

{"id":127,"date":"2011-02-14T14:16:21","date_gmt":"2011-02-14T19:16:21","guid":{"rendered":"http:\/\/rud.is\/b\/?p=127"},"modified":"2017-03-27T09:00:13","modified_gmt":"2017-03-27T14:00:13","slug":"metricon-automated-incident-reporting","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","title":{"rendered":"Metricon: Automated Incident Reporting"},"content":{"rendered":"<p>Speaker: Juhaniu Eronen<\/p>\n<p>&#8220;The Autoreporter Project&#8221; &#8211; Background<\/p>\n<p><em>Goal: make finland mostly harmless to the rest of the internet<\/em><\/p>\n<p>(that&#8217;s actually in the law &#8211; Protection of Privacy in Electronic Comms\/Finland)<\/p>\n<p>\u00a0<\/p>\n<blockquote>\n<p>\/me: I&#8217;ll need to put some verbiage around this tonight to give you a good picture of what Juhaniu was conveying&#8230;really good description of their charter, goals, challenges, successes<\/p>\n<\/blockquote>\n<p>\u00a0<\/p>\n<p><strong>What&#8217;s a &#8220;finnish&#8221; system: <\/strong><\/p>\n<ul>\n<li>any autonomous systems in finnish soil, operated or owned by finnish orgs<\/li>\n<li>.fi .ax domains<\/li>\n<li>+358 telephone prefix<\/li>\n<li>other networks owned by finnish orgs<\/li>\n<li>finnish banks\/brands\/CC<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Telcos mandated to report infosec incidents as well as major faults affecting users, networks or provider ability to operate<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.viestintavirasto.fi\/\"><strong>FICORA<\/strong><\/a><\/p>\n<p>Regulation for finnish security providers: Basic security of facilities &amp; processes, Business continuity, spam blocking<\/p>\n<ul>\n<li>Setup mandatory reporting for ISPs<\/li>\n<li>Establish <a href=\"https:\/\/www.viestintavirasto.fi\/en\/cybersecurity.html\">CERT-FI<\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Issues<\/strong><\/p>\n<p>Problem: Finland cleans up its own house, but they still end up getting attacked!<\/p>\n<p>Problem: Most incidents are out of scope in mandated reporting<\/p>\n<p>Problem: Establishing CERT-FI &#8211; no ownership or visibility of network; 3 ppl that in theory are expected to be there 7&#215;24!<\/p>\n<p>Huge increase in incidents [reported] from 2002-2006. It&#8217;s a pretty graph, but it really shows that the CERT-FI workforce increased and that processes were honed<\/p>\n<p>\u00a0<\/p>\n<p>How many incidents affect finnish networks?<\/p>\n<p>How are we compared to neighbors (would love to take a data-driven jab at swedes).<\/p>\n<p>\u00a0<\/p>\n<p>So, workforce, regulatory and other constraints &amp; need for actionable data == make automated system.<\/p>\n<p>\u00a0<\/p>\n<p>2006: created automated system to capture incident reports (mostly malware) from various monitoring projects around the globe.<\/p>\n<p>Daily reports, e-mailed, CSV format pre-defined agreed-upon subjects. digitally signed. reported incidents in body.<\/p>\n<p>\u00a0<\/p>\n<p>How CERT-FI handles abuse:<\/p>\n<ul>\n<li>detection<\/li>\n<li>reports (e-mail\/phone\/fax) &#8211;\u00a0<em>Funny story: one woman printed out all the spam she received and sent to CERT-FI, until asked not to anymore.<\/em><\/li>\n<li>Scraping feeds, normalizing\/correlating data<\/li>\n<li>Finding owners<\/li>\n<li>-Map bad events to netblocks<\/li>\n<li>-maintain contact list (&amp; contact prefs!)<\/li>\n<li>-manage customer expectations<\/li>\n<li>Report out stats, trends, chronic cases<\/li>\n<li>Assist in incident response<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>There are dozens of projects, data sources, blacklists etc but they vary in format (even timestamps), purpose, channel (IRC, http, ftp)<\/p>\n<ul>\n<li>data is frequently missed due to downtime, system availability<\/li>\n<li>info integrity is difficult to gauge<\/li>\n<li>bugs in feeds data &amp; reporting<\/li>\n<li>wildly differing frequency of updates (realtime to monthly)<\/li>\n<li>taxonomies are diverse<\/li>\n<li>detail level not discrete<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Ensuring Focus of CERT-FI<\/strong><\/p>\n<ul>\n<li>What are we not seeing?<\/li>\n<li>What should I prepare for?<\/li>\n<li>Who is the target of damage &amp; who is just collateral<\/li>\n<li>Can the data\/sources be trusted?<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>[side-talk: CERT-FI manages intake and the privacy laws make it difficult to delegate collection to the ISPs]<\/p>\n<p>[side-talk: 5.5 mill population of finland, very high # of folks with internet access, everyone has a cell phone. internet considered a basic human right]<\/p>\n<p>\u00a0<\/p>\n<p>CERT-FI shows ISP incident graphs in comparison to other ISPs. \/me: the embarrassment factor is a good motivator<\/p>\n<p>interesting: conficker is still a problem<\/p>\n<p>CERT-FI autoreporter can actually report out incidents per broadband customer (trending)<\/p>\n<p>\u00a0<\/p>\n<p>Abusehelper:\u00a0<span class=\"removed_link\" title=\"http:\/\/code.google.com\/p\/abusehelper\/wiki\/README\">http:\/\/code.google.com\/p\/abusehelper\/wiki\/README<\/span><\/p>\n<p>Abuse Helper is toolkit for CERT and Abuse teams. It is a modular, (hopefully) scalable and robust framework to help you in your abuse handling.<\/p>\n<p style=\"max-width: 65em;\">With Abuse Helper you can:<\/p>\n<ul style=\"max-width: 65em; padding-left: 40px;\">\n<li>Retrieve Internet Abuse Handling related information via several sources which are\n<ul style=\"max-width: 65em; padding-left: 40px;\">\n<li>near-real-time (such as IRC)<\/li>\n<li>periodic (such as Email reports), or<\/li>\n<li>request\/response (such as HTTP).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"max-width: 65em; padding-left: 40px;\">\n<li>You can then aggregate that information based on different keys, such as AS numbers or country codes<\/li>\n<li>Sent out reports in different formats, via different transports and using different timings<\/li>\n<\/ul>\n<p style=\"max-width: 65em;\">Abuse Helper features include:<\/p>\n<ul style=\"max-width: 65em; padding-left: 40px;\">\n<li>Fully modular (you can utilize different readers, parsers, transports, splitters, combiners in a pipe-like manner)<\/li>\n<li>Scalable: you can distribute the work to different machines and different geolocations<\/li>\n<li>Observable: you can use your favourite XMPP client to observe the bots at work<\/li>\n<\/ul>\n<p style=\"max-width: 65em;\">\u00a0<\/p>\n<p>Great overall presentation for the rationale to report incidents outside your org<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaker: Juhaniu Eronen &#8220;The Autoreporter Project&#8221; &#8211; Background Goal: make finland mostly harmless to the rest of the internet (that&#8217;s actually in the law &#8211; Protection of Privacy in Electronic Comms\/Finland) \u00a0 \/me: I&#8217;ll need to put some verbiage around this tonight to give you a good picture of what Juhaniu was conveying&#8230;really good description [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3,47,4],"tags":[214,215,217,211,213,212,216,207],"class_list":["post-127","post","type-post","status-publish","format-standard","hentry","category-information-security","category-metrics","category-risk","tag-broadband","tag-cellular-telephone","tag-conficker","tag-finland","tag-finnish-networks","tag-internet-access","tag-isp","tag-speaker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metricon: Automated Incident Reporting - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metricon: Automated Incident Reporting - rud.is\" \/>\n<meta property=\"og:description\" content=\"Speaker: Juhaniu Eronen &#8220;The Autoreporter Project&#8221; &#8211; Background Goal: make finland mostly harmless to the rest of the internet (that&#8217;s actually in the law &#8211; Protection of Privacy in Electronic Comms\/Finland) \u00a0 \/me: I&#8217;ll need to put some verbiage around this tonight to give you a good picture of what Juhaniu was conveying&#8230;really good description [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-14T19:16:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:00:13+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Metricon: Automated Incident Reporting\",\"datePublished\":\"2011-02-14T19:16:21+00:00\",\"dateModified\":\"2017-03-27T14:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/\"},\"wordCount\":654,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"broadband\",\"cellular telephone\",\"Conficker\",\"Finland\",\"finnish networks\",\"internet access\",\"ISP\",\"Speaker\"],\"articleSection\":[\"Information Security\",\"Metrics\",\"Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/\",\"name\":\"Metricon: Automated Incident Reporting - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2011-02-14T19:16:21+00:00\",\"dateModified\":\"2017-03-27T14:00:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/14\\\/metricon-automated-incident-reporting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metricon: Automated Incident Reporting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Metricon: Automated Incident Reporting - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","og_locale":"en_US","og_type":"article","og_title":"Metricon: Automated Incident Reporting - rud.is","og_description":"Speaker: Juhaniu Eronen &#8220;The Autoreporter Project&#8221; &#8211; Background Goal: make finland mostly harmless to the rest of the internet (that&#8217;s actually in the law &#8211; Protection of Privacy in Electronic Comms\/Finland) \u00a0 \/me: I&#8217;ll need to put some verbiage around this tonight to give you a good picture of what Juhaniu was conveying&#8230;really good description [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","og_site_name":"rud.is","article_published_time":"2011-02-14T19:16:21+00:00","article_modified_time":"2017-03-27T14:00:13+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Metricon: Automated Incident Reporting","datePublished":"2011-02-14T19:16:21+00:00","dateModified":"2017-03-27T14:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/"},"wordCount":654,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["broadband","cellular telephone","Conficker","Finland","finnish networks","internet access","ISP","Speaker"],"articleSection":["Information Security","Metrics","Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","name":"Metricon: Automated Incident Reporting - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-02-14T19:16:21+00:00","dateModified":"2017-03-27T14:00:13+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Metricon: Automated Incident Reporting"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-23","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":7246,"url":"https:\/\/rud.is\/b\/2017\/11\/23\/black-cyber-tips-a-k-a-how-the-hrbrgrinch-ruined-christmas-shopping\/","url_meta":{"origin":127,"position":0},"title":"&#8220;Black&#8221;\/&#8221;Cyber&#8221; Tips (a.k.a. How the hrbrgrinch ruined Christmas shopping)","author":"hrbrmstr","date":"2017-11-23","format":false,"excerpt":"NOTE: This is mainly for those of us in the Colonies, but some tips apply globally. Black Friday \/ Cyber Monday \/ Cyber November \/ Holiday ?hopping is upon us. You're going to buy stuff. You're going to use digital transactions to do so. Here are some tips in a\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":589,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-2-identity-social-networks-personalized-advertising-privacy-controls\/","url_meta":{"origin":127,"position":1},"title":"WEIS 2011 :: Session 2 :: Identity :: Social Networks, Personalized Advertising &#038; Privacy Controls","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Catherine Tucker Presentation [PDF] Catherine's talk was really good. She handled questions well and is a very dynamic speaker. I'm looking forward to the paper. Twitter transcript #weis2011 Premise of the study was to see what impact privacy controls enablement\/usage have on advertising. It's an empirical study #data! #weis2011 click\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6351,"url":"https:\/\/rud.is\/b\/2017\/09\/17\/armchair-quarterbacking-systemic-organization-and-industry-failures\/","url_meta":{"origin":127,"position":2},"title":"Armchair Quarterbacking Systemic Organization and Industry Failures","author":"hrbrmstr","date":"2017-09-17","format":false,"excerpt":"insert(post, \"{ 'standard_disclaimer' : 'My opinion, not my employer\\'s' }\") This is a post about the fictional company FredCo. If the context or details presented by the post seem familiar, it's purely coincidental. This is, again, a fictional story. Let's say FredCo had a pretty big breach that (fictionally) garnered\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12887,"url":"https:\/\/rud.is\/b\/2021\/01\/22\/soon-may-the-vendorman-come\/","url_meta":{"origin":127,"position":3},"title":"Soon May the Vendorman Come","author":"hrbrmstr","date":"2021-01-22","format":false,"excerpt":"There was an org that didn't see The data exfil hacking spree. A patch went up, our guard was down, Oh blow, SolarWinds, blow. Soon may the Vendorman come, And bring us Yara rules to run. One day when their huntin' is done, They'll take their scripts and go. There\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":574,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-the-underground-economy-of-fake-antivirus-software\/","url_meta":{"origin":127,"position":4},"title":"WEIS 2011 :: Session 1 :: Attacks :: The Underground Economy of Fake Antivirus Software","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Brett Stone-Gross Ryan Abman Richard A. Kemmerer Christopher Kruegel Douglas G Steigerwald Presentation [PDF] Twitter transcript #weis2011 presenting analysis of *actual* data from 21 servers from 3 multi-million $ fake a\/v ops!!! < #spiffy #weis2011 showing example of fake a\/v exploit that was embedded in HTML. good walkthrough. useful slides\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1948,"url":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","url_meta":{"origin":127,"position":5},"title":"Once More Into The [PRC Aggregated] Breaches","author":"hrbrmstr","date":"2013-01-27","format":false,"excerpt":"If you're not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You'll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}