You can now find our blog at www.cqr.com/blog so please pop on over and keep up to date with Information Security News from around the globe.
Monday, 15 September 2014
Tuesday, 9 September 2014
Much ado about SOCMINT!
You may not have heard of the term SOCMINT which emerged a
couple of years ago as the abbreviation for Social Media Intelligence. What has
this to do with Apple iCloud and Celebrities?
Well if you are to believe Apple this is what was used to hack into
celebrity iCloud storage. It appears the
criminals gathered enough online information on these individuals to reset
their passwords and hijack their accounts.
Effectively we have a successful social engineering attack without
manipulating the human. No one rang
Apple, no one rang the celebrities, no eavesdropping in restaurants, no near
contact to clone phones or going through celebrity trash cans. It appears this attack relied totally on intelligence
gathering and analysis of online digital content and perhaps some targeted
phishing emails.
Social engineering of social media, I think I can create a new
acronym - SESM. Checked Google no one has used it before.
How do you stop SESM happening to you? Google, Microsoft and Apple all want you to
use their cloud services, it’s free,
it’s so convenient and you can recover
your device, so “ don’t use it” is not
the practical answer. It is about responsibility for your security. In a foreign country would you hand over your
passport to a complete stranger? Yet when
it comes to our online digital life the lack of physical presence seems to create the belief that it is ok to pass
responsibility for the security to others.
How much did you pay these strangers to do this for you?
Here are some simple strategies to keep
strangers and hackers out of your digital life:
1.
Passwords are important, give
them personality – use special characters or a pass phrase. If a site you are
using does not support them, account lockout hacker tools can automatically run
every word in the dictionary and common password combinations against your
account in only a few hours.
2.
Get in front of a screen with
someone who you have not “friended”, might be a sibling or work colleague.
Get them to look you up on Facebook and
other social sites and see what
they can see as a stranger – you might be surprised. You can then go and fix your security
settings.
3. On social media value your circle of
trust. Do not “friend” anyone you have not met. What they say to you in a
request could be totally false. There is no internet Bro code that states “I
will not make up a social media page and tell lies”. You need to protect
yourself and your friends. If they say they know you through a mutual friend –
ask your friend how they know them
before responding.
4. Would you walk up to a creep on the
street and handover a photo of your smiling face with your home address written
on the back? No, so don’t do it online.
If you upload a photo taken at home or a friend’s house make sure the location/gps
data has been removed.
5. Birth date. You need this for
Facebook so everyone can wish you happy birthday but do you really need to
divulge it on other sites? Most of the
time these sites only want this so they can market to you, it is not adding to
your experience. Limit the amount of personal information you enter on such
sites, just because they ask you don’t have to tell. If you have to enter a
birth date then for example round the year to the nearest decade. If one of these sites is compromised then the
hacker cannot use the birth date to help gain access to your important sites.
6. SMS alerts. Apple has announced it
will strengthen its iCloud account alerting in light of the celebrity hack. If
there is one thing to do as soon as possible it is go to your social media
sites and check that you have SMS alerts turned on for account change requests.
7. Security questions. As appears to
have happened to the celebrities. The questions like - what is your mother’s
maiden name , what city were born in or
what high school did you attend don’t really cut it. Instead
try - what movie star or
singer do you not like? You are more
likely to post or join conversations about things you like rather dislike –
politicians are probably the exception.
8. Phishing emails can look very
legitimate and may be personally addressed. Never respond or open links in unsolicited
email asking you about online account details or that they have something for
you. Just delete them. Only go to your
sites using your browser favourites or app, you can then check if there are any
legitimate messages for you.
Greg Starkey
BDM
www.cqr.com
Tuesday, 2 September 2014
For your eye's only
“Celebs in nude photo scandal’ make it to the top of our
news feed today and who’s clicking on the link. I have to say for 1 ‘not me’.
I’m sure Jennifer Lawrence has a lovely figure but I don’t need
to see it and the photos were never intended for the public, they are private
photos stored on a private cloud account. The only reason why the likes
of you and I are aware of them is because someone stole them! Yes, stole,
‘to take without permission or right, especially secretly or
by force’. It took for someone to hack into her and the accounts of
others and copy and exploit their private images online for all to see and
continue to use what they have to blackmail others this is a criminal act.
I was pretty shocked and disappointed seeing comments made
on social media about the images and requests for links to the images, if you
really need to see it there are sites already available with similar content by
consenting adults rather than exploiting someone who hasn't. Celebs may be
famous and making a living by providing the world with entertainment but what
they do in their own time in their own homes is private, and everyone is
entitled to their own privacy. In general we have all been brought up to
respect others, to use a level of discretion and these values should be
remembered, and simply by not clicking on that link begins to remove and sense
of credibility the hacker would feel from performing such a deed.
Although there has been no official comment of how the hack
was made or specifically where the photos were taken from iCloud or Photostream
(and likely we won’t hear about it either) I’m sure that this has raised many
questions around the Apple offices this week.
The moral of that story is if you’re using a cloud based
photo storing service maybe a little cautious of what you store, having an
eternal hard drive works just as well, as for what Jen Law is up to, if this is
really important to you maybe you need a hobby…
Sarah
Taylor
www.cqr.com
Subscribe to:
Posts (Atom)