Turbotodd

Ruminations on tech, the digital media, and some golf thrown in for good measure.

Posts Tagged ‘cricket

Turbo Sports Update

with one comment

I’ve been so consumed with technology these past few weeks that I’ve all but forgotten to mention what really counts in life, and that’s sports.

First, and my first love, golf.

What in the world got into Padraig Harrington yesterday at Transitions?  Harrington comes out roaring with a 10-under 61 in the first round, and is already -1 for the day today, still leading the pack.

Meanwhile, Tiger Woods says no Achilles heel, or in this case, tendon, will keep him from the Masters.  I just hope his game keeps him in through the Masters weekend.

And Rory McIlroy continues leading the FedExCup points, not to mention the official world golf ranking. Oh, yeah, AND the money rankings.

I’m keeping my eye on a few golfers for the Masters, we golfers’ SuperBowl of Golf. Yes, Rory should be in the running this year, but I also have my eye on Phil Mickelson, Steve Stricker, Lee Westwood, and Keegan Bradley. We’re only a couple of weeks away, so we’ll see how they stack up the next two weeks.

Turbo is 12 for 16 thus far in his brackets for the 2012 NCAA Men's Basketball Tournament.

Then, there’s the NCAA men’s basketball tournament. I went to ESPN and picked my brackets the other day, and so far, I’ve had four bad picks and twelve good ones.  Pretty good for not having really handicapped the teams this year. Although my Texas Longhorns had better get it together — they currently trail Cincinnatti by 3 in the 2nd.

Way over in another part of the world, congratulations go out to Sachin Tendulkar, cricket “god,” who finally scored his 100th international ton in a match against Bangaladesh earlier today (a match which, in a theme not unfamiliar to Indian cricket fans, India lost!).

And my Premiere League fave, Manchester United, lost 2-1 to Athletic Bilbao in the Europa League, exiting them from this year’s tourney.  This will be the first time since the 2001-02 season they won’t contest a cup final.

And alas, for you fans of the new HBO David Milch series about horse-racing, “Luck,” well, you won’t have much of it. The series’ filming has been stopped due to some horse-racing deaths (three so far) during production.  Once again, a Milch series won’t make it to the HBO finish line, leaving the series’ denoeument to its viewers’ imagination (the same thing happened to “Deadwood,” some of the most brilliant TV I’d seen in years).

Too bad, the characters’ complexity were just coming more clearly into view, with stellar performances by Dustin Hoffman and Nick Nolte, among others, and the cinematography some of the most gorgeous I’d seen on TV in eons.

Written by turbotodd

March 16, 2012 at 6:22 pm

IBM X-Force Trends Report: Year Of The Security Breach

with 2 comments

Attacker types and techniques in 1H2011 identified by the IBM X-Force Mid-Year Trend & Risk Report. The study revealed mobile security exploits would likely double in 2011.

Okay, it’s my last day in Bangalore.  At least for this particular journey.

I don’t have any more India-related news, except to report that the Kolkata Night Riders beat the Royal Challengers Bangalore in the CLT20 last night, here in Bangalore.

KKR won by nine wickets, and now I know why there were such sad faces in the stadium as I watched the end of the match late last night on TV.

As I was watching cricket, IBM was releasing the results of its “X-Force 2011 Mid-Year Trend and Risk Report,” a tiding I always attempt to cover in some depth, both because I find the reports fascinating and enlightening, and because I consider it a real service that IBM is providing to the global IT community.

Poised at the frontline of security, the IBM X-Force team serves as the eyes and ears for thousands of IBM clients – studying security attack techniques and creating defenses before many vulnerabilities are even announced.

The X-Force Mid-Year Trend and Risk Report is based on intelligence gathered through IBM’s research of public vulnerability disclosures as well as the monitoring and analysis of an average of 12 billion security events daily since the beginning of 2011.

Drumroll, Please: Moble Exploits Are Ripe For Exploitation!

The headline: This report demonstrates the rapidly changing security landscape characterized by high-profile attacks, growing mobile vulnerabilities and more sophisticated threats such as “whaling.”

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to access the corporate network, is raising new security concerns.

IBM X-Force has documented a steady rise in the disclosure of security vulnerabilities affecting these devices.  X-Force research recommends that IT teams consistently employ anti-malware and patch management software for phones in enterprise environments.

Click to enlarge. This graphic explores what the security situation might look like if it were run by the IBM X-Force team as they attempted to deal with this year's exploits.

Other key findings from the study:

  • Malicious software targeting mobile phones is often distributed through third-party app markets. Mobile phones are an increasingly attractive platform for malware developers as the sheer size of the user base is growing rapidly, and there is an easy way to monetize mobile phone infections. Malware distributors can set up premium texting (SMS messaging) services that charge users that text to a specific number. Malware then sends text messages to those premium numbers from infected phones.
  • Some mobile malware is designed to collect end user’s personal information. This data could then be used in phishing attacks or for identity theft. Mobile malware is often capable of spying on victim’s personal communications as well as monitoring and tracking their physical movements via the GPS capabilities common in these phones.

“For years, observers have been wondering when malware would become a real problem for the latest generation of mobile devices,” said Tom Cross, manager of Threat Intelligence and Strategy for IBM X-Force. “It appears that the wait is over.”

Critical Vulnerabilities Triple in 2011

The X-Force team also reports that the percentage of critical vulnerabilities has tripled thus far in 2011.

X-Force is declaring 2011 the “Year of the Security Breach” due to the large number of high-profile attacks and network compromises that have occurred this year.

This graphic explores the top website categories from the 1H2011 report containing at least one malicious link.

There is a cadre of notable emerging threats from this year’s breaches:

  • Teams of professional attackers motivated by a desire to collect strategic intelligence have been able to gain and maintain access to critical computer networks through a combination of stealth, sophisticated technical capabilities and careful planning. These attackers are often referred to as “Advanced Persistent Threats” (APTs).
  •  The success of APTs has raised the profile of “whaling,” a type of spear phishing which targets “big fish,” or those positioned in high levels of an organization with access to critical data. These targeted attacks are often launched after careful study of a person’s online profiles has armed an attacker with the information needed to create a compelling phishing email that the victim will be fooled into clicking on.
  • Attacks from ‘hacktivist’ groups, who targeted web sites and computer networks for political ends rather than just financial gain. Hacktivist groups have been successful in using well known, off-the-shelf attack techniques such as SQL Injection, which is one of the most common attack techniques seen in the Internet.
  • Anonymous proxies have more than quadrupled in number compared to three years earlier. Anonymous proxies are a critical type of website to track, because they allow people to hide potentially malicious intent.

Advances In Security

“The rash of high-profile breaches this year highlights the challenges organizations often face in executing their security strategy,” said Cross. “Although we understand how to defend against many of these attacks on a technical level, organizations don’t always have the cross-company operational practices in place to protect themselves.”

Although the X-Force team declared 2011 as a watershed in high-profile security breaches, the report also uncovered some improvements in areas of computer security that show headway in the fight against crime on the Internet.

  • The first half of 2011 saw an unexpected decrease in web application vulnerabilities, from 49 percent of all vulnerability disclosures down to 37 percent.  This is the first time in five years X-Force has seen a decrease.
  • High and critical vulnerabilities in web browsers were also at their lowest point since 2007, despite an increasingly complex browser market. These improvements in web browser and application security are important as many attacks are targeted against those categories of software
  • As major botnet operators are taken down and off-line by law enforcement officials, the report shows a trend in the decline of spam and more traditional phishing tactics.
  • After years of consistent spam growth until the middle of 2010, there has been a significant decline in spam volumes in the first half of this year.In the first half of 2011, the percentage of spam that is phishing on a weekly basis was less than 0.01 percent. Traditional phishing has greatly declined from the levels X-Force was seeing prior to the middle of 2010.

Also of note, the SQL Slammer Worm has been one of the most common sources of malicious packets on the Internet since its appearance and naming by the IBM X-Force team in 2003, but it has fallen down the list after a dramatic disappearance observed in March 2011.

The most recent analysis strongly suggested that the SQL Slammer Worm’s disappearance is due to an unknown source or actor. The analysis showed that a time-based trigger using a Slammer’s server clock was used to shut it down, proving that it was disabled by a single cause.

Traditional Vulnerabilities Still a Problem

The X-Force report uncovered numerous attacks that target traditional security vulnerabilities. According to the report, attacks on weak passwords are commonplace on the Internet, as are attacks that leverage SQL Injection vulnerabilities in web applications to compromise backend databases.

Databases have become an important target for attackers. Critical data used to run organizations — including financial/ERP, customer, employee, and intellectual property information such as new product designs — is stored in relational databases.

IBM researchers tested almost 700 web sites — from the Fortune 500 and other most popular sites — to uncover that 40 percent of these contain a class of security issues referred to as client-side JavaScript vulnerabilities. The existence of vulnerabilities like these in so many corporate web sites is indicative of the security blindspots in many organizations.

This graphic reveals insight into the exploit effort versus potential reward in the 1H 2011 X-Force report.

IBM Launches Institute for Advanced Security in Asia Pacific

To help combat security risks and to foster collaboration amongst security industry leaders, IBM is launching the IBM Institute for Advanced Security in Asia Pacific in order to combat growing security threats in the region.

The IBM Mid-Year X-Force report states that top countries originating spam have shifted to Asia Pacific, with India sending out roughly 10 percent of all spam registered today, and South Korea and Indonesia also making the top five list.

This Institute joins its predecessors in Brussels, Belgium and Washington, D.C., focused on European and U.S. clients respectively.

About the IBM X-Force Team and the Trend and Risk Report

This report comes from IBM’s X-Force team, the premier security research organization within IBM that has catalogued, analyzed and researched more than 50,000 vulnerability disclosures since 1997.

The IBM X-Force Trend and Risk Report is an annual assessment of the security landscape, designed to help clients better understand the latest security risks, and stay ahead of these threats.

It is the result of the work done in IBM’s nine global Security Operations Centers, which is provided as a managed security service to clients.

The report gathers facts from numerous intelligence sources, including its database of computer security vulnerabilities, global web crawler, international spam collectors, and the real-time monitoring of an average of 12 billion security events every day for nearly 4,000 clients in more than 130 countries.

You can learn more about and download the report here.

Written by turbotodd

September 30, 2011 at 9:16 am

Back In Bangalore

leave a comment »

I’m back in Bangalore.

It’s been a little over a year since my first visit, and this time, I knew what I was getting into in terms of the travel.

I calculated that from Austin to India, as the crow flies, it’s a little over 8,000 miles…or was that kilometers??

The Sri Shiva temple in Bangalore is currently under renovation during my visit, but that certainly hasn't stopped hoardes of faithful Hindus paying a visit to Lord Shiva.

In either case, it’s a longgg way on an airplane traveling 500+ MPH. But I found myself eager with anticipation.

Not only in terms of meeting a new team we had put together, but in also seeing the friends I had already met here, and also visiting the vibrant (and now 3rd largest city in India, in terms of population) metropolis that is Bangalore.

The traffic is crazier than ever…there’s still plenty of dust in the streets, not to mention sacred (literally) cows…but I also sense an incredible energy and vibrancy here that has long ago worn off other major cities in the world.

And then there’s the food, which I wish I could just pack into my suitcase and bring back to America.

There’s also the serious business that is cricket (tonight it was the Mumbai Indians against Trinidad & Tobago, playing in the first round of the CLT20…UPDATE: Mumbai won, but just barely…The Trinidadian cricketers didn’t look too happy at breakfast this morning…They were staying at the same hotel as us.), a game I won’t pretend (yet) to fully comprehend but an excitement around which is palpable.

And then, of course, there are the people of India, and the Bangaloreans in particular, whose grace and courtesy and humbleness are unmatched around the globe.

I discovered from a taxi driver on the ride in from the airport here that 3M citizens in 2003 has grown to 9+M in 2011, and though the growth here may have overmatched the infrastructure, it is the chaos and verve and tenacity of its citizenry which suggests a nation that continues on the rise even despite the global gloom and doom headlined in newspapers and websites around the world.

Though my visit this year will be a week shorter, I have a distinct feeling that my learning and understanding will belie my time on the ground, and I’m very much looking forward to the four full days I have left in this week.

As for the content of the meetings and discussions going on here, I cannot relate those due to competitive reasons…the old CIA, “If I told you I’d have to kill ya.”

But rest assured it’s with great anticipation and expectations that we move through the rest of this week.

Beyond that, I’ll have to save the sordid stories for my as-of-yet unpublished memoirs…but know that the memories of my second sojourn to “Bengalaru” being stored in my human RAM will not be erased or forgotten anytime soon.

P.S. I’m blogging on my new portable guerilla platform, an iPod 4 with an Apple bluetooth keyboard. With some luck and some precious spare time, I’ll also hope to share some of what’s being witnessed here in some semblance of video content.

Written by turbotodd

September 26, 2011 at 5:03 pm