Login  |  Search

Lint Center Article in Haking Magazine

Lint Center Article in Haking Magazine
TWC - Tue Aug 07, 2012 @ 04:26PM
Comments: 0

Hakin9_EN_on_demand_05_2012.jpg

The Lint Center’s Public Affairs team had an article published in this month’s edition of Haking Magazine. The article discusses a hacker’s exploits and the implications on mobile security across the enterprise. The piece is entitled “The Jester’s QR Code Honey-Pot.”

Below is a sampling of some of the article:

With an exclamation of “TANGO DOWN” heralding another completed hacking escapade, the Jester, or as he is known by his Twitter handle, th3j35t3r, is a self-described “greyhat hacker,” known for targeting and taking down militant Jihadist websites. The Jester’s real identity is not known, leading to speculation and attempts to “out” the identity and background behind the sophisticated exploits.

Achieving an initial degree of cult notoriety and respect when he focused his efforts on disrupting WikiLeaks and one of its supporting hactivist-collectives, recently the Jester took a different approach, and let his enemies come to him.  In March, Jester published a blog post detailing a trap he had set aimed at ascertaining specific information from malefic online entities, interlopers, and antagonist hackers, all, he said, who were on his explicative “list.”

OnDeman.png

...The take-away here is that the Jester’s exploit has serious implications on security across the enterprise.  Regardless of the Jester’s personal intentions in releasing the operational hack, it serves as a warning to security personnel in any corporation or organization, which seeks to protect trade secrets, intellectual property, and proprietary information of value to outsiders. 

The U.S. government banned USB data drives to be used in government computers, with good reason. Malefactors may not be able to find a way into privileged information through direct means. Therefore, they may turn to indirect means, targeting the oblivious or careless, singling out and exploiting the individual from the herd.

The security integrity of any company or organization begins with that end user as the initial gatekeeper. Buffering and protective security protocols are secondary and only as good or effective as your first line of defense is knowledgeable about emerging vulnerabilities. In World War II, many OPSEC and patriotic sayings emerged, but perhaps none as relevant and poignant to this discussion as the reminder: “Defense in The Field Begins in The Factory.” 

To read the full article, please visit Haking Magazine.

Comments: 0

Post a Comment




This non-profits service by Grassroots.org and Doodlekit™ Free Website Builder