Read: http://www.h-online.com/security/news/item/Trustwave-issued-a-man-in-the-middle-certificate-1429982.html
SSL/TLS scheme have proven itself to be ineffective at protecting data confidentiality and authenticity of client/servers anymore. It is time something changed.
Showing posts with label encrypted webpage. Show all posts
Showing posts with label encrypted webpage. Show all posts
Tuesday, February 7, 2012
Tuesday, October 11, 2011
Reacting to a hacked email account
In an event your email account or your friend's email account security have been breached, I have some ideas below that might help.
The reason I am writing all these is I have seen many people's accounts being used to send spam (because their accounts are hacked) and no one tells their friends about the breach so the correct reaction could not be taken and probably be deleted or sent to the spam mail or trash. Another reason is no one bothers about their accounts being hacked and be used for spam because their emails are not important to them. The huge mistake is, the usage of their hacked emails as "robots" or "zombies" to control, the person who is in control of the accounts (puppet master) can use these accounts for other malicious deeds and harm others. It becomes a chain reaction and may snowball into something big.
So enough of the talk and let's get into the topic.
My friend's email have been hacked !!!
Yes, you can tell your friend's email have been hacked. He/she sends you suspicious links (so don't click on "juicy" or obviously dangerous links). Another trend to note is the "To" list of people who would be receiving the malicious spam mail. The list of people in the "To" field (whoever that would receive the malicious spam mail) would be alphabetical. Who would ever be so careful to include people into the "To" list of receivers of an email in a very neat and well thought out alphabetical fashion other than a computer program ?
To summarise, you would notice a weird link in the email or some attachment that makes no sense and the list of "To" people (which would include your own email address) would be so neatly adjusted in an alphabetical fashion.
So how do you react ? Firstly, take a screenshot and forward back the link as an evidence to your friend's email (hoping he/she can still access his/her account). Contact your friend via a channel they usually would and tell them to change the password to something else that's not some default passwords people usually use (good password selection policy). Also advise your friend to change all other accounts that he had used that compromised account to register as well. The notion is that the intruder might have used the email account to request for password resets or some emails might contain passwords from account registrations that people might refuse or forget to change. Finally, if it's possible, ask your friend to alert the email provider of a possible breach so that the email provider can investigate their own security measures and carry out some security audits to ensure other users are safe.
My email have been hacked !!!
Ok, do not panic. Attempt to change the password in the email account and the other accounts linked to that email account that have been compromised. If you are locked out of your own accounts of any sorts, then notify the service provider (email or account provider) while they investigate into the matter. Notify your friends to be careful of the compromised accounts. The best way is to ask your friends to alert you any time when they suspect a spam from your account (this arrangement can be done without any event from happening yet as a safety precaution and a good security practise). All you need to do after you have warned the necessary people is to wait for the investigation to take it's course. There is nothing much you can do unless you would consider making yourself a new email account (and secure it safely with a new well-designed password).
Some additional measures to ensure security
Always use HTTPS (secure and encrypted) if the email or website provides one. If there is a setting in the website or email provider's options to turn on HTTPS, use it as the default instead of HTTP (insecure and unencrypted). Change passwords at least once every few months if possible and do not use the same password across multiple accounts. It makes predicting passwords so much easier. Use a password manager like KeePass (http://keepass.info/), KeePassX (http://www.keepassx.org/) or PasswordSafe (http://passwordsafe.sourceforge.net/) that have the capabilities to use strong encryption to store your personal information and passwords. Obviously, use a pretty strong password which you can easily remember to protect your password manager as the login password and DO NOT SHARE PASSWORDS !!
Conclusion
Overall, it is hard to deal with email account breaches as you might not be the owner of the email server. You are usually using a web-based email service someone provides you (Hotmail, Yahoo, Gmail...etc...) which you have very little control over. The above practises are thought out to reduce the damages a compromised account can do by acting responsibly. Do not forget, you might think that your email account is insignificant but it can be used to create bigger threats.
© 2011 Thotheolh / ThothTech. Part or whole of this article can be reproduced or quoted if their meanings are not distorted, else link them to this article.
The reason I am writing all these is I have seen many people's accounts being used to send spam (because their accounts are hacked) and no one tells their friends about the breach so the correct reaction could not be taken and probably be deleted or sent to the spam mail or trash. Another reason is no one bothers about their accounts being hacked and be used for spam because their emails are not important to them. The huge mistake is, the usage of their hacked emails as "robots" or "zombies" to control, the person who is in control of the accounts (puppet master) can use these accounts for other malicious deeds and harm others. It becomes a chain reaction and may snowball into something big.
So enough of the talk and let's get into the topic.
My friend's email have been hacked !!!
Yes, you can tell your friend's email have been hacked. He/she sends you suspicious links (so don't click on "juicy" or obviously dangerous links). Another trend to note is the "To" list of people who would be receiving the malicious spam mail. The list of people in the "To" field (whoever that would receive the malicious spam mail) would be alphabetical. Who would ever be so careful to include people into the "To" list of receivers of an email in a very neat and well thought out alphabetical fashion other than a computer program ?
To summarise, you would notice a weird link in the email or some attachment that makes no sense and the list of "To" people (which would include your own email address) would be so neatly adjusted in an alphabetical fashion.
So how do you react ? Firstly, take a screenshot and forward back the link as an evidence to your friend's email (hoping he/she can still access his/her account). Contact your friend via a channel they usually would and tell them to change the password to something else that's not some default passwords people usually use (good password selection policy). Also advise your friend to change all other accounts that he had used that compromised account to register as well. The notion is that the intruder might have used the email account to request for password resets or some emails might contain passwords from account registrations that people might refuse or forget to change. Finally, if it's possible, ask your friend to alert the email provider of a possible breach so that the email provider can investigate their own security measures and carry out some security audits to ensure other users are safe.
My email have been hacked !!!
Ok, do not panic. Attempt to change the password in the email account and the other accounts linked to that email account that have been compromised. If you are locked out of your own accounts of any sorts, then notify the service provider (email or account provider) while they investigate into the matter. Notify your friends to be careful of the compromised accounts. The best way is to ask your friends to alert you any time when they suspect a spam from your account (this arrangement can be done without any event from happening yet as a safety precaution and a good security practise). All you need to do after you have warned the necessary people is to wait for the investigation to take it's course. There is nothing much you can do unless you would consider making yourself a new email account (and secure it safely with a new well-designed password).
Some additional measures to ensure security
Always use HTTPS (secure and encrypted) if the email or website provides one. If there is a setting in the website or email provider's options to turn on HTTPS, use it as the default instead of HTTP (insecure and unencrypted). Change passwords at least once every few months if possible and do not use the same password across multiple accounts. It makes predicting passwords so much easier. Use a password manager like KeePass (http://keepass.info/), KeePassX (http://www.keepassx.org/) or PasswordSafe (http://passwordsafe.sourceforge.net/) that have the capabilities to use strong encryption to store your personal information and passwords. Obviously, use a pretty strong password which you can easily remember to protect your password manager as the login password and DO NOT SHARE PASSWORDS !!
Conclusion
Overall, it is hard to deal with email account breaches as you might not be the owner of the email server. You are usually using a web-based email service someone provides you (Hotmail, Yahoo, Gmail...etc...) which you have very little control over. The above practises are thought out to reduce the damages a compromised account can do by acting responsibly. Do not forget, you might think that your email account is insignificant but it can be used to create bigger threats.
© 2011 Thotheolh / ThothTech. Part or whole of this article can be reproduced or quoted if their meanings are not distorted, else link them to this article.
Wednesday, July 14, 2010
Censorship extends to IM, Email and the Web ?
Read this: http://arstechnica.com/tech-policy/news/2010/07/new-massachusetts-law-extends-censorship-to-im-e-mail-web.ars
Oh my, what are the politicians thinking in the 'Land of the Free' ? Imagine you are trying to chat with someone and you have to worry whether you chat conversations would suddenly be dropped or your private emails would be inspected by someone and never be delivered successfully ?
I think the 'Land of the Free' have become so incompetent and locked down to the point, what's it's difference between itself and North Korea , except that North Korea isn't as advanced technologically.
It's time we exercise our freedom, switch on the Tor network, encrypt using AES 256, SSH, all websites and search engines switch from HTTP to HTTPS, secure our personal and enterprise assets, encrypt all our IM, emails, logs...etc.
Let's not allow others to control us and our rights and freedom.
Power to the People !
Out for now... brb soon...
Oh my, what are the politicians thinking in the 'Land of the Free' ? Imagine you are trying to chat with someone and you have to worry whether you chat conversations would suddenly be dropped or your private emails would be inspected by someone and never be delivered successfully ?
I think the 'Land of the Free' have become so incompetent and locked down to the point, what's it's difference between itself and North Korea , except that North Korea isn't as advanced technologically.
It's time we exercise our freedom, switch on the Tor network, encrypt using AES 256, SSH, all websites and search engines switch from HTTP to HTTPS, secure our personal and enterprise assets, encrypt all our IM, emails, logs...etc.
Let's not allow others to control us and our rights and freedom.
Power to the People !
Out for now... brb soon...
Sunday, December 27, 2009
Self proclaimed righteousness
There have always been self righteous people who try to be hypocritical and refuse the Rights of Freedom to others. We have seen these sort of scenarios in the Past and in the Present and it would continue into the Future.
Governments, agencies, ISPs, organizations, have introduced means and ways to remove Freedom from the people. Some organizations like Comcast supports 'Deep Packet Inspection',throttling user's network traffic and forging fake data packets. Many countries require anyone to reveal their passwords when asked by authorities and setup 'Great Walls' to ban Free access to contents on the Web. They use the name of Justice, proclaiming to fight supposed crime and bring supposed 'Justice'.
The Web was once a Free place but now it's Freedom have been removed. People resort to use tools like proxies, encryption, password protection, anonymous identity... to protect themselves and gain access to contents on the Web.
There are people who wish that the Freedom be removed so that they can commercialize from the removal of Freedom.
We do we need to promote such restrictions of Freedom ? Was it really for Justice ?
Think about it....
Governments, agencies, ISPs, organizations, have introduced means and ways to remove Freedom from the people. Some organizations like Comcast supports 'Deep Packet Inspection',throttling user's network traffic and forging fake data packets. Many countries require anyone to reveal their passwords when asked by authorities and setup 'Great Walls' to ban Free access to contents on the Web. They use the name of Justice, proclaiming to fight supposed crime and bring supposed 'Justice'.
The Web was once a Free place but now it's Freedom have been removed. People resort to use tools like proxies, encryption, password protection, anonymous identity... to protect themselves and gain access to contents on the Web.
There are people who wish that the Freedom be removed so that they can commercialize from the removal of Freedom.
We do we need to promote such restrictions of Freedom ? Was it really for Justice ?
Think about it....
Monday, November 30, 2009
norbt
I was reading my RSS feeds recently (which I have not accessed for weeks due to being busy) and 'norbt' caught my attention. norbt , as described on it's webpage, is a webpage containing encrypted text and you need a key / answer to decrypt it like how you do encryptions. norbt's webpage is: https://norbt.com/.
It's a cool piece of technology. How relevant is it... it depends. I personally would use logins and servlets with HTTPS if I want users to access confidential or secret data. But if I want a quick encrypted page to be up, maybe I would consider using norbt.
It's a cool piece of technology. How relevant is it... it depends. I personally would use logins and servlets with HTTPS if I want users to access confidential or secret data. But if I want a quick encrypted page to be up, maybe I would consider using norbt.
Subscribe to:
Posts (Atom)