An upsurge in African cybercrime targeting the financial sector threatens to derail the rollout of Internet banking and electronic commerce services and has forced the Nigerian government to raise an alarm over the vulnerability of the country's ICT infrastructure.

Nigeria joins other countries in Africa, including Zambia and Kenya, in warning about problems for online banking as a result of cybercrime. Read More
Africa is experiencing an explosion of mobile money services as banks and mobile providers compete for customers who would otherwise not have a bank account. This has increased phishing attacks on unsuspecting customers, in efforts to lure them to fake sites.

Cybercrime in the region has further increased following the landing last year of the SEACOM and TEAMS international cables, which are starting to lower bandwidth and Internet connectivity costs.

Nigeria now wants to formulate a legal framework for national cybercrime prevention, while the Zambian government already has enacted a law that could see a convicted hacker being sent to prison for up to 25 years.

Nigeria is Africa's largest telecom market by investment and subscribers and the country now wants to work with other nations in the region on cybercrime prevention and warning systems. Currently, very few banks that provide Internet services are able to also offer security software to curb cybersecurity attacks. Phishing attacks aimed at bank customers feature unsolicited messages instructing users to follow a link to confirm their account information, as a way for criminals to obtain passwords and user identities.

Sylvester Anyanwu, Nigerian Senate Communications Committee chairman, said in an e-mail interview that "Nigeria, which has 90 percent wireless ICT infrastructure, is very vulnerable to cyber attacks. But we are preparing to ensure the country does not become hostage to cyber criminals."

Like the Communications Commission of Kenya (CCK), the Zambia Information and Communication Technology Authority has this week announced the launch of a vigorous campaign to educate consumers about cybercrime.

The Zambian government has introduced the National Policy Framework on Cyber Crime, a package of laws that criminalizes cybersecurity activities that had not been covered in the ICT policy and computer misuse law. Last year, the Zambian government also approved a global cybersecurity protocol that is aimed at protecting Internet users.

However, communication experts warns that Zambia, like many other countries in Africa, lacks the skills, equipment and organizational abilities to fight cybercrimes.

Generally, ignorance has been cited as the reason many people in Africa fall prey to online scams as the criminals' Web sites are built to entice and make people fill out even intimate details.

Joseph Mkandawire, a Zambian businessman who fell victim to a phishing e-mail last week, said the message that asked for his details looked genuine.

"Criminals are then using my e-mail address to appeal for financial assistance claiming that I was stranded in a foreign country because I have run out of cash when in fact I'm in Zambia," Mkandawire said.

The Zambia Information and Communication Technology Authority, the country's telecom sector regulator, has warned it will review license conditions for ISPs that fail to provide security measures.

Disclaimer:
This information is intended for education purposes and the author is not responsible for any misuse or damage caused if tried on a system without permission.
A friend of mine came to me with a problem which am sure you may have encoutered one time or another, his clients' email had been hacked so they were blocked out of their own accounts. This article is not about how to hack or secure emails its about the problem faced by all web application desginers -Authentication.

Before we proceed lets go over the a few applied authentication methods used currently in Web Applications.
Read More 1. Basic Authentication
This kind of authentication requires that a special file .htpasswd, containing the credentials of the individuals who are authorised to access a resource, be placed in the directory which is to be secured.

2. Digest Authentication
Digest access authentication is one of the agreed methods a web server can use to negotiate credentials with a web user (using the HTTP protocol). Digest authentication is intended to supersede unencrypted use of the Basic access authentication, allowing user identity to be established securely without having to send a password in plaintext over the network. Digest authentication is basically an application of MD5 cryptographic hashing on credentials to prevent cryptanalysis.
Digest authentication was a pretty good idea but it didnot pick up as expected.

3. Forms-Based Authentication
This is by far the most used authentication method due its dynamic ability to link with DBMS and tracking of user sessions.

4. Single Sign-On (SSO) Authentication and Shared authentication Schemes
Single sign-on (SSO) is a property of access control of multiple, related, but independent software systems.
With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
Examples of SSO systems include Microsoft's .Net Passport which automatically logs a user into a resource if he/she is already logged into his account.
An example of a shared authentication scheme is the once much hyped OpenID which require additional sign-on for each web site though the same authentication works on several web sites.

Attacks on Web Application Authentication and tools used. Lets now delve into the details of the different etchniques used to defeat Web Application Authentication

1. Bruteforce/Dictionary Attacks
Mathematically virtually any password given sufficient computing power will eventually be cracked, bruteforce attacks mimic the act of a user trying to authenticate with a particular web application. These tools will systematically try out a list of passwords against a specific user account orlist of user accounts until a
match is found or until the list is exhuasted. There is a myth that Yahoo, Gmail, Live are impervious to hacks......but i beg to differ, if an attacker has several proxies at his disposal and an attack tool that randomises the authentication attempts he will go virtually unnoticed.
Anyway enough debates about which of the accounts is "unhackable" and lets proceed to the tools that can be used to initiate such attacks.
Tools:

  • Brutus
  • wwwhack
  • thc-hydra.
  • AccessDriver

Defence:

  • Account lockout: this would be implemented if a maximum number of login attempts is recorded on a specificuser account. This can be a viable option when defending against bruteforce attacks but it can also be mis-used to carryout DOS against accounts.
  • IP Blacklisting: This used to be a viable option but it was clear it could easily be used for a DOS for legitimate users with NAT devices, the blacklisting has been modified with an element of time in mind. Theoffending IP address is blacklisted for a given period of time, this would throw off most bruteforsing tools.
  • Server side web application randomised delayed replies for authentication request can also be used because it can lead to most tools giving many false positives.

2. SQL Injection
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.
Not only can it be used to bypass authentication but it can be used to cause server-wide  or even enterprise-wide damage if conditions are right.

Defence:
There is alot of information about SQL injections so i won't pretty much repeat it but here are some suggestion.
The list is small and not at all comprehensive....but they all basically revolve about filtering...period

  • User input filtering
  • User output filtering
  • User privilege attributes (for limited access to database functionality).
  • Web application firewalls.
  • Parameterized SQL statements

Now all these are relative depending on your web application

3. Phising
This can be extremely dangerous in breaking SSO and shared authentication schemes if the attacker is knowledgeable Phishing is a very blunt form of what is known in security as a man-in-the-middle attack. The general idea is to
impersonate a website with the intent to steal important information from users. Phishing sites are distinguishable only by the hostname in the URL.

Defence:

  • URL scanners: Most modern anti-virus suites are bundled with URL scanners which compare URLS to known phising linksalerting a user if a malicious URL is detected.
  • PhishTank: If your unsure of a particular link sent to you, you can you phishtank(www.phishtank.com) to check whetherthe link is a phishin link. The phishtank service keeps track of many phishing links on the web.
  • OpenDNS: If your the lazy kind who surfs without an anti-virus or dont want to check links all the time, this is the service for you. OpenDNS is a free secure DNS service that can also help detect any malicious phishing URLs.

4. Cross-site Scripting(XSS) attacks
Cross-site scripting is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users. An exploited cross-site scripting
vulnerability can be used by attackers to bypass access controls such as the same origin policy

Defence:
Again alot has been written about XSS but i will list the basic mitigation techniques but yet again the list is not exhuastive since alot of material is readily available about the topic.

  • Validation, escaping, filtering.......this is the song we will sing for all web application designers...validation,validation validation...(very effective)
  • Cookie security(really not viable)
  • Disabling scripts(hmm.....out goes web 2.0)
  • Using a web application firewall


5. Other Techniques
Malware:
Keyloggers

  • Hardware Keyloggers
  • Software Keyloggers
  • Blended Threat Keyloggers

Now when u think you have all your bases covered some hardware of software keylogger is recording your every keystroke....i know it sucks...malware falls in many categories some steal senstive information download updated modules of themselves which information can later be used to compromise user accounts.

Some techiniques worth metioning are Social Engineering, MITM attacks.....so much as this entire article is not exhaustive, it paints the picture of various techniques used....

By David

www.ashemug.com

Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about.
Am going to take a look at some of the top 10  worst computer viruses to cripple a computer system in history . Let's start with the love virus.

Read More

1. I Love You

They say you always hurt the ones you love. In 2000, this was taken to extremes when the ILoveYou virus caused $5.5bn in damages.
The concept was pretty simple: a user receives a file from a known email contact under the title 'LoveLetter' or 'ILoveYou'. When the attachment is opened, the virus is launched. After infecting the host, the virus then took control of the user's email program and sent the same 'ILoveYou' message to every user in the host's address book.
Love must have been in the air, because the virus was potent enough to infect some 10 per cent of internet-connected machines at its peak. At a time when many users were still trying to learn the finer points of the internet, ILoveYou was a major wakeup call to some of the dangers on the web.
Everybody wants to be loved and ILoveYou was brilliant social engineering. It helped that the virus was spammed out in the early days of internet use and there were a lot of newbies online who had only a vague idea about viruses and how dangerous they could be.
Email was a trusted format and, because the messages came from people the recipient actually knew, the likelihood of them being opened was much higher.
Things are different today, although there are still plenty of people who get caught by social engineering attacks, but ILoveYou makes it so high in the list because it was a brilliant piece of social engineering.

2. Sasser
Just how much damage can a virus do? Well, take the Sasser worm as one example. This relatively simple little attack managed to cripple airlines, news agencies and even knocked out government systems.
Perhaps most frustrating, however, was that Sasser infection was very easy to prevent. The vulnerability which the attack exploited had been patched for months, and all users had to do was install the most recent security updates from Microsoft.
Sasser was a stark warning that has yet to be heard by many. Unpatched systems are still pervasive around the world, leaving users vulnerable to Sasser and countless other malware attacks that target patched vulnerabilities.

3. MyDoom
Ah yes, the old 'infect the host then resend to the entire address book' attack method. Like many other attacks, MyDoom used the tried-and-true practice of spreading through email and address books.
But MyDoom went a step further and targeted peer-to-peer networks. The worm not only spread itself through address books but through the shared folder of users who ran the Kazaa file sharing application.
While definitely skilled programmers, MyDoom's creators also seemed to be fans of good old-fashioned vigilante justice. One of the early tasks performed by infected users was to take part in a denial-of-service attack against SCO, the infamous software vendor that once tried to lay claim to the patents for Linux.

4. Nimda
A week after the 11 September atrocities a new virus hit the internet in a big way. Nimda was one of the fastest propagating viruses in history, going from nowhere to become the most common virus online in 22 minutes, according to some reports.
The reason for this speed was that Nimda used every trick in the book to spread itself. It used email, open network shares, IIS vulnerabilities and even web sites to spread. It hit pretty much every version of Windows available and appeared all over the place.
In the paranoid days after the terrorist attack some speculated that this was a digital 11 September, and some security consultants got large speaking fees for suggesting just that. In fact, it was nothing of the sort and was just another attempt at large scale infection.

5.  Melissa

Melissa was created by David L. Smith in 1999 and is based on a Microsoft Word macro. He intended to spread the virus through e-mail messages. The virus prompts the recipient to open a document and by doing so the virus gets activated. The activated virus replicates itself and will be transferred to 50 persons whose address is present in the recipient’s e-mail address book. The virus was spread rapidly after it was unleashed by Smith. The increase in e-mail traffic due to the virus forced some companies to block e-mail programs until the virus attack was controlled.

6. Storm
Before Conficker came around and got everyone worked into a lather, Storm was the big bad botnet on the block. First appearing in early 2007 as a fake news video on European flooding, the Storm malware menaced users for more than a year.
The huge botnet was also influential for its continued use of social engineering tactics. The malware disguised itself as everything from video files to greeting cards, and attacks were continuously refreshed to coincide with holidays and current news events.
While Storm has since been eclipsed by newer botnets, the name still brings to mind one of the most menacing attacks seen in recent years.

7. Conficker
The global catastrophe that wasn't, the third form of the Conficker attack provided nice theatrics but little in the way of actual damage.
The premise was pretty simple: Conficker.C would spread to as many machines as possible throughout March. Each infected machine was given a huge list of domains, one of which would be contacted by 1 April.
The deadline made all the difference. Now, Conficker wasn't just a simple malware infection, it was a 'ticking time bomb', and a looming menace that would unleash carnage. Or at least that's what the story turned into when unscrupulous security vendors and tech-newbie news outlets got hold of the story.

8. SQL Slammer/Sapphire SQL
Slammer/Sapphire virus caused a damage of more than $1 billion and the affected networks included Bank of America’s ATM service, Continental Airlines etc . A few minutes after the infection of the first Internet server, the number of victims of the Slammer virus doubled every few seconds. After Fifteen minutes of the first attack, half of the servers that act as the pillars of the Internet were affected by the virus.
The Slammer virus taught a valuable lesson: It's not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn't widely known

9. Klez
Klez is a persistent little devil, and variants are still doing the rounds today, seven years after it first turned up.
The most common varient, Klez H, spoofs email addresses by randomly picking one from an infected machine before sending itself on to other users. This makes backtracing the identity of the infected machine particularly difficult, since any email stored for any reason can be used.

It exploits a vulnerability in Outlook that allows it to boot up automatically on unpatched systems. It's a cunning little devil but for all its ingenuity I still want to strangle the writer.

10. Elk Cloner
Elk Cloner was written by a 15-year old high school student called Rich Skrenta as a practical joke. Unfortunately for him the joke turned bad very quickly.
The virus was developed for the Apple II system and was a boot sector virus that spread via floppy discs. Apparently Skrenta was a fan of pirated games and would swap them with his friends, sometimes with little messages added. After one too many of these infected discs, he devised a way to alter discs automatically and the Elk Cloner virus was invented.
It had little in the way of a payload. Every 50th time a person booted an infected disc the software ran a little program on the computer screen, and that was it. Nevertheless it was a serious annoyance and was a harbinger of things to come.

By Joe
Intrusecurity

 

Google Inc Google today acquired ReCAPTCHA Inc., a spin-off of Carnegie Mellon University's Computer Science Department, has been acquired by Google Inc. The Pittsburgh company developed online puzzles that serve the dual purpose of protecting Web sites and digitizing printed text. Read More The reCAPTCHA puzzles, which consist of words with distorted letters that computer users must decipher to register for services online or otherwise gain access to a Web site, began as a research project of Luis von Ahn, assistant professor of computer science at Carnegie Mellon. ReCAPTCHAs were introduced in 2007 and are used by many leading Web sites. The company, ReCAPTCHA Inc., was founded by von Ahn in 2008.

Like similar CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) puzzles, reCAPTCHAs distinguish human visitors to Web sites from automated intruders. But reCAPTCHAs are created using words from printed texts that current optical character recognition programs are incapable of reading. So when humans solve the puzzle, they also help digitize pre-computer-age books, newspapers and other printed materials.

"Google is the best fit for reCAPTCHA," von Ahn said. "From the very start, people often assumed the project was connected to Google, so it only makes sense that reCAPTCHA Inc. ultimately would find a home within Google."

Multiple ties exist between Google and Carnegie Mellon's School of Computer Science, von Ahn noted. Many researchers from the two organizations collaborate with each other and Google's Pittsburgh engineering office is situated on Carnegie Mellon's campus. In 2006, Google licensed the ESP Game, an online game devised by von Ahn, for use as the Google Image Labeler.

Von Ahn will remain on the computer science faculty, but will also work at Google's Pittsburgh engineering office.

ReCAPTCHA Inc. is among the startups that have participated in Carnegie Mellon's Project Olympus, which provides advice, incubator space and investor connections to help faculty and students explore the commercial potential of their ideas.

About Carnegie Mellon: Carnegie Mellon (www.cmu.edu) is a private, internationally ranked research university with programs in areas ranging from science, technology and business, to public policy, the humanities and the fine arts. More than 11,000 students in the university's seven schools and colleges benefit from a small student-to-faculty ratio and an education characterized by its focus on creating and implementing solutions for real problems, interdisciplinary collaboration and innovation. A global university, Carnegie Mellon's main campus in the United States is in Pittsburgh, Pa. It has campuses in California's Silicon Valley and Qatar, and programs in Asia, Australia and Europe. The university is in the midst of a $1 billion fundraising campaign, titled "Inspire Innovation: The Campaign for Carnegie Mellon University," which aims to build its endowment, support faculty, students and innovative research, and enhance the physical campus with equipment and facility improvements.

Source: Prnewswire

1. Avira Premium Security Suite 9

I often recommend Avira's free AntiVir virus scanner (www.free-av.com)—I especially like the fact that it offers a bootable rescue CD as a free download. Unfortunately, I didn't find quite as much to like in the full Avira Premium Security Suite 9. A significant bug in the on-demand malware scanner could leave users thinking malware was removed when in fact it was ignored,. Avira had a relatively low impact on system performance, coming in with the second smallest impact on two of my tests. But a default setting in its spam filter slowed e-mail downloading. I also have a problem with the suite's needlessly complex user interaction. I'm hoping for a complete makeover before the next version.

 

Read More

2. G data
G DATA AntiVirus 2009 (formerly AntiVirusKit) is a simple and effective antivirus solution. It’s a basic and easy-to-use product that actually does what it’s supposed to do: protect your computer. G DATA has been one of the best European antivirus software manufacturers for over 20 years, and continues to find new users worldwide with their simple and valuable security software. AntiVirus 2009 from G DATA is no exception, delivering new innovations that make virus protection software straightforward without sacrificing security.


3. ESET Smart Security 4.0
ESET Smart Security 4.0 keeps its performance impact low by including only the most essential security elements: firewall, antivirus, antispyware, and spam filter. It had the least impact of any suite on browsing and came in third or better (out of 16) on all but one performance test. The independent testing labs praise its antivirus component, but the firewall's program control is turned off by default. This version includes the option to (laboriously) create a bootable rescue CD. It also integrates ESET's extremely useful SysInspector diagnostic tool.

4. Kaspersky Internet Security 2009
Kaspersky Internet Security's new user interface hides messy security details but leaves them accessible to power users. The new application-filtering feature renders the suite smart enough to make its own decisions without hassling the user. As long as you don't plan to rely on it for spam filtering or parental control, Kasperksy's suite is a good choice.

 

5. BitDefender Internet Security 2009
BitDefender has added a ton of new features—online backup and remote configuration, for example. It includes all the expected security elements, with decent performance from most of them. It's a reasonable choice if you're excited by those extra features.

 

 

6.TrustPort PC Security 2009
The new consumer-side suite from enterprise security vendor TrustPort PC Security 2009 doesn't offer either the tough security protection or the unobtrusive, helpful interface that consumers have come to expect. The corporate version, managed by an IT department, might work just fine, but this consumer offering doesn't belong on your desktop.



7. F-Secure Internet Security 2009
F-Secure Internet Security 2009 is easy to use, without complicated settings and extras. But installing it was a nightmare, and it took too long deleting inactive malware. The firewall is old-fashioned, and the antispam and parental-control apps are ineffective. The suite hasn't kept up with the times.

 

 

8. McAfee Total Protection 2009
McAfee's latest suite has improved malware detection, and its spam filter is also much better. But its overabundance of features hasn't changed at all; its UI is sluggish; and it saps system performance.

 

 

9. Symantec
Continues to offer security in two flavors, Norton Internet Security 2009 and Norton 360 version 3.0. This version of Norton 360 received the same rebuild from the ground up that Norton 2009 got last year, so its impact on performance is way down. In fact it had the least system drag of any tested suite in two categories despite the fact that it added some significant new abilities across many different components. For the most part, Norton 360 does its work in the background without hassling the user—I like that. Its parental control and antispam components are still weak, but an offer to install Norton Online Family (beta) in place of the regular parental control suggests that this will improve soon. My evaluation was marred by some seriously questionable practices on the part of Symantec's chat-based tech support; Symantec is in the process of addressing this problem. Nonetheless, we chose to award the security suite an Editors' Choice based on the merits of the software itself, because it's an otherwise excellent product.

10. ZoneAlarm Extreme Security
For a year now, Check Point Software has offered two very different types of protection: ZoneAlarm Internet Security 2009 and ZoneAlarm ForceField. With the new ZoneAlarm Extreme Security, Check Point combined the two into one comprehensive security package that includes the tough firewall, accurate spam filter, and unusual identity protection features from ZoneAlarm 2009. To that solid base it adds ForceField's unusual virtualization-based malware protection, and ices the cake with its backup and tune-up capabilities. That full-scale feature set puts ZoneAlarm Extreme in direct competition with Norton 360, and it generally fares well by comparison—except in performance. ZoneAlarm Extreme put a bit less drag on test systems than ZoneAlarm 2009 did, but quite a bit more than Norton 360. Even so, it's an equally good choice for comprehensive protection. It shares Editors' Choice honors with Norton 360 and Norton 2009.

Give us your views on what antivirus your using and how good is it.