Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Petraeus Fallout: 5 Gmail Security Facts
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
pegifoku
50%
50%
pegifoku,
User Rank: Apprentice
2/10/2016 | 11:41:27 PM
thanks
Thanks for showing me some revealing facts
citukuho
100%
0%
citukuho,
User Rank: Apprentice
2/10/2016 | 1:40:59 AM
Thanks
thanks for info
ANON1243361309294
50%
50%
ANON1243361309294,
User Rank: Apprentice
11/20/2012 | 3:26:31 PM
re: Petraeus Fallout: 5 Gmail Security Facts
was curious about that too, thanks for answering Mathew.
majenkins
50%
50%
majenkins,
User Rank: Apprentice
11/19/2012 | 4:15:41 PM
re: Petraeus Fallout: 5 Gmail Security Facts
"Want to avoid a fall from grace? Then ensure you're not the chief of a spy agency who coordinates your extramarital affairs using a free webmail service."

How about don't have an affair in the first place!!! If you are disciplined enough to remember to hide your activities well then how about being disciplined enough remain faithful to your spouse then there is nothing to hide.
ANewNickname
50%
50%
ANewNickname,
User Rank: Apprentice
11/16/2012 | 11:39:34 AM
re: Petraeus Fallout: 5 Gmail Security Facts
Maybe he's an Edgar Allan Poe fan.
FT1
50%
50%
FT1,
User Rank: Apprentice
11/16/2012 | 4:18:46 AM
re: Petraeus Fallout: 5 Gmail Security Facts
The director of the CIA doesn't know about Email encryption like PGP or ofshore VPN and email services like Unspyable. I worry about the jokers running governments these days, top down.
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
11/15/2012 | 3:45:29 PM
re: Petraeus Fallout: 5 Gmail Security Facts
Seems they would have been better off using disposable cell phones to communicate. Hard to believe our top dog would use Google services... for an affair no less. Sheesh.
macker490
50%
50%
macker490,
User Rank: Ninja
11/15/2012 | 12:18:55 PM
re: Petraeus Fallout: 5 Gmail Security Facts
learn to use GnuPG/ENIGMAIL or its equivalent Outlook/PGP

short of that just agree to a password -- preferably in a private meeting -- and then use WinZIP: Edit your message any way you like. Then ZIP it using the agreed password and send it as an attachment. Be sure to check the scrub original option. AES128 is sufficient but you can use AES256 if you like.

once you have done this your remaining concerns are: (1) you must be sure of the physical security of you endpoint computers.... and (this is the tough one) (2) you must be sure you do not have any un-authorized programming -- virus -- in your computer. If you do: your computer is an open book. I recommend starting by switching computers handling sensitive information to Linux/Ubuntu. Use a separate user logon for all sensitive activity.

this will not cover up any traffic analysis that may be employed. who you talk to can be discovered.
PhilAnderer
50%
50%
PhilAnderer,
User Rank: Apprentice
11/14/2012 | 8:50:57 PM
re: Petraeus Fallout: 5 Gmail Security Facts
One would have thought that 2 top ranking military men would have been better at hiding their extra-marital manoeuvres and had the good sense to not cheat so close to home, especially when it is so easy to meet strangers on websites such as Undercover Lovers and Ashley Madison nowadays.
indiffer3nce
50%
50%
indiffer3nce,
User Rank: Apprentice
11/14/2012 | 6:00:15 PM
re: Petraeus Fallout: 5 Gmail Security Facts
any chance you can provide ANY actual empirical data to backup your statement "Free Email Services Aren't Secure"...its quite a nice FUD statement and lacks almost any truth.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16060
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
CVE-2018-16061
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
CVE-2021-27561
PUBLISHED: 2021-10-15
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CVE-2020-4951
PUBLISHED: 2021-10-15
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
CVE-2021-28021
PUBLISHED: 2021-10-15
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.