The recent breach of Epsilon, an email marketing services company, emphasizes the fallacy of Online Privacy. There just is no such thing. But what do you do when you have trusted your private information to firms and financial institutions you deal with and someone breaches the security of the databases where that information is stored?
While the Epsilon breach reportedly only involved names and email addresses, not financial information, you should know how to deal with more serious data breaches where your personal financial information may be at risk. Here are five steps to take if you are notified of such a situation:
- Immediately change the passwords on all of your banking, credit card, and other online payment accounts and be sure they are all different. Do not use the same password for all of them and make sure the new passwords are unguessable.
- Change the passwords on any email accounts that you use for transacting business online.
- Be very alert to any phishing attempts arriving in your email the pretend to be from the affected accounts and monitor your accounts closely for unauthorized activity.
- If you suspect any unauthorized activity, immediately contact the financial institution. They will work with you to resolve any issues.
- Educate yourself on, or review the actions you should take in the event your identity is stolen, or if you suspect it has been. The FTC publishes an excellent guide: Take Charge: Fighting Back Against Identity Theft.
Please note that there is a big difference between simple fraud and identity theft. A data breach of any kind could lead to both. Someone using your stolen credit card is not the same thing as someone using your name, Social Security number (or other government-issued identity numbers), and other personal information to open credit accounts in your name, nor is it the same as someone posing as you to access your bank accounts.
Watch this video and find out why security is important both outside and inside the network.
[kml_flashembed movie="http://www.youtube.com/v/YyvpS44B_YQ" width="425" height="350" wmode="transparent" /]
I haven’t seen this one, but it seems to be quite nasty. The latest issue of Windows Secrets alerted me to it. Fred Langa posted a blow-by-blow account of an infection: http://windowssecrets.com/links/qivu6yl5kstcd/3a87b0h/
A nasty piece of malware known as LizaMoon has hijacked links on millions of websites in the past weeks, including some normally safe iTunes and Google links.
Fortunately, LizaMoon is easy to avoid if you know what to look for.
Using rogue-AV scare tactics, LizaMoon tries to trick you into running bogus security-scan and virus-cleanup tools on your PC — but it’s pure malware.
If allowed onto your PC, this particular ploy is especially troublesome because it can partially disable the Windows Security Center and change the Registry so that the full WSC can’t be restarted. It also interferes with Microsoft Security Essentials, if MSE is running. (You’ll find lots more LizaMoon news coverage via Google.)
Supposedly, infection peaked in October of 2010 at around 5600 affected sites, but it’s making a comeback, according to Langa. These things never really go away completely and often resurface. Be especially aware when searching sites on Google.
OpenCandy (OC), a relatively new advertising product is currently being bundled with software installers for popular programs including IZArc, mirC, PrimoPDF, Trillian Astra and more. As always happens with “new” methods of advertising via bundling agreements, OC is generating quite a bit of controversy in various forums and blogs. Some say it is benign adware under control of the person running the installer, others say it has the potential to be malicious spyware. I have no personal experience with OC, so I did some investigation by seeing what the OpenCandy folks had to say:
OpenCandy provides a plug-in that developers include in their software to earn money by showing recommendations for other software in their installers. Developers use this money to keep their software free and invest in further software development.
The installer uses the OpenCandy plug-in to present a software recommendation (such as the one below) during installation. You have complete control to accept the software recommendation by selecting either the “Install” or “Do not install” options on the software recommendation screen.
OpenCandy isn’t installed onto your computer, doesn’t collect personally identifiable information about you, and doesn’t collect information about your web browsing habits. It is safe, secure, and used by hundreds of software developers, including many of the world’s largest anti-virus companies. Several of our partners are listed here: http://opencandy.com/discover/.
IF this is true, then it looks like OC is benign. Check out the partners at the URL above, then you decide. Other forum members at Dave’s Computer Tips seem to agree with me:
ozbloke: I believe OpenCandy, as it now stands, is relatively harmless adware; on the proviso that the software distributors who bundle it with their products stick to a regimen of full disclosure and and employ an opt-out system. However, the potential for abuse is somewhat disturbing and I would like to see some more concrete assurances/guarantees in place.
As always, caveat emptor.
I have not been able to verify whether or not Kroger uses the same email services vendor, Epsilon Interactive, as U.S. Bank (see U.S. Bank Vendor Epsilon Interactive Hacked), but got this notice as well:
Kroger wants you to know that the data base with our customers’ names and email addresses has been breached by someone outside of the company. This data base contains the names and email addresses of customers who voluntarily provided their names and email addresses to Kroger. We want to assure you that the only information that was obtained was your name and email address. As a result, it is possible you may receive some spam email messages. We apologize for any inconvenience.
Kroger wants to remind you not to open emails from senders you do not know. Also, Kroger would never ask you to email personal information such as credit card numbers or social security numbers. If you receive such a request, it did not come from Kroger and should be deleted.
Wonder how many other notices I’ll be getting?
If you are a customer of U.S. Bank better be on the lookout for suspicious emails. It seems one the bank’s vendors of email marketing services, Epsilon Interactive, has been hacked and your email address may have been obtained in the process.
My wife got this email notice yesterday:
As a valued U.S. Bank customer, we want to make you aware of a situation that has occurred related to your email address.
We have been informed by Epsilon Interactive, a vendor based in Dallas, Texas, that files containing your email address were accessed by unauthorized entry into their computer system. Epsilon helps us send you emails about products and services that may be of interest to you.
We want to assure you that U.S. Bank has never provided Epsilon with financial information about you. For your security, however, we wanted to call this matter to your attention. We ask that you remain alert to any unusual or suspicious emails.
Please remember that U.S. Bank will never request information such as your personal ID, password, social security number, PIN or account number via email. For your safety, never share this or similar information in response to an email request at any time.
Stay alert to anyone who requests personal information via email. It just isn’t done by any financial institution.
What the heck is a “complex compound passphrase,” you ask? Ah, let me enlighten you, Grasshopper! I am the master of password systems, but this one escaped me. You see, I had fallen into the trap known as complexity and had been busy defining complex algorithms for generating unguessable passwords; in essence, I had been hoist by my own petard.
Yesterday, while solving the latest Cryptoquip puzzle in my local newspaper, I had a revelation. The description of the cryptoquip always says something along the line of “this puzzle is a simple substitution cipher…” The Aha! moment came when I realized that “simple” is the operative word here. People don’t like complexity, so the average person isn’t going to use a complex algorithm.
So, even though I call this “Complex Compound Pass Phrases,” the method of creating them is simple. I call them “complex” because they are extremely strong and nearly unbreakable for all intents and purposes. Here’s how to create them.
- Choose at least two words that are memorable to you. It doesn’t even matter if it’s something someone else would know. Use your pet’s name, your mother’s name, whatever.
- Merge the two (or more) together alternating letters from each word, creating a string.
- To make it all even more secure, capitalize every other letter or change a couple of the letters to their number equivalents.
All that would take a minute, at most and is easily remembered.
Here’s an example using my name and my pet’s name (Kenneth, Missy): KmEiNsNsEyTh. You could change the E’s to 3’s and you would have Km3iNsNs3yTh.
Pretty well unguessable!
Note to hackerz: I have not and never will use that pass phrase, so don’t bother trying to hack me! LOL
Saw this in a security forum today:
Here’s a new one; how about keylogging software pre-installed on brand new laptops, straight from the factory…….BY THE MANUFACTURER!!
The “StarLogger” software was discovered by Mohamed Hassan, founder of NetSec Consulting, after he scanned 2 brand new Samsung laptops [model numbers R525 and 540].
StarLogger auto starts with Windows and records all keystrokes made on the computer. It can be difficult to detect, and can be set to periodically and surreptitiously send e-mails containing information gleaned from the computer to a preset e-mail address, with screen capture images attached.
When Hassan first contacted Samsung to report this intrusion they referred him to Microsoft, saying all they did was manufacture the hardware. However, a senior supervisor at Samsung finally admitted that they had indeed installed the software on the laptops in order to monitor machine performance “and to find out how it is being used.”
In other words, Samsung wanted to gather usage data without obtaining consent from laptop owners.
Sounds as though users should be adding one more essential security step to the conventional strategy…..i.e. thoroughly scan any brand new machine as soon as possible!!
Or do you do that already??
Say it ain’t so, Joe (it’s opening day in Cincinnati).
It ain’t so!
Relax, will ya?
I can’t believe that a somewhat savvy friend of mine asked me about this message. He was actually considering opening it. Some people will fall for anything. The first thing is that this message is very poorly written. Anyway, please inform your family and clients that this is bogus and contains a malware attachment called UPS.zip that will infect their computers with a Trojan horse program. It usually arrives with a subject “United Parcel Service notification <number>”
Dear customer. The parcel was sent your home address. And it will arrive within 3 business day. More information and the tracking number are attached in document below. Thank you. © 1994-2011 United Parcel Service of America, Inc.
Just delete it upon receipt.
On March 17th, 2011, Art Coviello, RSA Security‘s Executive Chairman, posted a statement on their website disclosing their discovery of an attack on their network classified as an “Advanced Persistent Threat (APT).” Essentially, this means that the attackers had been rummaging around in their systems for awhile before being discovered; while doing so, they manage to penetrate one of RSA’s most secret databases.
This raises several questions: 1. How did the attackers penetrate RSA’s security perimeter; 2. How did they go unnoticed long enough to become a “persistent” threat; and, 3. What, exactly, did they get?
Coviello doesn’t address either of the first two questions and is quite vague on the third. How do you interpret this?
Our investigation also revealed that the attack resulted in certain information being extracted from RSA’s systems. Some of that information is specifically related to RSA’s SecurID two-factor authentication products [emphasis added]. While at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers [emphasis added] , this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack [emphasis added]. We are very actively communicating this situation to RSA customers and providing immediate steps for them to take to strengthen their SecurID implementations.
See what I emphasized up there? The attackers got some info related to the SecureID products. RSA isn’t saying exactly what they got, but Steve Gibson makes mention of this in a recent blog post:
…at the time of manufacture individual SecurID devices would be assigned a secret internal random or pseudo-random 64-bit key and a database would be maintained to forever map the device’s externally visible serial number to its internal secret 64-bit key.
This public-serial-number-to-secret-key mapping database then becomes “the keys to the kingdom”. It is RSA’s biggest secret to keep, since a full or partial disclosure of the database would potentially allow attackers to determine a device’s current and future display values and would therefore, of course, break any authentication protection.
More news as it becomes available.