Attacks/Breaches
2/11/2014
01:30 PM
John Klossner
John Klossner
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Cartoon: Identity Thieves

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 2:14:33 PM
Chump change
Stick-up man? That's amateur hour. You wanna be a thief today, you gotta have hacking skills.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 2:47:57 PM
Re: Chump change
Maybe a lecture from Kevin Mitnik as part of a criminal justice rehabilitation program...
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
2/11/2014 | 4:02:06 PM
Re: Chump change
But I'd bet the mugger would receive a lighter sentence than an apprehended hacker.
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 4:11:02 PM
Re: Chump change
True, the sentence should fit the crime. Tougher to catch them slippery hackers though. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 4:53:08 PM
hacking vs robbing
Here's a list of computer criminals and their sentences from Wikipedia, the most recent being Lewys Martin, who was sentenced to two years imprisonment for a hacking attempt on the websites of Kent Police, Cambridge University and Oxford University in the UK. (http://en.wikipedia.org/wiki/List_of_computer_criminals)

Compare that to the 25 years Danielle Johnson got in St. Louis for driving the getaway car for a robber who pulled a gun on a local priest and stole $200, and an assortment of gift cards and bus passes. (http://www.stltoday.com/news/local/metro/man-who-helped-rob-st-louis-priest-gets-years-in/article_d1d51f01-7db2-51da-82e0-589a0936814d.html)

 
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 10:42:32 AM
Re: hacking vs robbing
Yikes, that's quite the juxtaposition. Which do you think is worse: accomplice to a physical attack or a cyber attack?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/12/2014 | 10:46:20 AM
Re: hacking vs robbing
I'd say it depends on the crime and or hack! In this case 25 years for driving the getaway car for a robbery of $200 (no injuries) is a little excessive!
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
2/12/2014 | 11:12:48 AM
Re: hacking vs robbing
The criminal pulled a gun. The harsh punishment is for that, not for the amount stolen. The excessive punishment is to deter gun use in the commision of a crime...because bad things can happen whenever a criminal pulls a gun, whether he intended to use it going into the crime or not.

 
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 11:23:06 AM
Re: hacking vs robbing
Ah--the getaway driver was actually the criminal who pulled the gun in the robbery, as Rob mentions. That makes more sense now.
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
2/12/2014 | 12:31:05 PM
Re: hacking vs robbing
I suppose clicking away with keyboard and mouse can't be considered "use of deadly force" and the victims of hacking are not harmed physically. Still, we might want to revisit penalties for cybercrime with all the data that can potentially be maliciously accessed and manipulated today.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1556
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php.

CVE-2014-2008
Published: 2014-09-12
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.

CVE-2014-2009
Published: 2014-09-12
The mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to obtain credentials, the installation path, and other sensitive information via a direct request to api/curllog.log.

CVE-2014-4735
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in MyWebSQL 3.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter to index.php.

CVE-2014-5259
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in cattranslate.php in the CatTranslate JQuery plugin in BlackCat CMS 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant