Content & Communication
2017 FrontMatter Award Winner
The FrontMatter Award Winner program honors developers who have excelled over the last years and helped frontmatter.com to be what it is today. This year's award was won by John Dagelmore of J!Extensions Store for providing superior and dedicated services.
I am always amazed by the number of colleagues who accept invitations from fake accounts on LinkedIn. This, without checking the credentials of the person behind the account. Some fake accounts have reached over 500 connections. Is social networking all about the number of followers? The problem is that when you accept connections from fake accounts, you are exposing all your genuine connections who might now be targeted by email-based phishing campaigns, using social engineering and inviting them to click on a link.
When I receive an invitation on LinkedIn from someone who wants to join my network, I check his contacts. My interest increases in proportion to the number and quality of their contacts. But when I see a profile with reasonable expertise, and lots of contacts, I lower my scrutiny.
Of course, we all say "not me...", but, unprepared or too busy, you and I may end up accepting and opening invitations or messages. Then, without thinking, we click on a link, thereby downloading malicious software onto our devices. Hackers then are able to use our devices to launch the attack and encrypt files. We all know that, right?
Another common way for malicious software to be installed on our device is through ads on websites, or downloading questionable apps and programs. We need to exercise caution when opening unsolicited emails or visiting unfamiliar websites. It helps to read reviews about programs before you download them.
As much as possible, I try to check the credentials of the person sending an invitation. We can never be too vigilant. You can call me paranoid, but paying attention to recommendations on how to protect my professional social accounts is a priority. I think that I'm most exposed on my personal social accounts, where I tend to trust my connections. So I keep this list handy:
1- Backup files and data on a daily or weekly basis
2- Be suspicious of emails, websites, and apps
3- Use an antivirus program
4- Always install updates
5- Create a security plan before you are exposed
If you've been infected by ransomware, immediately disconnect your computer from the internet to avoid infecting devices of family, friends. and colleagues. Report the case to your local law enforcement. If you have seen the The Good Wife series, you may be tempted to pay the ransom, but by doing so, you are encouraging the hackers. If you had the foresight to carry insurance covering such risks, contact them immediately and follow their instructions. Contact professional developers to assist you with recovering data and reinstalling software.
I found the following article, "Cyber Security Threats in 2017 That You Can't Just Ignore... [How Vulnerable Are You?]" by Lois McConnachie Then Lois gives some hints on possible methodology used by a successful hacker. I smiled when reading her description of the methodology used by a typical hacker:
Are you even aware of the methodology used to employ a successful hack? You may be wondering; why do I even need to know this? I’m not interested in developing this particular set of skills. Well, if you want to beat a hacker then you need to start thinking like one! Some brave hackers will take a chance and go straight for the exploit but following the proper methodology tends to be successful and lessens the risk of being caught red-handed. [...]
To support Lois' thinking, I will add that hackers love site owners who need content and users (like me). One of their approaches used is to friendly offer articles for publication, or to become contributors on your site. I have tracked several of them through their multiple profiles on social networks. Their activities and postings, often with various IDs, are often attached to one person. If you do an online background check, you will likely find that it is loaded with nefarious information, listing their colorful activities, confirming your suspicions.
Yes, I learn a lesson. I better trust my friends and colleagues. So, if you are among them, don't be surprised if I call on you for articles...
Do you want to read more about such exploits? Read the Comodo Threat Research Labs Report extract:
The malware was designed to avoid detection by sandboxing and artificial intelligence technologies common in many endpoint protection systems," says Fatih Orhan, head of Comodo's Threat Intelligence Lab (CTIL). You may think that this malware is targeting mostly businesses, dream on, it's directed at individuals as well.
In Q3 2017, (CTRL) detected nearly 400 million malware incidents from around the world – and some within every nation-state on the planet. Even the tiny island nation of Kiribati has malware. Malware is a global security challenge that is only growing: in Q3, Comodo detected roughly four times the number of malware incidents as in Q2 (97 M). Cyber spies and criminals are busy, so it is critical that enterprises develop a sound cybersecurity strategy as soon as possible...
Q3 2017: Most Dangerous Malware
The most dangerous malware types were:
- Trojan horses (13.7 M) were the most common malware type, and Ukraine was the top victim.
- Viruses (5.4 M), with Brazil as the most vulnerable.
- Worms (2.8 M), and Russia was the most victimized nation.
- Backdoors (553 K), with the U.S. in the lead.
- Packers (384 K), with Russia in first place.
Phishing Goes Global, Spearheaded by “Zombie Computers” The Comodo Threat Intelligence Lab (CTIL) was the first cybersecurity analysis firm to discover a number of new, large-scale and global email-based phishing campaigns this quarter. Three were related to the “Locky” Trojan and used social engineering to get users to click on links, which delivered a ransomware payload.
“This attack was unique in its combination of sophistication and size, backed by a botnet spread across more than 11,000 IP addresses in 133 countries in just the first stage of the attack,” said Fatih Orhan, head of CTIL. “Also, the malware was designed to avoid detection by sandboxing and artificial intelligence technologies common in many endpoint protection systems.”
CTIL detected the phishing campaigns from August to September 2017. They were launched primarily from the IP addresses of infected “zombie computers,” owned by telecom companies and ISPs. Of the enterprise customers attacked, only the ones with a “default deny” security posture were truly safe.
The strategic analysis included in this Comodo report can help cyber defenders at the tactical level by helping them to see where they fall in the global malware landscape. Remember, cybersecurity is much more about brains than brawn. Businesses must integrate security into their corporate culture, and metrics are key to the decision-making process. Cyber spies and criminals take advantage of the mazelike, international architecture of the internet to achieve a high degree of anonymity. Therefore, it is important that enterprises collaborate with partners, both within their national borders and in other countries, in order to understand who is attacking them, and why...
The Comodo Threat Research Labs Q3 2017 Report is the third quarterly publication of the Comodo Threat Research Labs, a group of more than 120 security professionals, ethical hackers, computer scientists, and engineers, who work for Comodo full-time analyzing malware patterns across the globe. Comodo is a global innovator of cybersecurity solutions. For more detail on malware, countries, and even whole continents, please download the Comodo Threat Research Labs Threat Report Q3 2017. […]
Wednesday December 13
On Medium: Acquiring your first 100k active users is an art, but a messy one—especially if you don’t have a lot of money to spend on marketing and paid acquisition. Winnie…
Wednesday December 13
On TechCrunch: Professional social networks like LinkedIn have long been a mainstay of business, but what if you are more of a creative bent where LinkedIn looks pretty stuffy? In the…
Wednesday November 29
On BetaNews: Most data thefts are down to relatively simple techniques, like phishing, in order to get hold of login credentials. But even where systems are well protected, hackers can…
Wednesday November 29
On BetaNews: Machine learning is taking the tech world by storm. Recently, an announcement that Google was open-sourcing Tensor Flow, their machine learning (ML) software, and Microsoft quickly followed suit. Baidu and Amazon unveiled their own deep learning…