Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Black Hat Reveals Expanding Threat Landscape, Code Analytics Potential

    Written by

    Scot Petersen
    Published August 10, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—Black Hat 2015 showed that security technology is better, smarter and faster than ever before, but still one step or more behind the bad guys.

      If one step doesn’t seem like a lot, it is. There are up to 500,000 “malware events” happening every day. Security companies like Trend Micro are collecting hundreds of terabytes of exploit and attack data per day. What they are doing with that data is promising, but scaling threat detection systems is difficult and the threat landscape is constantly shifting.

      Hacks are so commonplace that last Thursday’s news of a breach of the Pentagon’s email system barely registered among the vendors and attendees at the annual gathering here.

      Admittedly, what’s one more government hack after the massive OPM breach? But the method, allegedly an email phishing scheme, shows once again that every link in the security chain has to be accountable, and that enterprises need to be better prepared from a policy and training perspective.

      Here are some more numbers that highlight the scale of the security challenge. More than 50 billion will be connected to the Internet by 2020. Each house will have hundreds of devices connected to the Internet by 2020, according to Cognosec researchers.

      IoT device proliferation is the result of a wave of innovation across many industries, and spurred by demand for ways to automate everything in daily life. What those numbers really mean is there will be billions more access points for attackers to infiltrate systems.

      Cognosec’s team of Sebastian Strobl and Tobias Zillner gave a Black Hat presentation on how ZigBee, a wireless communication protocol for connected devices, can be fairly easily compromised through weak network security key mechanisms.

      They tested their exploits on home automation systems, including door locks. The problem isn’t only with ZigBee, they said, but with device vendors who don’t implement security very well, or at all, in the name of usability and time to market. Device vendors “are not IT companies, and not experienced in data security,” said Strobl.

      Other Black Hat sessions dissected exploits of a variety of devices, including cars and even a high-end, “Linux-powered” precision-guided rifle.

      Businesses shouldn’t feel comfortable that IoT threats are confined to the home, said Norse Senior Data Scientist Mary Landesman. They are everybody’s problem. “Where’s the line between home and office when it comes to IoT? That smart fridge is as likely to end up in a break room of a company as it is in somebody’s kitchen,” she said in an interview. “IoT could be anywhere, anytime. That’s the point that people who talk about IoT minimize, because that’s a ‘home user’ issue.”

      So, as has been asked many times before, what is to be done? That’s a good question, because as always with cyber-security, there’s a high level of mistrust between vendors, government, researchers and every day citizens along with a lot of disagreement about what needs to be done.

      Black Hat Reveals Expanding Threat Landscape, Code Analytics Potential

      There’s also a genuine fear that the Internet has lost, or is quickly losing, it’s “dream of freedom” in the name of locking it down, said Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society in her keynote.

      The cyber-industrial complex

      What needs to happen is a re-examination of the security industry as a whole and the amount of investment businesses are prepared to make to get in front of security, not chasing it.

      There are signs this is starting to happen, with a growing understanding of just what the industry is up against. Researchers are starting to follow the money to nation-states or other well-financed entities, and at Black Hat they discussed new advanced analytics and machine learning methods to trace code back to its sources and predict new iterations of exploits.

      Cyber-attackers are no longer script kiddies, said Arun Lakhotia, of the Software Research Lab at the University of Louisiana at Lafayette, during a presentation. “They are following good coding practices,” he said.

      Cyber-attackers are professionals, producing complex, production-ready code. Yet the volume of exploits points to the fact that coders are also using standard tools and methods, such as code reuse and automation.

      “Signatures are dead,” as a reliable approach to anti-virus, said Matt Wolff, chief data scientist at Cylance. They “reinforce the need for smarter and more adaptive approaches to combating today’s highly variant malware,” he said.

      Wolff and co-researcher Andrew Davis discussed how machine learning and pattern recognition can be used to classify code as either benign or malware and can do so at a greater scale than human analysis, which will help vendors and security administrations keep up with the variants.

      Who or what is behind the millions of malware events per year is still pretty hazy. Researchers can piece together puzzles to get educated guesses, but stopping and prosecuting attackers is another thing. “Commercially written, offensive software from companies like FinFisher and Hacking Team has been sold to repressive regimes under the guise of ‘governmental intrusion’ software,” wrote a team of researchers who presented a paper on nation-state malware.

      The new analytics coupled with innovative threat detection and prevention technology from startups like Endgame, Prevoty and enSilo provide some hope. Enterprises have more and better tools to secure their data, and may yet be able to achieve a perpetual standoff with attackers. Anything more than that would exceed most reasonable expectations.

      Scot Petersen is a technology analyst at Ziff Brothers Investments, a private investment firm. Prior to joining Ziff Brothers, Scot was the editorial director, Business Applications & Architecture, at TechTarget. Before that, he was the director, Editorial Operations, at Ziff Davis Enterprise, While at Ziff Davis Media, he was a writer and editor at eWEEK. No investment advice is offered in his blog. All duties are disclaimed. Scot works for a private investment firm, which may at any time invest in companies whose products are discussed in this blog, and no disclosure of securities transactions will be made.

      Scot Petersen
      Scot Petersen
      Scot Petersen is a technology analyst at Ziff Brothers Investments, a private investment firm. Prior to joining Ziff Brothers, Scot was the editorial director, Business Applications & Architecture, at TechTarget. Before that, he was the director, Editorial Operations, at Ziff Davis Enterprise, While at Ziff Davis Media, he was a writer and editor at eWEEK.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×