As I’ve mentioned before, one of the chief objectives of the would-be bad guy is to gain access to the “inside” of a network or computing environment. By doing so, access to the desirable systems and information are often eased by lack of internal security mechanisms: most security folks are always worried about the perimeter. Email, by definition, allows for flow of information between the outside world and inside users. Attacking email makes lots of sense when we consider its vulnerabilities from the perspective of the attacker: email is a well-documented tool, popular, and information flows somewhat easily from outside to the inside (and out). …Read Full Article
Author: Greg Price
What’s in your EdTech System?
The bogeyman is an imaginary being often employed to scare children. For many of us, the use of a contrived creature served as a tool to foster good behavior. Our childhood experiences are littered with tales of the bogeyman, whether it be a nondescript creature that lurked under the bed, just down the hallway or lingering among the shadows, we all have tales of a creepy brute that almost got us.
In making the case for information security, the bogeyman takes many forms and lurks just within reach. …Read Full Article
Securing your holiday devices
Our bodies are connected to the internet via implantable devices, through wearables such as fitness trackers and smart watches. This holiday season, many new and exciting body trackers were revealed at discounted prices. Connecting your refrigerator and CrockPot to the internet became easier as well. After all, why would anyone want to make a shopping list or peak into the CrockPot? That’s so 2000s. …Read Full Article
Online sextortion is on the rise
“I have very bad news for you. On 12/01/2018, I got into your systems and took over your computer. Your email address is user@email.com and your password is 12345. You are a BIG pervert. I made screenshots and videos of the adult sites where you have fun. As evidence, I made a PowerPoint presentation of my proof. Visit http://dont_ever_click_on_this.com.”
I hope you’ve never received a message like this. However, if you have, I suspect the message could be terrifying. …Read More
