IBM X-Force 2011 Trend and Risk Report March 2012 IBM Security Systems IBM X-Force 2011 Trend and Risk Report

Total Page:16

File Type:pdf, Size:1020Kb

IBM X-Force 2011 Trend and Risk Report March 2012 IBM Security Systems IBM X-Force 2011 Trend and Risk Report IBM X-Force 2011 Trend and Risk Report March 2012 IBM Security Systems IBM X-Force 2011 Trend and Risk Report Contributors Contributors Producing the IBM X-Force Trend and Risk Report is a dedication in collaboration across all of IBM. We would About X-Force like to thank the following individuals for their attention and contribution to the publication of this report. The IBM X-Force® research and development teams study and monitor the latest threat trends including Contributor Title Contributor Title vulnerabilities, exploits and active attacks, viruses Bryan Casey Market Manager, Mark E. Wallis Senior Information Developer, and other malware, spam, phishing, and malicious IBM Security Systems IBM Security Systems web content. In addition to advising customers and Carsten Hagemann X-Force Software Engineer, Marne Gordan Regulatory Analyst, Content Security IBM Security Systems the general public about emerging and critical Colin Bell Security Solution Architect, Michael Applebaum Director of Product Marketing, threats, X-Force also delivers security content to help Lab Services & Support, Q1 Labs protect IBM customers from these threats. IBM Security Systems Michael Montecillo Managed Security Services Threat Clay Blankenship Senior Incident Response Analyst Research and Intelligence Principal Cynthia Schneider Information Developer Michelle Alvarez Manager, MSS Global Operations David McMillen Security Intelligence Analyst, Paul Sabanal X-Force Advanced Research ––––––––– D e dicati o n ––––––––– IBM Security Services Phil Neray Q1 Labs Marketing Leader, The IBM X-Force 2011 Trend and Risk David Merrill STSM, IBM Chief Information IBM Security Systems Security Office, CISA Report is dedicated in memory of our friend Ralf Iffert Manager X-Force Content Security Dr. Jens Thamm Database Management and colleague Marne Gordon who passed Randy Burton Senior Incident Response Analyst Content Security away during the production of this report. A Robert Lelewski Senior Incident Response Analyst Dr. Ashok Kallarakkal Sr. Manager, regulatory analyst with the IBM Security Product Management and Beta Ops Ron Black Senior Incident Response Analyst Division’s security strategy team, Marne’s Gina Stefanelli X-Force Marketing Manager Ryan Berg Cloud Security Strategy Lead knowledge and focus on cloud and social Jason Kravitz Techline Specialist for Scott Moore X-Force Software Developer and media security are featured in this report. IBM Security Systems and E-Config X-Force Database Team Lead She was a frequent speaker at industry John C. Pierce Threat Intelligence Analyst, Shane Garrett Team Lead, X-Force AI, MSS Advanced Research events and published numerous articles on the topics of security and compliance. John Kuhn Security Intelligence Analyst, Tom Cross Manager, X-Force Strategy and Threat IBM Security Services Intelligence Marne, and the contributions she made to Kimberly Madia Data Security Strategy, Veronica Shelley Segment Marketing Manager security, compliance, and to IBM will be InfoSphere Guardium & Optim IBM Security Systems greatly missed. Leslie Horacek X-Force Threat Response Manager Marc Noske Database Administration, Content Security 2 IBM Security Systems IBM X-Force 2011 Trend and Risk Report IBM security collaboration IBM security collaboration IBM Security represents several brands that provide a broad spectrum of security competency. • While the X-Force research and development teams are busy at work analyzing the latest trends and methods used by attackers, other groups within IBM use that rich data to develop protection techniques for our customers. • The IBM X-Force research and development team discovers, analyzes, monitors, and records a broad range of computer security threats and vulnerabilities. • IBM Managed Security Services (MSS) is responsible for monitoring exploits related to endpoints, servers (including web servers), and general network infrastructure. MSS tracks exploits delivered over the web as well as other vectors such as email and instant messaging. • Professional Security Services (PSS) delivers enterprise-wide security assessment, design, and deployment services to help build effective information security solutions. • The IBM X-Force content security team independently scours and categorizes the web through crawling, independent discoveries, and through the feeds provided by MSS. • IBM has collated real-world vulnerability data from security tests conducted over the past several years from the IBM AppScan® OnDemand Premium Service. This service combines application security assessment results obtained from IBM AppScan with manual security testing and verification. • IBM Security Services supports the cloud in two ways: Security Services for the Cloud that help clients begin their journey to the cloud by providing security expertise and Security from a cloud-based model that helps reduce costs and complexity, improve security posture and meet compliance requirements. • IBM Identity and access management solutions enable organizations to efficiently centralize and automate the management of identity profiles and access privileges for authorized users. These solutions can further strengthen security with strong authentication, single sign-on, and audit/reporting tools for monitoring user access activity. • IBM data and information security solutions deliver capabilities to help protect data and access management that helps address information lifecycle security across the enterprise. • IBM InfoSphere® Guardium® provides a scalable enterprise solution for database security and compliance that can be rapidly deployed and managed with minimal resources. • The QRadar Security Intelligence Platform from Q1 Labs, an IBM Company, offers an integrated solution for SIEM, log management, configuration management and anomaly detection. It provides a unified dashboard and real-time insight into security and compliance risks across people, data, applications and infrastructure. 3 IBM Security Systems IBM X-Force 2011 Trend and Risk Report Contents > Section I Contents Section I Contributors 2 The BEAST 35 About X-Force 2 Mitigation 36 IBM security collaboration 3 DigiNotar and Comodo compromises 36 Section I –Threats 6 Certificate revocation 37 Executive overview 6 SSL trust model 37 2011 Highlights 8 Problems with the SSL trust model 38 Threats 8 Revising SSL trust 38 Operating secure infrastructure 9 What does the future hold? 39 Software development security practices 10 The emergence of Mac malware 39 Emerging trends in security 10 Introduction 39 2011—Year of the security breach 12 MacDefender 39 From mid-year to the new year—the breach plays on 12 Flashback 40 Game changers in the second half of 2011 13 DevilRobber 41 Lessons learned 14 Conclusion 41 The way forward 15 Web content trends 43 IBM Managed Security Services— A global threat landscape 16 Analysis methodology 43 MSS—2011 top high-volume signatures 16 IPv6 deployment for websites 43 The continuing threat of SQL injection 27 Increase of anonymous proxies 44 SQL injection 27 Malicious websites 46 The nature of the threat 28 Spam and phishing 49 Helping to protect your code 29 Spam volume continues to decline 49 Helping to protect your server 30 Major spam trends 2011 50 Helping to protect your network 31 Common top-level domains in URL spam including long-term trends 53 Conclusion 32 Spam—country of origin trends 55 Challenges to SSL security 33 Email scam and phishing 56 THC-SSL-DOS 33 Evolution of spam 61 The TLS Handshake 33 Future prospects on spam 65 Mitigation 34 4 IBM Security Systems IBM X-Force 2011 Trend and Risk Report Contents > Section II, III and IV Contents Section II, III and IV Section II—Operational Security Practices 66 Changes in IT environments and evolving business initiatives 106 Introducing Security Intelligence: An integrated approach to real-time security 66 Smarter, more sophisticated attackers 106 Defining Security Intelligence 66 Compliance mandates 106 The analogy to Business Intelligence 67 Leveraging a holistic data security and privacy approach 108 The tenets of Security Intelligence 68 A three-tiered approach to ensure holistic data protection 109 How does Security Intelligence differ from SIEM? 69 Section III—Software Development Security Practices 111 What are the main benefits? 70 Conclusions from real-world web application assessments 111 Best practices for Security Intelligence 72 Methodology 111 Conclusion 73 Metric points 112 Vulnerability disclosures in 2011 74 2011 application vulnerability trends 113 Web application 74 Annual trends (2007—2011) 114 Declines in exploitation 78 Business segments 116 Attackers shifting attention to new areas of focus 82 Application security test cycle 118 Vulnerabilities in enterprise software 84 Section IV—Emerging Trends in Security 120 Social engineering social media: How the attackers do It 89 Mobile security and the enterprise—a year in review 120 Overview 89 Mobile malware perspective 121 Intelligence gathering 90 BYOD and secure isolation 123 Open source intelligence gathering 90 Importance of device management convergence in role-based enterprises 124 How it works—not rocket science 91 A retrospective look at the state of security in the cloud 126 Steps organizations can take to mitigate social media risks 93 Adopting security for the cloud 127 Future trends 96 Design considerations 127 Top 10 common CSIRP mistakes 97 Deployment considerations 127 Incident response—preparing your infrastructure for response at scale 100 Consume considerations 128 Preparation:
Recommended publications
  • Anti-Hero, Trickster? Both, Neither? 2019
    Masaryk University Faculty of Arts Department of English and American Studies English Language and Literature Tomáš Lukáč Deadpool – Anti-Hero, Trickster? Both, Neither? Master’s Diploma Thesis Supervisor: Jeffrey Alan Vanderziel, B.A. 2019 I declare that I have worked on this thesis independently, using only the primary and secondary sources listed in the bibliography. …………………………………………….. Tomáš Lukáč 2 I would like to thank everyone who helped to bring this thesis to life, mainly to my supervisor, Jeffrey Alan Vanderziel, B.A. for his patience, as well as to my parents, whose patience exceeded all reasonable expectations. 3 Table of Contents Introduction ...…………………………………………………………………………...6 Tricksters across Cultures and How to Find Them ........................................................... 8 Loki and His Role in Norse Mythology .......................................................................... 21 Character of Deadpool .................................................................................................... 34 Comic Book History ................................................................................................... 34 History of the Character .............................................................................................. 35 Comic Book Deadpool ................................................................................................ 36 Films ............................................................................................................................ 43 Deadpool (2016)
    [Show full text]
  • “Why So Serious?” Comics, Film and Politics, Or the Comic Book Film As the Answer to the Question of Identity and Narrative in a Post-9/11 World
    ABSTRACT “WHY SO SERIOUS?” COMICS, FILM AND POLITICS, OR THE COMIC BOOK FILM AS THE ANSWER TO THE QUESTION OF IDENTITY AND NARRATIVE IN A POST-9/11 WORLD by Kyle Andrew Moody This thesis analyzes a trend in a subgenre of motion pictures that are designed to not only entertain, but also provide a message for the modern world after the terrorist attacks of September 11, 2001. The analysis provides a critical look at three different films as artifacts of post-9/11 culture, showing how the integration of certain elements made them allegorical works regarding the status of the United States in the aftermath of the attacks. Jean Baudrillard‟s postmodern theory of simulation and simulacra was utilized to provide a context for the films that tap into themes reflecting post-9/11 reality. The results were analyzed by critically examining the source material, with a cultural criticism emerging regarding the progression of this subgenre of motion pictures as meaningful work. “WHY SO SERIOUS?” COMICS, FILM AND POLITICS, OR THE COMIC BOOK FILM AS THE ANSWER TO THE QUESTION OF IDENTITY AND NARRATIVE IN A POST-9/11 WORLD A Thesis Submitted to the Faculty of Miami University in partial fulfillment of the requirements for the degree of Master of Arts Department of Communications Mass Communications Area by Kyle Andrew Moody Miami University Oxford, Ohio 2009 Advisor ___________________ Dr. Bruce Drushel Reader ___________________ Dr. Ronald Scott Reader ___________________ Dr. David Sholle TABLE OF CONTENTS ACKNOWLEDGMENTS .......................................................................................................................... III CHAPTER ONE: COMIC BOOK MOVIES AND THE REAL WORLD ............................................. 1 PURPOSE OF STUDY ...................................................................................................................................
    [Show full text]
  • Creating a Superheroine: a Rhetorical Analysis of the X-Men Comic Books
    CREATING A SUPERHEROINE: A RHETORICAL ANALYSIS OF THE X-MEN COMIC BOOKS by Tonya R. Powers A Thesis Submitted in Partial Fulfillment Of the Requirements for the Degree MASTER OF ARTS Major Subject: Communication West Texas A&M University Canyon, Texas August, 2016 Approved: __________________________________________________________ [Chair, Thesis Committee] [Date] __________________________________________________________ [Member, Thesis Committee] [Date] __________________________________________________________ [Member, Thesis Committee] [Date] ____________________________________________________ [Head, Major Department] [Date] ____________________________________________________ [Dean, Fine Arts and Humanities] [Date] ____________________________________________________ [Dean, Graduate School] [Date] ii ABSTRACT This thesis is a rhetorical analysis of a two-year X-Men comic book publication that features an entirely female cast. This research was conducted using Kenneth Burke’s theory of terministic screens to evaluate how the authors and artists created the comic books. Sonja Foss’s description of cluster criticism is used to determine key terms in the series and how they were contributed to the creation of characters. I also used visual rhetoric to understand how comic book structure and conventions impacted the visual creation of superheroines. The results indicate that while these superheroines are multi- dimensional characters, they are still created within a male standard of what constitutes a hero. The female characters in the series point to an awareness of diversity in the comic book universe. iii ACKNOWLEDGEMENTS I wish to thank my thesis committee chair, Dr. Hanson, for being supportive of me within the last year. Your guidance and pushes in the right direction has made the completion of this thesis possible. You make me understand the kind of educator I wish to be. You would always reply to my late-night emails as soon as you could in the morning.
    [Show full text]
  • Cipher Code of Words, Phrases, Names of Organizations and Titles of Their
    r/^i OF Words, Phrases, Names of Organizations and Ti- tles of Their Officers, Names of Principal Rail- roads, Months, Days, Time of Day, Al- phabet and Figures. FOR Use of Organizations of Railway Employes in TELEGRAPHIC CORRESPONDENCE ARRANGED BY Galesburg, 1892. Digitized by tine Internet Arcliive in 2010 witli funding from Dul<e University Libraries littp://www.arcliive.org/details/cipliercodeofworOOsliea PREFACE. In assuming, with pardonaljle pride, the labor of preparing a Cipher Code adapted to the business of the several Organizations of Railway Employes, the au- thor has endeavored to bring it thoroughly up to the requirements of the times. It is not to be expected that a work of this kind can be perfected by any one man in the first edition and the author requests those using this little book to note its short-comings for future reference, that he who undertakes the labor of revision, may have the benefit of their experience. The need of a work of this kind has at times been sorely felt by every organization and if this work meets the requirements so far as to lighten the burden of any organization in time of trouble, or to assist in gaining a single point in favor of the laboring man. then the author will feel that he has been fully repaid for his labor. To the several Organizations of Railway Emplo3'es this vrork is dedicated with the good will and best Avishes of the author. INSTRUCTIONS. This Cipher Code arranged for use of the several Organizations of Railway Employes is intended more especiall}' for Telegraphic Correspondence in time of trouble, when it is desirable or necessary to send tele- grams that can not be read by any but those for whom they are intended, as is the case in time of strikes or other important moves on the part of an Organization, as it is often necessary to use the Company's wire to reach members of the Organization on other parts of the road and unless such telegrams can be sent in a safe cipher it would be better the}^ were not sent, as the Company would be forewarned of every contem- plated move mentioned in the telegram.
    [Show full text]
  • Wolverine Logan, of the X-Men and the New Avengers
    Religious Affiliation of Comics Book Characters The Religious Affiliation of Comic Book Character Wolverine Logan, of the X-Men and the New Avengers http://www.adherents.com/lit/comics/Wolverine.html Wolverine is the code name of the Marvel Comics character who was long known simply as "Logan." (Long after his introduction, the character's real name was revealed to be "James Howlett.") Although originally a relatively minor character introduced in The Incredible Hulk #180-181 (October - November, 1974), the character eventually became Marvel's second-most popular character (after Spider-Man). Wolverine was for many years one of Marvel's most mysterious characters, as he had no memory of his earlier life Above: Logan and the origins of his distinctive (Wolverine) prays at a Adamantium skeleton and claws. Like Shinto temple in Kyoto, much about the character, his religious Japan. affiliation is uncertain. It is clear that [Source: Wolverine: Wolverine was raised in a devoutly Soultaker, issue #2 (May Christian home in Alberta, Canada. His 2005), page 6. Written by family appears to have been Protestant, Akira Yoshida, illustrated although this is not certain. At least by Shin "Jason" Nagasawa; reprinted in into his teen years, Wolverine had a Wolverine: Soultaker, strong belief in God and was a Marvel Entertainment prayerful person who strived to live by Group: New York City specific Christian ethics and moral (2005).] teachings. Above: Although Logan (Wolverine) is not a Catholic, and Over the many decades since he was a Nightcrawler (Kurt Wagner) is not really a priest, Logan child and youth in 19th Century nevertheless was so troubled by Alberta, Wolverine's character has his recent actions that he changed significantly.
    [Show full text]
  • Narratives of Contamination and Mutation in Literatures of the Anthropocene Dissertation Presented in Partial
    Radiant Beings: Narratives of Contamination and Mutation in Literatures of the Anthropocene Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University By Kristin Michelle Ferebee Graduate Program in English The Ohio State University 2019 Dissertation Committee Dr. Thomas S. Davis, Advisor Dr. Jared Gardner Dr. Brian McHale Dr. Rebekah Sheldon 1 Copyrighted by Kristin Michelle Ferebee 2019 2 Abstract The Anthropocene era— a term put forward to differentiate the timespan in which human activity has left a geological mark on the Earth, and which is most often now applied to what J.R. McNeill labels the post-1945 “Great Acceleration”— has seen a proliferation of narratives that center around questions of radioactive, toxic, and other bodily contamination and this contamination’s potential effects. Across literature, memoir, comics, television, and film, these narratives play out the cultural anxieties of a world that is itself increasingly figured as contaminated. In this dissertation, I read examples of these narratives as suggesting that behind these anxieties lies a more central anxiety concerning the sustainability of Western liberal humanism and its foundational human figure. Without celebrating contamination, I argue that the very concept of what it means to be “contaminated” must be rethought, as representations of the contaminated body shape and shaped by a nervous policing of what counts as “human.” To this end, I offer a strategy of posthuman/ist reading that draws on new materialist approaches from the Environmental Humanities, and mobilize this strategy to highlight the ways in which narratives of contamination from Marvel Comics to memoir are already rejecting the problematic ideology of the human and envisioning what might come next.
    [Show full text]
  • Selling Marvel's Cinematic Superheroes
    Stream: Culture/Politics/Technology 2016, Vol 8(2), 23-35 © The Author(s), 2016 http://journals.sfu.ca/stream Selling Marvel’s Cinematic Superheroes through Militarization Brett Pardy School of Communication Simon Fraser University Abstract The Marvel comics film adaptations have been some of the most successful Hollywood products of the post 9/11 period, bringing formerly obscure cultural texts into the mainstream. Through an analysis of the adaptation process of Marvel Entertainment’s superhero franchise from comics to film, I argue that militarization has been used by Hollywood as a discursive formation with which to transform niche properties into mass market products. I consider the locations of narrative ambiguities in two key comics texts, The Ultimates (2002-2007) and The New Avengers (2005-2012), as well as in the film The Avengers (2011), and demonstrate the significant reorientation towards the military of the film franchise. While Marvel had attempted to produce film adaptations for decades, only under the new “militainment” discursive formation was it finally successful. I argue that superheroes are malleable icons, known largely by the public by their image and perhaps general character traits rather than their narratives. Militainment is introduced through a discourse of realism provided by Marvel Studios as an indicator that the property is not just for children. Keywords: militarization, popular film, comic books, adaptation 1. Introduction Nick Fury, head of the Strategic Homeland Intervention, Enforcement and Logistics Division (S.H.I.E.L.D) tells his team of assembled superheroes: “there was an idea… called the Avengers Initiative. The idea was to bring together a group of remarkable people, see if they could become something more.
    [Show full text]
  • Historic American Indian Tribes of Ohio 1654-1843
    Historic American Indian Tribes of Ohio 1654-1843 Ohio Historical Society www.ohiohistory.org $4.00 TABLE OF CONTENTS Historical Background 03 Trails and Settlements 03 Shelters and Dwellings 04 Clothing and Dress 07 Arts and Crafts 08 Religions 09 Medicine 10 Agriculture, Hunting, and Fishing 11 The Fur Trade 12 Five Major Tribes of Ohio 13 Adapting Each Other’s Ways 16 Removal of the American Indian 18 Ohio Historical Society Indian Sites 20 Ohio Historical Marker Sites 20 Timeline 32 Glossary 36 The Ohio Historical Society 1982 Velma Avenue Columbus, OH 43211 2 Ohio Historical Society www.ohiohistory.org Historic American Indian Tribes of Ohio HISTORICAL BACKGROUND In Ohio, the last of the prehistoric Indians, the Erie and the Fort Ancient people, were destroyed or driven away by the Iroquois about 1655. Some ethnologists believe the Shawnee descended from the Fort Ancient people. The Shawnees were wanderers, who lived in many places in the south. They became associated closely with the Delaware in Ohio and Pennsylvania. Able fighters, the Shawnees stubbornly resisted white pressures until the Treaty of Greene Ville in 1795. At the time of the arrival of the European explorers on the shores of the North American continent, the American Indians were living in a network of highly developed cultures. Each group lived in similar housing, wore similar clothing, ate similar food, and enjoyed similar tribal life. In the geographical northeastern part of North America, the principal American Indian tribes were: Abittibi, Abenaki, Algonquin, Beothuk, Cayuga, Chippewa, Delaware, Eastern Cree, Erie, Forest Potawatomi, Huron, Iroquois, Illinois, Kickapoo, Mohicans, Maliseet, Massachusetts, Menominee, Miami, Micmac, Mississauga, Mohawk, Montagnais, Munsee, Muskekowug, Nanticoke, Narragansett, Naskapi, Neutral, Nipissing, Ojibwa, Oneida, Onondaga, Ottawa, Passamaquoddy, Penobscot, Peoria, Pequot, Piankashaw, Prairie Potawatomi, Sauk-Fox, Seneca, Susquehanna, Swamp-Cree, Tuscarora, Winnebago, and Wyandot.
    [Show full text]
  • IBM X-Force Threat Intelligence Index 2018
    IBM X-Force Threat Intelligence Index 2018 IBM X-Force Threat Intelligence Index 2018 Notable security events of 2017, and a look ahead IBM Security March 2018 IBM X-Force Threat Intelligence Index 2018 TABLE OF CONTENTS A threat intelligence powerhouse ...............................3 TrickBot ............................................................. 18 Additional credential storage ............................... 32 Executive overview ..................................................... 4 QakBot (aka QBot) ............................................ 19 X-Force-monitored network activity .................... 32 Network attack trends .................................................6 Necurs botnet still hitting hard ......................... 19 Cybercrime and cryptocurrency ................................ 34 Security incidents and attacks ...............................6 2017’s goners ....................................................... 20 The rush for crypto ............................................... 35 Network attack vectors ..........................................7 Neverquest’s 2017 exit ..................................... 20 Wallet phishers ................................................. 35 Inject unexpected items .................................... 8 Goodbye Shifu? ..................................................21 Coin-mining malware ........................................ 35 Botnet-based CMDi LFI attacks ..................... 8 What to expect in 2018? .......................................21 Why mine coins
    [Show full text]
  • Scholar Adventurers Also by Richard D
    ichard THE SCHOLAR ADVENTURERS ALSO BY RICHARD D. ALTICK Preface to Critical Reading The Cowden Clarkes The English Common Reader: A Social History of the Mass Reading Public, 1800-1900 The Art of Literary Research Lives and Letters: A History of Literary Biography in England and America Browning's Roman Murder Story: A Reading of The Ring and the Book (with James F. Loucks II) To Be in England Victorian Studies in Scarlet Victorian People and Ideas The Shows of London Paintings from Books: Art and Literature in Britain, 1760-1900 Deadly Encounters: Two Victorian Sensations EDITIONS Thomas Carlyle: Past and Present Robert Browning: The Ring and the Book THE Scholar Adventurers RICHARD D. ALTICK Ohio State University Press, Columbus Copyright ©1950, 1987 by Richard D. Altick. All rights reserved. Library of Congress Cataloging-in-Publicatlon Data Altick, Richard Daniel, 1915- The scholar adventurers. Reprint. Originally published: New York : Macmillan, 1950. With new pref. Bibliography: p. Includes index. 1. English literature—Research. 2. Learning and scholarship—History. 3. Great Britain—Intellectual life. I. Title. P56.A7 1987 820'.72'0922 87-11064 ISBN O-8142-O435-X CONTENTS Preface to the Ohio State University Press Edition vii Introduction: The Unsung Scholar 1 I. The Secret of the Ebony Cabinet 16 II. The Case of the Curious Bibliographers 37 III. The Quest of the Knight-Prisoner 65 IV. Hunting for Manuscripts 86 V. Exit a Lady, Enter Another 122 VI. A Gallery of Inventors 142 VII. The Scholar and the Scientist 176 VIII. Secrets in Cipher 200 IX. The Destructive Elements 211 X.
    [Show full text]
  • SPIDER-MAN: a BUMPY RIDE on BROADWAY the Broadway Production of “Spider-Man: Turn Off the Dark” Suffered from Vast Expenses and Discord
    FROM THE NEW YORK TIMES ARCHIVES SPIDER-MAN: A BUMPY RIDE ON BROADWAY The Broadway production of “Spider-Man: Turn Off the Dark” suffered from vast expenses and discord. (Sara Krulwich/The New York Times) TBook Collections Copyright © 2015 The New York Times Company. All rights reserved. Cover photograph by Sara Krulwich/The New York Times This ebook was created using Vook. All of the articles in this work originally appeared in The New York Times. eISBN: The New York Times Company New York, NY www.nytimes.com www.nytimes.com/tbooks Broadway’s ‘Spider-Man’ Spins A Start Date By PATRICK HEALY February 24, 2009 The widely anticipated new musical “Spider-Man, Turn Off the Dark,” with music and lyrics by Bono and the Edge and directed by Julie Taymor (“The Lion King”), took a big swing toward a Broadway debut on Tuesday: the producers announced that the show would begin previews on Jan. 16 at the Hilton Theater. The musical, produced by Hello Entertainment/David Garfinkle, Martin McCallum, Marvel Entertainment and Sony Pictures Entertainment, is to open on Feb. 18. Industry insiders have said its budget would be the largest in Broadway history, about $40 million; a spokesman for the show, Adrian Bryan-Brown, said on Tuesday that the producers would not comment on the dollar amount. ‘Spider-Man’ Musical Names 2 Of Its Stars June 27, 2009 Evan Rachel Wood will be Mary Jane Watson and Alan Cumming will star as Norman Osborn (a k a Green Goblin) in the upcoming Broadway musical “Spider-Man, Turn Off The Dark,” the producers announced on Friday.
    [Show full text]
  • A Qualitative Content Analysis of How Superheroines Are Portrayed in Comic Books
    CALIFORNIA STATE UNIVERSITY, NORTHRIDGE Fight Like a Girl: A Qualitative Content Analysis of How Superheroines are Portrayed in Comic Books A graduate project submitted in partial fulfillment of the requirements for the degree of Master of Arts in Sociology By Kimberly Romero December 2020 Copyright by Kimberly Romero 2020 ii The graduate project of Kimberly Romero is approved: _________________________________________ ______________ Dr. Michael Carter Date _________________________________________ ______________ Dr. Stacy Missari Date _________________________________________ ______________ Dr. Moshoula Capous-Desyllas, Chair Date California State University, Northridge iii ACKNOWLEDGEMENTS I would like to start off by acknowledging my parents for braving through a civil war, poverty, pain, political criticisms, racial stereotypes, and the constant bouts of uncertainty that immigrating to the United States, seeking asylum from the dangers plaguing their home country of El Salvador, has presented them with throughout the years. If it were not for your sacrifices, we would not have the lives and opportunities we have now. Having your constant love and support means the world to me. You are both my North Stars for everything I do. I would also like to acknowledge my sister for convincing Mom and Dad to let you name me after two of your greatest childhood role models, superheroines, and cultural icons. The Pink Power Ranger and The Queen of Tejano music are both pretty huge namesakes to live up to. I hope I do their legacies justice and that I am making you proud. I know I do not say this to you often but know that, through all our ups and downs, you were my hero growing up.
    [Show full text]