With a Digital Sneeze I got a Wireless Virus!

In 2009 and in 2012 the Australian Science organisation CSIRO won landmark court case’s on the invention of Wi Fi technology. From its introduction Wi Fi security has been an issue ignored in the wake of the convenience of its features and potential. In early 2000 I recall reading that Queensland University students proved that Wi Fi could never be made totally secure. A gene out of its bottle is rarely put back in and in the case of technology it’s the risk reward ratio that kept the Wi Fi gene out of the bottle as it made device based mobile computing possible and now indispensable.

In Wi Fi’s earliest days I would observe many a poor uni student hunkered down in a shopping mall with a laptop, piggy backing the shopping malls Wi Fi to do their research for free. Now that’s just taken for granted and we expect open access Wi Fi wherever we go as a no charge customer service.
Some time ago a student showed me a device he bought at an electronics store.
“It scans for Wi Fi networks.” He said.
“Why do you need it?”
“I might want to see if I can get online from the wood shed down the bottom of my back yard.”
“Right …….. So how many unsecured Wi Fi networks did you find down your street then?”
“Five”
Wi Fi security is now under a new threat. A digital influenza is now possible. ‘Chameleon’ a codenamed virus designed by researchers at the University of Liverpool have developed an airborne Wi Fi virus.
Piggy backing Wi Fi waves this coded common cold spreads faster than Bali Belly from network to network. The denser the networks the faster it spreads.
It was assumed, however, that it wasn’t possible to develop a virus that could attack Wi Fi networks,” computer security expert Professor Alan Marshall said. “But we demonstrated that this is possible and that it can spread quickly.
So those places offering open access networks, the shopping malls, the coffee shops, free hotspots and my TAFE campus could be dangerous places easily infiltrated.
Straining the distinction between research and Ukrainian hackers the team designed and simulated attacks that spread quickly between home and business avoiding detection and also finding and remembering unprotected networks. In a laboratory setting which must make it alright, they simulated successful attacks on Belfast and London. The team reported that “Chameleon” behaved just like a real airborne virus.

 

When “Chameleon” attacked an AP (Access Point) it didn’t affect how it worked, but was able to collect and report the credentials of all other Wi Fi users who connected to it. The virus then sought out other Wi Fi APs that it could connect to and infect.”
Alan Marshall, Professor of Network Security

 

Shopping malls could become areas of high digital pestilence, with the majority of AP’s in close proximity mostly within a 10-50 metre radius; a Wi Fi virus like “Chameleon” will propagate like the plague.
It slips past virus protection because virus protection software only looks at viruses on our devices not within the Wi Fi network itself. You might beat it with your home and business secured AP only to find yourself “nailed” at your favorite coffee shop or conference.

 

Wi Fi connections are increasingly a target for computer hackers because of well-documented security vulnerabilities, which make it difficult to detect and defend against a virus. It was assumed, however, that it wasn’t possible to develop a virus that could attack Wi Fi networks but we demonstrated that this is possible and that it can spread quickly. We are now able to use the data generated from this study to develop a new technique to identify when an attack is likely.” Professor Marshall

 

Well thanks for that but, what about copy cats. I think the first computer virus was let loose by some early computer genius having a random academic moment wondering if he could give networked computers a form of digital cancer, contemplated some likely code and hit the enter key forgetting he was on a huge university network and thus gave birth to the first computer virus. He owned up and apologized but that gene was out of its bottle.

 
I really do wonder sometimes why we keep a laboratory sample of a virus or bacteria causing a horrific disease that took hundreds of years to eradicate just in case we might need it in the future. It’s a trust us scenario because we are scientists and you are just people who don’t know any better and you should leave it to us.
Are they going to do a perpetual computerized quarantine of “Chameleon” while they protect us from others that might invent a “Chameleon” knock off but who are not them? I would either look to putting virus protection on my smart phone or try going to a coffee shop to just have a cup of coffee with a friend and talk, a device free time. It’s fast becoming one of those life crisis issues requiring professional help and mental health coverage on your medical insurance plan.

 

Related Articles:
How CSIRO’s stars won the WiFi battle
Detection and analysis of the Chameleon WiFi access point virus
Adelaide CBD wi-fi network

Advertisements

The Girl with the Tasteful Tattoo

As a teacher it is always inspiring to be on the other side of a classroom and to get taught well. Recently I found myself a student again at a conference about how my organisation can apply social media. I have always believed that learning has a law of three. The three things required for learning to take place. It has to be the right time, the right place and the right person. If only one of those is absent learning doesn’t happen and it’s nobody’s fault. As soon as the missing piece or pieces drop into place it happens. An empowered team of digital natives directed by the girl with the tasteful tattoo aided by representatives from Australia’s new Twitter team and from LinkedIn Australia, we were guided back to the Future.

 
Now I have two traffic lights between me and my workplace. If any of them are red I’m likely to have an instance of male menopausal road rage. So Sydney is not a place I could live in again. Never the less it is truly a beautiful city. When I lived there a Sunday afternoon at an intimate little pub in the Rocks, with jazz notes drifting in on the wind and coffee brewing in the distance, was just the best day. It’s even better down there now, the Sydney foreshore by night in the middle of the Vivid festival took me back down the years to the Sydney citizen I once was. I walked all the way from the Opera House to Darling Harbour and on up to Central Station. The city has done a great job. It’s a beautiful walk especially at night. A walk with the new and the memory of places that have stayed the same.

 
It got a bit scary at Central Station, 11 o’clock at night. Walking head on into a drunken mob with breaths that were incendiary, I nearly freaked out until I noticed red and white scarves. I yelled out “Up the Mighty Swanees ……. Mate I’m from the bush, where the “f###” is the platform to Cronulla?” Well the lads bundled me up and deposited me down, on the right platform, slapped my back, shook my hand and were gone with comments about how good it was that we kicked Geelong’s arse.

 
No one told me there are three thousand stops between Central and Cronulla. What’s more the train seats just don’t smell the same.
In my youth I lived with two other uni students in a flat near the Cross. One of them, Rod was going out with a very straight girl. In the middle of the sexual revolution he is going out with a girl who will only let him kiss her once on the doorstep of her parents’ house on a Saturday night.
Dump her I used to say. Back then I could be insensitive sometimes.
They would go to a movie, rush to catch the second last train to Southerland, walk a million miles, sweaty hand in hand, catch a kiss on a cold front porch, run to catch the last train back, fall into an exhausted sleep of unfulfilled lust and go around and around the city circle all night. He would stagger back into the flat early next morning smelling like a train seat. Well Rod after all these years I finally realise the hell you went through. I did the second last train to Cronulla.

 
It’s extraordinary that for the first time in human history desktop PC sales have dropped the last 2 years running. Every presenter from the Social Media companies showed us stats’ ranging from 60 to 80 percent of all social media content is currently being consumed on mobile devices. I learned that one minute of video is equivalent to 1.8 million words. I was encouraged to make my content relevant (so much for this post), make it local, mobile optimised and use multimedia that’s multi directional and above all embrace conversation and don’t be afraid to let that conversation have a life of its own.

Related Information
Buzz Numbers
Quiip
Twitter Australia
Darren Keppie (LinkedIn Australia)

That was the year that was!

That was the year that was. Let’s start with the tech deals done dirt cheap that didn’t make it in 2013:

  • Simcity 10 years in the relaunch of a much loved game totally botched the games launch.
  • Reddit lost it in its attempt at social media justice by muddying the waters in the search for the Boston marathon bombers.
  • Twitter’s new music discovery service started with a whimper and died with a burp.
  • Dell can’t say die and refuses to accept the general PC’s day is dead and gone.
  • BlackBerry is undergoing a death by a thousand cuts. Apart from President Obama who do you know that has one? No one.
  • Adobe upset everyone with its move to subscription software to absolutely outrage 38 million of their customers with a massive security breach of their credit card details.
  • Facebook Home for smart phones didn’t grab users with its first attempt although the company insists it will persist.
  • Microsoft Surface Tablet didn’t make a ripple on the surface of worldwide tablet sales.

Australians internet habits for the year was to check the weather, download videos big time, check our social media, and play smart phone games. However the difference in 2013 was the increasing use of mobile smart devices. Half of Australia is now on the internet and one third of them now access the internet on mobile or wireless links.

Google trending analysis of our search curiosity put celebrities dead before their time high on the list. Points of trivia concerning trivial reality TV shows confirmed the public’s increasing demand for reality avoidance.

We did however use the Rural Fire Service during our increasingly deadly bush fire season. Nearly all of us worried about someone near to us in the path of a fast moving fire somewhere. Our wonderful BOM (Bureau of Meteorology) received 471 million visits reflecting our fascination for cyclones heatwaves and bushfires.
We all expressed a morbid interest in the 24 hour, slogan driven, negative message electioneering of our modern more than likely reviled politicians. The Electoral Commission’s more than 12 million page views on election night reflected a 45% rise from the previous election.

Much else didn’t change. We are too lazy to bookmark so we banked, emailed, social media’d, checked weather, searched for jobs and real estate, booked accommodation and travel, shopped on Ebay and the such all from shortcutting out of Google.

The Twitter spikes caused by Australia’s 2 million Twitter users was a depressing reflection on our general level of education. It is not surprising that the majority of spikes were around mindless conversation pieces like the moment Dami Im was crowned winner of The X Factor. Whoever the hell he or she is. It’s not surprising after a survey of Australians general science knowledge found that 40% of us had no idea it takes the earth one year to revolve around the sun and that since the re-release of Jurassic Park on Blu-ray that humans lived in the time of dinosaurs. Small wonder that Twitter peaks concentrated around conversation pieces from television shows.

Some serious topics did trend, leadership spills and drugs in sport being the main ones. However the word television needs to be qualified. 2013 saw a large increase in the number of people using internet, subscription TV, video on demand and catch-up TV particularly children’s shows. Does anyone still have a video “Blockbuster” store in their town? If you do you won’t for long.

Season three “Game of Thrones” confirmed Australians as the most prolific illegal downloaders in the world. Downloading from smartphones and tablets rose 97 per cent to about 6545 terabytes a month.
Looking forward to 2014 I’m wondering if I will be able to 3D print a lifelong replacement for a chronic ingrown toenail or invest in an e-ink tattoo parlour providing removable, moving multi-coloured tattoos.

Related Articles:

 

Digital Ticket of Leave

Apparently everyone in Australia with an internet connection should be arrested. Like our first fleet ancestors we are all criminals. In truth the wonderful book “Fatal Shore” by Robert Hughes informs us that only the first 50 years of our convict colony was really tough. After that life in England if you were not one of the uber rich one percenter’ s born into riches and royalty, life in that rain drenched, sun starved island was truly miserable. People started to commit crimes in order to get sent here.

You had to make sure it was a petty crime. That got you a seven year stretch with a ticket of leave at the end. The ticket of leave meant you were free to live anywhere in Australia but couldn’t ever return to England. No great loss there.

It was a bit more of a problem if you got a 14 year stretch. Then you could become a victim of undercover, creeping incremental white slavery. You did your first 7 years on the government road gangs then you were indentured to a squatter for the next 7 years as an unpaid labourer. If you were a good worker your dishonest boss could cook up another crime against you before the 7 years was up and you got another 7 on top from an accommodating magistrate, another conspiring blueblood to help keep you in perpetual servitude.

If you were not a good worker the squatter could kill two birds with one stone. Incite the war of conquest against Australia’s first people who the Royal Society of London adamantly insisted didn’t exist anyway. You did this by sending your indentured convict with 100 sheep into an area you knew was going to get him a spear in the guts. Fitting end to your bad worker, plenty more where he came from and in the meantime good cause for riding on in there with guns, dogs and some squatter mates to take care of those murderous black barstard’s who didn’t officially exist anyway. Thus one of the ways the war was waged.

When you finished your 7 years and were nicely set up growing wheat and sheep on some river flats up the Parramatta river valley you wrote home to cousins in England and told them to throw a brick through a window, steal a loaf of bread, get a 7 stretch and do your time as we have land waiting for you. I guess that’s why the conservative sections of our body politic still have an irrational fear of boat people. Never the less why should we all be arrested in our own illegally gotten country once again?

Our copyright laws apparently. Sharing a video clip on YouTube is technically a 5 year stretch with a $93,000 fine. Our laws in this area probably date back to near the convict era, certainly reflect blue blood thinking in their battle to keep us in our place. You are always reminded of a Monty Python skit that has become reality when there are too many laws to remember but ignorance of any one of them is no excuse for breaking it.  A good way of making sure we are always criminals just waiting to be caught.

Section 132A part 2 of the Australian Copyright Act states: “distributing an infringing article that prejudicially affects the copyright owner” is against the law. There you go. Everything you do online is technically illegal in Australia. Everything you do on Facebook, Reddit, Twitter and YouTube is completely illegal. Your one edition claim to fame, your photo in a newspaper is not yours so if you post it on Instagram you have just committed a crime.

Thankfully on our behalf the Australian Digital Alliance is campaigning to highlight the flaws in our ancient anachronistic copyright laws that belong in our historical dustbin. It’s a simple solution. Something like a fair use clause would allow people to share, copy or recreate works so long as they don’t do copyright owners harm or take revenue away from them. With our on line lives this is like outlawing culture. Recently “Juice Media” did a rap parody on their YouTube channel of Julian Assange, using John Farnham’s “You’re the Voice”.  It was issued with a takedown order. John would not have had a problem but even though it is his song he doesn’t own it some bully boy recording label, dead but yet to lay down does. They issued the takedown.

Even the establishment is starting to say that the “antiquated” attitude to copyright “breeds contempt for the law.” Well that horse bolted years ago. Australians are born with an inbuilt contempt for the law. It’s part of our convict heritage. We had an old saying out in the country. The law only exists where there is a blue uniform to enforce it.

The Australian Digital Alliance will present its arguments to the Australian Law Reform Commission inquiry into Copyright and the Digital Economy in late November.
“In six month’s time, in February we will take that body of work to the Attorney General’s office and teach the old people who live in Canberra who make the laws how young people are making things,” – Dan Ilic

Well Dan if they give you 100 sheep and point you up some alley in Redfern don’t go mate.

Related Articles:
Why creating memes is illegal in Australia

Only one on-line slip up

Back in the last share boom before the GFC (Great Financial Crisis) everyone thought they were a red hot trader. Mums were spending their day in a trading pod checking the websites spruiking todays penny dreadfuls. I recall one scam. Young Australian guy spam mailed all these hot trade tip web sites with a fake report on a penny dreadful, taking a big position before hand of course. The sheep got on board in the first hour of the day and he sold into it making about $21,000 for the mornings work. Only problem was he did it from home and got done. Caught and charged. I remember thinking at the time why didn’t he get one of those dodgy promotional CD’s with 10 hours free internet time from one the undercutting ISP companies who never answered the phone, had non-existent support and an address that turned out to be a car park. Take the CD into an internet cafe and our “perp” would have been away clean.

Those days are gone. The arrest on the 1st October of “Silk Roads” Ross William Ulbricht illustrates the point. The online drug and dodgy deeds site had apparently turned over more than $1 billion from hundreds of thousands of customers. From fake ID’s to top grade heroin the site had cleverly covered itself using complex server configurations, anonymity software and Bitcoin money, Silk Road had become a major player in the “Dark Net.” Until Ross made one stupid, rookie blunder that bought it all undone.

Strutting his stuff on a forum Ross used a user profile called “altoid” and said he was looking for an expert in Bitcoin and stupidly gave the address to send applications to as rossulbricht @gmail.com. In itself innocent enough but the FBI tracing the user name “altoid” found two earlier posts  about Tor being a kind of “anonymous amazon.com” Both posts referenced  “silkroad420.wordpress.com.” Duh!!
Did this make Ulbricht a person of interest to the FBI? It sure did. Further footprints followed.  A Google+ profile of rossubicht@gmail.com included video links that enabled the FBI to cross link Ross with his Silk Road handle “Dread Pirate Roberts.” Both Ross and the Dread Pirate seemed to both be believers in the Austrian Economic Theory on which Silk Roads market model was based.
The final bread crumb was a post by Ross on a forum on “How can I connect to a Tor hidden service using curl in php?” Later forensic analysis on a Silk Road hard drive found exactly the same code.

Even if the “Dread Pirate Roberts” initial slip up didn’t require the powerful surveillance capability of the NSA it is suspected that while chasing child pornographers the FBI agents exploited a vulnerability in the Firefox browser to unmask Tor users and may have used this to expose the Silk Roads kingpin.

Many people concerned over Snowden’s NSA revelations have started to use software like Tor recommended by the Cryptoparty to stay anonymous. If it’s just to keep pesky profile marketing away and otherwise having nothing to hide, all well and good. However with something to hide it becomes a bigger challenge everyday as any investigator need only to wait and stay vigilant and they will get lucky with that one slip up.

Related Articles:
Silk Road mastermind couldn’t even keep himself anonymous online

The Street Snooper’s

I had moved house. My Internet Service provider told me the transfer of my internet connection would take 24 hours. I was in shock. I had not been without an internet connection since somewhere in the 1990’s. I couldn’t help myself, it was instinct. I clicked on the internet link and as I did so I thought “You idiot its only hour one of this long 24 hour wait, you don’t have the internet yet.” But it scanned and connected. I was online. Well, well I thought looking around the neighbouring houses, one of you has an unsecured wireless network.  Will I or wont I, that was the question? I will but in 24 hours. I know, but I’m an internet addict so I was going to beg forgiveness rather than ask permission. After my connection was transferred I knocked on the neighbours door introduced myself and asked him if he was aware he had an unprotected wireless network. He said he was but it was unlimited and paid for by his company. “Do you know about computers?” he asked. “Perhaps you can help me with my laptop?” Hours later the gods had made me pay the price for piggy backing his internet connection for those 24 hours.
It was around the same time Google Street View had been launched and Google camera cars roamed the earth like digital Jurassic predators. Websites were launched showing dirty deeds revealed by passing Google cameras. A man coming out of a brothel, a back alley dope deal going down,  a newly married man’s car found parked outside the ex-girlfriends house.  Numerous news reports followed this collateral damage caused by Google camera cars. One story showing a drunk man collapsed on the nature strip outside his house got that newspaper into trouble. It turned out the man had just returned from a wake after the burial of his best friend. Quick apologies proceeded his threatened legal action. One town in Ireland flatly refused to let the camera car enter the village limits.
A smart town as it turned out as no one was aware that the camera cars were also collecting unsecured Wi-Fi data while collecting images for Streetview. A US judge has finally ruled that Google did break the law and it now faces a user driven class action. The lame excuse that the data was “mistakenly collected” and Google had no case to answer because such data was readily accessible to members of the public and thus not subject to wire-tapping laws has been dismissed by the Judge.
Even if it is commonplace for members of the general public to connect to a neighbour’s unencrypted Wi-Fi network, members of the public do not typically mistakenly intercept, store, and decode data transmitted by other devices on the network.”  – Circuit judge Jay Bybee
I felt better about myself, if I had been a Yank I would be off the hook!
“The court made clear that federal privacy law applies to residential wi-fi networks and users should be protected when a company tries to capture data that travels between their laptop and their printer in their home.” – Marc Rotenburg, executive director of the Electronic Privacy Information Centre.
After its “inadvertent” collection of emails, user names, passwords, images and documents in over 30 countries and having already paid $7m (£4.4m) in US fines to settle a case involving 38 states in the US Google is looking at a lot more fines over this. Germany first exposed the issue and is one of the first countries to fine Google. It described the debacle as “one of the biggest known data protection violations in history”.
We will destroy the data say’s Google. We will educate our employees better. We will educate the consumers as well. There is an old Australian expression that goes: I believe you but millions wouldn’t.”
Don’t get me wrong I love Streetview. I have visited every house I’ve lived in for hours of nostalgic enjoyment. I find new places easily because I know what they look like. I love the creative ways people like Ze Frank’s “Childhood Walk” or Aaron Koblins “Wilderness Downtown” have used Streetview for different and interesting projects.

However I think the times are a changing and this is demonstrated by a quote today from the Los Angeles Times.
“With everything going on with the NSA, any privacy violation, inadvertent or not, is a sensitive thing for Google … This is one more piece of writing on the wall that the courts are going to take privacy concerns very seriously wherever they can.”

Related Articles:
Google faces Streetview wi-fi snooping action

Cyberwar is not New, it’s Now Against You!

The revelations of Edward Snowden just keep on keeping on. At a TED talk in 2011 Ralph Langner revealed the details of the Stuxnet computer worm. It was sophisticated and far beyond the capabilities of some gothic hacker cult in the back-end of the Ukraine. It could only have been developed by the government of an advanced country. The frightening fact Langer pointed out was that it is generic and could be used in the future against any advanced infrastructure needing instantaneous digital fail safe systems. Stuxnet had two payloads in its Iranian deployment. One introduced an intermittent error into the nuclear plants centrifuges to drive the engineers insane and forever delay the construction of their nuclear weapons. The other, in case all else fails, to cause the centrifuges to spin out of control, explode and take down the plant. One day it will be movie plot to look forward to. Exactly how was the Stuxnet worm placed onto the laptop or USB of an engineer working with the closed grey box systems inside the Iranian nuclear power plant?
On July the 9th of this year, Jacob Applebaum for the German daily Der Spiegel interviewed Snowden who stated that the US and Israel were behind the development and deployment of the stuxnet computer worm.

It is a long held tenet of warfare that the invention of a weapons system immediately starts the development of its counter. If no one invents a tank there is no need to invent an anti-tank gun. After the southern general “Stonewall” Jackson had 20 cavalry troopers ride in a circle across the face of a gap in the trees to fool one of the many incompetent union generals into reinforcing the wrong flank the union army started its first deployments of hot air balloons for observation.

World War II stimulated the fastest technological development in the modern era until the space race, the first and only relatively bloodless war so far. In the six years of WW2 we went from aircraft of wood, canvas and glue to the first jet. The German communication code, the enigma machine designed by Arthur Scherbius was broken early in the war by three Polish cryptologists Marian Rejewski, Jerzy Różycki and Henryk Zygalski. They gave the method of breaking the code to the British for nothing. The British further refined code breaking in the top secret “Ultra” program at  Bletchley Park. This effectively negated Germany’s superiority in war fighting and generalship and Winston Churchill claimed after the war that it was the major contributing factor to the allied victory. This also shows that the concept of cyberwar is by no means new. If the enigma machine was anything it was an early computer even if it wasn’t on the internet.

Countermeasures to new technology can also involve reusing old technology in a new way. The most amazing example is the British army’s use of the skills of one Jasper Maskelyne in the battles of North Africa. Maskelyne was the last of a long line of famous European magician’s and illusionists. Using his skills he was able to create the illusion of the city of Alexandria in the middle of an empty desert that the Germans proceeded to bomb the crap out of while the real city remained relatively untouched. With canvas and wood he created a shell game that made tanks look like trucks and trucks look like tanks to create a dummy army that helped win the battle of El Alamein.

In the conflict in Vietnam the US deployed electronic probes by air along the Ho Chi Minh trail, disguised as bamboo plants to detect the movement of people. When discovered the North Vietnamese soldiers urinated on them sending many a freaked out US airman running to his officer screaming that thousands upon thousands of drug crazed, suicide squads of hardcore North Vietnamese soldiers were moving south. In reality it was Nigel Nog after a hard night on rice wine pissing on the probe happily chuckling “Take that Yankee dog.”  Another example of the powers of piss.

The deployment of clouds of silver foil named chaff over the cities of Germany in WW2 confused radar systems to the numbers and direction of allied bomber streams as they laid waste to Germany. In a sophisticated redesign the US army in the first Iraq war in 1990 deployed the BLU-114/B “Soft-Bomb” which dispersed clouds of fine carbon filaments over electrical switching stations that shorted out 70% of Iraq’s power in the first hours of the war.

Although I am drawing a fine line with the definition: Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems. My examples provide a timeline of attack methods that used to be conducted against enemy armies. However now including private organisations and individuals and is becoming increasingly personal. Just as behavioural tracking was once confined to building buyer profiles for particular demographics to now becoming pointed and personal and directed specifically to your individual online profile.

A new survey carried out by Lieberman Software Corporation at Black Hat USA 2013 asked 200 senior IT security professionals a series of questions with a conservative 58 per cent admitting they think we’re losing the battle against state-sponsored attacks with 74 per cent already believing their corporate network has been the victim of an attack from a state-sponsored hacker out of another country with 96 per cent thinking that hacking will worsen over time.
“The threat of state-sponsored attacks is extremely serious for government and commercial entities.  The probing of IT infrastructures in both environments is occurring 24/7, with attacks being launched on a regular basis,” said Philip Lieberman, president and CEO of Lieberman Software.

Just last week reports that the Syrian Electronic Army (SEA), a pro-Assad hacking group used a cleverly constructed phishing email and by sneaking through the unsecured backdoor of a reseller were able to alter the DNS records for the New York Times, Twitter, and the Huffington Post and take them offline.
“Social-engineering and most specifically phishing is one of the largest attack surfaces we face in the security industry. Hacking through websites and breaching perimeters takes way too much time and usually not worth the effort. Sending a targeted email to a company almost guarantees you access to whatever you want and we aren’t capable of handling these types of attacks right now,” said Dave Kennedy the founder of TrustedSec.

Well we as individuals better develop that capability if others cant. We also should be proactive in helping with the security of the small business’s and organisations we work for. Maybe a power to the people development of a toolkit of counter measures has to begin at a grassroots level to protect the principles of online freedom first introduced by the Electronic Frontiers Foundation in 1990. The co-founder John Perry Barlow’s quote: “Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds.” seems to becoming increasingly apt.

Maybe we all need to start holding CryptoParty‘s in our neighbourhoods.

Related Articles: