<div dir="ltr"><div><div><div dir="ltr"><div dir="ltr"><div dir="ltr">
<table bgcolor="#ffffff" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" valign="top">
<table cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td style="border-top:0px solid rgb(0,0,0);border-bottom:1px solid rgb(255,255,255);background-color:rgb(255,255,255);text-align:center" align="center"><span style="font-size:10px;color:rgb(96,96,96);line-height:200%;font-family:verdana;text-decoration:none">Email
not displaying correctly? <a href="http://www.oplin.org/4cast/" style="font-size:10px;color:rgb(0,0,255);line-height:200%;font-family:verdana;text-decoration:none" target="_blank">View
it in your browser.</a></span></td>
</tr>
<tr>
<td style="border-top:0px solid rgb(51,51,51);border-bottom:0px solid rgb(255,255,255);background-color:rgb(255,255,255)">
<center><a><img src="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickheader.jpg" title="OPLIN" alt="OPLIN 4Cast" align="middle" border="0"></a></center>
</td>
</tr>
</tbody>
</table>
<table style="width:763px;height:877px" bgcolor="#ffffff" cellpadding="20" cellspacing="0">
<tbody>
<tr>
<td style="font-size:12px;color:rgb(0,0,0);line-height:150%;font-family:trebuchet ms" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" bgcolor="#ffffff" valign="top">
<p>
<span style="font-size:20px;font-weight:bold;color:rgb(0,0,0);font-family:arial;line-height:110%">OPLIN 4cast #447: The business of hacking</span><br>
<span style="font-size:11px;font-weight:normal;color:rgb(102,102,102);font-style:italic;font-family:arial">July 22nd, 2015</span></p>
<p style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><img align="left" src="http://www.oplin.org/4cast/wp-content/uploads/2015/07/hacker.png" alt="hacker" width="130" height="100">Hacking into the computer files of a company or government agency often is not a very lucrative occupation, unless the hacker has some way to convert stolen information to cash. So a current trend seems to be for hackers or hacker groups to sell their services, before the hack, to someone who wants specific information. The business side of hacking has been highlighted in some recent news reports, like news about the <a href="http://www.theguardian.com/technology/2015/jul/20/hacking-team-police-investigate-employees-inside-job-claims" target="_blank">Hacking Team</a> company being hacked themselves, and the takedown of the <a href="http://www.darkreading.com/cloud/darkode-shuttered-but-cybercrime-still-alive-and-well--/d/d-id/1321359" target="_blank">Darkode</a> forum for hackers. You may think that libraries are safe from this kind of cyber crime (why attack a library?), but by that logic, we also should not be seeing denial of service attacks on libraries - yet we are.
</p>
<div> </div>
<ul style="text-align:left">
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.fastcompany.com/3043016/the-cybercrime-service-economy" target="_blank">Hackers on demand</a> (Fast Company | Steven Melendez) "At <a href="https://hackerslist.com/projects" target="_blank">Hackers List</a>, for instance, hackers bid on projects in a manner similar to other contract-work marketplaces like Elance. Those in the market for hackers can post jobs for free, or pay extra to have their listings displayed more prominently. Hackers generally pay a $3 fee to bid on projects, and users are also charged for sending messages. The site provides an escrow mechanism to ensure vendors get paid only when the hacking's done."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://www.washingtonpost.com/blogs/the-switch/wp/2015/07/16/how-cybercriminals-have-turned-forums-into-sophisticated-blackmarkets/" target="_blank">Hackers for hire: How online forums make cybercrime easier than ever</a> (Washington Post | Andrea Peterson) "These forums and black markets offering physical goods as well as digital services - such as the now defunct Silk Road - have helped drive the popularity of cybercrime, because the sites contain almost everything someone would need to get into hacking for profit, [Raj] Samani [of Intel Security] said. Even those without technical knowledge can visit the forums or black markets and hire people to do the individual components of a scam - or outsource it altogether in a subcontractor-style set up, he said."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.toptechnews.com/article/index.php?story_id=020000MIVK1S" target="_blank">Sophisticated hacker group strikes for profit, not politics</a> (Top Tech News | Jef Cozza) "Almost as unnerving as Morpho's habit of targeting enterprise assets is its familiarity with the inner workings of its victims. The group has successfully compromised commonly used e-mail servers such as Microsoft Exchange and Lotus Domino, according to Symantec. It has also targeted enterprise content management systems, where it could have gained access to valuable documents such as financial records, product descriptions, and legal documents. And unlike attacks by other hacker groups suspected of working for the Chinese, Russian, or North Korean governments, Morpho's malware tools are well documented in fluent English."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.itweb.co.za/index.php?option=com_content&view=article&id=144418" target="_blank">Hacker for hire</a> (ITWeb | Jon Tullett) "Managing consultant [Tyrone Erasmus] at security specialist firm MWR InfoSecurity, he and his teams are hired to audit their clients' security, mimicking the behaviour of criminal syndicates that are after the same valuable details: financial systems, intellectual property and trade secrets. 'I'm a bad guy who plays by good guy rules,' he proclaims, with a nearly straight face. Since the '70s and '80s, when hackers like Kevin Mitnick and John Draper burst onto the scene, corporate information security has improved greatly, it's far stronger and...haha. Just kidding. 'We have a 100-percent success rate,' Erasmus says, deadpan."</li>
</ul>
<div style="text-align:left"> </div>
<p style="text-align:left;font-size:20px;font-family:arial;line-height:110%"><small><strong><em>Articles from <a href="http://ohioweblibrary.org" target="_blank">Ohio Web Library</a>:</em></strong></small><br>
</p>
<div style="text-align:justify;font-size:16px;font-family:arial;line-height:110%">
<ul>
<li><a href="http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=4be14fb1-ee95-4b17-9ef3-534d0d9de920%40sessionmgr4001&crlhashurl=login.aspx%253fdirect%253dtrue%2526db%253dbuh%2526AN%253d84503895%2526site%253dehost-live&hid=4101&vid=0&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=84503895" target="_blank">The business of hacking and birth of an industry.</a> (<em>Bell Labs Technical Journal</em>, Dec. 2012, p.5-16 | Matt Bowles)</li>
<li><a href="http://web.b.ebscohost.com.proxy.oplin.org/chc/detail?sid=5fb8cbb5-e93f-4077-b428-61e219071140%40sessionmgr113&crlhashurl=login.aspx%253fdirect%253dtrue%2526db%253dcmh%2526AN%253d94311325%2526site%253dehost-live&hid=124&vid=0&bdata=JnNpdGU9Y2hjLWxpdmU%3d#db=cmh&AN=94311325" target="_blank">IT security for you and your library.</a> (<em>Computers in Libraries</em>, Jan/Feb. 2014, p.13-16 | Blake Carver)</li>
<li><a href="http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=68a82ec8-f497-44e3-9639-c185c6b89534%40sessionmgr4004&crlhashurl=login.aspx%253fdirect%253dtrue%2526db%253dbuh%2526AN%253d102092395%2526site%253dehost-live&hid=4101&vid=0&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=102092395" target="_blank">The rising strategic risks of cyberattacks.</a> (<em>McKinsey Quarterly</em>, 2014 2nd Quarter, p.17-22 | Tucker Bailey, Andrea Del Miglio, and Wolf Richter)</li>
</ul>
</div>
<div style="text-align:left"> </div>
</td>
</tr>
<tr>
<td background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" valign="top" width="760"><span style="font-size:10px;color:rgb(96,96,96);line-height:100%;font-family:verdana">
<hr>
<div style="text-align:justify">The <strong><em>OPLIN
4cast</em></strong>
is a weekly compilation of
recent headlines, topics, and trends that could impact public
libraries. You can subscribe to it in a variety of ways, such as: <br>
</div>
<div style="text-align:left"> </div>
<ul>
<li style="text-align:justify"><strong>RSS feed.</strong>
You
can receive the OPLIN 4cast
via RSS feed by subscribing to the following URL:
<a href="http://www.oplin.org/4cast/index.php/?feed=rss2" target="_blank">http://www.oplin.org/4cast/index.php/?feed=rss2</a>. </li>
<li style="text-align:justify"><strong>Live Bookmark.</strong>
If you're using the Firefox
web browser, you can go to the 4cast website
(<a href="http://www.oplin.org/4cast/" target="_blank">http://www.oplin.org/4cast/</a>) and click on the orange "radio wave" icon
on the right side of the address bar. In Internet Explorer 7, click on
the same icon to view or subscribe to the 4cast RSS feed. </li>
<li style="text-align:justify"><strong>E-mail.</strong>
You
can have the OPLIN 4cast
delivered via e-mail (a'la OPLINlist and OPLINtech) by subscribing to
the 4cast mailing list at
<a href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast" target="_blank">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>. </li>
</ul>
</span> </td>
</tr>
<tr>
<td style="border-top:0px solid rgb(255,255,255);background-color:rgb(255,255,204)" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg" valign="top" width="760"> <br>
</td>
</tr>
</tbody>
</table></td></tr></tbody></table><div dir="ltr"><br></div></div></div></div></div></div>
</div>