Top security stories of the week

My top security stories of the week, as part of my work to curate the Dice Security Talent Community portal page:

Top 10 security stories of the week

Here are my favorite security stories of the past week, as part of my work to curate the Dice Security Talent Community portal:

Top Ten Security Stories of the Week

lock-and-key-icon-thumb355812A collection of various security articles from the past week from around the Web for my Dice Security Talent Community news portal.

My top ten security stories of the week

My favorite security stories from around the Net as part of my work to curate the Dice Security Talent Community:

Latest security news of the week

Here are the more notable security articles as part of my responsibilities on the Dice Security Talent Community page:

Why social engineering works

I have been to a couple of white hat security seminars over the past two weeks, one put on by Fishnet at the local SecureWorld Expo and another by Network Technology Partners. By white hat I mean people who are paid to break into their clients’ networks and demonstrate various security weaknesses. The biggest skill required? Wear a suit and smile. Sure, it is nice to have various gizmos and technical tools, but getting in the door is easy if you look nice.

Social engineering, as this is called, isn’t new. Kevin Mitnick mastered this in the 1980s, although back then he was mostly trying to break into telephone switches. But what was interesting about both talks was how effective and how often these tricks were successful: some more than 85% of the time.

In both seminars, we saw how easy it was for the hacker to hang out by an employees’ entrance, or where the outdoor smokers congregate. Then they waltz right in, sit right down, and start connecting a laptop to the network within minutes. In one case, the hacker brought his own 19-inch server inside the data center and was helped by a Verizon technician to install the box on a rack. What made this funny was the hacker was posing as another Verizon engineer! I guess Verizon is a big company: you can’t expect to know everybody. But that is exactly the point.

In another case, the visiting hacker was challenged and escorted back to the front desk. But that was rare. Most people accepted that a stranger sitting in a nearby cube was just part of the scenery. In one case, the hacker had forged their badge and even put the words “Please stop me” right below their ID photo. No one bothered to look more closely.

Hackers usually do some basic research to find out whom they need to use to construct a cover story. Sometimes they hang out where employees spend their lunch hours at a nearby eatery. And LinkedIn can be a valuable tool to get names of systems that are being used, or names of IT employees that can give up this data. You don’t need much beyond a simple request: people are too trusting. Just say you are a recruiter and are looking for candidates for a six-figure job.

One of the speakers showed us an insidious tool: a necktie that has a pinhole HD video camera and can store video. Just wear the tie (see above), and then take it off and hang it on a hook with full view of the office. You can buy it for a couple hundred bucks, and then come back and download the video via a USB cable. This makes the surveillance seen in the movie “Closed Circuit” look like child’s play. There are other USB devices that can act as key loggers: who ever checks the back of their desktop PC on a regular basis?

At the SecureWorld show, the Fishnet guys set up their own rogue Wi-Fi hotspot. Within a few hours, they had more than a dozen attendees login to the thing and start typing their IDs and passwords, all dutifully captured by the device. Some of these hotspots look like power bricks – all you need to do to hide them in plain sight is to label them “property of the IT department” and most people won’t touch them. The same thing happens at Black Hat in Vegas, even though you would think that a conference full of security professionals would be more careful.

Social engineering is certainly alive and well these days, as always. The best security is to actually test these sorts of penetrations on a regular basis, and educate your employees to be less trusting. But it goes against human nature – at least here in the Midwest where folks are usually friendly by default – to challenge someone at the workplace. Still, we humans are the weakest link and all the firewalls and intrusion prevention systems can’t protect us against these simple exploits.

Favorite security stories of the week, NSA edition

Lots of news on the security front as always. And this week we seem to have lots more implications of what the NSA is trying to do and ways to deal with them. This is part of my curation of the Dice Security Talent community that you can find here.

Time to improve your password hygiene

Let’s take a brief quiz on password hygiene. Don’t worry, the answers are all yes or no, and I won’t reveal your individual grades.

1. Do you avoid reusing the same password on multiple websites?

2. Have you changed your email password in the past 90 days?

3. Do you use the two-factor authentication for Google, Apple, LinkedIn, Facebook, Twitter, GitHub, and others?

If you answered no to any of these questions, it is time to consider upping your game. I have been spending a lot of time looking at various password-related security products for Network World, and my latest review just came out this week. The review examines password management tools. These are very useful products that enable you once and for all to eliminate the password cheat sheet from your desktop.

What is the password cheat sheet? We all have seen situations where someone places a Post-It note with a written list of passwords. I remember one time passing a brokerage firm where you could see the notes on the monitors from the street: clearly they had lousy hygiene. But many of us have gotten lazy and re-use the same password, or have similar enough passwords, that if one of our online accounts was compromised, the whole ball of wax melts.

There is a better way. The tools that I looked at for Network World include consumer-grade and enterprise-grade products that set up a master password vault where you can safely store all your passwords. Of course, you need to protect this vault with a strong password, but that is the last one that you need to remember. You can automatically fill in your authentication information from both your desktop computer and from mobile browsers from this vault, and also store other information such as credit card numbers and client notes that you want to share with your teammates. Most of the tools that I looked at have a means of synchronizing your vault so that if you enter a login ID and password from your desktop it will be available to your mobile browser or remotely if you login from a Web browser when you are using a shared computer at a remote location. Most also included a complex password generator so you can swap out your pet’s name for something a bit harder for the bad guys to guess.

Another benefit to these tools is to be able to strengthen shared administrative access to corporate servers and services, such as your SQL databases and websites. If you have a strong password for these sites, you can change it frequently without having to distribute emails with the new password or having everyone remember what the daily password will be.  This is what Liberman’s Enterprise Random Password Manager does.

A few products also included centralized administration and management features. For example, you can set up a policy to override the default auto logoff protections for PC shutdown, or when in screensaver mode, or when idle, or when the computer is locked.

One of the tools that I tested and really liked is LastPass. It is free for the individual user, and you get the full functionality of the tool this way so IT managers can easily check it out and see how it works. Once you are ready to upgrade to the enterprise version, you can start a free two-week trial, after which it will cost you $24 per user per year. Upon install (and you can run this security check afterwards as well) it tells you which insecure passwords your browsers (or password vault) have already saved, and gives you the option to remove or change them to keep things more secure.

Favorite security stories of the week

In my role as curator of the Dice Security talent community, here are my favorite stories for the past week.

Password manager reviews for Network World

Today Network World has posted the latest product review of mine and is the third in a series of reviews over the past year that I have written about the general topic. We all have too many passwords to deal with, and enterprise IT managers have too many products that can manage them.

The most recent review looks at six different products that can be used by either consumers or corporations to handle passwords in a variety of situations. They are Kaspersky Pure, LastPass Enterprise, Lieberman Enterprise Random Password Manager, 1Password, RoboForm Enterprise, and TrendMicro DirectPass. Because you can’t directly compare the six, I didn’t award a winner, but I did like LastPass and Lieberman’s products a lot.

You can also see the various features of the products in this series of screenshots that I posted on Slideshare.

My earlier review on single sign-on products last December can be found here. These are strictly enterprise-related and look at ways that enterprises can deploy more secure Web services’ logins. The winner of that review was Okta.

Finally, my review of two factor authentication tools last May can be found here. These strengthen passwords by adding another mechanism, such as your cell phone, to the login process. The winner of that review was SecureAuth’s IdP.