The horror of cyberspace: we can’t easily identify our attackers.

Summary: In this last of Marcus Ranum's 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible -- no matter how confidently they're stated. Our difficulty with this is a common if scary aspect of modern warfare and crime.  {2nd of 2 posts today.} Attribution is … Continue reading The horror of cyberspace: we can’t easily identify our attackers.

Advertisements

How do we identify our attackers in cyberspace?

Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender's perspective, explaining the difficulty of attribution, written by our co-author Marcus Ranum. After reading this, you'll regard the news about these things more skeptically. {2nd of 2 posts today.} By Marcus Ranum, Senior Strategist at Tenable … Continue reading How do we identify our attackers in cyberspace?

In cyberspace you don’t see your attacker (that’s why we don’t know who hacked Sony).

Our hawks (aka warmongers), with their loyal journalist-enablers, have sparked a new round of hysteria about North Korea's cyber-attack on Sony. Kim Zetter at Wired gives a good analysis in "North Korea Almost Certainly Did Not Hack Sony". The Hollywood Report cites insiders pointing to disgruntled current or former employees (Sony has many of both). … Continue reading In cyberspace you don’t see your attacker (that’s why we don’t know who hacked Sony).