cutting the lawn the other day and I had an insight about them that I don’t think that people appreciate.  For a computer, there is no “maybe.” A computer is not a brain and the software program running defines everything as yes, or no.

Read More

ransom

They Need To Remember To Keep The Web Light

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

There is an old Roman saying; “Quis custodiet ipsos custodies?” It means, who will watch the watchers?  It’s appropriate when considering the internet and the web.  Heretofore the web standards and protocol development  has been more or less a mutual agreement between interested parties who by and large had no real interest in doing anything that would create problems in real society.  They just wanted to make their wonderful toy work.  They were idealistic and didn’t really see the potentials of the dark side.

Read More

ransom

The Problem With Ever Higher Fences

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

I’ve been called an idiot in various venues by mostly it seems computer security types for this series and my insistence that more law enforcement is required.  What these people don’t see is the bigger issues involved.

Read More

ransom

Cyber Crooks Are Human Too

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

The fact that they are young and inexperienced seems to work against them. They make mistakes.  And get caught.  The interesting thing is that, like a medieval castle under siege the dark net is most likely to break from the inside. What’s also amazing is that no matter how stupid the last guy was and how big the punishment, there’s always anew idiot ready and willing to step in and be the next guy on the “caught” list.  One would think that the possibility of a lifetime relationship with “Bubba” and his friend and strict limitations on computer usage would be a huge deterrent.  Apparently not.

Read More

ransom

Looking Inside The Hood Of Malware

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

 

In this post we are going to take  look inside the guts of a ransomware program. How this stuff comes about is unknown, but there are some clues.  The key thing is that the malware relies on the TOR browser anonymity to do it’s work.

Read More