Record bad year for tech securityPaper says 2005 saw the most computer security breaches ever; more than 55M Americans exposed.
CNNMoney.com
2005 saw the most computer security breaches ever, subjecting millions of Americans to potential identity fraud, according to a report published Thursday.
Over 130 major intrusions exposed more than 55 million Americans to the growing variety of fraud as personal data like Social Security and credit card numbers were left unprotected, according to USA Today.
The Treasury Department says that cyber crime has now outgrown illegal drug sales in annual proceeds, netting an estimated $105 billion in 2004, the report said.
At the same time, the Department of Homeland Security's 2005 research budget for cybersecurity programs was cut 7% to $16 million.
It is difficult to gauge the true number of security failures because many companies are unaware they've been hacked, the paper said.
__________________________
Ford recently saw 70,000 employee records stolen --
read more here.
US hacker pleads guilty to eBay attack
A hacker who was charged with using approximately 20,000 virus-infected computers to attack online auction firm eBay in 2003 has pleaded guilty, the United States Attorney's office said on Wednesday.
The hacker, Anthony Scott Clark, 21, of U.S. state Oregon, helped to launch distributed Denial of Service attacks on the Internet against eBay, according to prosecutors.
Clark and his accomplices used a worm program called "bot" that exploited a vulnerability in the Windows Operating System. The "bots" were then directed to an Internet chat server, where they connected, logged in, and waited for instructions.
"Mr. Clark personally commanded the 'bots' to launch DDOS attacks on the name server for eBay.com," and, "as a result of these commands, Mr. Clark intentionally impaired the infected computers and eBay.com," the Attorney's office said in a statement.
Clark admitted to the charges at a federal court in San Jose, California, on Tuesday afternoon. Prosecutors said Clark faces a potential sentence of up to 10 years in prison, a fine of 250,000 U.S. dollars, and three years supervised release.
But the arrest is unlikely to make a dent in the number of botnets or their usage, security experts warned. Attacks using botnets are difficult to track, because they are usually cross-border attacks and anonymous.
"It is difficult to tell who's pushing the buttons," said Joseph Telafici, director of operations for the Anti Virus Emergency Response Team at anti-virus software maker McAfee.
"Botnets are the biggest source of cash flow in organized Net crime as they are used to drop adware into user computers, for spam relays, data theft, and to launch DDOS attacks," Telafici told Red Herring, a well-known technology magazine.
Hacker cracks police force network
RCMP, OPP and Toronto service may be among victimsThieves raid database favoured by law enforcement agencies
OTTAWA—Major police forces across Canada, including the RCMP, OPP and the Toronto force, are among thousands of law enforcement agencies and forensic investigators whose private and financial information may have been stolen this month in a hacker attack, a published report says.
Guidance Software, Inc., a private Pasadena, Calif., firm, said in a letter sent out to law enforcement agencies last week that thieves had raided its database sometime in November, stealing credit card numbers and in certain cases information such as addresses and telephone numbers for 3,800 customers.
Guidance makes EnCase, a suite of forensic investigation software that has become the standard tool used by computer crime units of police, insurance companies, banks and private computer forensics specialists.
The RCMP, the OPP and the Toronto police are among Canadian agencies that say they received letters from Guidance informing them that their units' confidential information had been exposed. Guidance became aware of the breach Dec. 7, the Ottawa Citizen reports.
Toronto Police Service spokesman Mark Pugash told the Star's Betsy Powell yesterday the matter will be investigated to see what, if anything, the breach means to Canada's largest municipal force.
EnCase products are used, among other things, to extract and analyse digital evidence from computers to identify hacker attacks.
Guidance's own software "certainly should have set off some alarms that `someone is downloading our entire database,'" said Ryan Purita, an EnCase-certified investigator with Totally Connected Security Ltd. in Vancouver. He is one of a handful of Canadian computer forensics experts authorized to testify in court.
"It highlights that intrusions can happen to anybody."
John Colbert, head of Guidance Software, Inc.
"Something fell apart here."
John Colbert, chief executive of Guidance, said the attack "is ironic, but it highlights that intrusions can happen to anybody. It's not a matter of if, but of when, so nobody should be complacent about their (computer network) security."
The Los Angeles Electronic Crimes Task Force is leading an investigation, along with the U.S. Secret Service and FBI, Colbert said. He said the breach has led to "a few instances of fraud" involving stolen credit card numbers.
Colbert admitted Guidance broke the rules of credit card issuers by storing in its database the card value verification (CVV) codes — a security feature meant to stop the cards from being used in Internet or telephone fraud. The company could face fines for keeping CVVs permanently on file.
OPP spokesman Supt. Bill Crate said the computer investigation unit's credit card information had been kept on file by Guidance, but that despite concerns over the breach of confidentiality there is no evidence the agency has suffered any financial loss.
RCMP Staff Sgt. Paul Marsh said the breach of confidentiality "is of concern."