Endpoint

4/16/2015
05:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail

7 Deadly Sins That Get Users Hacked

How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
1 of 8

Image: (Pixabay)
Image: (Pixabay)

1 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
pawan14
50%
50%
pawan14,
User Rank: Apprentice
6/8/2015 | 4:21:42 AM
Re: Username/password is main problem
The long we continue to user Username/password combination the worse these situation will get. 
SashKhe
50%
50%
SashKhe,
User Rank: Apprentice
4/23/2015 | 7:27:30 AM
Re: Username/password is main problem
If people would start using key-patterns instead of letter patterns as password, that would help too.
Example, "draw" a circle on your keyboard, every second key pressed is with shift - you just made a strong password that's as easy to remember as looking at your keyboard.
SashKhe
50%
50%
SashKhe,
User Rank: Apprentice
4/23/2015 | 7:24:54 AM
Re: Username/password is main problem
Don't forget the salt.
MarkSitkowski
50%
50%
MarkSitkowski,
User Rank: Moderator
4/20/2015 | 11:40:45 PM
Re: Username/password is main problem
I agree - and so do thousands of others, probably.

Thing is, it's not even necessary to send anything meaningful. Imagine, that you have a secret word, which only you know. Now imagine you are presented with an alphabet, under which is a random array of 0's and 1's. You enter the pattern corresponding to your secret word, which won't be the same next time you login, as the 0's and 1's are random.

Oh, yes, just in case anyone is listening on the network, you don't send the solution, you just send its SHA256 hash.

Isn't that better than passwords?
cyclepro
50%
50%
cyclepro,
User Rank: Strategist
4/20/2015 | 9:07:04 AM
hacking
One other way that was not mentioned is through Instant Messaging.

 

I always just delete any messages where I do not recognize the person.

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/18/2015 | 11:11:24 AM
Re: Fake phone calls
Nice tactic. You can also tell them what a good service they acre providing and you want to send kudos to their bosses if they can provide phone number for that. You never know, they may be providing real number of their boss.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/18/2015 | 11:07:50 AM
Re: Fake phone calls
I tend to do the same thing, not answering any unknown and waiting for voice message for the number I do not recognize. It is safer and saving time that way.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/18/2015 | 11:05:40 AM
Re: Fake phone calls
I like the idea, keeping them on the line until they hang up. Or giving the all the fake information so they can continue their effort.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/18/2015 | 11:02:35 AM
Username/password is main problem
The long we continue to user Username/password combination the worse these situation will get. Today, most common attacks are phishing and social engineering attacks on the end-users side, even these attacks are the results of the fact tags we use username/password combination. We need to find out a way to get rid of it or move the next level such as two or three factor authentication.
SmarterThanTheAverageBear
50%
50%
SmarterThanTheAverageBear,
User Rank: Apprentice
4/17/2015 | 7:55:31 PM
Re: Fake phone calls
Tell them your boss wants to hear more about their services and you are going to forward their call to him then forward them to the FBI/NSA or one of the otgher alphabet soups :)
Page 1 / 2   >   >>
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17321
PUBLISHED: 2018-09-22
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
CVE-2018-17322
PUBLISHED: 2018-09-22
Cross-site scripting (XSS) vulnerability in index.php/index/category/index in YUNUCMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the area parameter.
CVE-2018-14889
PUBLISHED: 2018-09-21
CouchDB in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local code execution vulnerability.
CVE-2018-14890
PUBLISHED: 2018-09-21
Vectra Networks Cognito Brain and Sensor before 4.2 contains a cross-site scripting (XSS) vulnerability in the Web Management Console.
CVE-2018-14891
PUBLISHED: 2018-09-21
Management Console in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local privilege escalation vulnerability.