Monday, February 2, 2009

Web identity hijacking on the rise - vnunet.com

The computer industry is a strange place. I remember back in the day where memory was so expensive we were taught to write our code to use cryptic variables and short hand names so it could run faster, and store less. Ultimately this led to the y2k problem - so now everyone is encouraged to store just what you need - not more. Likewise, years ago privacy professionals were advising to put as little as possible online. By not sharing anything, then the baddies couldn't steal it - right? sort of.

With the rise in web identity theft - officials are now advising people to *join* the social networking boards before the baddies do it pretending to be them! (huh?) I've heard how HR departments are now using LinkedIn almost exclusively to check up on potential new hires - but really - who believes the 'myspace' profile when it comes to jobs or banking?

you read - you decide!

Web identity hijacking on the rise - vnunet.com

Thursday, January 15, 2009

patch cycles?

I know a few people who don't trust Microsoft. Everytime they see a patch available from our friends in Redmond, they happily ignore it! "probably just a scam. probably Bill wants to know how much I'm using firefox and google!"

... uh - no.

Setting your computer to automatically accept patches from well established vendors like Microsoft, Adobe, and your Anti-virus vendor is a wise thing to do. EXACTLY for the reason shown in the article below!

Researcher: Worm infects 1.1M Windows PCs in 24 hours

Hmm, let's do the math - m'soft issued a patch in October - so that's about 70 days later someone has put together a nice attack based on it. That's a pretty long time to be sitting still without patching, but apparently there are millions of target boxes available!

Tuesday, January 13, 2009

Credit Card News: Consumer Tips Regarding Identity Theft for 2009

There is a book called the world is flat, and Disney has haunted millions with that song 'it's a small world afterall. But there really are 2 worlds. One that is physical - the other that is cyber.

Identity theft in the cyber world is primarily where I work - this article regards the physical world. It's a good 'cheat sheet' for tips regarding what to do to first prevent identity theft, and then what to do if it happens anyhow.

Credit Card News: Consumer Tips Regarding Identity Theft for 2009

Sunday, December 28, 2008

Russian hackers target U.S., Europe for profit and politics

When I saw this title, I said to myself - isn't that what I've been saying for over a year now??

Russian hackers target U.S., Europe for profit and politics -- chicagotribune.com

To ply online banking accounts, Russian hackers rely on viruses that record keystrokes as customers type log-ins and passwords. Russian-made viruses are believed to be behind several major online heists, including the theft of $1 million from Nordea Bank in Sweden in 2007 and $6 million from banks in the United States and Europe that same year.

it is, but I'll give it up to this writer, he said it better!

Monday, December 15, 2008

secure that laptop!

Recently I met with a couple of companies that assured me they didn't have any security concerns. They had a good IT guy, a firewall on every laptop, and a guard at the door. Certainly they were OK.

... not really!

Both firms I spoke with had a highly mobile workforce where they met with many clients while using their laptop as their primary computer. They'd enter in client NPI into the laptop, and then send it across the web to their corporate based application.

A couple thoughts occured to me - if there was a rootkit like infostealer on these boxes, they'd be easily compromised. Likewise if they were using non-secured hotspots for internet access. BUT the single biggest hole in the papers today is much more low tech - it's just stealing the whole laptop. Once in the hands of the badguys, they can take their time to harvest all the great NPI from files, emails etc

Here's a recent article describing options on how to secure these
New solutions to remotely secure a stolen laptop | IT Security | TechRepublic.com

burn me once, shame on you

burn me twice - shame on me!

Bottom line to the story below is simple - use Firefox as your browser (or any alternative to IE).

Hackers are in this to make a living, and for their new tools to have the biggest impact (IOW infect the most desktops) then they go after the most popular OS and browser. While Firefox is very popular, millions are still using Internet Explorer every day even though it has the most vulnerabilities!

New zero-day IE7 exploit is in the wild | Network Administrator | TechRepublic.com