Tuesday, November 26, 2013

Malware: War without end

We may be facing a stalemate. Or, we may be evolving a new cyber biosphere.

Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.

Today, around 5% of the average IT budget is devoted to security, estimates John Pescatore, a director at the SANS Technology Institute. Cybercrime (including malicious insider attacks and theft of devices) costs U.S. corporations an average of $11.6 million yearly, according to an October 2013 study by the Ponemon Institute that was sponsored by HP Enterprise Security. This cost represents a 23% increase over last year's average of $8.9 million per company.

Asked why malware is the war without end, experts commonly embrace either a military or an ecological metaphor. Those with the military viewpoint say flawed defenses have led to a stalemate. The ecology-minded don't see it as a war to be won or lost -- they see an eternal cycle between prey and predator, and the goal is not victory but equilibrium.
Around 5% of the average IT budget is devoted to security, says John Pescatore, a director at the SANS Technology Institute.

One who favors the military metaphor is David Hoelzer, director of research for Enclave Forensics in Henderson, Nev. "We are essentially going in circles," he says. "We improve only after our adversaries defeat our defenses. Most software is still riddled with vulnerabilities, but the vendors typically make no move to fix one until it becomes publicly disclosed. Coders are not trained in security, and 'well written' means 'under budget.'"

Security consultant Lenny Zeltser chooses the ecology metaphor. "Attackers take advantage of the defenders, and the defenders respond. It's part of the cycle," he says. "If attackers get in too easily, they are spending too much to attack us. If we are blocking 100% of the attacks, we are probably spending too much on defense. We have been in a state of equilibrium for some time and always will be. But being complacent is dangerous, as we must constantly apply energy to maintain the equilibrium."

Developments in the financial sector offer an example of why it's important to constantly apply energy to maintain the equilibrium. A new report from Trend Micro points out that attacks aimed at stealing online banking credentials recently surged to a level not seen since 2002.

Nevertheless, experts agree that progress has been made -- even if only toward the maintenance of ecological equilibrium or a military stalemate.
The wins so far

At this point, "there are no types of malware for which there are no defenses that we are currently aware of," says Roel Schouwenberg, a researcher at anti-malware software vendor Kaspersky Lab.

"We no longer see the kinds of big spreading malware that we saw three or four years ago, [such as] the ILOVEYOU virus of 2000," adds William Hugh Murray, a security consultant and a professor at the Naval Postgraduate School.

Interviews with analysts and executives at security vendors McAfee, AVG and Kaspersky Lab suggest that the following are the four principal weapons that make this possible:

• Signature detection. This approach gives you the ability to spot malicious code, among other things.

• Behavior monitoring. By adopting this technique, you can do things like spot malicious activity in a computer or determine if a suspicious file will respond to virtual bait

• Blacklisting. This is a mechanism for blocking access to sites and files that are included on a list of undesirable entities.

• Whitelisting. With this approach, essentially the opposite blacklisting, users are only allowed access to sites and files on a list of entities known to be harmless; access is denied to sites and files that aren't on the list.

Each of the four has its supporters and detractors, and all the anti-malware software vendors queried for this article said they use some form of all four weapons, in combination.

Other defenses include firewalls, which can prevent intrusions and -- with Windows at least -- are part of the operating system, and periodic vendor patches to address vulnerabilities.
Frequency of cyberattacks

The frequency of different types of attacks experienced during a four-week period in 60 companies benchmarked.
Viruses, worms, trojans 100%
Malware 97%
Botnets 73%
Web-based attacks 63%
Denial of service 50%
Malicious code 48%
Malicious insiders 42%
Phishing/social engineering 42%
Stolen devices 33%
Source: Ponemon Institute/HP Enterprise Security "2013 Cost of Cyber Crime" study.


A question sometimes raised is whether there are more advanced weapons that we haven't yet learned about. "I've heard that [the anti-malware vendors] have better defenses up their sleeve that they choose not to release since they are not necessary yet, and they don't want to tip their hand," says Zeltser.

The vendors deny this. "Our secret weapons are in force every day -- it's a daily battle," says Tony Anscombe, an executive at anti-malware software vendor AVG Technologies. Indeed, if vendors had something that can stop all viruses "it would be foolish to wait to use it," says Kevin Haley, spokesman for anti-malware software vendor Symantec. "It would be a competitive advantage" to help sell more software, he points out.

Either way, the end result is that anti-malware software vendors can now respond to a new (or "zero-day") exploit within two hours, although complicated exploits may require subsequent follow-up, says Haley.

In parallel, there have been efforts to make software less vulnerable to infection. For instance, Tim Rains, director of Microsoft Trustworthy Computing, says that Microsoft has revamped the code libraries used by developers to remove errors and vulnerabilities.
There are no types of malware for which there are no defenses that we are currently aware of.
Roel Schouwenberg, researcher, Kaspersky Lab

As a result, he notes, stack corruption was the vulnerability exploited 43% of the time in 2006, but now it's used only 7% of the time. He also cites a study conducted in 2011 by analyst Dan Kaminsky and others indicating there were 126 exploitable vulnerabilities in Microsoft Office 2003, but only seven in Office 2010.

Years of security-related software patches downloadable by users have also had a measurable effect. Rains cites statistics derived from executions of Microsoft's online Malicious Software Removal Tool, which showed that systems with up-to-date protection were 5.5 times less likely to be infected.

As of December 2012, the rate was 12.2 infections per 1,000 machines for unprotected systems vs. 2 per 1,000 for protected systems. The global average was 6 infections per 1,000.

On the other hand, infections still happen. But even the nature of the infections seems to have reached a state of equilibrium.
Today's attacks: Two broad categories

Roger Thompson, chief security researcher at security testing firm and Verizon subsidiary ICSA Labs, divides today's most common infections into two categories: APT ("advanced persistent threat") and AFT ("another freaking Trojan.")

New examples of APT malware appear about once a month, are aimed at a particular target and are produced by organizations with impressive resources, abilities and patience, he says. The classic example is the Stuxnet virus of 2010, whose goal appears to have been to make centrifuges in Iranian nuclear research labs destroy themselves by spinning too fast.

"Each one is different and scary," Thompson notes.

As for AFTs, self-replicating malware is no longer the infection vector of choice, with attackers preferring to launch drive-by attacks from infected websites against victims who were tricked into visiting. (However, worms and older malware are still lurking on the Internet, and an unprotected machine can still get infected in a matter of minutes, sources agree.)
Average annualized cybercrime cost

These costs are weighted by attack frequency in 60 companies benchmarked.
Denial of service - $243,913
Malicious insiders - $198,769
Web-based attacks - $125,101
Malicious code - $102,216
Phishing/social engineering - $21,094
Stolen devices - $20,070
Botnets - $2,088
Viruses, worms, trojans - $1,324
Malware $997
Source: Ponemon Institute/HP Enterprise Security "2013 Cost of Cyber Crime" study.


The acquisition of new Trojans appears to be limited only by a researcher's ability to download examples, experts agree; hundreds of thousands can be collected each day. Many examples are simply members of long-standing malware families that have been newly recompiled, and some malicious websites will recompile their payload -- creating a unique file -- for each drive-by attack. There are probably no more than a thousand such families, since there is a finite number of ways to take over a machine without crashing it, notes Thompson.

The initial infection is usually a compact boot-strapping mechanism that downloads other components. It may report back to the attacker on what kind of host it has infected, and the attackers can then decide how to use the victim, explains Zeltser.

These days, an infected home system is typically hijacked by the attackers for their own use. With a small enterprise, the object is to steal banking credentials, while with large enterprises, the object is typically industrial espionage, Murray explains.

While the anti-malware vendors have adopted a multi-pronged strategy, so have the attackers -- for instance, writing malware that does not stir until it sees that it is not in the kind of virtual machine used to trick malware into revealing itself.

Meanwhile, the attackers have formed their own economy, with a division of labor. "Some are good at crafting malware, others are good at infecting systems, and others are good at making money off the infections, such as by sending spam, or by launching distributed-denial-of-service attacks, or by pilfering data," says Zeltser.

"You can buy the software required to do the account takeover, and then to convert the money into cash you hire mules," Murray adds.
New battlefields include XP, Android

But while many pundits expect to see a continued cycle of attack and defense, they also foresee additional future dangers: Windows XP may become unusable because of the support situation, and the Android smartphone environment may be the next happy hunting ground for malware.

For its part, Windows Vista is no longer receiving mainstream support, but Microsoft has announced the company will continue issuing security updates for the OS through mid-April 2017.

Windows XP, released in 2001, is still widely used, but Microsoft will stop issuing security updates for it after April 2014. At that point, Microsoft will continue to issue security updates for Windows 7 and Windows 8, and after each one is issued the malware writers will reverse-engineer it to identify the vulnerability that it addresses, Rains predicts.

"They will then test XP to see if the vulnerability exists there, and if it does they will write exploit code to take advantage of it," Rains says. "Since XP will never get another update, the malware writers will be in a zero-day-forever scenario. If they can run remote code of their choice on those systems it will be really hard for anti-virus protection to be effective. The situation will get worse and worse and eventually you will not be able trust the operating system for XP."

"People should not be running XP," agrees Schouwenberg. "When it was written the malware problem was very different than it is today. It had no mitigation strategies and is extremely vulnerable."

Android, meanwhile, is going like gangbusters on smartphones -- outselling Apple's iOS phones in the third quarter of this year, according to Gartner -- making it a huge target for crackers.

Experts see many parallels between Android's development and the early history of the Windows market, with hardware vendors adapting a third-party operating system for their products, leaving no single party ensuring security. And with the Android market, the additional involvement of telecommunications carriers is a complicating factor.
Average days to resolve attack in 60 companies benchmarked

Malicious insiders include employees, temporary employees, contractors and, possibly, business partners.
Malicious insiders - 65.5
Malicious code - 49.8
Web-based attacks - 45.1
Denial of service - 19.9
Phishing/social engineering - 14.3
Stolen devices - $10.2
Malware - 6.7
Viruses, worms, trojans - 3
Botnets - 2
Source: Ponemon Institute/HP Enterprise Security "2013 Cost of Cyber Crime" study.

"It is not like the case with Apple, which can push security updates to every iPhone in the world in one day," says Schouwenberg. "With Android, the manufacturer has to implement the patches and then go through certification with the carrier before the patches are deployed. Assuming your phone still gets security updates it may be months before you get them. That would not be considered acceptable with a laptop."

"Android is in a position that Windows was in a few years ago; there is not enough protection," adds Johannes Ullrich, head of research at the SANS Technology Institute, which certifies computer security professionals.
Is there hope?

Returning to the ecology metaphor, sometimes the impact of an asteroid will drive species into extinction. And, indeed, sources can point to extinction types of events in the short history of the malware biosphere.

Thompson, for instance, points out that the adoption of Windows 95 drove MS-DOS malware into extinction by adding protected mode, so one program could not overwrite another at will. Microsoft Office 2000 drove into extinction (PDF) malware based on Office 1995 macros by adding a feature that basically required user permission before a macro could run. Windows XP Service Pack 2 in 2004 set the Windows firewall on by default, wiping out another generation of malware.
The success rate for social engineering is phenomenal.

John Strand, network penetration tester, Black Hills Information Security

"But there is no extinction-level-event in sight to wipe out the current Trojans," Thompson says.

Even if there were such a miracle, attackers could fall back on persuasive email, officious phone calls, smiling faces or other non-technical manipulations usually referred to as "social engineering."

"The success rate for social engineering is phenomenal," says John Strand, network penetration tester with Black Hills Information Security in Sturgis, SD.

People will call in pretending to be from a help desk, suggesting that the user download (infected) software. Or plausible emails such as a delivery notification will entice users to click on infected links, he explains.

And then there's software that tells the user to disable the system's malware protection "to ensure compatibility." "I don't think there is any legitimate software that needs you to disable security protection for compatibility reasons," says Schouwenberg. "But some software does ask you to disable it during installation, creating a precedent, so they think it's all right when they get email from a website telling them to turn it off."

Even if users are trained to resist such ploys, smiling people with clipboards and faux badges may show up at the front desk saying they need to inspect the server room on some pretext -- and they'll probably be allowed in, says Strand.

Beyond that, large numbers of log-in credentials to corporate networks are always for sale at various malicious sites, because people have registered at third-party sites using their office email addresses and passwords -- and those sites were later compromised, Strand adds.
Holding on

"The good news is that it is relatively easy to defend against most malware, if you use up-to-date anti-virus software, run a firewall, get security updates and use strong passwords," Rains says. "These techniques can block the major attacks used today and probably for years to come."

"The best practices I was telling people about 10 years ago I still have to tell people about today," Haley adds. "Have good security software, update the system and use good common sense. Don't link to email that doesn't seem right."

Finally, Pescatore suggests looking to the field of public health (rather than the military or ecology) for a metaphor about living with malware. "We have learned to wash our hands and keep the cesspool a certain distance from the drinking water," he notes. "We still have the common cold, and we still have occasional epidemics -- but if we react quickly we can limit the number who are killed."

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, November 22, 2013

642-321 Cisco Optical SDH Exam


QUESTION 1
What is the phenomenon called where different wavelengths of light travel at different speeds?

A. attenuation
B. OSNR
C. dispersion
D. light skew

Answer: C


QUESTION 2
Why are the 1300 nm and 1550 nm regions of the fiber spectrum primarily used for optical
communications?

A. They are both regions of lowest loss.
B. They are both regions of low index of refraction.
C. They are both regions of low chromatic dispersion.
D. They are both regions of low reflections.
E. They are both regions of low Polarization Mode Dispersion (PMD).

Answer: A


QUESTION 3
For lasers with tightly controlled wavelengths, approximately how far apart are the centers of
adjacent wavelengths when 100 GHz spacing is used in a DWDM system?

A. 0.8 nanometers
B. 1.6 nanometers
C. 0.4 nanometers
D. 1.2 nanometers
E. 0.6 nanometers

Answer: A


QUESTION 4
Which device creates an OEO conversion?

A. fiber-optic cable
B. regenerator
C. optical receiver
D. optical switch
E. attenuator
F. amplifier
G. light emitter

Answer: B


QUESTION 5
If node 2 is accepting line timing from node 1, node 2 will send _____ to node 1 as its SSM
messge.

A. SMC
B. AMI
C. ESF
D. PRS
E. DUS
F. B8ZS

Answer: E


Thursday, November 14, 2013

Verizon: LTE service didn't keep up with demand

Verizon CFO Shammo: "We did not anticipate that amount of growth in the network"

Verizon's network wasn't ready for the flood of new traffic that it had to deal with after the company rolled out LTE service, admitted CFO Fran
Speaking on a conference call with investors hosted by Wells Fargo on Tuesday, Shammo said that Verizon had to back away from its all-you-can-eat data plans in a hurry, thanks to a major spike in demand.

“What we saw happen when you move from a 3G to a 4G network, the consumption of data increased tremendously,” he said. “And we knew that if a small percent did that, what happens when you get a large percent moving? You have to be able to monetize your capital investment somehow.”

Shammo declined to specify exactly how much more data an LTE customer consumes than a 3G one, but said that the ratio was “more than two.”

The trend could slow slightly, however, once smartphone saturation really kicks in.

“Smartphone net-add is going to start to slow,” said Shammo. “It’ll still continue to grow, I think, at least for Verizon for the next two years or so, but that’s going to continue to slow.”

What’s more, Verizon is planning to grow its infrastructure substantially, Shammo added, saying that the company will increase capital expenditures by $500 million this year. He named New York, San Francisco and Chicago as the cities with the biggest congestion problems, and, therefore, the focus of Verizon’s build-out efforts.

The company can afford to focus exclusively on capacity, Shammo said, in part because it has essentially completed its build out of geographic coverage.

“We’re done with coverage,” he said. “We’ll be in the capacity game.”

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday, November 4, 2013

10 Windows Start menus for Windows 8.1

Although Windows 8's Start menu is still MIA in Windows 'Blue,' a smorgasbord of replacements can fill the void

Start here
Seems Microsoft really has put its Windows Start menu out to pasture, alongside Bob, Clippy, and Rover. Sure, the forthcoming 8.1 update to Windows 8 has a shiny new Start button, but clicking it doesn't cause a familiar menu to pop up, providing users quick access to their preferred apps and files. Why'd Microsoft retire the menu in the first place? It was a design choice made by Steven Sinofsky, former head of Microsoft's Windows division.

If you fall into the category of users who don't share Sinofsky’s vision of a menu-less Windows 8, take heart. Several third-party developers have built menus for the operating systems -- and some are arguably superior to any that Microsoft has ever made.

Classic Shell
Classic Shell was originally designed to replace the Windows 7 Start menu with the XP-style Start menu. Now it brings a Windows 7 Start experience to Windows 8 users. Apps can be pinned to the menu area via drag and drop. A pair of flyout menus provides access to classic Desktop programs and Metro apps, respectively. The program also supports starting directly in the Desktop and disabling Windows 8 hot corners.

Classic Shell adds changes to File Explorer, too, such as an icon ribbon populated with commonly used file commands (cut, copy, paste, and so on) and the ability to shut off the "breadcrumb" trail in the address bar and replace it with the full folder path.

Author: Ivo Beltchev
Cost: Free (open source)

Pokki Menu
Pokki Menu is a more ambitious program than many of the others shown here. SweetLabs hasn't so much restored the original Start menu as provided an enhanced replacement for it. Beyond delivering familiar Start menu functionality, for example, it also serves as a source for notifications. It does this via various apps available in Pokki's own app store, which include clients for common social networks.

The Pokki Menu has undergone a significant facelift since InfoWorld looked at it last year. Aside from such aesthetic changes as new colors and layout, the app has improved search and the ability to set files and apps as favorites from File Explorer.

Author: SweetLabs
Cost: Free

Power8
Another open source option, Power8 provides a self-sorting menu of commonly used applications, a set of flyouts for the main Start menu app hierarchy, and flyouts for Computer, Libraries, Control Panel, Administrative Tools, and Network shortcuts. The old search functionality is also replicated, Metro features (charms, hot corners, etc.) are disabled, and -- one very nice touch -- Windows 7 taskbar jump lists are retained. Among the drawbacks, Power8 is short on configurable features.

Since InfoWorld last dabbled with Power8, its developers have made several upgrades and fixes, including boosting the file-system event watching and a more flexible updater.

Author: Power8 Team
Cost: Free (open source)

RetroUI Pro
RetroUI isn't designed to be more than a strict replacement for the traditional Start menu. Clicking the RetroUI Taskbar icon brings up a tile grid that's reminiscent of the Windows 8 Start screen, but outfitted with flyouts that borrow from the original Start menu (Libraries, Computer, Control Panel). Also included are handy shortcuts to the Metro task switcher and Charms bar. Another taskbar icon opens an icon-grid view that displays Metro apps and major system locations.

Thinix has continually updated RetroUI since InfoWorld’s last review, adding features such as optimized file searches, the ability to set default shutdown actions, and caching technology to speed up the Start menu.

Author: Thinix
Cost: Starts at $5 per seat

Start8
Stardock Software has created a Start menu replacement that behaves uncannily like the original. From its accordion-style opening of folders to its subcategorized type-to-search results, Start8 delivers all the familiar functionality, alongside considerable configurability.

Apps can be pinned to the Start8 menu via a right-click contextual menu option in File Explorer. Even the system shortcuts (Control Panel, Computer, etc.) can be toggled as needed. Better yet, the bottom-left hot corner can take you straight to Start8, even from within a Metro app. Hot keys can bring up Windows 8's own Start screen, hot corners can be selectively disabled, and Metro apps can be hidden from Start8 if you don't want them there.

Author: Stardock Software
Cost: $5 for a single-user license

StartIsBack
StartIsBack is a startlingly precise recreation of the Windows 7 Start menu, orb and all, although a good deal more tweakable than the original. Each Windows 8 hot corner can be selectively toggled. The Start screen can be skipped on login, invoked with a dedicated hot key, and reserved only for Metro programs. Just right-click a program in Explorer to pin it to the StartIsBack menu.

Since InfoWorld last tested StartIsBack, developer Tihiy has made numerous upgrades. For instance, you'll find a new shortcut to the Start screen in the Start menu, the option to display all programs in a multicolumn flyout menu, and the option to enable the Start screen hot corner on the Desktop.

Author: Tihiy
Cost: $3 for two-PC license

StartMenu8
Launch StartMenu8 and you're greeted with the familiar Windows 7 Start menu orb, along with a fairly spot-on reconstruction of the rest of the classic Start menu. The StartMenu8 interface wasn't as customizable as its competitors when InfoWorld tried it out last December. There was no way to toggle things like the links to the games folder or the Control Panel, and most of the program's behaviors appear to be hard-wired. Users can log in directly to the Desktop, and StartMenu8 can deactivate the Windows 8 hot corners and the Metro Charms bar. The latest version includes a key for opening Metro, a new Settings interface, and some aesthetic improvements.

Author: IObit
Cost: Free

Start Menu Reviver
Start Menu Reviver brings the Metro look, fat-finger friendliness, and lots of customizability to a Start menu for either Windows 8 or Windows 7. Like a mini Windows 8 Start screen, Reviver presents buttons and tiles (large or small, as you like) that give you direct access to literally anything on your PC -- documents, folders, desktop apps, Metro apps, favorite URLs, you name it. A flyout menu provides speedy access to everything else. Along with the tiles, menus, colors, text, and tile icons, a few other settings are configurable. You can boot directly to the Desktop or have the Windows key open the Start menu.

Author: Reviversoft
Cost: Free

StartW8
StartW8 is a good classic Start menu recreation, though it lacks much in the way of customization options, and pinning programs to the Start menu isn't as straightforward as it could be. Options include the ability to switch to the desktop immediately after signing in; the ability to activate the menu with the Windows key; buttons for logging off, locking the system, and powering off; a traditional search field; and the ability to designate favorite apps. The latest update adds the option to ignore Hot corners, along with an automatic update feature.

Author: SodatSW
Cost: Free

ViStart
ViStart is a free Windows Start menu app that boasts a high level of customizability. The latest version comes with three Start Menu skins and four Start menu buttons, alongside a renewed skin manager. You can download 25 additional skins and 20 buttons from the developer's site. A new control lets you configure Windows 8 to skip the Metro screen and boot directly to the Windows 8 Desktop. You can also disable features such as the Charms bar and start corners. ViStart even indexes the Start menu to speed up searches for files and programs.

Author: Lee-Soft
Cost: Free


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com