Attacks/Breaches

2/11/2014
01:30 PM
John Klossner
John Klossner
Commentary
50%
50%

Cartoon: Identity Thieves

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 2:14:33 PM
Chump change
Stick-up man? That's amateur hour. You wanna be a thief today, you gotta have hacking skills.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 2:47:57 PM
Re: Chump change
Maybe a lecture from Kevin Mitnik as part of a criminal justice rehabilitation program...
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
2/11/2014 | 4:02:06 PM
Re: Chump change
But I'd bet the mugger would receive a lighter sentence than an apprehended hacker.
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 4:11:02 PM
Re: Chump change
True, the sentence should fit the crime. Tougher to catch them slippery hackers though. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 4:53:08 PM
hacking vs robbing
Here's a list of computer criminals and their sentences from Wikipedia, the most recent being Lewys Martin, who was sentenced to two years imprisonment for a hacking attempt on the websites of Kent Police, Cambridge University and Oxford University in the UK. (http://en.wikipedia.org/wiki/List_of_computer_criminals)

Compare that to the 25 years Danielle Johnson got in St. Louis for driving the getaway car for a robber who pulled a gun on a local priest and stole $200, and an assortment of gift cards and bus passes. (http://www.stltoday.com/news/local/metro/man-who-helped-rob-st-louis-priest-gets-years-in/article_d1d51f01-7db2-51da-82e0-589a0936814d.html)

 
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 10:42:32 AM
Re: hacking vs robbing
Yikes, that's quite the juxtaposition. Which do you think is worse: accomplice to a physical attack or a cyber attack?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/12/2014 | 10:46:20 AM
Re: hacking vs robbing
I'd say it depends on the crime and or hack! In this case 25 years for driving the getaway car for a robbery of $200 (no injuries) is a little excessive!
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
2/12/2014 | 11:12:48 AM
Re: hacking vs robbing
The criminal pulled a gun. The harsh punishment is for that, not for the amount stolen. The excessive punishment is to deter gun use in the commision of a crime...because bad things can happen whenever a criminal pulls a gun, whether he intended to use it going into the crime or not.

 
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 11:23:06 AM
Re: hacking vs robbing
Ah--the getaway driver was actually the criminal who pulled the gun in the robbery, as Rob mentions. That makes more sense now.
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
2/12/2014 | 12:31:05 PM
Re: hacking vs robbing
I suppose clicking away with keyboard and mouse can't be considered "use of deadly force" and the victims of hacking are not harmed physically. Still, we might want to revisit penalties for cybercrime with all the data that can potentially be maliciously accessed and manipulated today.
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.