HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Comments
View Comments: Newest First|Oldest First|Threaded View
<<  <  Page 4/5  >  >>
David Cox
User Rank
Silver
Re: Data Disruption
David Cox   6/18/2014 8:43:40 AM
NO RATINGS
A lot of the time I see the software asking permission, and as Charles said, he not only invited them in but offered them a cocktail.  The "Your computer is infected, let us run a HD diagnostic" is a huge red flag. One of my friends says that since his kids use the computer, he only runs his everyday os as a virtual computer.  This way only current work in progress is available and if it is totally destroyed, he can just reboot to get back to where he was (with minimal data loss).  Also, with 1.5 - 2Tb external hard drives available for approx $100 and free daily backup software available it should be possible to avoid major data loss.   A good Internet Security program will catch a lot of potential attacks, but knowing what I know, if I fall victim to an internet attack it is almost like going for a walk in the jungle and being attacked by a tiger.  Preparation and foreknowledge may have avoided a problem, but not always.

Elizabeth M
User Rank
Blogger
Re: Data Disruption
Elizabeth M   6/18/2014 5:44:40 AM
NO RATINGS
You point out yet another way people's data can be exploited by hackers, Nancy. Attacks are getting so much more sophisticated these days. I feel somewhat immune since I live in a small country and three hours from the nearest big city, and work only on wireless networks mostly. But I doubt anyone is ever really "safe" when it comes to the Internet and hackers.

Elizabeth M
User Rank
Blogger
Re: So what did you do?
Elizabeth M   6/18/2014 5:21:24 AM
NO RATINGS
You have certainly inspired me. I'm quite lax about back up but think it's about time I do another one. Of course I wouldn't lose data that's terribly crucial like a business would, but would be a shame to lose stuff that's important to me.

Nancy Golden
User Rank
Platinum
Data Disruption
Nancy Golden   6/17/2014 4:35:33 PM
NO RATINGS
Another tactic is not stealing data but disrupting it by overloading servers: thereby causing them to crash and demanding a ransom to back off, so that data flow can be restored. Evernote recently experienced such an attack.

We are definitely living in different times and sadly we need to be cognizant of cybercrime.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 4:34:42 PM
NO RATINGS
Rev, I was running Internet Explorer 11.

Rev
User Rank
Silver
Re: So what did you do?
Rev   6/17/2014 3:58:55 PM
NO RATINGS
My hacking experience was quite some time ago.  I was accessing the internet on my Red Hat_5 (Linux) box through my telephone modem at home.  I disconnected and I noticed that my hard drive was running like crazy.  When I investigated, I found the following process...

egrep -ri /home mastercharge|visa

The hacker was searching each file on my hard drive for any text containing "mastercharge" or "visa".  The search was case insensitive. Fortunately, there was no text containing any of that.  I actually did have a fax document with my credit card number on it, but I did not identify my card type.  The search would not have found it.  

The hacker's root kit completely screwed up my operating system.  I had to re-install  it. I installed the latest version of Red Hat, and I installed the firewall.  I forget whether or not Red Hat_5 offered one.  I was over confident. 

My data was on a partition separate from my OS, so I did not lose anything.  I was not managing anybody's critical personal information, so not much harm was done.  Mostly, it was my wasted time.

Lessons...
  1. Your computer always is under attack. 
  2. Anybody who is managing critical information, like your credit card number, is under attack. 
  3. Run a firewall.
  4. Go to www.grc.com, run their Shields Up tool, and make sure you are invisible on the internet.

I am still running Linux.  You need to consider not running Microsoft Windows.  If nothing else, its popularity makes it the favourite target of hackers.  

What browser were you running?

Daniyal_Ali
User Rank
Iron
Your Money AND Your Data!
Daniyal_Ali   6/17/2014 1:33:18 PM
NO RATINGS
Sorry to hear about your loss Charles. And you are right, these guys are getting very professional day by day and most of them are very smart as compared to an average internet user. We really need to be cautious or the identity thefts and data loss will be a very common thing among the masses.

And $400 you say? You got lucky! The hackers who hacked Dominos's Customer Data demanded $40,000! Besides, even if you get your data back it's already corrupted as the hacker has a copy of it. So even if you pay the ransom, you do get your files back, but your data is no more private.

tekochip
User Rank
Platinum
First Hand
tekochip   6/17/2014 10:33:06 AM
NO RATINGS
Thanks for sharing the story with us, it's important for us all to hear it first hand.  I had heard about this on the network news, but first hand accounts are far more valuable.  There's some comfort in knowing that following the normal safety rules might have prevented the intrusion, but it's frightening to know that there is no way to track the criminals.  It's a problem that's only likely to get worse.  Governments are demanding back doors into everyone's network, you know, to keep us all safe, but if the "good guys" have a way into your network it isn't long before the bad guys exploit it.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:12:40 AM
NO RATINGS
You're right, Liz. I shared my story as a cautionary tale for others, especially those who may be lax about prevention and back-up, as I obviously was. It's also worth noting that many of the victims of this have been small businesses, such as pharmacies and law firms (as well as police forces), who often have a desperate need to get their files back.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:05:32 AM
NO RATINGS
I haven't contacted any agencies, Rob. My impression is that it would take a big federal agency -- the FBI, for example -- to track down the scammers on behalf of the many people who've had this happen. Whoever, does the tracking, they need to be prepared to search outside the U.S.

<<  <  Page 4/5  >  >>


Partner Zone
Latest Analysis
Self-driving vehicle technology could grow rapidly over the next two decades, with nearly 95 million “autonomous-capable” cars being sold annually around the world by 2035, a new study predicts.
MIT’s Senseable City Lab recently announced the program’s next big project: “Local Warming.” The concept involves saving on energy by heating the occupants within a room, not the room itself.
The fun factor continues to draw developers to Linux. This open-source system continues to succeed in the market and in the hearts and minds of developers. Design News will delve into this territory with next week's Continuing Education Class titled, “Introduction to Linux Device Drivers.”
Dean Kamen tells an audience at MD&M East 2014 how his team created the DEKA Arm to meet DARPA's challenge to design a better prosthetic arm for wounded veterans.
The new draw-it-on-a-napkin is the CAD program. As CAD programs become more ubiquitous and easier to use, they have replaced 2D sketching for early concepting.
More:Blogs|News
Design News Webinar Series
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
6/25/2014 11:00 a.m. California / 2:00 p.m. New York
5/13/2014 10:00 a.m. California / 1:00 p.m. New York / 6:00 p.m. London
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Aug 4 - 8, Introduction to Linux Device Drivers
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: August 12 - 14
Sponsored by igus
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service