2 Wednesday 17th November, 2010 Monday 13th December ...pdfs.island.lk/2010/12/31/L2.pdf ·...

1
2 Monday 13th December, 201 Friday 31st December, 2010 KATY PERRY'S LIZARD-SKIN SLAYER "People will always grab my hand or grab my shoulder and be like, 'Oh my god, your skin is so soft! It's creepy how soft it is.' And I'm like, 'What are you, a lizard? What's happening with you?' " the star jokes to PEOPLE of her soft arms and legs. Her secret? "I started maybe when I was 10 or 9, using lotion after I got out of the shower single every day." FIRST STEP TO FLAWLESS "I always do the moisturizer first and let it sink in for a minute," says makeup mogul and teen Beauty Rules author Bobbi Brown of her first step to flattering makeup. "When you put moisturizer on you don’t need as much makeup – and you actually look better." FERGIE'S BROW MATCH-UP After the singer went back to blonde recently, she recruited brow pro Tonya Crooks to take the total look to the next level. "I lightened Fergie's brows about three shades, to a nice dark blonde/light brown color, for a contrast against her skin since she's pretty tan," she says, explaining, "If I went too light with the color, her brows could appear washed out against her tan skin." FALSE-LASH LASHING "Never use false eyelashes," Jessica Simpson reveals as the best tip she's learned from her longtime makeup artist, Jeannia Robinette. Instead the duo prefers using a Shu Uemura eyelash curler and multiple coats of Dior Show mascara. "It's nice because then you don’t have to feel over the top and made up. Your eyelashes should just look natural." POST-WORK-OUT REFRESHER Taraji P. Henson keeps her pores clog-free by finishing up her exercise routine with a mint-infused facial cleanser. "I love using it when I shower after a good workout. It wakes me up! Minty tingly fresh," she says of her top choice, Reneé Rouleau Luxe Mint Cleans- ing Gel. DEAR HEART Like mommy, like daughter! In comple- mentary shades, Jessica Alba and daughter Honor, 2, arrive at LAX to catch a flight to Cabo San Lucas, where they will reportedly ring in the New Year. TRAVEL DARLINGS After going on a couple of dates with Nikki Sixx, Denise Richards returns to mommy duty preparing for takeoff at Los Angeles International Airport with daughters, Sam, 6, and Lola, 5. KIM KARDASHIAN The brunette bombshell outshines the decorations at her family's Christmas fête in L.A., in an iridescent one-shouldered Tadashi Shoji gown and coordinating cuff. Amy Chew in Kuala Lumpur The Star/ ANN C yber crimes are evolving. A lay person can now have a go at hack- ing with the advent of ‘attack tool kits’ sold in the underground economy servers Malaysian Lin Mun Poo did more than get himself arrested when he allegedly hacked into the high security computer networks of the United States’ Federal Reserve Bank (FRB) and the Pentagon’s security contractor. He put Malaysia on the map of “super hackers”, on par with those from China and Russia, raising concerns from US security and intelligence offi- cials. “How did a hacker in Malaysia man- age to penetrate a computer network operated by the Federal Reserve Bank (FRB) of Cleveland?” mused MSNBC.com, the website of the giant US cable news network NBC, when the news broke. “To have the skills to break into highly sensitive systems like that is an impressive level of criminal activity,” MSNBC.com quoted Kurt Baumgartner of Kaspersky Lab, a computer security firm, as saying. Lin, 32, has pleaded not guilty to charges of hacking into the FRB and unlawful possession of stolen credit and debit card account numbers belonging to individuals. He was denied bail. Little is known of Lin except that he hails from Ipoh in Malaysia where he has a business address. It turns out to be a pub cum karaoke lounge in a com- mercial district of Ipoh. Malaysian police say Lin has no criminal record and it appears he com- mits his cyber crimes outside the coun- try. Describing Lin as “highly profession- al”, a senior police source said Lin appeared on US authorities’ radar four years ago—in Thailand where he was alleged to be involved with hacking into US-linked corporations. Cyber crime has evolved from the past when men and women hacked into computer systems of established enti- ties for their five minutes of fame. “Cyber criminals used to be after fame. The attacks were noisy, brought down systems and were highly visible,” said Nigel Tan, Symantec Corporation principal consultant for the Asia South region. Symantec’s Global Intelligence Network has the largest, most sophisti- cated intelligence network worldwide, processing over eight billion e-mail messages daily and gathering malicious code data from 130 million systems. Today’s hackers are mainly motivat- ed by money. They move silently across borders in cyber space and the physical world, selling their ill-gotten wares in the underground economy. “The attacks have now become more silent and they are motivated purely by financial gains. Their motivation is to sell whatever information they get,” Tan added. Lin was arrested by the US Secret Service on October 21 at a diner in Brooklyn after being caught red-handed selling stolen credit card numbers for US$1,000. He had just arrived a few hours earlier on a flight from Europe. Secret Service agents seized his heav- ily encrypted laptop computer and found more than 400,000 credit, debit and bank account numbers which he had allegedly obtained by hacking into various computer systems. In his post-arrest statement, Lin said the primary purpose of his trip to the US was to meet with an individual whom he believed was capable of regu- larly providing him with a large volume of stolen card numbers and personal identification numbers. Credit card information topped the list of goods advertised for sale on the underground economy servers, account- ing for 28 per cent of all goods, accord- ing to the Symantec Intelligence Quarterly for April-June 2010. Prices ranged from $1 to $30 depend- ing on three main factors: the amount of information included with the card, rarity of the card type and bulk pur- chase sizes. Credit cards that included security features such as CVV2 numbers, PINs and online verification service pass- words were offered at higher prices. The Federal Reserve Bank of Cleveland, Ohio was not Lin’s only vic- tim, as it is alleged that he also breached the computer servers of major financial institutions and companies. “The defendant possessed data ille- gally obtained from the computer net- work of FedComp, a data processor for various credit unions in the United States,” Justice Department prosecutors told US District Judge Dora L. Irizarry in a letter. By hacking into FedComp, Lin gained access to the data of the Firemen’s Association of the State of New York Federal Credit Union and the Mercer County New Jersey Teachers’ Federal Credit Union, among other vic- tims. According to the prosecutors, the amount of stolen data found in Lin’s possession is staggering and has led them to describe him as an “extremely sophisticated and dangerous” computer hacker. It underscored cyber criminals’ sin- gle-mindedness in searching and exploiting vulnerabilities in the com- puter systems of government institu- tions and corporations. Lin admitted he made money by “finding and exploiting network vulner- abilities”, or trading and selling the information contained therein, accord- ing to the prosecutors. Symantec warns that it is now easier than ever to launch a cyber attack, thanks to the advent of a so-called ‘attack tool kit’ sold in the underground economy. The attack tool kit is changing the landscape of cyber criminals that was once dominated by IT savvy indi- viduals. Now anyone can purchase a cyber attack tool kit and use it to launch sophisticated attacks. “Attack tool kits are easily available on the web for reasonable prices. A tool kit allows people to customise a piece of malicious code designed to steal data and other personal information,” said Tan. “Such tool kits are easy enough to implement that even people with mini- mal technical knowledge can use them effectively,” he added. Two of the most common platforms where such tool kits are sold are the Internet relay chat (IRC) servers (IRC) and web-based forums, according to Tan. “Both feature discussion groups that participants use to buy and sell fraudu- lent goods and services.” For as little as $5 to $20, one can pur- chase an attack tool kit, he said. The tool kit is also sold on a monthly basis at a subscription rate of $120. This package comes with technical support. “The market for these tool kits is now sophisticated enough that updated versions are released on a development schedule, advertising the inclusion of exploits for the latest vulnerabilities while retaining previous exploits,” Tan said. The lowering of barriers for attack- ers to enter into cyber crime is reflected in the increase in malicious code that steals confidential information. New malicious codes more than doubled, year-on-year, between 2006 and 2008. In 2009, it continued the upward trend, reaching 2.9 million, according to Symantec. Efforts to combat cyber crimes on an international scale are being hampered by the lack of agreement in law enforce- ment procedures and cooperation across international jurisdictions. Now, Everyone Can Hack BY HARISCHANDRA GUNARATNE C elebrate the dawn of the New Year’s Eve in style, sophistication and fun at the Galadari Hotel and dance to the fabulous sounds of “Mirage” with Cathay Menezes and “Amazing Grace”. Budrin Musafer will be the master of ceremonies.Prizes and surprises galore. “Mirage” has been performing at the hottest night spot in the metropolis “The Margarita Blue” at the Galadari “Amazing Grace” with Donald, Benjy, Reza and Tony joined by Nihal will take the guest spot for one hour. The popular band of yesteryear will be perform- ing in Sri Lanka for the first time after their re-union concert in 2005 where the group played to packed house at the BMICH. “Mirage” comprising Donald, Benjy, Derrick, Melantha and Gavin had been the mainstay at the “Magarita Blue” and with their wide repertoire will dishout popular hits of the 60s ,70s, 80s and the mod- ern stuff. Cathay, the daughter of Micky Menezes has been specially flown in for the occasion. New Year’s Eve at Galadari “Mirage” at their best: from left. Derrick, Melantha, Benjy, Cathay, Donald and Gavin “Grace” from left: Benjy,Donald,Reza and Tony

Transcript of 2 Wednesday 17th November, 2010 Monday 13th December ...pdfs.island.lk/2010/12/31/L2.pdf ·...

Page 1: 2 Wednesday 17th November, 2010 Monday 13th December ...pdfs.island.lk/2010/12/31/L2.pdf · blonde/light brown color, for a contrast against her skin since she's pretty tan," she

2Wednesday 3rd November, 20Wednesday 17th November, 2010Thursday 2nd December, 2010Monday 13th December, 201Friday 31st December, 2010

KATY PERRY'S LIZARD-SKIN SLAYER"People will always grab my hand or grab my shoulder and be like, 'Oh my god, your skin is so soft! It's creepy how soft it is.' And I'm like, 'What are you, a lizard? What's happening with you?' " the star jokes to PEOPLE of her soft arms and legs. Her secret? "I started maybe when I was 10 or 9, using lotion after I got out of the shower single every day."

FIRST STEP TO FLAWLESS"I always do the moisturizer first and let it sink in for a minute," says makeup mogul and teen Beauty Rules author Bobbi Brown of her first step to flattering makeup. "When you put moisturizer on you don’t need as much makeup – and you actually look better."

FERGIE'S BROW MATCH-UPAfter the singer went back to blonde recently, she recruited brow pro Tonya Crooks to take the total look to the next level. "I lightened Fergie's brows about three shades, to a nice dark blonde/light brown color, for a contrast against her skin since she's pretty tan," she says, explaining, "If I went too light with the color, her brows could appear washed out against her tan skin."

FALSE-LASH LASHING"Never use false eyelashes," Jessica Simpson reveals as the best tip she's learned from her longtime makeup artist, Jeannia Robinette. Instead the duo prefers using a Shu Uemura eyelash curler and multiple coats of Dior Show mascara. "It's nice because then you don’t have to feel over the top and made up. Your eyelashes should just look natural."

POST-WORK-OUT REFRESHERTaraji P. Henson keeps her pores clog-free by finishing up her exercise routine with a mint-infused facial cleanser. "I love using it when I shower after a good workout. It wakes me up! Minty tingly fresh," she says of her top choice, Reneé Rouleau Luxe Mint Cleans-ing Gel.

DEAR HEARTLike mommy, like daughter! In comple-mentary shades, Jessica Alba and daughter Honor, 2, arrive at LAX to catch a flight to Cabo San Lucas, where they will reportedly ring in the New Year.

TRAVEL DARLINGSAfter going on a couple of dates with Nikki Sixx, Denise Richards returns to mommy duty preparing for takeoff at Los Angeles International Airport with daughters, Sam, 6, and Lola, 5.

KIM KARDASHIANThe brunette bombshell outshines the decorations at her family's Christmas fête in L.A., in an iridescent one-shouldered Tadashi Shoji gown and coordinating cuff.

Amy Chew in Kuala LumpurThe Star/ ANN

Cyber crimes are evolving. A layperson can now have a go at hack-ing with the advent of ‘attack tool

kits’ sold in the underground economyservers

Malaysian Lin Mun Poo did morethan get himself arrested when heallegedly hacked into the high securitycomputer networks of the UnitedStates’ Federal Reserve Bank (FRB) andthe Pentagon’s security contractor.

He put Malaysia on the map of“super hackers”, on par with those fromChina and Russia, raising concernsfrom US security and intelligence offi-cials.

“How did a hacker in Malaysia man-age to penetrate a computer networkoperated by the Federal Reserve Bank(FRB) of Cleveland?” musedMSNBC.com, the website of the giantUS cable news network NBC, when thenews broke.

“To have the skills to break intohighly sensitive systems like that is animpressive level of criminal activity,”MSNBC.com quoted Kurt Baumgartnerof Kaspersky Lab, a computer securityfirm, as saying.

Lin, 32, has pleaded not guilty tocharges of hacking into the FRB andunlawful possession of stolen credit anddebit card account numbers belongingto individuals. He was denied bail.

Little is known of Lin except that hehails from Ipoh in Malaysia where hehas a business address. It turns out tobe a pub cum karaoke lounge in a com-mercial district of Ipoh.

Malaysian police say Lin has nocriminal record and it appears he com-mits his cyber crimes outside the coun-try.

Describing Lin as “highly profession-al”, a senior police source said Linappeared on US authorities’ radar fouryears ago—in Thailand where he wasalleged to be involved with hacking intoUS-linked corporations.

Cyber crime has evolved from thepast when men and women hacked intocomputer systems of established enti-ties for their five minutes of fame.

“Cyber criminals used to be afterfame. The attacks were noisy, broughtdown systems and were highly visible,”said Nigel Tan, Symantec Corporationprincipal consultant for the Asia Southregion.

Symantec’s Global IntelligenceNetwork has the largest, most sophisti-cated intelligence network worldwide,processing over eight billion e-mailmessages daily and gathering maliciouscode data from 130 million systems.

Today’s hackers are mainly motivat-ed by money. They move silently acrossborders in cyber space and the physicalworld, selling their ill-gotten wares inthe underground economy.

“The attacks have now become moresilent and they are motivated purely byfinancial gains. Their motivation is tosell whatever information they get,”Tan added.

Lin was arrested by the US SecretService on October 21 at a diner inBrooklyn after being caught red-handedselling stolen credit card numbers forUS$1,000. He had just arrived a fewhours earlier on a flight from Europe.

Secret Service agents seized his heav-ily encrypted laptop computer andfound more than 400,000 credit, debitand bank account numbers which hehad allegedly obtained by hacking intovarious computer systems.

In his post-arrest statement, Lin saidthe primary purpose of his trip to theUS was to meet with an individualwhom he believed was capable of regu-larly providing him with a large volumeof stolen card numbers and personalidentification numbers.

Credit card information topped thelist of goods advertised for sale on theunderground economy servers, account-ing for 28 per cent of all goods, accord-ing to the Symantec IntelligenceQuarterly for April-June 2010.

Prices ranged from $1 to $30 depend-

ing on three main factors: the amountof information included with the card,rarity of the card type and bulk pur-chase sizes.

Credit cards that included securityfeatures such as CVV2 numbers, PINsand online verification service pass-words were offered at higher prices.

The Federal Reserve Bank ofCleveland, Ohio was not Lin’s only vic-tim, as it is alleged that he alsobreached the computer servers of majorfinancial institutions and companies.

“The defendant possessed data ille-gally obtained from the computer net-

work of FedComp, a data processor forvarious credit unions in the UnitedStates,” Justice Department prosecutorstold US District Judge Dora L. Irizarryin a letter.

By hacking into FedComp, Lingained access to the data of theFiremen’s Association of the State ofNew York Federal Credit Union and theMercer County New Jersey Teachers’Federal Credit Union, among other vic-tims.

According to the prosecutors, theamount of stolen data found in Lin’spossession is staggering and has led

them to describe him as an “extremelysophisticated and dangerous” computerhacker.

It underscored cyber criminals’ sin-gle-mindedness in searching andexploiting vulnerabilities in the com-puter systems of government institu-tions and corporations.

Lin admitted he made money by“finding and exploiting network vulner-abilities”, or trading and selling theinformation contained therein, accord-ing to the prosecutors.

Symantec warns that it is now easierthan ever to launch a cyber attack,thanks to the advent of a so-called‘attack tool kit’ sold in the undergroundeconomy. The attack tool kit is changingthe landscape of cyber criminals thatwas once dominated by IT savvy indi-viduals.

Now anyone can purchase a cyberattack tool kit and use it to launchsophisticated attacks.

“Attack tool kits are easily availableon the web for reasonable prices. A toolkit allows people to customise a piece ofmalicious code designed to steal dataand other personal information,” saidTan.

“Such tool kits are easy enough toimplement that even people with mini-mal technical knowledge can use themeffectively,” he added.

Two of the most common platformswhere such tool kits are sold are theInternet relay chat (IRC) servers (IRC)and web-based forums, according toTan.

“Both feature discussion groups thatparticipants use to buy and sell fraudu-lent goods and services.”

For as little as $5 to $20, one can pur-chase an attack tool kit, he said.

The tool kit is also sold on a monthlybasis at a subscription rate of $120. Thispackage comes with technical support.

“The market for these tool kits isnow sophisticated enough that updatedversions are released on a developmentschedule, advertising the inclusion ofexploits for the latest vulnerabilitieswhile retaining previous exploits,” Tansaid.

The lowering of barriers for attack-ers to enter into cyber crime is reflectedin the increase in malicious code thatsteals confidential information. Newmalicious codes more than doubled,year-on-year, between 2006 and 2008.

In 2009, it continued the upwardtrend, reaching 2.9 million, according toSymantec.

Efforts to combat cyber crimes on aninternational scale are being hamperedby the lack of agreement in law enforce-ment procedures and cooperationacross international jurisdictions.

Now, EveryoneCan Hack

BY HARISCHANDRA GUNARATNE

Celebrate the dawn of the New Year’s Eve instyle, sophistication and fun at the GaladariHotel and dance to the fabulous sounds of

“Mirage” with Cathay Menezes and “Amazing Grace”.Budrin Musafer will be the master ofceremonies.Prizes and surprises galore.

“Mirage” has been performing at the hottest nightspot in the metropolis “The Margarita Blue” at theGaladari

“Amazing Grace” with Donald, Benjy, Reza andTony joined by Nihal will take the guest spot for onehour. The popular band of yesteryear will be perform-ing in Sri Lanka for the first time after their re-unionconcert in 2005 where the group played to packedhouse at the BMICH.

“Mirage” comprising Donald, Benjy, Derrick,Melantha and Gavin had been the mainstay at the“Magarita Blue” and with their wide repertoire willdishout popular hits of the 60s ,70s, 80s and the mod-ern stuff.

Cathay, the daughter of Micky Menezes has beenspecially flown in for the occasion.

New Year’s Eve at Galadari

“Mirage” at their best: from left. Derrick, Melantha,Benjy, Cathay, Donald and Gavin

“Grace” from left: Benjy,Donald,Reza and Tony