Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Welcome To My Cyber Security Nightmare
Newest First  |  Oldest First  |  Threaded View
Rook1
Rook1,
User Rank: Apprentice
11/5/2014 | 1:46:06 PM
Best original article I've read in a while.
A lot of original thoughts in here. Thank you.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/4/2014 | 5:07:10 PM
Re: Future result of a declining economy?
Many people would not willingly be duped into committing unlawful acts (though some definitely would). But I can conceive of a scenario where they would be tricked into doing someting seemingly harmless -- for instance we'll pay you $10 a day to download software that will monitor your YouTube preferences. As dad usefd to say, "If it seems to good to be true, it probably is." But, sadly, there are a lot of people who would take the money and run.
Robert McDougal
Robert McDougal,
User Rank: Ninja
10/31/2014 | 3:03:06 PM
Future result of a declining economy?
I can see people being duped by the "work from home" offer, but I don't think people would willingly commit criminal acts, yet. Another aspect of this that seems to make it less likely is that the criminal will expose themselves more using this scheme. They will have to either email, call or meet with their new "employees". Seems like a big risk.


To address the willingness to commit criminal acts, I personally think that if people who wish to work continue to drop out of the work force, this may come to pass. Think about it, people who want to work but are unable to find a job, run across an offer like this, would they take it? I think many would, just to make the money. So, in short this nightmare scenario may be more plausible than you may think.


Happy Halloween
Sara Peters
Sara Peters,
User Rank: Author
10/31/2014 | 1:17:15 PM
Re: Hard to believe... and yet?
@Marilyn  It really is just way too believable, isn't it? Pyramid schemes work all the time, and they're miserable. Why shouldn't this? 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
10/30/2014 | 3:41:40 PM
Hard to believe... and yet?
Would people really be duped into downloading a software package in exchange for $10 a day. But then again, I'm sure the "recruiter" would be very slick and convincing. And how hard would it be to set up a web site with a seemingly legitimate purpose. Not that improbable, really.

Great timely, fun and frightening blog, TK. Thx for writing it for us.  

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-41604
PUBLISHED: 2022-09-27
Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This ca...
CVE-2022-40199
PUBLISHED: 2022-09-27
Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information.
CVE-2022-40352
PUBLISHED: 2022-09-27
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php.
CVE-2022-40353
PUBLISHED: 2022-09-27
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php.
CVE-2022-40354
PUBLISHED: 2022-09-27
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php.