HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Comments
View Comments: Newest First|Oldest First|Threaded View
<<  <  Page 4/5  >  >>
David Cox
User Rank
Silver
Re: Data Disruption
David Cox   6/18/2014 8:43:40 AM
NO RATINGS
A lot of the time I see the software asking permission, and as Charles said, he not only invited them in but offered them a cocktail.  The "Your computer is infected, let us run a HD diagnostic" is a huge red flag. One of my friends says that since his kids use the computer, he only runs his everyday os as a virtual computer.  This way only current work in progress is available and if it is totally destroyed, he can just reboot to get back to where he was (with minimal data loss).  Also, with 1.5 - 2Tb external hard drives available for approx $100 and free daily backup software available it should be possible to avoid major data loss.   A good Internet Security program will catch a lot of potential attacks, but knowing what I know, if I fall victim to an internet attack it is almost like going for a walk in the jungle and being attacked by a tiger.  Preparation and foreknowledge may have avoided a problem, but not always.

Elizabeth M
User Rank
Blogger
Re: Data Disruption
Elizabeth M   6/18/2014 5:44:40 AM
NO RATINGS
You point out yet another way people's data can be exploited by hackers, Nancy. Attacks are getting so much more sophisticated these days. I feel somewhat immune since I live in a small country and three hours from the nearest big city, and work only on wireless networks mostly. But I doubt anyone is ever really "safe" when it comes to the Internet and hackers.

Elizabeth M
User Rank
Blogger
Re: So what did you do?
Elizabeth M   6/18/2014 5:21:24 AM
NO RATINGS
You have certainly inspired me. I'm quite lax about back up but think it's about time I do another one. Of course I wouldn't lose data that's terribly crucial like a business would, but would be a shame to lose stuff that's important to me.

Nancy Golden
User Rank
Platinum
Data Disruption
Nancy Golden   6/17/2014 4:35:33 PM
NO RATINGS
Another tactic is not stealing data but disrupting it by overloading servers: thereby causing them to crash and demanding a ransom to back off, so that data flow can be restored. Evernote recently experienced such an attack.

We are definitely living in different times and sadly we need to be cognizant of cybercrime.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 4:34:42 PM
NO RATINGS
Rev, I was running Internet Explorer 11.

Rev
User Rank
Silver
Re: So what did you do?
Rev   6/17/2014 3:58:55 PM
NO RATINGS
My hacking experience was quite some time ago.  I was accessing the internet on my Red Hat_5 (Linux) box through my telephone modem at home.  I disconnected and I noticed that my hard drive was running like crazy.  When I investigated, I found the following process...

egrep -ri /home mastercharge|visa

The hacker was searching each file on my hard drive for any text containing "mastercharge" or "visa".  The search was case insensitive. Fortunately, there was no text containing any of that.  I actually did have a fax document with my credit card number on it, but I did not identify my card type.  The search would not have found it.  

The hacker's root kit completely screwed up my operating system.  I had to re-install  it. I installed the latest version of Red Hat, and I installed the firewall.  I forget whether or not Red Hat_5 offered one.  I was over confident. 

My data was on a partition separate from my OS, so I did not lose anything.  I was not managing anybody's critical personal information, so not much harm was done.  Mostly, it was my wasted time.

Lessons...
  1. Your computer always is under attack. 
  2. Anybody who is managing critical information, like your credit card number, is under attack. 
  3. Run a firewall.
  4. Go to www.grc.com, run their Shields Up tool, and make sure you are invisible on the internet.

I am still running Linux.  You need to consider not running Microsoft Windows.  If nothing else, its popularity makes it the favourite target of hackers.  

What browser were you running?

Daniyal_Ali
User Rank
Platinum
Your Money AND Your Data!
Daniyal_Ali   6/17/2014 1:33:18 PM
NO RATINGS
Sorry to hear about your loss Charles. And you are right, these guys are getting very professional day by day and most of them are very smart as compared to an average internet user. We really need to be cautious or the identity thefts and data loss will be a very common thing among the masses.

And $400 you say? You got lucky! The hackers who hacked Dominos's Customer Data demanded $40,000! Besides, even if you get your data back it's already corrupted as the hacker has a copy of it. So even if you pay the ransom, you do get your files back, but your data is no more private.

tekochip
User Rank
Platinum
First Hand
tekochip   6/17/2014 10:33:06 AM
NO RATINGS
Thanks for sharing the story with us, it's important for us all to hear it first hand.  I had heard about this on the network news, but first hand accounts are far more valuable.  There's some comfort in knowing that following the normal safety rules might have prevented the intrusion, but it's frightening to know that there is no way to track the criminals.  It's a problem that's only likely to get worse.  Governments are demanding back doors into everyone's network, you know, to keep us all safe, but if the "good guys" have a way into your network it isn't long before the bad guys exploit it.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:12:40 AM
NO RATINGS
You're right, Liz. I shared my story as a cautionary tale for others, especially those who may be lax about prevention and back-up, as I obviously was. It's also worth noting that many of the victims of this have been small businesses, such as pharmacies and law firms (as well as police forces), who often have a desperate need to get their files back.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:05:32 AM
NO RATINGS
I haven't contacted any agencies, Rob. My impression is that it would take a big federal agency -- the FBI, for example -- to track down the scammers on behalf of the many people who've had this happen. Whoever, does the tracking, they need to be prepared to search outside the U.S.

<<  <  Page 4/5  >  >>


Partner Zone
Latest Analysis
Advertised as the "Most Powerful Tablet Under $100," the Kindle Fire HD 6 was too tempting for the team at iFixit to pass up. Join us to find out if inexpensive means cheap, irreparable, or just down right economical. It's teardown time!
The first photos made with a 3D-printed telescope are here and they're not as fuzzy as you might expect. A team from the University of Sheffield beat NASA to the goal. The photos of the Moon were made with a reflecting telescope that cost the research team 100 to make (about $161 US).
At Medical Design & Manufacturing Midwest, Joe Wascow told Design News how Optimal Design prototyped a machine that captures the wing-beat of a duck.
The increased adoption of wireless technology for mission-critical applications has revved up the global market for dynamic electronic general purpose (GP) test equipment. As the link between cloud networks and devices -- smartphones, tablets, and notebooks -- results in more complex devices under test, the demand for radio frequency test equipment is starting to intensify.
Much of the research on lithium-ion batteries is focused on how to make the batteries charge more quickly and last longer than they currently do, work that would significantly improve the experience of mobile device users, as well EV and hybrid car drivers. Researchers in Singapore have come up with what seems like the best solution so far -- a battery that can recharge itself in mere minutes and has a potential lifespan of 20 years.
More:Blogs|News
Design News Webinar Series
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: 10/28-10/30 11:00 AM
Sponsored by Stratasys
Next Class: 10/28-10/30 2:00 PM
Sponsored by Gates Corporation
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service