Search Disaster Preparedness Blog

Entries in Cyber Security (8)

Friday
Jun282013

Safety and Social Media - Before You Post That Read This

Before You Post To Social Media Read This Post

I'm a big fan of Social Media. I use it to engage with my fans, clients, potential clients and keep up with friends. What you never really see me doing is posting pictures of my family, sure there are a few but I limit how much I post. If I had kids, I would never post publicly viewable photos of them.

Another thing I do not do on Social Media is post photos with my home in them. I also never discuss where I am. At least not at the time I am away or anything like that. Some of you may call me crazy, paranoid and some may even laugh. That's fine. Most of you also don't have thousands of strangers reading what you put online and trying to connect with you either. Don't get me wrong, I'm not famous by a long shot. But let me explain a few things.

First, there are people out there who look for these things. They will track you down, they will find you, and when they do, they will likely break into your home. I'm not kidding. There are many reports of this occurring. Also, when we purchased a new home a few years ago we had a break in and were robbed. The good news. There wasn't much to take, just a few things that we had just purchased and placed in the garage for safe keeping. 

I've since turned the house into a fortress, got an alarm system (we were getting anyway, but waiting till the move took place), and a nice beautiful living alarm/deterrent we call Luna. Anyway, that is not what this post is really about.

You see, my wife knows someone that was recently robbed. This person posts frequent pictures of the inside of their home. Also, those of you with kids, taking those innocent photos of them playing sports, or in front of their school, or wearing the team jersey. It seems to me the internet has made it easier for the nefarious would be stalker who is looking to do something evil.

Sure, I may be paranoid. But, paranoid and being safe never really hurt anyone. So next time. Before you post something. Think. Am I exposing myself to harm in a way I would never do if I knew someone was watching me?

 

Monday
Sep272010

Autofill Bug In Safari Exposes Personal Information

Apple has left an autofill bug in Safari unpatched that could potentially expose personal information you would never intend for anyone else to see.

Apples Autofill feature allows you to quickly fill out forms that you have previously entered, including credit card information and social security numbers.

A security expert has figured out a way of getting that information by tricking you to hit two keys: the "U" key and the "tab" keys. In theory you could place a hidden form behind a game on a web page that utilizes these keys and tricks you into filling out the form, and stealing your information.

Jeremiah Grossman discovered the bug and you can see a video of the flaw being demonstrated on his site under his entry: The Safari AutoFill Hack Lives!

Monday
Sep272010

Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard 

Updated on Monday, September 27, 2010 at 7:18PM by Registered CommenterKeith Erwood

Many people (most security experts aside) who work with industrial SCADA (Supervisory Control and Data Acquisition) and PLC (Programmable Logic Controllers) systems have long considered these systems safe. In fact if you check the reference sources at the bottom, you will notice a recurring theme of, if you asked me if this was possible last week, I would have said no. I have personally had people tell me they are safe from these kinds of threats because they have multiple layers of firewall's and other "robust" cyber security in place. These people are wrong, and I hope this incident serves as a wakeup call to others who work with these systems everyday. Bottom line - All systems are vulnerable. A worm known as Stuxnet has infected systems from several countries including those of the United States, Indonesia, India, and Iran.

Click to read more ...

Sunday
May092010

15 Minutes to Apocalypse – The Cyber Warfare Threat

When most people think of cyber warfare, they are probably thinking of a battle taking place sometime in the future. The other thought most people probably have is they think the United States as a being a leader in this area.

The truth is cyber warfare is already here and the United States is lagging far behind. Not only that but a majority of all services deemed as critical infrastructure are in the hands or under control of the private sector.

Currently 30 countries are known to have viable offensive and defensive cyber warfare capabilities with the top potential threats recognized as being Russia, China, and believe it or not North Korea, which is also the most dangerous country to have these capabilities. North Korea has already taken out systems run by the U.S. Treasury, Secret Service, and Federal Trade Commission.

Cyber warfare is a reality in today's world - Timeline of Cyber Attacks since May 2006 - which will likely be used in combination with conventional attacks and as stand alone attacks far into the future from here on.

While some point to these threats as fear mongering, unrealistic, and even as impossible to pull off I would venture to say they do not fully appreciate just how vulnerable we are should a massive attack bring down much of our infrastructure.

One thing to note about these types of attacks is the social engineering aspect, which no amount of security hardware or software can protect against. We need to better train employees to understand phishing attacks, to guard passwords, what to look and listen for during the social engineer aspect of any attack. Good security practices should incorporate continuous training with real world examples.

As the recent attacks against Google, Rackspace and others showed our private sector is just as much a target for malicious attacks. We must remain vigilant and proper training training is an important part of securing our networks.

See the Reference link below for more detailed information on this.

 

 

Monday
Mar222010

Google Takes New Approach with China Censorship in Response to Hacks

In response to what is being called a sophisticated cyber attack back on January 12th, Google stopped censoring searches in China by redirecting traffic to Hong Kong earlier today.

Here is the full announcement from the Official Google Blog:

A new approach to China: an update

3/22/2010 12:03:00 PM
On January 12, we announced on this blog that Google and more than twenty other U.S. companies had been the victims of a sophisticated cyber attack originating from China, and that during our investigation into these attacks we had uncovered evidence to suggest that the Gmail accounts of dozens of human rights activists connected with China were being routinely accessed by third parties, most likely via phishing scams or malware placed on their computers. We also made clear that these attacks and the surveillance they uncovered—combined with attempts over the last year to further limit free speech on the web in China including the persistent blocking of websites such as Facebook, Twitter, YouTube, Google Docs and Blogger—had led us to conclude that we could no longer continue censoring our results on Google.cn.

So earlier today we stopped censoring our search services—Google Search, Google News, and Google Images—on Google.cn. Users visiting Google.cn are now being redirected to Google.com.hk, where we are offering uncensored search in simplified Chinese, specifically designed for users in mainland China and delivered via our servers in Hong Kong. Users in Hong Kong will continue to receive their existing uncensored, traditional Chinese service, also from Google.com.hk. Due to the increased load on our Hong Kong servers and the complicated nature of these changes, users may see some slowdown in service or find some products temporarily inaccessible as we switch everything over.

Figuring out how to make good on our promise to stop censoring search on Google.cn has been hard. We want as many people in the world as possible to have access to our services, including users in mainland China, yet the Chinese government has been crystal clear throughout our discussions that self-censorship is a non-negotiable legal requirement. We believe this new approach of providing uncensored search in simplified Chinese from Google.com.hk is a sensible solution to the challenges we've faced—it's entirely legal and will meaningfully increase access to information for people in China. We very much hope that the Chinese government respects our decision, though we are well aware that it could at any time block access to our services. We will therefore be carefully monitoring access issues, and have created this new web page, which we will update regularly each day, so that everyone can see which Google services are available in China.

In terms of Google's wider business operations, we intend to continue R&D work in China and also to maintain a sales presence there, though the size of the sales team will obviously be partially dependent on the ability of mainland Chinese users to access Google.com.hk. Finally, we would like to make clear that all these decisions have been driven and implemented by our executives in the United States, and that none of our employees in China can, or should, be held responsible for them. Despite all the uncertainty and difficulties they have faced since we made our announcement in January, they have continued to focus on serving our Chinese users and customers. We are immensely proud of them.