Security Corner


October 31, 2011  7:37 PM

Happy Halloween!



Posted by: Ken Harthun
Ciphers, Edgar Allen Poe, Encryption, halloween

IMHO, no writer in history embodies the essence of Halloween more that Edgar Allen Poe whom I consider the creator of the horror genre (yes, I know he’s credited as the creator of detective-fiction and contributor to the science fiction genre but he dealt more in the macabre than anything else).

Poe’s short story, “The Gold Bug,” is what got me interested in ciphers and encryption as a young boy; a collection of his most popular short stories is what inspired me to become a writer.

So, on this Halloween 2011 I present a very special reading of Poe’s famous poem, “The Raven.” Enjoy!

[kml_flashembed movie="http://www.youtube.com/v/rIckeYVuMC0" width="425" height="350" wmode="transparent" /]

October 31, 2011  5:07 AM

How to kill a zombie



Posted by: Ken Harthun
halloween

Happy Halloween! In celebration of International Kill-A-Zombie Day which, apparently, I am the only one celebrating this year (c’mon Sophos, bring it back….Please?) I present to you a neat video on how you can join the fight to kill the zombies that have taken over millions of PCs.

[kml_flashembed movie="http://www.youtube.com/v/MXi_tKKePN4" width="425" height="350" wmode="transparent" /]


October 30, 2011  4:00 PM

Celebrate International Kill-A-Zombie Day



Posted by: Ken Harthun
Botnet, Malware, spambot, Video

Though announced by Sophos on Halloween Eve (Oct. 30) two years ago, International Kill-A-Zombie Day is just as relevant this Halloween as it was then. So, with Halloween 2011nigh, let’s redouble our efforts against malicious software. It’s still out there, you know. Have you noticed any drop in activity?

“Millions of computers around the world, in homes and business premises, are – without the knowledge of their owners – under the control of cybercriminals who commandeer the PCs to send spam, distribute malware, and commit identity theft,” says Graham Cluley, senior technology consultant at Sophos.

“Billions of spam messages are sent every day, with over 99% determined to be relayed from innocent users’ computers that have been hijacked and turned into a “zombie”. Hackers control networks of zombie computers, known as a botnet, in order to silently send out adverts that peddle sexual enhancement drugs or questionable financial deals, distribute scareware attacks to trick users out of their credit card details, access your social networking accounts, and spread further malicious attacks.”

[kml_flashembed movie="http://www.youtube.com/v/C6Jm_wAl668" width="425" height="350" wmode="transparent" /]


October 29, 2011  2:39 PM

Beware of Halloween tricks



Posted by: Ken Harthun
hackers, halloween, Malicious Website, Malware

The bad guys love to trick people into downloading their malicious garbage and will use just about any tactics to do so. It’s Halloween season, so people will be searching for all kinds of scary stuff to decorate, dress up and generally celebrate the creepy. The hackers know this and have started putting up poisoned search results, such as the one below for “free halloween skeleton templates.”

The site links to a fake video site and will infect you with malware if you fall for the trick of installing Adobe Flash player. More info can be found here: http://community.websense.com/blogs/securitylabs/archive/2011/10/05/first-wave-of-halloween-scare.aspx


October 29, 2011  12:40 AM

Yubico delivers secure two-factor authentication for Gmail and Google Apps



Posted by: Ken Harthun
Gmail, Two-factor authentication, Yubikey

I love my Yubikey and I recommend it highly to everyone. I have it set up to authenticate me to LastPass and as the second factor on PayPal and eBay. Now, thanks to a small Windows app, you can use your Yubikey to provide two-factor authentication for Gmail and Google Apps.

This past Wednesday, October 26, 2011, Yubico announced that the company has successfully implemented the Initiative For Open Authentication (OATH) Time-based One-time Password (TOTP) configuration for the YubiKey USB authentication key, enabling secure access to Gmail and Google Apps.

Built into the Google account framework to supplement traditional password protection, Gmail and Google Apps users are able to authenticate their login with an additional layer of security using OATH TOTP.  The YubiKey simplifies the process of logging in with a one-time password token, as it does not require the user to re-type long passcodes from a display device into the login field of the computer.

“The OATH-TOTP configuration of the YubiKey enables Google Apps and Gmail users to authenticate with a simple click of the mouse, with a higher level of security than a smartphone application and with a minimal sized and practically indestructible token,” said Stina Ehrensvard, CEO and Founder, Yubico.

The OATH-TOTP protocol relies on using the current time to create a hash-based message authentication code for login credentials.  To utilize the YubiKey to support this protocol, Yubico has developed a small Windows app.  Once installed, the app sends the current time as a challenge to the YubiKey and the response is processed to produce the OATH-TOTP six-digit response.

You can get full details here: yubico.com/totp.

Now, I’m off to set up Google two-factor authentication on my accounts.


October 17, 2011  5:09 PM

Why you should stop posting these five things on Facebook



Posted by: Ken Harthun
cyber security, Facebook, Online Scams, Security

If you’re not already a member of MakeUseOf, I highly suggest you join. They have a wealth of information that can make your lives and jobs easier. Today’s tip comes from a MakeUseOf email I just received. These are five things you need to stop posting on Facebook for both professional and personal reasons. Here is my take on them from a security standpoint.

  1. Your current location. You want the whole world to know where you are, or a thief to know you’re not home? This is just dangerous on the web. There are people out there who don’t have your best interests in mind and letting them know where you are just doesn’t make sense.
  2. New technology toys. “Wow, I love my new expensive gadget! Here’s a picture of it sitting on my bed. There is no reason for the whole world to know how you spend your money and no need to make yourself the target of thieves. This also ties in with #1 above: If the bad guys know you you aren’t at home and that you have penchant for expensive technology, you’ll be on their radar. Believe me, there are rings of people out there who take advantage of this.
  3. Chain posts about Facebook’s new payment system. It’s free: always was and always will be. It is absolutely amazing to me how these things just seem to persist forever. Posting these things is an indication that you’re, well, not the brightest bulb in the lamp. Hackers target gullible people with this stuff and gullible people continue to fall for it. Stop letting them know you’re a potential target.
  4. Vague or impersonal “personal” messages. You’ve seen them; you read them and go “huh?” Again, this could indicate that you are low-hanging fruit for the scammers and spammers.
  5. Vacation, pictures. I’ll let you be the judge on this one. This is not only related to #1 above – you’re letting people know you’re out of town – but depending on where the vacation spot is, local bad guys who may be monitoring things could target you.

You think your security settings that only allow your friends to see your updates are going to prevent bad things from happening? Well, take a good hard look at your friends list. Anyone on there who may be questionable? Anyone on there you really don’t know and have never met?

Facebook isn’t a private telephone conversation, it’s more like a 50,000 watt radio station; it can reach into places you don’t consider. And, unlike a telephone conversation that is over when it’s over, what you post on Facebook and the web will probably never go away. It can come back to bite you.

It’s not fun to get bit…


October 11, 2011  3:12 PM

Operation Swiper – Largest ID theft bust in history



Posted by: Ken Harthun
Banking Fraud, Credit Card Fraud, Identity Theft, Online banking fraud, Scam

From BankInfoSecurity.com (BIS):

On Oct. 7, the District Attorney of Queens County, N.Y., and City of New York Police announced the results of a two-year investigation that resulted in the biggest identity theft takedown in U.S. history.

The elaborate scheme, which involved five organized crime rings with ties to Europe, Asia, Africa and the Middle East, resulted in financial losses exceeding $13 million over a 16-month period.

So far, 111 individuals have been indicted, and authorities say 86 are now in custody.

The operation was dubbed “Operation Swiper.”

The criminals focused on credit card fraud, using stolen credit card numbers which they then used to create counterfeit credit and identification cards. Skimming devices were used in restaurants and on bogus websites to obtain the credit card numbers.

“The counterfeit cards were supplied to hired shoppers who were instructed to purchase high-end electronics and other merchandise, items that could easily be fenced and re-sold, usually over the Internet. Some of the shoppers also have been accused of using counterfeit cards to stay in five-star hotels and rent luxury cars during their so-called shops. In one case, a shopper allegedly commissioned a private jet to travel from New York to Florida,” BIS reports.

This is why it pays to keep careful tabs on your credit cards.


October 10, 2011  3:32 PM

Patch Tuesday – two critical vulnerabilities



Posted by: Ken Harthun
Critical update, Patch management, Patch Tuesday, Vulnerabilities

Tuesday, October 11, is the second Tuesday of October and is the usual day when Microsoft issues security updates for its Windows products. This one contains two critical updates, so you will want to make sure that you turn your automatic updates on at your home PCs. (Mac users don’t have to worry about such things…) Here’s the scoop:

Microsoft is planning eight security updates next week – two critical – as part of its regular Patch Tuesday program.

The obvious highlight of the batch is a critical update for Internet Explorer that affects all supported versions of Microsoft’s ubiquitous web browser, including IE 9. The second critical update covers flaws in Microsoft .NET Framework and Microsoft Silverlight that create a possible mechanism for miscreants to inject hostile code onto vulnerable systems.

The bad news is that most of the updates will require system restarts. I suggest you set updates to manual on any application servers.


October 1, 2011  3:36 PM

If computer problems were real…



Posted by: Ken Harthun
Computer Humor, Humor, Video

Hilarious YouTube video that one of my fellow Net Admins sent out this morning. So, I’m going to kick off the new month with a bit of humor. And watch for some scary Halloween-esque real-life security horror stores in celebration of the scariest month of the year.

[kml_flashembed movie="http://www.youtube.com/v/L1jAr466DJc" width="425" height="350" wmode="transparent" /]


September 30, 2011  4:00 PM

Three years later and Conficker is still going strong



Posted by: Ken Harthun
Antivirus, Conficker, sophos, Virus

If your computer is not properly patched (according to all the best advice I have given you), you are at risk of infection. According to Sophos, “Even after 3 years, Conficker is the still the most common virus. Since 2008, it has exploited unprotected computers, weak passwords and USB storage devices.”

The good news is that Sophos has released a Conficker Removal Tool that you can use to scan your system and remove the virus. I tested the tool and it’s very simple – no complicated installation or configuration. Naturally, the tool didn’t find Conficker on my system :-)

If you suspect you have Conficker on your system, or you’re not sure, but want to check, download the tool and remove Conficker now. They, get your system security patches up to date. Please. The virus will just keep spreading until everyone is patched.

Don’t be a Conficker enabler…


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: