Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Welcome To My Cyber Security Nightmare
Newest First  |  Oldest First  |  Threaded View
Rook1
Rook1,
User Rank: Apprentice
11/5/2014 | 1:46:06 PM
Best original article I've read in a while.
A lot of original thoughts in here. Thank you.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/4/2014 | 5:07:10 PM
Re: Future result of a declining economy?
Many people would not willingly be duped into committing unlawful acts (though some definitely would). But I can conceive of a scenario where they would be tricked into doing someting seemingly harmless -- for instance we'll pay you $10 a day to download software that will monitor your YouTube preferences. As dad usefd to say, "If it seems to good to be true, it probably is." But, sadly, there are a lot of people who would take the money and run.
Robert McDougal
Robert McDougal,
User Rank: Ninja
10/31/2014 | 3:03:06 PM
Future result of a declining economy?
I can see people being duped by the "work from home" offer, but I don't think people would willingly commit criminal acts, yet. Another aspect of this that seems to make it less likely is that the criminal will expose themselves more using this scheme. They will have to either email, call or meet with their new "employees". Seems like a big risk.


To address the willingness to commit criminal acts, I personally think that if people who wish to work continue to drop out of the work force, this may come to pass. Think about it, people who want to work but are unable to find a job, run across an offer like this, would they take it? I think many would, just to make the money. So, in short this nightmare scenario may be more plausible than you may think.


Happy Halloween
Sara Peters
Sara Peters,
User Rank: Author
10/31/2014 | 1:17:15 PM
Re: Hard to believe... and yet?
@Marilyn  It really is just way too believable, isn't it? Pyramid schemes work all the time, and they're miserable. Why shouldn't this? 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
10/30/2014 | 3:41:40 PM
Hard to believe... and yet?
Would people really be duped into downloading a software package in exchange for $10 a day. But then again, I'm sure the "recruiter" would be very slick and convincing. And how hard would it be to set up a web site with a seemingly legitimate purpose. Not that improbable, really.

Great timely, fun and frightening blog, TK. Thx for writing it for us.  

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40204
PUBLISHED: 2022-12-01
A cross-site scripting (XSS) vulnerability exists in all current versions of Digital Alert Systems DASDEC software via the Host Header in undisclosed pages after login.
CVE-2022-46162
PUBLISHED: 2022-11-30
discourse-bbcode is the official BBCode plugin for Discourse. Prior to commit 91478f5, CSS injection can occur when rendering content generated with the discourse-bccode plugin. This vulnerability only affects sites which have the discourse-bbcode plugin installed and enabled. This issue is patched ...
CVE-2019-18265
PUBLISHED: 2022-11-30
Digital Alert Systems’ DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability that allows remote attackers to inject arbitrary web script or HTML via the SSH username, username field of the login page, or via the HTTP host header. The injected con...
CVE-2022-46156
PUBLISHED: 2022-11-30
The Synthetic Monitoring Agent for Grafana's Synthetic Monitoring application provides probe functionality and executes network checks for monitoring remote targets. Users running the Synthetic Monitoring agent prior to version 0.12.0 in their local network are impacted. The authentication token use...
CVE-2022-23746
PUBLISHED: 2022-11-30
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.