El Hacker Dorado

image

Here comes the bringer of bad cyber news. The permamemtly and incurably pessimistic Kaspersky Lab. So, what have we on the cyber trouble menu this time? The trouble with the curve in this matter is always related to the notorious so-called human factor. Let us see what is happening on social networks.

Especially, if you are accessing them on your mobile phones. For the newbie hackers this is a golden opportunity. You simply cannot believe how reckless the users can be on the social networks, while using their accounts on the smartphones. If you want to find something out, just ask and you will get it.

There are so many useful information leftovers all over the social networks that all you have to have is a little bit of patience and a detailed approach in order to make a use of it. In addition, the mobile social networks are such a nice cyber place for the malicious phishing activities. Is this enough?

Unless we change something about our cyber habits, there is no software in the world to save our privacy or a credit card. We have proven it one more time that bad habits online inevitably gave birth to the serious offline troubles. It is about time for us to do something serious and effective in this field.

Identica Problematica

image

The stupidest thing you can possibly do on the Internet is to use the same user names and passwords for the different online platforms and services. Then how come we keep repeating it all over again, with the self-destructive stubbornness? We are either too lazy or unforgivingly ignorant about the cyber security.

Finally, someone has decided to do something about it. What exactly and how efficiently? Well, the Facebook has decided to turn the first page. If it turns out that you are using your Facebook account user name and password for some other web service, you will get a fair warning to change them accordingly.

How the Facebook knows all of that? You should relax. If Facebook knows it, then you can rest assured more than one hacker knows it, as well. It is always better to change them all before any real damage is being done. On the other side, do not worry about your privacy. Facebook works for you, in this case.

Do we have to repeat it all? User name and password twins on the Internet are not a smart choice. Do not be lazy and at least create different passwords, if you do not have enough patience to play with the different user name combinations. Our hats off to the Facebook for this thoughtful move.

Internet Trolls And Prison Walls

image

Is there such a thing as the Internet Troll? Apparently there is. If you are an Internet troll and you are happen to be somewhere in the UK, you can easily spend some time in prison. To be a little bit more precise, instead of six months, now you are facing two years of jail time. Why? What for? Confused?

Cyber trolls are all about the virtual violence, which produces suffering and pain in the real life. We guess you do not need additional explanation, do you? The Internet trolls are all around us. We just do not call them these names or we are not fully aware it is a punishable crime. Is this a good idea?

On the one side, the new technologies ask for the new appropriate laws. On the other side, we sure hope that this new regulation will not take the wrong turn and pay an unpleasant visit to our privacy. That would be the worst case scenario in this situation. What can we do to avoid it in the first place?

That is the tricky part. Honestly, not much. What if your government thinks you are the Internet troll from its point of view, because of your political activism? This is a nice initiative, which has to be kept under a strict control. Or, otherwise we can all become trolls and orcs. They do not allow Warcraft in prison, do they?

Dr. Offline And Mr. Online

image

The immortal story about Dr Jekyll and Mr Hyde just got itself an additional chapter. This phenomenon has become so much obvious that we cannot ignore it. Not any more. It seems that some people go through a complete transformation once they get online. Why? What is happening with them?

It turns out that the Internet and especially the social networks bring the worst in some of us. In addition, some people cannot recognize themselves once they evaluate their previous online behavior. Now you see that the analogy with the Dr Jekyll and Mr Story story is definitely not an exaggeration.

From the cyber security point of view, this can cause so many serious problems. The cyber villains are your friendly neighbors in the real life. There is no way you can guess what they have done, said or suggested in their online mode. It is just like you are chasing two completely different guys, one good and one evil twin.

So, why should we worry about what someone does in the cyper space? Well, it is only a matter of time before someone gets confused about the real and cyber life. Who will prevail? The good offline or the bad online person? What if the online mode of behavior becomes the dominant offline mode?

Airlines Grounded For Cyber Security Reasons

image

It is not a joke. Not so long ago the flight schedule of the Japanese PM was hacked. Even worse, it was offered to the black hacker’s market. Do you remember how in one of the Superman movies all oil tankers were unwillingly brought together in the middle of the ocean as a result of hacking?

Well, who says we cannot do the same on the sky? Can you believe that more than 40% of all leading airlines do not have a plan nor effective strategy in terms of cyber security? Why? Maybe, they spend too much time flying and they do not have time to deal with the mother earth related problems such as the cyber attacks.

You can hack whatever you want. We can deal with that scenario. But, what about hacking a plane? There is nothing romantic about it. You are not going to make your own version of the Lost, once your plane hits the ground. And, there will not be any superhero including the Superman to rescue you.

Of all the cyber places in the world the airlines’ IT infrastructure should be the most secured ones. Can you accept the 40% chance for a cyber attack, while you are on the plane? You have greater chances to suffer from the cyber than the terrorist attack while flying. Think about it for a change, will you?

Simplicity Atrocity

image

The hackers do not move in mysterious ways. They prefer simple and effective methods. What is the best way to obtain a private information? Well, all you have to do is call and ask, as simple as that. Or, even better. Just leave a message and your victim will get back to you. Even simpler. Right?

Well, for what is worth, the latest phone scams leave you the extremely realistic messages. Something like, your credit card reports some unusual activities, please contact our support and provide all necessary data. You are already panicking, and you do not have time to think twice about your call back.

They are counting on your fear. This is a reasonable reaction to the unreasonable consequences. Before you know it, you have said all there is to know about you to a complete stranger with some dishonest intentions. So, what can we really do about it? Are we completely helpless, or there is still hope?

Always think twice before you push the panic button in your head. Do not call the suggested number right away. Call the HQ or make some additional inquiries. Surprise your friendly neighbor hacker with your patience and reasonable decision during the hard time. Difficult, but definitely worth a try.

I Am The Cyber Law?

image

Yes, we have modified the timeless movie line used by the Judge Dredd. You can rest assured that it is more than appropriate for our story. For what is worth, and it is worth a lot, the UK Government has launched a course about the cyber security especially designed for lawyers and accountants.

Well, no need to wait any longer, our hats off to this invaluable initiative. Someone has obviously put a finger on his forehead and said to himself, let us do something that truly works. Let us focus on a certain group and improve their awareness about the cyber threats and how to successfully protect from them.

We sure hope this will become a tradition, which will include more professionals not only from the legal and accountancy field. When it comes to the cyber security the proper prevention is the key. Just imagine how important the potential savings can be in this field. Better to pay for prevention than a cure.

Or, let us be a little bit more precise with this one, shall we? It is always better for an affordable cyber prevention, than to spend huge amounts for the expensive cyber cure, including the aftermath sanation process. There is a cyber law and cyber accountancy, but this is something completely different.

Amazon Cyber Pirate Bay

image

Who are the hackers, actually? The ugly, dirty and bad cyber freaks. Or, maybe you should leave your prejudices aside. Here is an additional and more appropriate definition. Nowadays, the modern hackers are the educated fools with the money on their minds. For some reason, they have embraced the dark side.

And, this is how we ended up here. In the midst of the unparalleled cyber terror. Here are some new moments to add to the existing trouble. The modern hackers have become extremely sophisticated and surprisingly patient. They plan and execute some of the most vicious actions in the long run.

The trouble with the curve in this field is that the recent attacks take the legitimate form. Did you know that almost 20% of all known cyber vulnerabilities and threats come from the Amazon Web Services. How? Well, they have found a way to become a part of the legitimate IT infrastructure.

What is the moral of this story? Our good old friendly hacker neighbors have evolved. So, we should too. Until is too late. The last thing we need it be ridiculously outdated. We should also find an IT security man to plan and fight in the long run. New circumstances call for the new solutions. Right?

Bello: An Unpleasant Hello

image

One of the most prestigious universities in the world has just been hacked. The IT department of University College London has announced or better to say admitted that almost 25,000 students and staff member emails got spammed and compromised. That is not a lesson you want to teach your students.

All the troubles started with a simple Bello in the spam emails. How come none of the youngest and brightest students could not see it coming? Well, you do not expect a spam email from the University’s President or the top managers, do you? So, what happened to the top IT security standards?

When you are on the top, you are supposed to be on the top of many things, including the cyber security, as well. These types of institutions are all about the prestige. Why risk it all for an appropriate software solution, which could have prevented it in the very first place? That was a simple question.

You do not have to be a rocket scientist to ensure the proper cyber protection. All you need to do is to do some thinking on time, and to include some preventive measures. There is no point crying your academic tears over the spilled cyber milk. You need to make sure it does not happen again. Right?

Symantec 1 & Symantec 2

image

Hey, what is happening? What is the meaning of all this? First, HP and Symantec decides to cut it in two. Why? Wait, we can understand what is happening with HP, but how about Symantec? HP Inc will deal with computers and printers. On the other side, HP Enterprise will focus on servers and Internet services.

Now, let us see what is the Symantec’s master plan? The first Symantec will handle the IT security stuff, as usual. The other, second, remaining, or call it what you want Symantec will be focused completely on the information management. Here is the catch. Does this mean there is no use to provide IT security services anymore?

Can you imagine a thing like the Kaspersky Lab and Kaspersky coffee? Enough is enough, and we demand to hear some answers. What is the use of information management, if you cannot ensure the protection of this information? For the sake of all of us, we sure hope Symantec knows what it is doing.

Huh, after these splitters, how about some mergers for a change? We are supposed to grow and combine, rather than to split. There is no way we are going to buy that this one will improve our security. What a lovely news for the hackers. They are definitely not into this splitting stuff. There is no malware cut in two. You always get the whole thing.