HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Comments
View Comments: Newest First|Oldest First|Threaded View
<<  <  Page 4/5  >  >>
David Cox
User Rank
Gold
Re: Data Disruption
David Cox   6/18/2014 8:43:40 AM
NO RATINGS
A lot of the time I see the software asking permission, and as Charles said, he not only invited them in but offered them a cocktail.  The "Your computer is infected, let us run a HD diagnostic" is a huge red flag. One of my friends says that since his kids use the computer, he only runs his everyday os as a virtual computer.  This way only current work in progress is available and if it is totally destroyed, he can just reboot to get back to where he was (with minimal data loss).  Also, with 1.5 - 2Tb external hard drives available for approx $100 and free daily backup software available it should be possible to avoid major data loss.   A good Internet Security program will catch a lot of potential attacks, but knowing what I know, if I fall victim to an internet attack it is almost like going for a walk in the jungle and being attacked by a tiger.  Preparation and foreknowledge may have avoided a problem, but not always.

Elizabeth M
User Rank
Blogger
Re: Data Disruption
Elizabeth M   6/18/2014 5:44:40 AM
NO RATINGS
You point out yet another way people's data can be exploited by hackers, Nancy. Attacks are getting so much more sophisticated these days. I feel somewhat immune since I live in a small country and three hours from the nearest big city, and work only on wireless networks mostly. But I doubt anyone is ever really "safe" when it comes to the Internet and hackers.

Elizabeth M
User Rank
Blogger
Re: So what did you do?
Elizabeth M   6/18/2014 5:21:24 AM
NO RATINGS
You have certainly inspired me. I'm quite lax about back up but think it's about time I do another one. Of course I wouldn't lose data that's terribly crucial like a business would, but would be a shame to lose stuff that's important to me.

Nancy Golden
User Rank
Platinum
Data Disruption
Nancy Golden   6/17/2014 4:35:33 PM
NO RATINGS
Another tactic is not stealing data but disrupting it by overloading servers: thereby causing them to crash and demanding a ransom to back off, so that data flow can be restored. Evernote recently experienced such an attack.

We are definitely living in different times and sadly we need to be cognizant of cybercrime.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 4:34:42 PM
NO RATINGS
Rev, I was running Internet Explorer 11.

Rev
User Rank
Silver
Re: So what did you do?
Rev   6/17/2014 3:58:55 PM
NO RATINGS
My hacking experience was quite some time ago.  I was accessing the internet on my Red Hat_5 (Linux) box through my telephone modem at home.  I disconnected and I noticed that my hard drive was running like crazy.  When I investigated, I found the following process...

egrep -ri /home mastercharge|visa

The hacker was searching each file on my hard drive for any text containing "mastercharge" or "visa".  The search was case insensitive. Fortunately, there was no text containing any of that.  I actually did have a fax document with my credit card number on it, but I did not identify my card type.  The search would not have found it.  

The hacker's root kit completely screwed up my operating system.  I had to re-install  it. I installed the latest version of Red Hat, and I installed the firewall.  I forget whether or not Red Hat_5 offered one.  I was over confident. 

My data was on a partition separate from my OS, so I did not lose anything.  I was not managing anybody's critical personal information, so not much harm was done.  Mostly, it was my wasted time.

Lessons...
  1. Your computer always is under attack. 
  2. Anybody who is managing critical information, like your credit card number, is under attack. 
  3. Run a firewall.
  4. Go to www.grc.com, run their Shields Up tool, and make sure you are invisible on the internet.

I am still running Linux.  You need to consider not running Microsoft Windows.  If nothing else, its popularity makes it the favourite target of hackers.  

What browser were you running?

Daniyal_Ali
User Rank
Platinum
Your Money AND Your Data!
Daniyal_Ali   6/17/2014 1:33:18 PM
NO RATINGS
Sorry to hear about your loss Charles. And you are right, these guys are getting very professional day by day and most of them are very smart as compared to an average internet user. We really need to be cautious or the identity thefts and data loss will be a very common thing among the masses.

And $400 you say? You got lucky! The hackers who hacked Dominos's Customer Data demanded $40,000! Besides, even if you get your data back it's already corrupted as the hacker has a copy of it. So even if you pay the ransom, you do get your files back, but your data is no more private.

tekochip
User Rank
Platinum
First Hand
tekochip   6/17/2014 10:33:06 AM
NO RATINGS
Thanks for sharing the story with us, it's important for us all to hear it first hand.  I had heard about this on the network news, but first hand accounts are far more valuable.  There's some comfort in knowing that following the normal safety rules might have prevented the intrusion, but it's frightening to know that there is no way to track the criminals.  It's a problem that's only likely to get worse.  Governments are demanding back doors into everyone's network, you know, to keep us all safe, but if the "good guys" have a way into your network it isn't long before the bad guys exploit it.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:12:40 AM
NO RATINGS
You're right, Liz. I shared my story as a cautionary tale for others, especially those who may be lax about prevention and back-up, as I obviously was. It's also worth noting that many of the victims of this have been small businesses, such as pharmacies and law firms (as well as police forces), who often have a desperate need to get their files back.

Charles Murray
User Rank
Blogger
Re: So what did you do?
Charles Murray   6/17/2014 10:05:32 AM
NO RATINGS
I haven't contacted any agencies, Rob. My impression is that it would take a big federal agency -- the FBI, for example -- to track down the scammers on behalf of the many people who've had this happen. Whoever, does the tracking, they need to be prepared to search outside the U.S.

<<  <  Page 4/5  >  >>


Partner Zone
Latest Analysis
Last year you helped Design News and Allied Electronics crown its first-ever Gadget Freak of the Year, and we need your help again. Vote in round 2 of our second-annual contest.
The key to autonomous driving is not to forget about the driver, and to remember that passengers want a sense of control, as opposed to being utterly passive backseat drivers.
HP revealed more of its 3D printing plans in a recent webinar. Senior vice president of inkjet and graphics solution business Stephen Nigro spoke about how the technology works and expanded on HP's vision of open collaboration to commercialize its Multi Jet Fusion 3D printing technology for end-production, and open collaboration on new materials. He also said HP will create software to help users decide when to use Multi Jet Fusion versus conventional subtractive manufacturing.
Get a load of these strange product designs. What's in the water these design engineers are drinking?
The Dutch are known for their love of bicycling, and they’ve also long been early adopters of green-energy and smart-city technologies. So it seems fitting that a town in which painter Vincent van Gogh once lived has given him a very Dutch-like tribute -- a bike path lit by a special smart paint in the style of the artist's “Starry Night” painting.
More:Blogs|News
Design News Webinar Series
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
11/6/2014 11:00 a.m. California / 2:00 p.m. New York
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Dec 1 - 5, An Introduction to Embedded Software Architecture and Design
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Last Archived Class
Sponsored by Littelfuse
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service