Sunday, December 28, 2008

Russian hackers target U.S., Europe for profit and politics

When I saw this title, I said to myself - isn't that what I've been saying for over a year now??

Russian hackers target U.S., Europe for profit and politics -- chicagotribune.com

To ply online banking accounts, Russian hackers rely on viruses that record keystrokes as customers type log-ins and passwords. Russian-made viruses are believed to be behind several major online heists, including the theft of $1 million from Nordea Bank in Sweden in 2007 and $6 million from banks in the United States and Europe that same year.

it is, but I'll give it up to this writer, he said it better!

Monday, December 15, 2008

secure that laptop!

Recently I met with a couple of companies that assured me they didn't have any security concerns. They had a good IT guy, a firewall on every laptop, and a guard at the door. Certainly they were OK.

... not really!

Both firms I spoke with had a highly mobile workforce where they met with many clients while using their laptop as their primary computer. They'd enter in client NPI into the laptop, and then send it across the web to their corporate based application.

A couple thoughts occured to me - if there was a rootkit like infostealer on these boxes, they'd be easily compromised. Likewise if they were using non-secured hotspots for internet access. BUT the single biggest hole in the papers today is much more low tech - it's just stealing the whole laptop. Once in the hands of the badguys, they can take their time to harvest all the great NPI from files, emails etc

Here's a recent article describing options on how to secure these
New solutions to remotely secure a stolen laptop | IT Security | TechRepublic.com

burn me once, shame on you

burn me twice - shame on me!

Bottom line to the story below is simple - use Firefox as your browser (or any alternative to IE).

Hackers are in this to make a living, and for their new tools to have the biggest impact (IOW infect the most desktops) then they go after the most popular OS and browser. While Firefox is very popular, millions are still using Internet Explorer every day even though it has the most vulnerabilities!

New zero-day IE7 exploit is in the wild | Network Administrator | TechRepublic.com

Wednesday, December 10, 2008

17 MILLION dollars - heh heh heh


the title should be read in your best Austin Powers impression to make sense.

I was just getting ready to turn off the computer for the night, when I was sucked in by this email ...
From: Stella Oliever
Dear Beloeve one

Based on your profile, l am happy to request for your assistance because I beleive that you are not going to betrayed the trust which I am going to lay on you Dear Beloved i pray all is well with you and Other members of your family.

My name is Stella 20 years old and the only daughter of my late parents Mr.and Mrs Oliever, My father was a highly reputable busnness magnet-(a cocoa merchant) who operated in the capital of Ivory coast during his days. It is sad to say that he passed away mysteriously in France during one of his business trips abroad on 12th.November 2005.Though his sudden death was linked or rather suspected to have been masterminded by an uncle of his who travelled with him at that time, but God knows the truth!

My mother died when I was just 6 years old, and since then my father took me so special. Before the death of my Father on November 12th 2005 he called the secretary who accompanied him to the hospital and told her that he has the sum of (USD$17.5 000 000) Seventeen Milion five hundred thousand dollars left in a metalic trunk trunk box, wich he deposited in a Security Company here in abidjan, that he registered it as family valuable items for security reasons, he told the secretary that I should contact the Company for them to know me as his next of kin wich I have did as he instructed,

He also told the secretary that I should not let any of his relations to know about this because he was kiled by them and if they know about it, that they will do nothing but to kill me in other to take hold of every thing, He told her that I should seek for a foriegn partner abroad who will help me retreived the trunk box and also travel with him or her in other to continue my Live and Education and also to start a Bussines relationship with the person whom can take cear of me in the fucture,

My dear, this is why I have come in contact with you in order to help me retreive that trunk box from the Security Companys custody and send it direct to your country and also to make an arrangement for me on how I will come over to your country in other to continue my Live and Education and also to go into bussines relationship with you hence I am still a child and I dont know any thing about bussines,

I am just 20 years old and a university undergraduate and really don't know what to do. this is because I have suffered a lot of set backs as a result of incessant political crisis here in Ivory coast. The death of my father actually brought sorrow to my life, My dear, I am in a sincere desire of your humble assistance in this regards and your suggestions and ideas will be highly regarded.
Now permit me to ask these few questions:

1. Can I completely trust you?
2.Can you accept me as your own blood Sister (Or Doughter)?
3.What percentage of the total amount in question will be good for you?

Consider this and get back to me as soon as possible with your full assurance that you will not disapoint me in this issue so that i can give you the contact of the Security Company where my late Father deposited that trunk box for you to contact
them on how the trunk box will be retreived from their custody and deliver to your country,

Thank you soo much for your understanding and may almighty God bless you and your Family to the Glory of God Almighty,

My sincere regards,
Miss Stalla.

The best part is her email address is from japan! hahahahaha

Clearly they don't have very good writing courses on the ivory coast, and the plot is a little thin ... but all in all it just cries SCAM! I almost want to reply back to her, I'll treat you just like I do my current sisters (where IS my birthday present??), yes you can trust me fully - and give me ALL the money.

If anyone reading this feels like this is legit - email me. let's talk. I have a bridge to sell you first. ;)

the shell game of websites

This is one of those more advanced issues. If you know all about how individuals' browsers can find a website - just skip to the link

Otherwise - consider your computer is like you when you want to find out a phone number, or an address for a business you've heard of - but don't know the details about. As an individual, you trust the phone book to give you a correct number. As a computer, you trust the dynamic name space (DNS) lookup to give you the right address. For computers, this is the IP (internet protocol) address - looking something like 209.131.36.158 (this is the address for www.yahoo.com - if you go to your command window and type "ping www.yahoo.com" you'll see it along with the response time)

SO now that you know how the computer finds websites ... what would be the harm if a fraudster was to change the IP address? well - you could type in www.yahoo.com and instead of going to the correct address - you could be re-routed to a "yahoo" looking site hosted only by the badguys. ... not good!

for more of the details - read below!


New trojan in mass DNS hijack • The Register

Facebook ignores huge security hole for four months

I've written about the dangers of the social websites for a while now. In general I don't think minors should be allowed on them - there are too many wackos out there and it's too easy to disclose personal information that one could use against you.

Now I found this article describing a current 'hole' in their security. Facebook has known about, but not responded to a hole called Cross Site Scripting (XSS)
The cross-site scripting (XSS) error can be plainly demonstrated here and here. It allows a miscreant to trick a user into believing he is visiting Facebook when the vast majority of the content is being supplied by a website of the attacker's choice.
The danger of it is - a person can believe they are logged into Facebook and the scripts running on that page will be from the hackers website collecting information. hmmm - not good!

here is the original article
Facebook ignores huge security hole for four months • The Register

Thursday, December 4, 2008

Popular Home DSL Routers At Risk Of CSRF Attack - DarkReading

Most of the people I talk to feel like their home environment for computing is 'safe'. The ones that feel MOST secure tell me how they're behind a router, so there is no way for them to be attacked. hmm, maybe they should read the paper below! In it a research has shown how a home router can easily be worked around by using an old technique called cross site request forgery (CSRF)

(Cross-Site Request Forgery) An online forgery that requires knowledge of which Internet-based institutions a person deals with. It is used to steal money or obtain valuable data such as credit card numbers. Also called an "XSRF," "sea surf" and "confused deputy attack," the CSRF is embedded in a fake link or bogus script on a Web page. In either case, the browser executes a malicious transaction such as a wire transfer to the cybercrook's bank.

The CSRF exploit only works if the user is already logged onto the institution's Web site that is being targeted or has recently logged on, in which case a stored cookie used for authentication may still be active.

Today's exploit is described as
A CSRF attack on a DSL router could be launched from a social networking site, Hamiel says, using an image tag on a MySpace page, for example. 'Everyone who viewed my MySpace page with AT&T DSL and the Motorola/Netopia DSL modem would be owned,' he says."

Popular Home DSL Routers At Risk Of CSRF Attack - DarkReading:

Wednesday, November 26, 2008

a rock drops in a pond


Last I heard good credit card numbers were going for about $40 each, and good user name/password combinations were $15 ... add a bunch of those up, and voila! $275,000,000!

The ripple effect of stolen user id/passwords can be astounding. I've seen where one (a $15 dollar purchase by Attackers, Inc) user name password was used to control over 200K.
... the report puts the market value of the traded goods, including financial credentials, at around $275M. This total market value is dwarfed by the potential amount of cash that can be extracted by the underground using these accounts.
see the full report here -->

Symantec puts value of underground transactions at $275M | Zero Day | ZDNet.com

Wednesday, November 19, 2008

Virtual Fitness!

Virtual Fitness - Cyber Fitness ... doing things to make yourself online presence safer. I compare it to physical fitness because there are so many different ways a person can try to be healther - yet I've never met anyone in "perfect health" - there is always a chance of disease, physical attack, or just aging. It's the same with your computer - one can add a firewall, anti-malware, a password vault and many other facets of security - but they'll just improve their chances - not elminate them.


Question - do you live in a good neighborhood? and do you still lock the doors?? Well, not to scare you, but while you're online you are NOT in a good neighborhood, and the drive-bys could change your financial health! A 'drive-by' is just seeing a website on your browser - NOT selecting a thing on it, and still getting infected.
"Identity theft victimized 8.1 million Americans last year and 8.4 million in 2006, according to data compiled by Javelin Strategy & Research, a financial services research firm in Pleasanton, California. Unauthorized transactions cost consumers as much as $45 billion in 2007, Javelin reported."

Bloomberg.com: Invest:

what should I do? from the article above they cited an excellent resource - CERT.
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited Information Technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity.

if you've read their recommendations and have questions - email me - Dave@myinternetsecurityguy.com

Tuesday, November 18, 2008

spying for dummies

I wish I could make up stuff like this - it's actually so strange, it MUST be true!

A well known commercial vendor of software, basically was selling a 'how to' kit to collect information from anyone that would open up your email!

RemoteSpy SoftwareJust like every decent marketer out there, vendors of commercial malware tools are very good at positioning their tools. However, their pitches often contradict with themselves in a way that what’s promoted as a Remote Administration Tool, has in fact built-in antivirus software evading capabilities, rootkit functionality and tutorials on how to remotely infect users over email.



check out the full scoop here
Commercial vendor of spyware under legal fire | Zero Day | ZDNet.com

Monday, November 3, 2008

like the brooms in Fantasia



Sometimes in this line of work, I feel like Mickey Mouse in fantasia. Just when he thought he had the broom under control, (by smashing it) there was another one, and another, and another!

Like other Trojans, Sinowal uses an HTML injection feature that effectively injects new Web pages or information fields into the affected victim's Internet browser -- and these injections seem like legitimate pages to the victim.

Trojan Caught Stealing Data From Hundreds of Thousands - Trojan horse/Vulnerabilities - DarkReading

what to do?
If you're the owner of the webpages -
  1. Regularly schedule penetration tests.
  2. Validate all new code being published is tested and secure.
  3. Establish credential management programs

If you're the consumer, use something like McAffee SiteAdvisor to validate a webpage is ok before you go to it.

...but I already have a firewall

I talk to a lot of people about identity theft and fraud these days. Most individuals and companies don't really know, but somehow think they are protected.

"I'm pretty sure we have a good firewall - our IT guy is great!"

He/she might be great - but then why do I keep reading statistics about the millions of compromised computers? hmm - something to think about!

This morning I'm getting ready to go see a new prospect. On the phone she said that they had a good firewall so they should be ok. But then I asked her if she and her fellow employees had the ability to
  • to install their own software?
  • view attachments in email?
  • use their personal phones to text clients?
  • what are they doing with wi-fi?
These are all areas where even with a solid firewall you still may be exposed. The only way to determine if a business is 'secure enough' is to analyze all the potential threats for that specific company, and create a threat matrix.

In building a threat matrix I have to look at all the inbound and outbound data sources. This includes cell phones, networks, all the devices an employee uses, usage patterns, the employees themselves as well as normal internet usage. (eg. the things an up to date firewall could potentially stop)

Oh, here's one more thing to think about as a consumer of online services - the bad guys are now using text messaging to persuade people to call them and give up their NPI!
... text message phishing, occurs when customers receive a text message from what seems to be a reputable financial institution prompting them to call a telephone number due to a possible fraudulent transaction on their account.

SourceWire | Press Releases - Mobile phone identity theft on the increase

Sunday, October 26, 2008

sometimes it's a good thing to capture keystrokes!


A while back I compared teaching kids about the internet to teaching them gun safety. I believe the parallel works. In the case of guns - the safest thing to do is to not have one in the house. But if you do have one, do you keep it in a safe? with a trigger lock? do the kids know it's there? are your teenagers trained in the legal and safety aspects of using it safely?

The same can be said about the internet - if you are REALLY concerned about keeping your kids safe from cyber predators, don't have a computer online at home. If you must have one - develop your plan of how you'll train them. It's not about using a mouse, it's what you do with it.

There are many ways to make your home computer safer - here are a few tips and a recent testimonial on why it's important
Internet safety tips
•Don’t put a computer in the child’s room. It’s better to have it in a room where parents can monitor activity.

•Check out parental controls. Some are free.

•Get your kids to educate you about the Internet.

•Communicate with them and assure them they won’t lose Internet privileges for reporting inappropriate messages and images.


www.kansascity.com | 10/25/2008 | Program discusses Web safety for children

Friday, October 17, 2008

Silent Banker Trojan Keylogger Threatens All Online Transactions Just For Starters

My favorite nemesis is now being distributed as a root kit.

not good ...

the Silent Banker Trojan login page will steal your keystrokes with a keylogger & then send your passwords & login information to a server that is operated by cyber hackers or even cyber terrorists who need funding...

That's old news.

The latest problem with the Silent Banker Trojan is this...

It now apparently has added a rootkit that will let the Silent Banker Trojan load before your virus detections software rendering it useless.

Silent Banker Trojan Keylogger Threatens All Online Transactions Just For Starters

though the bigger bummer here is before I'd want to try out the software recommended by the author, I'd like to know more about who HE is before installing it! and also I'd want to try it out on a computer other than my primary one.

cyberwar is war

There are many reasons why an individual considers strengthening the security on their on computer.
1. Fear of identity theft
2. Protect their kids from predators
3. Protect their computer so it will still work ok
...
But I have not heard a single person outside of the tech industry ever say anything like
"eliminate one attack option for a hostile nation"


Take a look at the following link - When Russia and Georgia fought a small physical war last month - there was also a cyber component. The citizens of Georgia - military and civilian - could not get to the internet because of an attack called DoS. (Denial of Service)
"Russia is one of the most capable countries when it comes to launching system intrusion hacking attempts, distributed denial-of-service attacks, and operation of botnets," said Don Jackson, director of Threat Intelligence for SecureWorks. "Yet you'll notice the number of attacks coming from Russia are very low."
...
On the SecureWorks list, the United States has more than 20 million botnet compromised PCs. The next highest is China at roughly one-third that number, or 7 million. At first glance that may seem due to the size of each country and the number of computer users. Jackson said that isn't necessarily the case

A Denial of Service attack is a network of computers simultaneously making requests against a given server at a rate so high that the attacked server cannot respond. It's like trying to make a call out of a radio station during a promotion where they invite everyone to call in. DoS are most effectively run by Botnets. Botnets (robotic networks) are sleeper programs on regular citizens PCs. Like yours, or mine. When a botmaster wakes them up, he has an army to attack with. Last year a man arrested in LA who had a bot army of 250,000.

SOOOO - what do I do?

Well, Joe the Plumber, you can do a few things
1. throw out your computer, cellphone and any other computing device OR
2. get educated and stay educated! What is working for you today on your computer may not be enough tomorrow.

and of course - get a good firewall and AV/Anti-malware suite! :)



Thursday, October 16, 2008

there is nothing funny about bullies


remember the old days when a bully was a tough that wanted to take your lunch money?
you either went hungry, got in a fight, or RAN!

As a parent, it's tough enough to help your child deal with the local toughs, but with the cyberage upon us, it's even tougher. Take a look at these tips from our friends in the government, I'm sure I'll post more on it later

US-CERT Cyber Security Tip ST06-005 -- Dealing with Cyberbullies

BTW - where they say something like be careful what you post ... I'm almost CERTAIN this was written before all the social sites like MySpace, Facebook, LinkedIn etc became popular. You can look here for recent thoughts on them.

it's a small small world ...

drats! now I'll have that Disney song in my head all morning! ;)



Yesterday I attended the Electronic Crimes Task force quarterly meeting hosted by the Secret Service. Undersecretary of Cybersecurity from the department of Homeland Defense Gregory Garcia was the first speaker. His presentation was very good, it was clear that there still is a lot of work to do, but it was also clear that they had accomplished a lot during his watch.

One of the items he reminded us about was it is the 5th annual CyberSecurityAwareness month! Follow the link for a list of things you should think about for securing your home computer.

On a similar thread ... I read a story this morning discussing one of my favorite topics -(see the new economy)
The FBI was recently revealed to be operating an online forum called DarkMarket, as part of a sting operation against criminals buying and selling stolen identities and credit card information online.
see the whole story from cnet here

Cyber threats on the rise, FBI official says

Cyber threats on the rise, FBI official says

Thursday, October 9, 2008

ET phone home ...


It's been a great afternoon!

To help us celebrate Sarah's and Seth's birthdays, our good friends Suzanne, Seth and Luke took us out on their horses for an afternoon of riding. My guys haven't ridden very much, but everyone did very well - no new bumps or bruises! It was my first time on horseback since 91 when I went on a ride in the Blue Mountains just outside of Sydney. After a few nerves in the beginning (for both the horse and I!) it was a lot of fun.

Seth was just practicing his violin - playing Gavotte, Happy Farmer and Red River Valley on the violin - one of the family dogs Badger was doing his very very best to sing along ... it was very funny! :)

Now, I'm smelling brownies cooking ... mm mmmm very nice!

Much nicer than this ...

There's a new type of identity theft I just learned about - ATM skimming. Yes, this refers to stealing your card data and pin. Apparently the crooks can scan your card when you slide it in, then video you tapping in your pin - send all that data via a cellphone to a nifty card manufacturing warehouse and bada boom bada bing! they can rip you off!
For about $8,000, skimmers can have their own ATM overlay capable of transmitting 1,856 cards via SMS. Bulk pricing is available. And if they don't want the information sent card by card, they can dial into the device and download the data at their convenience.

robbers phone it in Defense in Depth - computer security, hacking, crime, viruses - CNET News

What can I do about this?? not a whole lot, just be aware of the ATMs you use, and look for things out of the ordinary.

Friday, October 3, 2008

bait and switch

so you want to find out a little more about the moderator on the VP debate - what else do people do these days but pull up google and badaboom badabing - you have a list of articles to read!

STOP! before you click on that top link - read this from ZD net!
Search keywords blackhat SEO malwareA random keyword “on fire” like gwen ifill wheelchair indicates that 55 minutes ago a malware serving blog has been successfully crawled and is now appearing within the first 10 results thanks to the high page rank of Windows Live Spaces. Upon clicking the link, the user is exposed to the typical ActiveX Object Error message that is attempting to trick them into installing TrojanDownloader:Win32/Zlob.AMV with 10 out of 36 AV scanners currently detecting it (27.78%).
full article here
Cybercriminals syndicating Google Trends keywords to serve malware | Zero Day | ZDNet.com

what does this mean?
well - the fraudsters have their program they want to install on your computer - in this case it's the Zlob.amv which would happily send out your personal information across the internet back to the fraudster. Now that they have it in hand, all they need to do is get YOU to download it to your computer. They do it by tricking you into thinking you'll be on a legitimate website researching ... whatever hot topic you are doing that day.

update - here's another example - this one from a fake YouTube site
A program circulating online helps hackers build those fake pages. Users who follow an e-mail pointing them to one of the pages would see an error message that claims the video they want won't play without installing new software first. That error message includes a link the hacker has provided to a malicious program, which delivers a virus.

what can I do?
1. verify your Anti-Virus package evaluates all search results links. Only visit those that are verified as good.
2. verify your AV suite is a good one for detecting and killing malware!

Thursday, October 2, 2008

the new new economy


Below is a great write up of a new black market I've been describing to people over the past 18 months. The idea of hackers targeting you as an individual seems very slight - targeting your bank (assuming the bank is still there of course!) seems like a much better target.

But - that's where common sense fails.

All people who use the internet for commerce, banking or just chit chatting are exposed.

Why should I as a hacker attack a bank that has a couple of major firewalls and a variety of anti-fraud devices, when I can create, buy or rent a program that'll provide me with the keys to the kingdom?? (your username and password)

It's just like a burglar trying to convince a bank teller just to give him money - then failing that he walks down a suburb street just testing every front door. If it's locked, no problem, there are many more homes. If it is not - then he'll go inside and find the person's bank book and id so he can NOW easily make a withdrawal.

For this type of hacker, any or all of your personal information is valuable for social engineering as well as any user id's and passwords.

vnunet.com analysis: The malware 'shadow economy' - vnunet.com

the key here is don't freeze from fear - but take the right steps and protect yourself!

Monday, September 22, 2008

who's watching who?


My son just received a a book yesterday called 'eats, shoots and leaves' - on one page it shows a cartoon of a Panda bear ... eating with the title of the book as a caption. On the next page is the same caption with a picture of a criminal at a diner. hmmm...



With that in mind, I just read an article describing how hackers can now use zero day exploits to put a trojan on your system that'll then open up brand new doors!

Once activated the Trojan installed a program that allowed such control of a computer that it could stream back live pictures via the computer's web cam (which it could switch on) or allow the hacker to record the sound from its microphone.

The picture could be of cloistered deviants watching you late at night working on your bank accounts with the caption "remote capture!"

or

The picture could be of your boss watching you during your telecommute work hours managing your fantasy football team with the caption "remote capture!"

ha!




so I'm sure whether to list this article under new threat - or new corporate management tool! it's funny when those two world collide
Hacker tool can watch you through webcam | News | TechRadar UK

UPDATE: 10-8-08 - Adobe has issued a press release, but other than that, it appears clickjacking will be around for a while!

Friday, September 19, 2008

Experts: US Is Not Prepared to Handle Cyber Attacks - Desktop Security News Analysis - Dark Reading

hmm, I'd like to say the article below is shocking - and a HUGE surprise, but for anyone that's in the industry it's really not.

I saw Michael Chertoff last year at the RSA conference and he was attempting to rally support for the Homeland Defense cyber efforts. I don't know him well, and he seems bright enough - but his capability to convince the largely private sector crowd to help out didn't go over very well. The recap of cybergames II was stunning in the lack of real warfare they didn't get too.

read it and weep
Experts: US Is Not Prepared to Handle Cyber Attacks - Desktop Security News Analysis - Dark Reading

ease of use vs. security

in cars, it's Horsepower (your Bugatti goes REAL fast) vs. Miles per gallon (the Prius just keeps on going)

in credential management - it's Security (NASA is asking you for advice) vs. Convenience of use (all my passwords are the same so I won't forget it)


Last year I was working on a system where we were implementing a 'shared secret' system - just like Yahoo and others, we wanted to allow a person that forgot their password an easy way to recover it. To do this we created a stack of questions so people can choose a few best suited to them. Somewhere in the middle of this design I had one of those "Homer Simpson" moments - DOH! The easier I make it for the embarassed user to recover his own password, the easier I make it for the hacker to take it over - DOH!!!

apparently I wasn't the only one ...
Yahoo, Hotmail, Gmail all vulnerable to Palin-style password-reset hack

Tuesday, September 9, 2008

How do hackers make money?


well - let's explore this

A hacker, let's call him Fred, once he has possession of identity can do many things

1. if Fred has your user id and password to your banking website, he could change the mailing address they have on record for you to a PO Box of his choice, and start receiving checks.
--> the downside to this one is, there will be some sort of paper trail on the PO Box, so he could get caught

2. if he doesn't have your computer IDs, but does have your statements - Fred can then try his best to use social engineering to convince some well meaning teller to 'help' him reset the password.
--> the downside to this one is, he'd have to either make a call (traceable) or see someone in person (on film) and therefore could get caught

3. or he could just use the assets in your account to BUY his favorite penny stock, and not have to bother transferring anything out. In this case, it's much harder to find him as

From Riches to Prison: Hackers Rig Stock Prices | Threat Level from Wired.com

Monday, September 1, 2008

better than a secret decoder ring ...


A few months back I tried the 'getyourFreeCreditReport' website and found out that it wasn't free, and it charged me every month!

This article sounds like someone came up with something much better - something that works

In a nutshell, the Debix puts a lock on your credit. Then it conditionally unlocks your credit if you answer your cell phone, and give it the right password when it automatically calls you. now THAT'S almost as cool as having your own robot watching your accounts! ... almost

Here's how Robert Vamosi describes it
So how does Debix work in the real world? Say you are at a car dealership and you need to finance a new car. Shortly after the salesperson leaves the showroom floor, your mobile phone should ring. That's Debix; you know it because it's your voice saying a secret code. Then Debix asks if you indeed are seeking to establish a new account. If yes, you type in a secret personal identification number.
pretty cool, eh? :)

Thursday, August 28, 2008

fun prank - NOT!

well, after doing this type of stuff for as long as I have, I was starting to feel a little jaded. Ya got your nigerian emails, the kid collecting business cards, Bill Gates paying ya a buck for every email you can send ... I can sniff out a hoax email from a mile away!

BUT, this one is new to me. I hadn't heard of a spammed 'hit man' email before - and depending on the level of 'stuff' going on in a given day, I might have believed it for a bit!

Internet Crime Complaint Center (IC3) | Alert: Hit man e-mail returns

Tuesday, August 26, 2008

Research Blog - Research - SecureWorks

I haven't posted much in a while - my apologies - work, life and having a summer vacation with my kids got in the way!

this post is pretty cool - it reminds me of something mom would say "don't talk to strangers!" even if all you want to say is something along the lines of 'see ya loser!' it may be like yanking on the proverbial tigers tail!

Research Blog - Research - SecureWorks

Tuesday, July 15, 2008

Man-in-the-Middle Attacks

for those fuzzy on the concept of Man in the Middle, here is a great essay from Bruce Schneier on it

Schneier on Security: Man-in-the-Middle Attacks

Friday, July 11, 2008

Bush signs wiretap law, gets sued

I saw a panel debate this one at the RSA conference. if I'm remembering it right - the government wanted the right to listen in on any foreign inbound or outbound calls. Actually I think they'd prefer getting all calls into their database for analysis but they knew better than ask for that one!

Bush signs wiretap law, gets sued

Thursday, July 3, 2008

Gmail, Yahoo and Hotmail’s CAPTCHA broken by spammers | Zero Day | ZDNet.com

this one is interesting. I keep explaining to people about the black market of stolen user id's being on the black market - but this is a new twist. Here's 1,000 email accounts for sale so you can use them for sending out important messages about inheriting millions in Nigeria! ;)

Gmail, Yahoo and Hotmail’s CAPTCHA broken by spammers Zero Day ZDNet.com

Tuesday, June 17, 2008

Firefox 3 - it's a better browser!

hey there,

finally some good news - there is a new release of Firefox to use for your internet browsing. Firefox has many more security features than Internet Explorer AND it's faster! did I mention it's also free?

it's allll good tonight -

Firefox 3 goes live, improves security

Monday, May 26, 2008

if it sounds too good, it probably is!

Several months ago as I was just getting immersed in this field of home security I found what sounded like a great personal insurance policy for identity protection - Lifelock. But after researching what it provided, and what I could get for free from folks like Experian - I decided to pass.

Today - I see this being written about the company in Computerworld
"Contrary to the all-encompassing impression created through LifeLock's
advertisements, the protection it claims to provide only extends to limited
instances of identity theft," claims the complaint filed against the company in
New Jersey's Middlesex County Superior Court. The complaint also asserts that
LifeLock actually has failed to protect Davis' identity, saying that his
personal information has been misappropriated in at least 20 separate identity
theft incidents.


Wednesday, May 21, 2008

No security software, no E-banking fraud claims for you | Zero Day | ZDNet.com

so banking online is safe - right?

sortof

and if ANYTHING is put on my credit card that I didn't order - I don't have to pay for it, right?

maybe.

take a few minutes and read this article -

No security software, no E-banking fraud claims for you Zero Day ZDNet.com

nuggets for the home user to take
* don't bank from public pc's
* practice safe surfing at home!
* be aware of the changing landscape regarding credit cards and eBanking

Tuesday, May 20, 2008

snopes.com: 'Postcard from a Family Member' virus

drats! I really shouldn't post this one ... my family reads this website. (or so they tell me)

I'M the guy who's always multi-tasking 100,000 things at any given moment - and even though I buy cards in advance ... getting them into those pesky big blue boxes on the street corner is challenging! SO, I tend to send e-cards. I look around online, and find something either good, or funny - in rare occasions I can find both in the same card, but not always.

and now I read this

snopes.com: 'Postcard from a Family Member' virus

geez - next thing they'll tell ya is kissing under the mistletoe is a bad idea!

Wednesday, May 14, 2008

Microsoft patches database, Office flaws

ah - finally, an issue with a simple fix. Turn on 'auto update' for microsoft - and then fuhgeddaboutit! :)

Microsoft patches database, Office flaws

Monday, April 28, 2008

Security Resources for the Family

I just found what looks to be a pretty good, and current list of resources for families from Microsoft (yes I realize the irony of looking to them for security advice, but of all the large vendors they HAVE had the most experience!)

I just read through a few of these links and they seemed to strike a good level between sharing the good techie info but not being too techie where it didn't make sense anymore.


Prevention guidelines

AAP and Microsoft partner on online safety for children
The AAP sees 96 million school-age children a year. That's why Microsoft asked them about keeping children safe online.

Using family contracts
See a sample of a contract you can copy and customize to clarify your family's "house rules."

10 things to teach kids
Want to talk to your kids about the Internet, but not sure where to start? Here's a list of subjects to consider.

School is in: 7 computer security tips for students
Help protect the computers you use for school from viruses, hackers, spyware, and other attacks.

4 steps to improve your family's Web security
Get tips for how to protect your children’s privacy and safety when they use the computer.

Online predators: Minimize the risk
Know the risks of online communication and become involved in your kids’ Internet activities.

Kids and the Internet FAQ
Strategies and tools to help deal with parents’ top concerns.

Video: Teach your kids to be safe online
Watch this video to find out more about what
you can do to help keep your kids safer as they explore the Internet.

Thursday, April 24, 2008

Hackers jack thousands of sites, including UN domains

wow - the fun never steops - here's a fun article from computerworld
When a visitor reaches one of the hacked sites, the malicious JavaScript loads a
file from the malware-hosting server, then redirects the browser to a different
page, also hosted on the Chinese server.
"Once loaded, the file attempts
eight different exploits," noted the Websense warning, including one that hits a
vulnerability in Internet Explorer's handling of Vector Markup Language (VML) that
was patched in January 2007.


Hackers jack thousands of sites, including UN domains

Wednesday, April 23, 2008

don't catch this popup!


Tonight I was helping my son make a birthday card for his teacher. He wanted to say 'Have an all-star birthday!" and then include some pictures of an all-star. While we were searching for a couple good shots of our favorite - JT Snow - we were suprised by a popup window that said

"Your computer is infected! Windows has detected spyware infection. Click here to protect your computer."

naturally being the uber-geek dad, I pointed out to him it was an attempt to get us to do the wrong thing. I think he was still more interested in the JT Snow pics, but it felt good trying to teach safe surfing anyhow. ;)

Then, just before calling it a night - I saw this on my blog reader -

Don't 'Click here to protect your computer'

Infectious 'trojans' sell rogue software, send unwanted email, steal data

Its designers trick people into saving it by telling them they need a new piece of software to watch video online.

Once installed, it bombards people with pop-up messages and bogus flashing warnings that their computer is infected.

The messages say: "Your computer is infected! Windows has detected spyware infection. Click here to protect your computer."

The trojan then sends adverts offering to sell rogue anti-spyware on sites that could expose customers to credit card fraud. Microsoft said the problem is global and linked to organized criminal gangs.

hmm - reminds me of infostealer - that piece of malware that'd auto-magically call your bank for you and relieve you of that troublesome cash sitting in your account.

what's the moral of the story? - JT Snow was a great player for the Giants - but just because he caught every popup that came near him, we will be better off if we skip this kind of popup.

ha!

Tuesday, April 8, 2008

Greetings from RSA Security Conference!

I'm at the RSA security conference this week. That's me and 16,999 security geeks running amok in downtown SF trying to acquire that final piece in the puzzle for it all to make sense!

could it be from the Secretary of Homeland Defense - Michael Chertoff? no. but it is comforting to know the government is looking to recruit from the private sector.

how about from the president of RSA, Art Coviello? noooot exactly

Actually, the best comment of the day came from Whitfield Diffie when asked if he was 20, where would he put his research energy. This guy is one of the giants of the cryptography field - the Diffie-Helms algorithm was THE standard several years ago that we used when it was something you seriously had to keep private. He said - I'd go into genetics. Bio-engineering of genes is where it's going to be at. THEN it got a little wierd ... but it probably won't translate well, so let's just say you had to be there. ;)

Wednesday, April 2, 2008

Vermont ski area reports Hannaford-like theft of payment card data

these reports just don't seem to stop -

Vermont ski area reports Hannaford-like theft of payment card data

'what can I do about it?' well, if you're the business owner I've got a lot of answers for you - email me! :)

But as the consumer wanting to continue using credit cards, you will continue to be at risk.

One of the ideas I've floated out there with a few tech friends is we need credit cards with an authorization code that'll expire every 60 seconds or so. Some banks offer this functionality to their customers to be used in addition to a password. It would work just the same with a credit card - you give the card to the restaurant, ski resort etc; AND you give them a 'one time password' - an authorization number that'll expire in 60 seconds.

Even this wouldn't stop the real time theft that's described in the story, but it'd severely curtail the time a fraudster could use the card!

Thursday, March 27, 2008

Teaching our kids to fish

Ok, using this analogy on a blog where I’m commonly writing about “phishing” (where a stranger tricks people into giving up their private information) probably isn’t my brightest idea!

But … I’ll continue with the analogy anyhow.

We can give our kids fish for dinner tonight, or we can teach them to fish for a lifetime. OR – we can protect them online today while we’re with them, or we can teach them the skills they need to make good decisions while we’re not there!

I found a great resource a while back, and I’d like to share it. Netsmartz.gov seems to be the most up to date, kid friendly (and parent friendly) site that I’ve seen addressing the area of internet safety. Here’s an example of what is available


NSTeens - Terrible tEXt

Some teens say and do terrible things to each other online
because they don’t see the direct effects of their actions. So what should you
do if you’re cyberbullied? Watch the NSTeens
in their latest video, “Terrible tEXT,” about a
young girl who is troubled when a cyberbully sends mean text messages to her
cell phone at all hours of the day and night.
Visit NSTeens.org.

Wednesday, March 26, 2008

Full Service ScamWare!

this story is a good eye opener (well if it hasn't happened to you yet!
Spyware 'scammer' sued over PC pop-up invasion Channel Register

the company caused some people surfing the net to receive a torrent of pop-ups that advertised porn links and other sketchy sites ...With end users' nerves rattled by the mysterious pop-ups, the company would then send out a new batch of notifications that were designed to look like official Windows alerts. They warned that the computer was vulnerable to malware attacks and directed the end user to reduce the threat by installing one of the software titles.


As with anything else, know who it is you're buying from, and do a little research first. I use consumer search as a consolidated review page - it's a pretty easy read, and a great place to start. Looking at it today for spyware - I see Webroot, and Panda as their top two recommendations. that sounds about right!

Friday, March 21, 2008

Search engine for kids??

Here’s a question that was recently passed on to me –

Can anyone advise me on a good, safe internet search engine for kids?

Sure! Here’s a resource written by an expert in the field. I’ve used Danny Sullivan’s work many times when trying to figure out how to get Search Engines to find the website I’m working on! I figure if he knows how to make one find something, he’ll also know the ones that won’t find the things you don’t want.

Of the group, I like the sound of this one

Looksmart's Kids Directory
http://search.netnanny.com/?pi=nnh3&ch=kids

The Kids Directory is a listing of over 20,000 kid friendly websites that were hand picked by employees of Looksmart subsidiary Net Nanny and vetted for quality. Looksmart also offers a safe search of the entire web, using Net Nanny software to filter Wisenut search results, as well as a free toolbar that uses the same service.

Also, I’d recommend using the NetNanny software as a content filter. That way your computer will constantly verify the content about to be viewed meets up with the standards you established BEFORE jr. started browsing!

There are more extreme measure of computer monitoring, but for pre-teens, this should be sufficient.

Wednesday, March 19, 2008

Major flaw in State of Pennsylvania online voter registration

quickie!

I LOVE how the most conservative response to protecting against identity theft is to refer someone to a government site like this one from the FTC (which actually looks good!)

Of course *they* must know what to do right? Well, not if you're in Pennsylvania apparently

Major flaw in State of Pennsylvania online voter registration puts user data at risk

Tuesday, March 18, 2008

Front door policy: What about the Wii and Lego Star Wars?

I ran into someone who attended one of my lectures the other day, she told me the single thing that stood out to her the most was when I pointed out that most bad guys don’t pick your computer to attack, they’re invited in.

‘what do you mean?’

Well when you visit a website, and see a pop up window that says ‘ most computers are not properly protected, click here for a free virus scan’ they might be legit, then again, they might not be. By clicking ‘ok’ you’re giving the owner of that application permission to do something to your computer. It’s like a stranger knocking on your door and you letting them in, and then not watching them. Once the stranger has access to your home or computer, it’s up to them what they’ll touch – not you.

No one knows for sure where computer viruses, Trojans, or malware comes from. These days I’m reading more about it coming from the manufacturer pre-installed! But one thing is for sure, the more time spent on websites that you wouldn’t want your mom to see, the higher your chances are in getting infected.

My kids are getting to the age of independence and wanting to explore more online than just the websites I’ve found for them. They are good kids, so I really have no reason to be too concerned. But the other day when we were driving home from baseball practice my son tells me – ‘hey dad, guess what Bobby showed me today – he helped me find cheat codes for Lego Star Wars on the Wii!’

Ya gotta love the friends that have older siblings and just know more about the world.

I just ran a couple of searches on ‘wii cheats’ and found a TON of pages. I wasn’t really looking for the codes my found – I was looking for who ever else was using those pages as bait for kids! Using Google and McAfee Site Advisor I found most of the pages weren’t known hazards, but a few had been tagged as having excessive popups. (yellow) All in all, no biggie, but it was a nice ‘heads up!’ to me from him that there will be times when he innocently searches for something that may not be entirely safe!

Canceling CIC Triple Advantage: Get Your Money Back and Get Justice!

quickie - something to think about ...

a few months ago I went looking for equifax et al, to get a free credit report. Apparently their website with the word 'free' in it is not, and their website without it - is!

here's a good link if you've found yourself in the same bind
Canceling CIC Triple Advantage: Get Your Money Back and Get Justice!

Card data stolen from grocery chain

I haven't said much about identity theft lately, but it's still going on. Here's a story about a grocery store chain back east Hannaford that lost the NPI (non-public information) of 4.2 million of their clients.
"We sincerely regret this intrusion into our systems, which we believe, are among the strongest in the industry," Ronald C. Hodge, president and CEO of Hannaford, said in a statement. "The stolen data was limited to credit and debit card numbers and expiration dates, and was illegally accessed from our computer systems during transmission of card authorization."

Card data stolen from grocery chain

I find the presidents declaration that their data security is among "the strongest in the industry" interesting. He may be right. But considering what just happened, it's more a warning to the public that they have to watch over themselves than a comfort that Hannaford is a safe place.

Wednesday, March 12, 2008

Homeland Security bulletin

It's not often I get to cite something from the department of Homeland Security - but here's something related to what our government is doing relative to the threats from china etc.

Cyber Storm II National Cyber Exercise

I think it's a great idea - though if they really wanted to test their chops, I wouldn't go through existing corporate structures. There are much better and much scarier real world scenarios to try out!

1. the honeypot.org - this group is consistently floating 'user' credentials and priviate information out there for real bad guys to come get them. They work like 'Jim' in the Mutual of Omaha's Wild Kingdom. They tag data, so it can be tracked later.
2. the blackhat conventions -- this organization of white and blackhat hackers probably have the best resources to create a 'bad guy' squad.

Then again, when you've got pandoras box in your hand ... does it make sense for anyone to open it?

Thursday, March 6, 2008

U.S. military flags China cyber threat

quickie ...

U.S. military flags China cyber threat
The U.S. Department of Defense warned in an annual report released this
week that China continues to develop its abilities to wage war in cyberspace as
part of a doctrine of "non-contact" warfare.

Portable Data

Maybe you’ve seen the article – Stolen VA laptop caught in safety net. The Veterans Administration (VA) made several policy improvements after the news story of 5/22/06


The Veterans Affairs Department today revealed that personal, identifying data
for as many as 26 million American veterans was stolen from a VA employee's home
in May. The information is a list of all veterans who served in the military and
were discharged since 1975.
I’m really glad organizations are starting to understand that the reason portable devices were created were to allow for people to have access to their electronic date from more places than just their desktop! Of course once they’re out of the office they are more at risk, but that’s the nature of the beast of being portable.

So – what data do you carry around town? Names, phone numbers, birthdates on your phone? Email on a PDA? A personal laptop with Quicken?

Window’s Vista’s BitLocker or Apple’s FileVault are both steps in the right direction. With most security topics it’s like the old joke

Q. you and a friend are in the woods when a Grizzly Bear decides you look
like breakfast and starts to chase you! how fast do you need to
run?
A. Faster than your friend!

If you have implemented anything to prevent identity theft, you’ll be ahead of most people. Depending on the sophistication of your thief – it should be enough, but these products are not perfect.

A write up from the SANS institute on ‘cold boot’ In memory of hard disk encryption?
With the appropriate replies from the vendors 'Cold boot' - vendor reactions
PGP: press release
Utimaco: original link broken now, new press release
Mobile Armor: note and press release
Winmagic: support note
GuardianEdge: news article
Bitlocker: blog (protection) and technical explanation
Pointsec: advisory
Bitarmor: article and press release
Jetico: FAQ entry related to a new release to mitigate "coldboot" effects



ps. for those of you keeping score, yes - this area would be a new one that we haven't talked about before adding a new dimension to your personal threat profile. :)

Saturday, March 1, 2008

Beyond the 'normal' protection

I swear – the next blog I create and run will be a LOT happier topic than this one!

Here’s a sobering website from the family of Kristin Helms that sounds like they did all the normal right things related to internet safety to protect their daughter, and the story did not have a happy ending.

I found this site after reading the comments on the fairly positive sounding headline from computer world Child Internet Safety Task Force then I read the comments below the article.

My position on this tough issue is we need more from both sides. Parents absolutely are the first, second and third lines of defense, but Corporate America needs to be held accountable. Unfortunately there is a large gap of misunderstanding between lawyers and the law – and technologists and software. So it may be a very long time before a solution similar to checking a drivers license before letting a kid in a bar exists.

The words of Ronald Reagan are coming back to me now – “Trust, but verify”.

Train, educate, take all the right steps. Then take the steps you need to avoid the Helms family tragedy. You can log the key strokes of your computer – you can harden your computer such that the kids can’t work around your limitations – you can establish timers and use content filters … it’s just a matter of knowing you should be looking for them!

Tuesday, February 26, 2008

Fear of Internet Predators ... unfounded?

Sometimes smart people say that darnedest things …

This morning I got up to write about kids and what we can do to protect them in this wacky internet enabled world, and for a few minutes – I had one of those rare bursts of good news!

I read lots of different blogs, and news streams – everything from MS/NBC to Computerworld, to Schneier on Security. I generally like Schneier on Security and am reading a couple of his books now.

But today I’m not a fan. His headline Fear of Internet Predators Largely Unfounded sounded great!! But then after reading it, it didn’t smell quite right to me. I checked on the sources and found a link to this article from the Crimes Against Children Research Center at UNH and finally a press release from UNH -

Here’s an excerpt

For example, in spite of public concern, the authors found that adolescents' use of popular social networking sites such as MySpace and Facebook do not appear to increase their risk of being victimized by online predators. Rather, it is risky online interactions such as talking online about sex to unknown people that increases vulnerability, according to the researchers.

From my (admittedly limited) time on those two social sites, they seem to be established largely for the type of personal connectivity between both people you know and people you don’t know that would enable the risky behavior that increases vulnerability. While it's true they could meet a predator in class, or related to a sports team - it's a lot riskier online because of the lack of visual and other types of validation.

"what do you mean by this?"

When you or I see someone on the street, or buy something in a store - our eyes and ears can tell us things like "the store is clean, it's been here for years, many people shop here. The owner is here every day, and the merchandise feels like it has a quality to it". Online - we are missing all the tactile senses, and have to develop a sense of validation through other means. eg. other people rate the site highly, they are certified to be who they say they are ...

With meeting people it's the same. I'm coaching kids sports - when they show up for the first practice, I've got a good idea they are who they say they are. If I were to meet the same group online for an online class I'm teaching - then I really wouldn't know.

This 'not knowing' is why I caution the use of the social sites. While many people use them for their daily news, gossip and jokes - as soon as your pool of friends is extended beyond people you've personally 'validated' (seen them etc) it's contaminated. The internet is a great tool - but it is like a sword and needs to be respected.

Back to my thoughts on the article - just like any statistical article, it's great to get some numbers - but the conclusions are suspect. From my perspective, it's great that there aren't as many predators or negitive experiences as perceived - but it's still a risky environment that one should be carefully prepared for.

Monday, February 25, 2008

Hackers ramp up Facebook, MySpace attacks

quickie!

don't follow that inivite to facebook or MySpace if you don't REALLY know who sent it to you!!

Hackers ramp up Facebook, MySpace attacks

update from 2-27: Here's a free tool - Killbit - that you can run on your desktop to stop the current stream of desktop issues

Saturday, February 23, 2008

who's fave five are you in?

I don't know why, but that catch phrase from T-mobile ...

I was talking to some corporate consultants the other day about risks in the enterprise, I could tell they were pretty blase' about security. They had a firewall. They had an anti-virus tool - I'm sure I sounded like one of Charlie Brown's teachers. wonk wa wonk wah wahh.

So I asked them, do you use a cell phone or pda for business? "of course" - is the data on it protected? "uh..." Do you know that even secure internet traffic isn't secure over wireless?

Then the typical tragedy of this space occured - I brought someone from the happy world of not really knowing about the threats going on, into the panicked world of "aaah! I'm never using the internet again!" I've really got to work out a better way to get action then inducing extreme fear. :)

it's not all bad - just remember all mobile devices could be lost - so any data on them (if you value it!) should be encrypted. Also, unless you've got more saftety on your portable than I know about, don't use free, unsecured access. When you do, you've brought your entire laptop or phone to that network. As the gentleman in the article above demonstrated, it's pretty easy to access all of the places you access when that happens.

here's another article on phones - and don't be afraid, it's not all bad
Users fear for mobile security

ID theft on the decline

good news! less people in 07 were victims of identity theft!
bad news :( those who were lost more money


Zero Day Security Victor R Garza and Matt Hines InfoWorld ID theft on the decline February 12, 2008 01:36 PM By Matt Hines

Experian sues LifeLock, alleges fraud - The Red Tape Chronicles - MSNBC.com

AHA! I've been wondering when this one was going to happen!

I heard the adds for LifeLock, and a $1,000,000 guarantee sounded pretty darn interesting ... but then when I when I googled Experian - I found AnnualCreditReport.com (for free annual reports) and it's other site FreeCreditReport.com (paradoxically this site is for profit, the first month is free) and I was confused why I would need LifeLock if this was all they were doing for me.

I didn't! and you don't. take a look at the article below, and save your money as well as your ID

Experian sues LifeLock, alleges fraud - The Red Tape Chronicles - MSNBC.com

Friday, February 15, 2008

BOT WHATS???

*propeller head alert! When I wrote this it all made perfect sense ... to me. If you're a normal non-techie sort, skip down to "Got it – so what do I do?"


I’m reading a lot about botnets and rootkits these days. There are even a few companies set up just to track and fight these ‘armies’.

So what are they? Wikipedia defines them as:
Botnet is a jargon term for a collection of software robots, or bots, which run autonomously and automatically. They run on groups of "zombie" computers controlled remotely. This can also refer to the network of computers using distributed computing software. AKA (called zombie computers) running programs, usually referred to as worms, Trojan horses, or backdoors)
A rootkit is a program (or combination of several programs) designed to take fundamental control a computer system, without authorization by the system's owners and legitimate managers. Typically, rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms. AKA (malware, spyware, adware)

So. What’s that mean to me?

Botnets are designed for a larger attack. Rootkits are just for ripping you off. In either case it’s not good! One sign would be if your computer that is running slow. It may just be the side effect of not running cleanup scripts on your registry, or running out of RAM – but then again, your computer may just be part of a botnet army doing processing for whoever runs it. I’ve read estimates of 25-50 million computers in the US and up to 150 million world wide are infected with Bots. They could be used for a variety of schemes none of them attractive. (eg. Phishing, Pharming, DoS, …)

Rootkits such as SilentBanker (a Man in the Browser attack for those of you keeping score) and Infostealer are designed to get access to your bank accounts. As long as that backdoor is available to its boss (wherever he may be) – your information on that computer, and the things you use it for are not secure.

Got it – so what do I do?

I’m starting to consider rootkits/botnets something like herpes. Once you’re infected you may never get rid of it. There are some good anti-rootkits out there, but even the best ones seem to cover only 50-75% of the known problems. You’re much better off trying to avoid catching it in the first place! (see Candy Canes from strangers for tips on safe surfing).

Most of the firewalls I’ve tried lately also ‘flag’ results from search engines letting you know if they’re safe or not. I see it in my system from Zonelabs, and VCom. McAfee Site Advisor will check out the links on a page for you also.

update!
Here's a description article on how bad things are getting from TechSpot, and a couple of good sites - Webroot, the market leader and Prevx, I haven't used, but looks good

update #2! (2-28)
Here's a description of a teenager going to jail for creating a botnet of 400,000 computers over 3 months. in this article "script kiddie" refers to someone who is computer savvy, but isn't the original author of the hacking tools they are using - they're just the one who has targeted and unleashed it.

Wednesday, February 13, 2008

quickie! a nice addition for your browser

Ever wonder if the website you're viewing is 'safe'?


This free browser plugin, McAfee Site Advisor will check it and the links returned from Google or Yahoo against their DB of known badguys.

Saturday, February 9, 2008

More fun with passwords

I was having lunch with my buddy Nick the other day talking about this blog. Now Nick isn’t in my target audience – he’s an excellent programmer, very aware of security threats and I’m sure he’s running a great hardware firewall at home.


The thing that caught his attention the most was something I discussed a while back in Mmmm, I love hunny – User Ids are being stolen via rootkits (software that is undetectable by your antivirus program) and are then sold to middlemen who then resell them to people who form attacks. These Ids are NOT being taken by the bored teenager down the street, hacking ids is big business these days for organized crime and it's going to get worse.

The part where it really gets interesting – MOST people do not create great username/password combinations to begin with, THEN they re-use that same combination on every site they go to!

So – let’s just say I’m running a really simple rootkit (one I can buy for about $75) that’ll tell me all the websites you visit. If any of them (like y! mail) is running non-secure – I can easily nab your username/ password. Then, referencing my handy dandy list of all your websites, I can try out each one to see where it works! Once I login as you, I’ll change the mailing address, or see if I can get money out --- or in a worse case scenario, I’ll sell your good stocks to buy the penny stocks I’m holding, then I’ll sell out of my account when the time is right! (pump and dump, baby)

It gets better – most people I talk to don’t ever change their passwords. Never. Or if they do, they store them in a file called passwords.txt file on their C drive. Not good. Even better are the folks that put them on a sticky and leave it up on their screen 24x7. (uh, other people might just read that!)

Whaddya do? - there are a lot of good solutions in this area – robo-form is interesting, Password Safe looks really good – but so far I’m using another piece of open source software called KeePass. Install it on a USB stick, and carry your passwords with you. Even better, have it generate new, incredibly complex and unique passwords for you and you’ll never have to worry about remembering them!

I’m still experimenting in this area – if you’re interested in more, email me!

Thursday, February 7, 2008

Chat rooms, IM riskier than social networking sites for kids

for young kids - I'm thinking they don't need to be on any of these options! :) but that's just me

Chat rooms, IM riskier than social networking sites for kids

low tech always beats high tech

"low tech always beats high tech" is a quote from an author I'm reading on Security issues - Bruce Schneier

He's got a point. How good is my router, firewall etc, when my laptop is stolen? All the data I've been keeping private is right there on the hard drive. hmm - seems like my phone and PDA have a lot of data too

One thing to consider would be to use a program to encrypt/decrypt all your stored data. That way if your computing device is ever lost or stolen (which is bad), at least your identity will not be.

I'll write more on this topic later if there is interest
Truecrypt 5.0 is out and it's free - The INQUIRER

World Privacy Forum: Top Ten Opt Outs

Grocery Stores, Department stores, and Casinos all use loyalty cards to track an individuals purchases and activites to give them a better chance to target you for more products you "need". Generally it seemed to me a fair trade-off - they get some data, I get a better deal. I'm not sure how much I care about all the lists I'm in - but I do care about some of them related to my finances.

"Opt Out" is a strange term for choosing not to participate. Back in the day I was launching a startup website I remember debating with the owners ... if we have an automatic "opt in" (including the new member in what we choose) we'd get more value. BUT it seemed more than a little dishonest to sign people up for something they don't know about, so we chose to set the default to "opt out"

not every website works this way. many big ones don't - not Yahoo not even your bank!

check out this list - then you decide where you want to share, and where you want out
World Privacy Forum: Top Ten Opt Outs