At first glance, the Dune universe seems IT-deficient. Humanity may be building spaceships, but it relies on the human mind to calculate flight paths. Humans send troops to alien planets but exchange messages through couriers. They colonize other worlds yet live in a feudal society. What information security is there show more ...
to talk about? Quite a bit, in fact. It plays a vital role in Frank Herbert’s universe. Why the state of technology is so poor in the first book Almost all of the tech oddities in the Dune universe boil down to its blanket prohibition: At some point in its history, humanity encountered a global cyberthreat and took radical action, abandoning the information technologies so familiar to us and banning artificial intelligence and computers. The first installment in the Dune series briefly touches on the reasons behind the prohibition, and the sequels contain conflicting versions of the story, but the key point is that humans rebelled against and destroyed the machines. With prohibition, possession of a “thinking machine” became a capital offense. The main scripture (the Orange Catholic Bible) states categorically: Thou shalt not make a machine in the likeness of a human mind. Needing to replace the usual information technologies, humans developed their minds in amazing ways. All sorts of teachings, schools, sects, and orders sprang up, as did humans’ ability to perform complex mental calculations, guide spaceships through folded space, analyze the world, and even influence the minds of others. What’s more, to manage a civilization scattered throughout different star systems, the leaders of humanity reintroduced monarchical rule, feudalism, and the caste system. Despite the disappearance of computers, however, information — and information security — has maintained its central role in people’s lives. Mentat as security officer A Mentat is a human trained to function as a computer, capable of processing huge amounts of information in the mind. For example, in addition to developing military strategy, Dune‘s Thufir Hawat of House Atreides is responsible for: Finding backdoors and vulnerabilities in the castle’s security system; Employee background checks; Risk assessment. In other words, he performs the role of chief information security officer (CISO). At the same time, being essentially an organic computer, Hawat also functions as a living security engine, analyzing all threat signs and issuing verdicts (being paranoid, he also throws up the occasional false positive). Interestingly, judging by the First Law of Mentat, as quoted by Paul Atreides, he works on behavioral analysis algorithms: “A process cannot be understood by stopping it. Understanding must move with the flow of the process, must join it and flow with it.” Information exchange tools In the absence of computers, radio communication and old-fashioned dispatches have become the primary means of information exchange. Neither method is particularly secure; the book describes several techniques characters use to protect their communication channels. It additionally mentions a number of secure information exchange methods for face-to-face meetings in the presence of potential adversaries. Radio communication Today, encryption can make radio exchanges relatively secure (if someone eavesdrops, they will not understand a word), but in the world of Dune, without “thinking machines,” information has to be encrypted manually. In particular, the Atreides have a “battle language” — a system of verbal messages known to the Duke’s soldiers. It’s not entirely reliable. After all, the more widely a secret language is used, the more likely an enemy is to crack it — especially given House Harkonnen’s executioners’ widespread use of outmoded cryptanalysis. Physical media Exchanging dispatches is a method whose weaknesses have been known since ancient times — a courier can get turned or captured, or simply fail to arrive — but even its vulnerabilities can become an advantage. The Harkonnens, for example, periodically arrange for their messengers to get caught and supply enemies with misinformation. The book makes at least one mention of a dispatch self-destruct system that uses a capsule to corrode the material of a message’s carrier. The Bene Gesserit Organization also has a secret language of dots that doesn’t even look like information to the uninitiated. Information security for in-person meetings Dune describes two means of securing in-person encounters. First, the Atreides use a system of secret signs for exchanging fairly large amounts of information right under the enemy’s nose. Second, a “cone of silence” is installed in the palace of Baron Harkonnen. It distorts human voices, letting people speak without fear of outside ears. How this technology works, the author does not divulge. The human factor Because “information technologies” in Dune have migrated into the heads of the Mentats, the Navigators, the Bene Gesserit sisters, and other strange beings, the human factor is even more critical than it is in the real world, today. After all, Dune has abandoned the algorithms that could potentially detect human error or malicious insider intentions. Here, Herbert’s predictions are nothing if not pessimistic: Individuals and entire factions scheme, betray, and sell out; they infiltrate spy groups and extract information by torture. Moreover, the Bene Gesserit sisters possess the power of Voice, a method of verbal manipulation that can force people to act against their will. Imperial Conditioning, a Hippocratic Oath–type development of the Suk Medical School, offered some hope by preventing, at least in theory, Suk doctors from harming their patients. But the Harkonnens found a way to break this conditioning through psychological pressure caused by having a loved one taken hostage. We’re eager to see how Denis Villeneuve conveys all that on screen. It’s quite possible that his version of Frank Herbert’s world won’t be too bad as far as infosec goes. David Lynch’s 1984 effort saw fit to play pretty fast and loose with the original source, and the creators of the new film may have followed suit.
LogPoint announced it will acquire Tel Aviv-based SecBI, a disruptive player in automated cyber threat detection and response. The fInancial terms of the deal were not disclosed.
Railway and other types of wireless communication devices made by Taiwan-based industrial networking and automation firm Moxa are affected by nearly 60 security vulnerabilities.
The operators of the Mozi IoT botnet have been taken into custody by Chinese law enforcement authorities, nearly two years after the malware emerged on the threat landscape in September 2019.
Google will record the location of whatever phone a person has logged into. So, it’s not even necessary for someone to install one of the insidious stalkerware apps that have flooded the marketplace.
Ireland's Data Privacy Commissioner has hit WhatsApp with a $266 million fine for violating the EU's GDPR privacy laws after failing to inform users and non-users on what it does with their data.
Wawa is paying out up to $9-million in cash and gift cards related to a data breach that exposed customers' credit and debit card numbers and names between March 4, 2019, and December 12, 2019.
The cybercrime group compromises up to 100,000 email inboxes daily, and apparently uses this access to except siphon gift card and customer loyalty program data that can be resold online.
White House deputy national security adviser Anne Neuberger on Thursday urged U.S. organizations to be on guard against malicious digital activity ahead of the Labor Day holiday.
An attacker was apparently able to breach the site for famed street artist Banksy and sell a fake NFT of the artist’s work for more than $336,000. The fraudster has since returned the ill-gotten cash.
Machine learning in cybersecurity has a major challenge – it can't make mistakes. A mistake in one direction can lead to a risky slip of malware falling through the cracks.
Software vendor SolarWinds did not enable ASLR anti-exploit mitigation that was available since the launch of Windows Vista in 2006, allowing the attackers to launch targeted attacks in July.
The FBI said today that Americans lost more than $8 million to sextortion scams in the first seven months of the year following a massive uptick in activity from criminal groups.
Springbrook Software, Deerfield’s data storage provider, notified the town of the incident after it completed an investigation on May 6 and the town made a formal announcement on August 31.
MarkMonitor, now part of Clarivate, is a domain management company. The parked domains were pointing to nonexistent Amazon S3 bucket addresses, hinting that there existed a domain takeover weakness.
The company said its systems blocked a denial of service (DDoS) attack on one user but in doing so caused some Vocus customers in Auckland, Wellington, and Christchurch to suffer outages.
If exploited, an attacker could discover cameras that they do not own, instruct these cameras to broadcast their feeds to unauthorized third parties, and compromise the camera firmware.
It has been engineered to overcome a major issue with operating systems — that if not configured correctly, they will trust all USBs regardless of what might be installed on them.
China and other countries have used insiders to steal intellectual property from agricultural research. The government has responded with guidance for identifying insider threats.
In addition to the May ransomware attack on JBS Foods, the FBI listed dozens of ransomware incidents that have taken place over the last six months targeting the food sector.
The zero-day was the work of a new threat actor tracked as DEV-0322, which Microsoft described as “a group operating out of China, based on observed victimology, tactics, and procedures.”
The USCYBERCOM also stressed the importance of patching vulnerable Confluence servers as soon as possible: "Please patch immediately if you haven’t already— this cannot wait until after the weekend."
Researchers from Rapid7’s IntSights revealed that underground criminals are selling unauthorized access to compromised enterprise networks for up to $10,000.
Bilaxy announced on its Telegram channel that the crypto exchange suffered a “serious hack” on Saturday between 6 pm and 7 pm UTC, resulting in the transfer of 295 different ERC-20 tokens.
The Dallas Independent School District (Dallas ISD) has disclosed a data breach exposing sensitive personal data belonging to students and employees enrolled or employed since 2010.
While Microsoft fully patched these vulnerabilities in May, technical details regarding exploiting the vulnerabilities were recently released, allowing threat actors to start using them in attacks.
A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including a JavaScript implant.
As first noticed by security researcher vx-underground, an alleged member of the Babuk group released the full source code for their ransomware on a popular Russian-speaking hacking forum.
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database show more ...
management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the show more ...
broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.
This whitepaper discusses BRAKTOOTH, a family of new security vulnerabilities in commercial BT stacks that range from denial of service (DoS) via firmware crashes and deadlocks in commodity hardware to arbitrary code execution (ACE) in certain IoTs.
Cisco has patched a critical security vulnerability impacting its Enterprise Network Function Virtualization Infrastructure Software (NFVIS) that could be exploited by an attacker to take control of an affected system. Tracked as CVE-2021-34746, the weakness has been rated 9.8 out of a maximum of 10 on the Common Vulnerability Scoring System (CVSS) and could allow a remote attacker to circumvent
A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including a JavaScript implant, against a point-of-sale (PoS) service provider located in the U.S. The attacks, which are believed to have taken place between late June to late July 2021, have been attributed with "moderate confidence" to a
Cybersecurity researchers have disclosed details about a new malware family that relies on the Common Log File System (CLFS) to hide a second-stage payload in registry transaction files in an attempt to evade detection mechanisms. FireEye's Mandiant Advanced Practices team, which made the discovery, dubbed the malware PRIVATELOG, and its installer, STASHLOG. Specifics about the identities of the