It sometimes seems like no one is listening when it comes to good password practices. I stress best practice with end users at every opportunity and though I always get the old okey-doke head nod, they rarely listen. The problem is, people are lazy and don’t want to be bothered with creating good passwords, to say nothing of managing all of them.
It’s no surprise to find what security firm SplashData says are the top 25 worst passwords of 2011. In fact, it’s even less of a surprise that I have seen fully two-thirds of these passwords in use by people I know:
A security Geek’s work is never done…
In an advisory issued late Thursday, Microsoft said the previously unknown flaw in the Win32k TrueType font-parsing engine affected every supported version of Windows, including Windows 7 and Windows Server 2008, which are the most secure to date. The critical vulnerability was recently exploited to spread Duqu, malware that some researchers say was derived from last year’s Stuxnet worm that sabotaged Iran’s uranium enrichment program.
“An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode,” the advisory warned. “The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”
The accompanying Fix it is designed to protect against exploits until a permanent patch is issued. The company didn’t indicate when that would happen, except to say it wouldn’t be before next Tuesday’s regularly scheduled security update release.
Jerry Bryant, a spokesman in Microsoft’s Response Communications and Trustworthy Computing groups, said here that the company has already shared technical details with security partners.
“This means that within hours, anti-malware firms will roll out new signatures that detect and block attempts to exploit this vulnerability,” he explained. “Therefore, we encourage customers to ensure their antivirus software is up-to-date.”
He went on to say risk of exploitation remains low.
“However, that is subject to change so we encourage customers to either apply the workaround or ensure their anti-malware vendor has added new signatures based on the information we’ve provided them to ensure protections are in place for this issue.” ®
IMHO, no writer in history embodies the essence of Halloween more that Edgar Allen Poe whom I consider the creator of the horror genre (yes, I know he’s credited as the creator of detective-fiction and contributor to the science fiction genre but he dealt more in the macabre than anything else).
Poe’s short story, “The Gold Bug,” is what got me interested in ciphers and encryption as a young boy; a collection of his most popular short stories is what inspired me to become a writer.
So, on this Halloween 2011 I present a very special reading of Poe’s famous poem, “The Raven.” Enjoy!
[kml_flashembed movie="http://www.youtube.com/v/rIckeYVuMC0" width="425" height="350" wmode="transparent" /]
Happy Halloween! In celebration of International Kill-A-Zombie Day which, apparently, I am the only one celebrating this year (c’mon Sophos, bring it back….Please?) I present to you a neat video on how you can join the fight to kill the zombies that have taken over millions of PCs.
[kml_flashembed movie="http://www.youtube.com/v/MXi_tKKePN4" width="425" height="350" wmode="transparent" /]
Though announced by Sophos on Halloween Eve (Oct. 30) two years ago, International Kill-A-Zombie Day is just as relevant this Halloween as it was then. So, with Halloween 2011nigh, let’s redouble our efforts against malicious software. It’s still out there, you know. Have you noticed any drop in activity?
“Millions of computers around the world, in homes and business premises, are – without the knowledge of their owners – under the control of cybercriminals who commandeer the PCs to send spam, distribute malware, and commit identity theft,” says Graham Cluley, senior technology consultant at Sophos.
“Billions of spam messages are sent every day, with over 99% determined to be relayed from innocent users’ computers that have been hijacked and turned into a “zombie”. Hackers control networks of zombie computers, known as a botnet, in order to silently send out adverts that peddle sexual enhancement drugs or questionable financial deals, distribute scareware attacks to trick users out of their credit card details, access your social networking accounts, and spread further malicious attacks.”
[kml_flashembed movie="http://www.youtube.com/v/C6Jm_wAl668" width="425" height="350" wmode="transparent" /]
The bad guys love to trick people into downloading their malicious garbage and will use just about any tactics to do so. It’s Halloween season, so people will be searching for all kinds of scary stuff to decorate, dress up and generally celebrate the creepy. The hackers know this and have started putting up poisoned search results, such as the one below for “free halloween skeleton templates.”
The site links to a fake video site and will infect you with malware if you fall for the trick of installing Adobe Flash player. More info can be found here: http://community.websense.com/blogs/securitylabs/archive/2011/10/05/first-wave-of-halloween-scare.aspx
I love my Yubikey and I recommend it highly to everyone. I have it set up to authenticate me to LastPass and as the second factor on PayPal and eBay. Now, thanks to a small Windows app, you can use your Yubikey to provide two-factor authentication for Gmail and Google Apps.
This past Wednesday, October 26, 2011, Yubico announced that the company has successfully implemented the Initiative For Open Authentication (OATH) Time-based One-time Password (TOTP) configuration for the YubiKey USB authentication key, enabling secure access to Gmail and Google Apps.
Built into the Google account framework to supplement traditional password protection, Gmail and Google Apps users are able to authenticate their login with an additional layer of security using OATH TOTP. The YubiKey simplifies the process of logging in with a one-time password token, as it does not require the user to re-type long passcodes from a display device into the login field of the computer.
“The OATH-TOTP configuration of the YubiKey enables Google Apps and Gmail users to authenticate with a simple click of the mouse, with a higher level of security than a smartphone application and with a minimal sized and practically indestructible token,” said Stina Ehrensvard, CEO and Founder, Yubico.
The OATH-TOTP protocol relies on using the current time to create a hash-based message authentication code for login credentials. To utilize the YubiKey to support this protocol, Yubico has developed a small Windows app. Once installed, the app sends the current time as a challenge to the YubiKey and the response is processed to produce the OATH-TOTP six-digit response.
You can get full details here: yubico.com/totp.
Now, I’m off to set up Google two-factor authentication on my accounts.
If you’re not already a member of MakeUseOf, I highly suggest you join. They have a wealth of information that can make your lives and jobs easier. Today’s tip comes from a MakeUseOf email I just received. These are five things you need to stop posting on Facebook for both professional and personal reasons. Here is my take on them from a security standpoint.
- Your current location. You want the whole world to know where you are, or a thief to know you’re not home? This is just dangerous on the web. There are people out there who don’t have your best interests in mind and letting them know where you are just doesn’t make sense.
- New technology toys. “Wow, I love my new expensive gadget! Here’s a picture of it sitting on my bed. There is no reason for the whole world to know how you spend your money and no need to make yourself the target of thieves. This also ties in with #1 above: If the bad guys know you you aren’t at home and that you have penchant for expensive technology, you’ll be on their radar. Believe me, there are rings of people out there who take advantage of this.
- Chain posts about Facebook’s new payment system. It’s free: always was and always will be. It is absolutely amazing to me how these things just seem to persist forever. Posting these things is an indication that you’re, well, not the brightest bulb in the lamp. Hackers target gullible people with this stuff and gullible people continue to fall for it. Stop letting them know you’re a potential target.
- Vague or impersonal “personal” messages. You’ve seen them; you read them and go “huh?” Again, this could indicate that you are low-hanging fruit for the scammers and spammers.
- Vacation, pictures. I’ll let you be the judge on this one. This is not only related to #1 above – you’re letting people know you’re out of town – but depending on where the vacation spot is, local bad guys who may be monitoring things could target you.
You think your security settings that only allow your friends to see your updates are going to prevent bad things from happening? Well, take a good hard look at your friends list. Anyone on there who may be questionable? Anyone on there you really don’t know and have never met?
Facebook isn’t a private telephone conversation, it’s more like a 50,000 watt radio station; it can reach into places you don’t consider. And, unlike a telephone conversation that is over when it’s over, what you post on Facebook and the web will probably never go away. It can come back to bite you.
It’s not fun to get bit…
On Oct. 7, the District Attorney of Queens County, N.Y., and City of New York Police announced the results of a two-year investigation that resulted in the biggest identity theft takedown in U.S. history.
The elaborate scheme, which involved five organized crime rings with ties to Europe, Asia, Africa and the Middle East, resulted in financial losses exceeding $13 million over a 16-month period.
So far, 111 individuals have been indicted, and authorities say 86 are now in custody.
The operation was dubbed “Operation Swiper.”
The criminals focused on credit card fraud, using stolen credit card numbers which they then used to create counterfeit credit and identification cards. Skimming devices were used in restaurants and on bogus websites to obtain the credit card numbers.
“The counterfeit cards were supplied to hired shoppers who were instructed to purchase high-end electronics and other merchandise, items that could easily be fenced and re-sold, usually over the Internet. Some of the shoppers also have been accused of using counterfeit cards to stay in five-star hotels and rent luxury cars during their so-called shops. In one case, a shopper allegedly commissioned a private jet to travel from New York to Florida,” BIS reports.
This is why it pays to keep careful tabs on your credit cards.
Tuesday, October 11, is the second Tuesday of October and is the usual day when Microsoft issues security updates for its Windows products. This one contains two critical updates, so you will want to make sure that you turn your automatic updates on at your home PCs. (Mac users don’t have to worry about such things…) Here’s the scoop:
Microsoft is planning eight security updates next week – two critical – as part of its regular Patch Tuesday program.
The obvious highlight of the batch is a critical update for Internet Explorer that affects all supported versions of Microsoft’s ubiquitous web browser, including IE 9. The second critical update covers flaws in Microsoft .NET Framework and Microsoft Silverlight that create a possible mechanism for miscreants to inject hostile code onto vulnerable systems.
The bad news is that most of the updates will require system restarts. I suggest you set updates to manual on any application servers.