Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'Fancy Bear' Targets Democratic Sen. Claire McCaskill
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
LaptopCharger
50%
50%
LaptopCharger,
User Rank: Apprentice
8/1/2018 | 2:52:10 AM
Re: Passwords
Another example of username/password not being a good security countermeasure.many people are very curious about this issue in password.

https://laptopcharger.ae/

 
besquare
50%
50%
besquare,
User Rank: Apprentice
7/31/2018 | 12:18:10 PM
Re: Password change
"Need to switch to MFA." - 100% agreed
BrianN060
50%
50%
BrianN060,
User Rank: Ninja
7/31/2018 | 11:31:05 AM
Re: Solve all problems - click here
If you want to trick users into doing what you want them to do, just ask them to do it by the easiest possible method, one that requires no thought, time or effort. 

"Your bank" tells you there's suspicious activity concerning your account, and you should contact them (they're not asking for your account info or password - they figure you're not dumb enough for that, any more).  For your convenience, they include a link.  What do you do?  Go online or call your bank directly, or click? 

"Your company" informs you that [insert anything that would get or require your attention], and offers a link for more information.  What do you do, verify independently, or click the link?

Want to solve all your problems, and the worlds?  Hey!  If all it takes is to "click here"....

Not only have most user education efforts failed to warn against taking the easy road; legitimate application development has accustomed users to expect that road (their daily commute), to be clearly marked, free of traffic and lined with palm trees. 

So, user education efforts have been successful: in teaching them that clicking a button or link will fulfill every wish, satisfy every requirement, or solve every problem - faster than the speed of thought
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:22:16 AM
Re: Password change
'"Senate staffers received fake notification emails instructing them to change their Microsoft Exchange passwords. " This is a tricky, users expects these types of email that is why it would be successful. Need to switch to MFA.'

 

Another helpful trick is security awareness. Educating your users what to look for in phishing attempts and the authorized means of how certain processes will be performed at that entity/organization. In this case password expiration/password reset.

 

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:19:21 AM
Re: Passwords
Weakest form of authentication and yet they are still abundantly in use.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2018 | 11:18:48 AM
Poking the "Bear"
I've always made references to poking the bear as it pertains to honeypots and honeynets but the principle is sustained here....literally. It is no surprise that the first target towards nefarious activity would be the individual that has directly referenced constituents of the Bear. Hopefully, we can ensure that the first amendment is preserved and does not cause hindrance towards this election process.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:08:10 AM
Password change
Senate staffers received fake notification emails instructing them to change their Microsoft Exchange passwords. This is a tricky, users expects these types of email that is why it would be successful. Need to switch to MFA.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:05:42 AM
Re: It's True!
Especially if they are beyond the reach of any consequences. This is one of the main reasons we keep experiencing these types of attacks, no consequence.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:04:42 AM
Re: It's True!
If your information is valuable, someone is motivated to get it. That is a good point. In the this case I think they are trying to make a political point.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/30/2018 | 9:03:28 AM
Re: It's True!
"No amount of outrage, existing or new laws, will protect you. I would agree, that is where we need to start, what do we do so likeyhood of attack minimized.
Page 1 / 2   >   >>


News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22675
PUBLISHED: 2021-05-07
The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, C...
CVE-2021-22679
PUBLISHED: 2021-05-07
The affected product is vulnerable to an integer overflow while processing HTTP headers, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK v...
CVE-2020-14009
PUBLISHED: 2021-05-07
Proofpoint Enterprise Protection (PPS/PoD) before 8.17.0 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipar...
CVE-2021-21984
PUBLISHED: 2021-05-07
VMware vRealize Business for Cloud 7.x prior to 7.6.0 contains a remote code execution vulnerability due to an unauthorised end point. A malicious actor with network access may exploit this issue causing unauthorised remote code execution on vRealize Business for Cloud Virtual Appliance.
CVE-2021-26122
PUBLISHED: 2021-05-07
LivingLogic XIST4C before 0.107.8 allows XSS via feedback.htm or feedback.wihtm.