Wikipedia is suing the NSA. The organization with all of our public knowledge is suing the organization with all of our private knowledge. Is now the time for other massive companies and organizations to make a stand?
This week US Rep. Marsha Blackburn filed legislation under the name of “Internet Freedom Act” in an effort to “overturn the Feberal Communications Commission’s new network neutrality rules”. This is especially interesting to me since Blackburn received ” $25,000 from an AT&T political action committee (PAC), $20,000 from a Comcast PAC, $20,000 from a cable industry association PAC, and $15,000 from a Verizon PAC, according to the Center for Responsive Politics.” This means that she is essentially promising the complete opposite of what is actually happening. Another case of a politician cashing in for personal gain while hiding behind a mask of “freedom”.
The sentence that irritated me the most was this: ““Once the federal government establishes a foothold into managing how Internet service providers run their networks they will essentially be deciding which content goes first, second, third, or not at all,”
I seriously do not understand how a person can read that and think “oh look, freedom”
Using this source, you can set up your own attack map. This provides a graph that shows
any attacking IPs to your system. The map itself looks like this:
The map also comes with sound effects.
A lot of people talk about the increasing frequency and intensity of cyber attacks these days. Something people aren’t talking about enough is the difference between one type of cyber attack vs another. I’m always hearing “Company X has been hacked!” and yet not one seems to go into specifics.
If I asked you “Are cyber attacks which target finances on the rise? or are they on the decline?” I’d bet that the majority of you would say that these attacks are on the rise, and for good reason. More and more the media has been covering cyber attacks because the general public is more invested into technology than ever before. As of January 2014, 58% of Americans have a smart phone. More people now have smart phones than those who don’t in the United States. That is amazing. So, I think it’s time people start to look at what the cyber attacks are doing.
Financial attacks are on the decline since 2014. Why? It’s probably a mix of several reasons: Shift of focus by the hackers, better security and law enforcement, large focus attacks are shifting to be more important than small spread attacks.
No matter the reasons, we should be thinking about this. If we don’t understand why a certain trend in computer security is happening then how can we possibly expect to prevent it?
Every now and then I’ll stumble upon yet another article talking about the cons to all of the newly introduced “smart” products. “Smart” wallets, lights, appliances, etc etc. The list goes on. The most recent smart product con I was reading about was by none other than Keurig.
For those who haven’t read about this stuff, basically what happened is this:
Keurig releases new product with “innovative technology”.
Users eventually discover that the “innovative technology” which is supposed to make life easier for them actually makes things difficult and mostly just expensive.
People find work-arounds for this new technology.
Keurig tries to prevent the work-arounds.
Keurig gets a bunch of terrible press.
Well this crap keeps happening and I think it’s the reason computer security jobs continue to grow and become more important in society.
Just a few ago people were hacking into the security vulnerabilities of BMW cars, finding ways to take over the vehicle. A car is not a coffee machine. This is scary stuff.
It’s always interesting to step back and look at the lack of security in wireless internet connections. Even as I’m driving around in my neighborhood, I can detect a ton of completely open (or might as well be open) wifi connections all over the place.
This got me thinking about how difficult it is to get into a “secure” wifi router. That’s when I stumbled upon this post: http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html
This shows step by step, the methods used to attack a tp-link router. Simple scripts can go so far.
Not long after having been shown to store credentials in a standard text format (see link below), Lizard squad is claiming to be responsible for even more crap.
These guys will claim anything to get attention and here I am, giving them attention.