Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'Fancy Bear' Targets Democratic Sen. Claire McCaskill
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
LaptopCharger
50%
50%
LaptopCharger,
User Rank: Apprentice
8/1/2018 | 2:52:10 AM
Re: Passwords
Another example of username/password not being a good security countermeasure.many people are very curious about this issue in password.

https://laptopcharger.ae/

 
besquare
50%
50%
besquare,
User Rank: Apprentice
7/31/2018 | 12:18:10 PM
Re: Password change
"Need to switch to MFA." - 100% agreed
BrianN060
50%
50%
BrianN060,
User Rank: Ninja
7/31/2018 | 11:31:05 AM
Re: Solve all problems - click here
If you want to trick users into doing what you want them to do, just ask them to do it by the easiest possible method, one that requires no thought, time or effort. 

"Your bank" tells you there's suspicious activity concerning your account, and you should contact them (they're not asking for your account info or password - they figure you're not dumb enough for that, any more).  For your convenience, they include a link.  What do you do?  Go online or call your bank directly, or click? 

"Your company" informs you that [insert anything that would get or require your attention], and offers a link for more information.  What do you do, verify independently, or click the link?

Want to solve all your problems, and the worlds?  Hey!  If all it takes is to "click here"....

Not only have most user education efforts failed to warn against taking the easy road; legitimate application development has accustomed users to expect that road (their daily commute), to be clearly marked, free of traffic and lined with palm trees. 

So, user education efforts have been successful: in teaching them that clicking a button or link will fulfill every wish, satisfy every requirement, or solve every problem - faster than the speed of thought
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:22:16 AM
Re: Password change
'"Senate staffers received fake notification emails instructing them to change their Microsoft Exchange passwords. " This is a tricky, users expects these types of email that is why it would be successful. Need to switch to MFA.'

 

Another helpful trick is security awareness. Educating your users what to look for in phishing attempts and the authorized means of how certain processes will be performed at that entity/organization. In this case password expiration/password reset.

 

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:19:21 AM
Re: Passwords
Weakest form of authentication and yet they are still abundantly in use.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:18:48 AM
Poking the "Bear"
I've always made references to poking the bear as it pertains to honeypots and honeynets but the principle is sustained here....literally. It is no surprise that the first target towards nefarious activity would be the individual that has directly referenced constituents of the Bear. Hopefully, we can ensure that the first amendment is preserved and does not cause hindrance towards this election process.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:08:10 AM
Password change
Senate staffers received fake notification emails instructing them to change their Microsoft Exchange passwords. This is a tricky, users expects these types of email that is why it would be successful. Need to switch to MFA.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:05:42 AM
Re: It's True!
Especially if they are beyond the reach of any consequences. This is one of the main reasons we keep experiencing these types of attacks, no consequence.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:04:42 AM
Re: It's True!
If your information is valuable, someone is motivated to get it. That is a good point. In the this case I think they are trying to make a political point.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:03:28 AM
Re: It's True!
"No amount of outrage, existing or new laws, will protect you. I would agree, that is where we need to start, what do we do so likeyhood of attack minimized.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.