I talk quite a bit about computer viruses and computer security on this site. It’s probably one of the bigger problems that I grapple with for my customers. Today I’m going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It doesn’t affect a specific operating system or piece of software. It’s also the MOST attacked and exploited vulnerability in all of computing.
Yes, the computer user is usually the weakest link in the computer security environment.
Social Engineering is what is referred to as the computer cracker con-man’s best tool.
Take this example. The phone rings, “hi I’m from _yourisp_, we’ve had a problem here with some of our mailservers and need to get some information from you about your username and password.” Ok, many home users have to scratch for the information, but is the caller really from your isp, don’t they know that information? Unfortunately some people are gullible enough to bite.
This is, in many ways, no different from the phishing attacks that we see. A message claiming to be from your bank asking you to login and “verify” your account information.
OK, let’s say it’s a business environment. Hi, I’m the new computer tech guy and was asked to install some software on your machine….. oh, I didn’t realize… well, ok.
I’m sometimes amazed when I go into a business and explain to a new face that I’m there to look at their computer and many without question to me or anyone else will say ok and let me in to the keyboard. Of course, I’m not going to install trojans or backdoors, I’m always at businesses for a legitimate call. It is a bit amazing when you consider how easily some will accept the story at face value without batting an eye.
The bottom line here is to try and check with someone who knows whether or not the person should be there. Is he really the new tech guy, call the IT desk and ask to verify. If you’re only there some days, but suspect that other people know him, check with someone that should have met them.
The next element of security fault you might present is the choosing of passwords. Usually dictionary or name based passwords are TERRIBLE security wise because they can easily be cracked by an automated, dictionary-based password cracking tool. “But it’s hard for me to remember something else.” Try this approach, think of a phrase…. let’s see….
“ask not for whom the bell tolls, it tolls for thee”
Let’s use the first initials of words to make a password…
ok, not bad, better than bell (or belltolls).
Let’s try substituting numbers that sound like words (four/for)
That looks much better. It appears fairly random, would be tougher to crack and probably easy to remember. In fact even without the phrase some folks might have it memorized in about 4-6 uses.
One important note. Be careful about leaving passwords taped to the monitor, keyboard or in close proximity to the computer. That is VERY obvious, even if you don’t specify PASSWORD.
Think about what you throw away. Did you just through out your login information into the trash or did it get shredded before going out. Don’t underestimate the advantage that a cracker could gain by any detail of information about network layout, usernames, internal software. As we might have seen in the article on google’s use in cracking there are lots of bits of data that can be gleaned from a search engine that could be useful for a cracker. (If you followed the links you’ll be certain to have seen some great examples.) One such is computer system software audits. This would detail the version of the Operating system and all software installed. A literal goldmine for an attacker looking for a foothold in the network.
Another avenue is web pages. Let’s say we go to a site and something pops up saying “you have a virus – click here to remove”. Wow, I guess I better do what it says. Stop and look. Is it in a web browser window, what does the title look like. Is it very flashy and eye-catching or is it something more like what you’ve seen your antivirus software warn with before. I’ve seen people fall for this as an ad and on the click, a piece of software downloads and installs that is more of a headache than some of the real viruses. If in doubt, close that window and any others, open a new browser session and visit Trendmicro’s online antivirus scan
Beyond that stop and think anytime a website tries to automatically download software.
Be cautious, be “web smart” and don’t let yourself be the weak link in the security of your pc.
Related PostsRelated Posts
- Firefox 220.127.116.11 out and be cautious with extensions... Well, let's start with the extensions first. Like ANY software, you should be cautious installing something from an untrusted source. If you think an extension looks neat and cool - look for reviews and third party information before installing it. That much said.... never install an extension that comes attached......
- Pakistan/India hacker skirmishes. The Hindustan times has an article on the latest round of India vs. Pakistani hacker/IT online skirmishes. It sounds as though there has been a recent rash of back and forth with Pakistani cracker groups trying to break into and deface Indian web sites and India trying to get word......
- Network Security guide for the home or small business network - Part 11 - Why? Alright, so you're still reading this series and you're thinking. Look, I'm not protecting national security secrets. All I'm doing is (running a business|emailing my grandkids|using the web for research). True, good point. You're not at the defense department. OK. Let's say you just use your computer for email and......
- What Exactly is a Registry Repair Cleaner? A lot of confusion surrounds the registry repair cleaner tool and what it does exactly. In fact, you may be like most computer owners and not even be aware that such a tool exists. Most people that own a computer never find out how a registry repair cleaner can help......
- How to Evaluate Your Financial Risks Whether we realize it or not, many of us face financial risks every single day. From the high powered investor, to the minimum wage earner, every one of us has the potential to lose everything we own. How can you evaluate your financial risks and find ways to secure your......
- Wireless Broadband Internet-whether It Is LAN Or WAN Service-is Associated Having A Wireless broadband Internet-whether it is LAN or WAN service-is associated having a number of diverse myths. These typically center on security and need to do with anxiety about how info is transmitted over a wireless connection and, furthermore, need to do with concerns about eavesdropping, in several cases. You will......
- Windows XP lost administrators password
- Network Security guide for the home or small business network – Part 10 – use good passwords
- Google Talk on Linux using wine
- Varying Degrees of Password Security
- Park Your Virus Impervious Smugness Mac (and Linux) Users