What Can I Do With A Hijacked Email Account? Part 2

On Monday we opened this discussion about hijacked email accounts, and showed some examples of the phishing tricks that attackers use to get you to reveal your email password.  Today we will explore the many useful and profitable exploits that a compromised email account offers a cyber-criminal or other attacker.

I consider email account compromise to be one of the most personally harmful cyber-exploits.  When another person has access to your email ...

Continue Reading →
0

What Can I Do With A Hijacked Email Account? Part 1

Let’s say I just hijacked your email account.  What can I do with it?

First thing, a hijacker would not announce his or her presence in your account.  Staying undetected is important so you do not change your password.  Depending on what the attacker is doing with your email account, there is a significant probability that you would not know your account was compromised for several days, weeks, or even years!

In order ...

Continue Reading →
0

Smartphones Need Security Too

When a smartphone is stolen, it is a disaster.  You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app.  If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks.  If you have live camera feeds ...

Continue Reading →
0

Weekend Update – Recent Cybersecurity Alerts

Not sure if Weekend Update is going to become a regular feature on Saturdays, but you might keep an eye out for a few more of these.  What follows is a copy and paste from alert emails I receive from the FBI, Department of Justice, FTC, and US-CERT.  Also content from other bloggers, such as Sophos Naked Security block, Brian Krebs, Bruce Schneier, WordFence blog, and others that I read and ...

Continue Reading →
0

Should Facebook Manage Password Recovery?

Back on February 22nd, we discussed Facebook’s new Delegated Account Recovery feature.  Basically, if you should for some reason forget your password to any account, or lose your two-factor authentication device (smartphone), and can no longer get into your account, Facebook will help you recover the account, as long as it is one that is enrolled with Facebook.

This is not the same thing as password managers like DashLane or LastPass, although ...

Continue Reading →
0

Are You Breached? Know What To Look For

The average number of days between a network intrusion and it’s detection by the victim is around 200 days, which is at least 199 days too long.  Sooner or later your company will suffer an network intrusion, computer incident, or data breach, in spite of your best efforts to prevent it.  The goal is to shorten the time between intrusion and detection.

A recently article on Tech Republic discusses ...

Continue Reading →
0

Linksys Wireless Routers Have Security Vulnerabilities

Research firm IOActive recently released a an article that revealed some serious security deficiencies on popular Linksys Smart Wi-Fi products.  They have notified Linksys, and Linksys is working on the firmware upgrades that will be necessary to fix these issue, and they have issued a security advisory.

Among the vulnerabilities discovered:

  • Unauthenticated attacker can create a denial-of-service ...
Continue Reading →
0

Why Biometrics Aren’t the Answer

Happy World Password Day.  I have been following the progress that NIST is making in formulating new standards for user authentication.  Something I found surprising was that NIST is not recommending using biometrics as a form of authentication.  The two main reasons are that biometrics, such as fingerprints, iris scans, and voice recognition, are not a secret.  For instance, you leave your fingerprints behind everywhere you touch something. ...

Continue Reading →
0

SCADA Systems Vulnerable Due to Hard Coded Passwords

We have discussed the dangers to what NIST identifies as Critical Infrastructure that exists because SCADA and other industrial control systems are designed to be run on “air-gapped” networks that are not connected to the public Internet.  Unfortunately, many of these systems are being connected to the Internet, if only in a tangential way.

The German security firm OpenSource Security recently found hard coded ...

Continue Reading →
0
Page 1 of 7 12345...»