Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Petraeus Fallout: 5 Gmail Security Facts
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
pegifoku
50%
50%
pegifoku,
User Rank: Apprentice
2/10/2016 | 11:41:27 PM
thanks
Thanks for showing me some revealing facts
citukuho
100%
0%
citukuho,
User Rank: Apprentice
2/10/2016 | 1:40:59 AM
Thanks
thanks for info
ANON1243361309294
50%
50%
ANON1243361309294,
User Rank: Apprentice
11/20/2012 | 3:26:31 PM
re: Petraeus Fallout: 5 Gmail Security Facts
was curious about that too, thanks for answering Mathew.
majenkins
50%
50%
majenkins,
User Rank: Apprentice
11/19/2012 | 4:15:41 PM
re: Petraeus Fallout: 5 Gmail Security Facts
"Want to avoid a fall from grace? Then ensure you're not the chief of a spy agency who coordinates your extramarital affairs using a free webmail service."

How about don't have an affair in the first place!!! If you are disciplined enough to remember to hide your activities well then how about being disciplined enough remain faithful to your spouse then there is nothing to hide.
ANewNickname
50%
50%
ANewNickname,
User Rank: Apprentice
11/16/2012 | 11:39:34 AM
re: Petraeus Fallout: 5 Gmail Security Facts
Maybe he's an Edgar Allan Poe fan.
FT1
50%
50%
FT1,
User Rank: Apprentice
11/16/2012 | 4:18:46 AM
re: Petraeus Fallout: 5 Gmail Security Facts
The director of the CIA doesn't know about Email encryption like PGP or ofshore VPN and email services like Unspyable. I worry about the jokers running governments these days, top down.
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
11/15/2012 | 3:45:29 PM
re: Petraeus Fallout: 5 Gmail Security Facts
Seems they would have been better off using disposable cell phones to communicate. Hard to believe our top dog would use Google services... for an affair no less. Sheesh.
macker490
50%
50%
macker490,
User Rank: Ninja
11/15/2012 | 12:18:55 PM
re: Petraeus Fallout: 5 Gmail Security Facts
learn to use GnuPG/ENIGMAIL or its equivalent Outlook/PGP

short of that just agree to a password -- preferably in a private meeting -- and then use WinZIP: Edit your message any way you like. Then ZIP it using the agreed password and send it as an attachment. Be sure to check the scrub original option. AES128 is sufficient but you can use AES256 if you like.

once you have done this your remaining concerns are: (1) you must be sure of the physical security of you endpoint computers.... and (this is the tough one) (2) you must be sure you do not have any un-authorized programming -- virus -- in your computer. If you do: your computer is an open book. I recommend starting by switching computers handling sensitive information to Linux/Ubuntu. Use a separate user logon for all sensitive activity.

this will not cover up any traffic analysis that may be employed. who you talk to can be discovered.
PhilAnderer
50%
50%
PhilAnderer,
User Rank: Apprentice
11/14/2012 | 8:50:57 PM
re: Petraeus Fallout: 5 Gmail Security Facts
One would have thought that 2 top ranking military men would have been better at hiding their extra-marital manoeuvres and had the good sense to not cheat so close to home, especially when it is so easy to meet strangers on websites such as Undercover Lovers and Ashley Madison nowadays.
indiffer3nce
50%
50%
indiffer3nce,
User Rank: Apprentice
11/14/2012 | 6:00:15 PM
re: Petraeus Fallout: 5 Gmail Security Facts
any chance you can provide ANY actual empirical data to backup your statement "Free Email Services Aren't Secure"...its quite a nice FUD statement and lacks almost any truth.
Page 1 / 2   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21394
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-22497
PUBLISHED: 2021-04-12
Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue.
CVE-2021-3163
PUBLISHED: 2021-04-12
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field.
CVE-2019-15059
PUBLISHED: 2021-04-12
In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords.
CVE-2021-21524
PUBLISHED: 2021-04-12
Dell SRM versions prior to 4.5.0.1 and Dell SMR versions prior to 4.5.0.1 contain an Untrusted Deserialization Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability, leading to arbitrary privileged code execution on the vulnerable application. The severity is Cr...