Roger’s Information Security Blog

Roger’s Information Security BlogLinkedIn SpearphishingLogMeIn Buys LastPassPeople Unclear on the Concept – HumorFBI Investigates the CardinalsYou wouldn’t grow your own electricity

http://www.infosecblog.org Since 2004, a source for ranting, reviews and InfoSec news Mon, 12 Oct 2015 02:38:55 +0000 en-US hourly 1 http://wordpress.org/?v=4.3.1 http://www.infosecblog.org/2015/10/linkedin-spearphishing/ http://www.infosecblog.org/2015/10/linkedin-spearphishing/#comments Mon, 12 Oct 2015 02:38:55 +0000

http://www.infosecblog.org/?p=6425
Dell Secureworks has identified targeted attacks occurring through LinkedIn. In this attack, a fake user with a network of connections is created.   Under the guise of a recruiter, they contact targets of opportunity, think sysadmins at a target company.   The victim is enticed to go to a purported resume submission website.  And then …

Continue reading ‘LinkedIn Spearphishing’ »

The post LinkedIn Spearphishing appeared first on Roger’s Information Security Blog.

]]>

Dell Secureworks has identified targeted attacks occurring through LinkedIn.

In this attack, a fake user with a network of connections is created.   Under the guise of a recruiter, they contact targets of opportunity, think sysadmins at a target company.   The victim is enticed to go to a purported resume submission website.  And then you have malware.

  • As always, on LinkedIn be aware that people may not be who they claim to be.
  • If you are going to apply for a job, go the known, established website of a company, and click on something like “Careers” to find a link to their jobsite.   Where it’s an external recruiter contacting you, take care in establishing their bona fides.
  • Dont be part of the problem.  Only accept connections from people you know and trust.   Your connection is an implicit endorsement to other people.

The post LinkedIn Spearphishing appeared first on Roger’s Information Security Blog.

]]>
http://www.infosecblog.org/2015/10/linkedin-spearphishing/feed/ 0 http://www.infosecblog.org/2015/10/logmein-buys-lastpass/ http://www.infosecblog.org/2015/10/logmein-buys-lastpass/#comments Fri, 09 Oct 2015 20:00:56 +0000

http://www.infosecblog.org/?p=6423
I was just recommending LastPass on a corporate Chatter.  Then I read that LogMeIn has bought LastPass. LogMeIn isn’t one of my favorite companies IIRC it is quite impossible to block LogMeIn’s enterprise security circumventing product without blocking remote support sessions also.  This is becuase they use the same servers for each.  GoToMyPC on the other …

Continue reading ‘LogMeIn Buys LastPass’ »

The post LogMeIn Buys LastPass appeared first on Roger’s Information Security Blog.

]]>

I was just recommending LastPass on a corporate Chatter.  Then I read that LogMeIn has bought LastPass.

LogMeIn isn’t one of my favorite companies IIRC it is quite impossible to block LogMeIn’s enterprise security circumventing product without blocking remote support sessions also.  This is becuase they use the same servers for each.  GoToMyPC on the other hand provided a ways specifically to block its use in an enterprise, and kept their gotoassist/gotomypc servers separate.  This was a few years ago so perhaps things have changed.

Since that time LogMeIn annoyed people by doing away with their free product (making my need to block it much less).   And also engaged in rampant price hikes for those foolish enough to pay for the service.

Even if none of the above were true, our passwords make a huge target.   LastPass was believed to be a security company who realized they’d lose everything if they failed to protect our encrypted passwords.   Even then twice now we’ve all had to change our master password out of an abundance of caution.    Now they’re being bought by a company that doesn’t seem to have the same drive for security.

It is very disappointing.

The post LogMeIn Buys LastPass appeared first on Roger’s Information Security Blog.

]]>
http://www.infosecblog.org/2015/10/logmein-buys-lastpass/feed/ 0 http://www.infosecblog.org/2015/06/people-unclear-on-the-concept-humor/ http://www.infosecblog.org/2015/06/people-unclear-on-the-concept-humor/#comments Wed, 17 Jun 2015 13:45:34 +0000

http://www.infosecblog.org/?p=6411
an old one, but new to me.

The post People Unclear on the Concept – Humor appeared first on Roger’s Information Security Blog.

]]>

an old one, but new to me.

The post People Unclear on the Concept – Humor appeared first on Roger’s Information Security Blog.

]]>
http://www.infosecblog.org/2015/06/people-unclear-on-the-concept-humor/feed/ 2 http://www.infosecblog.org/2015/06/fbi-investigates-the-cardinals/ http://www.infosecblog.org/2015/06/fbi-investigates-the-cardinals/#comments Tue, 16 Jun 2015 18:24:16 +0000

http://www.infosecblog.org/?p=6409
The FBI is investigating the St Louis Cardinals for a hack of the Houston Astros. The Cardinals reviewed a “master list of passwords” to access the Houston prospect database.   A former employee of the Cardinals now worked for Houston in setting up this system.  The FBI tracked the unauthorized login to the home of …

Continue reading ‘FBI Investigates the Cardinals’ »

The post FBI Investigates the Cardinals appeared first on Roger’s Information Security Blog.

]]>

The FBI is investigating the St Louis Cardinals for a hack of the Houston Astros.

The Cardinals reviewed a “master list of passwords” to access the Houston prospect database.   A former employee of the Cardinals now worked for Houston in setting up this system.  The FBI tracked the unauthorized login to the home of Cardinals team officials.

source – NY Times.  (if the link is paywalled, do a search on google to find the article or add a google refer to your request.)

This illustrates why password reuse is a problem.  Additionally if passwords were routinely changed, even with an admin using the same password initially,  they would be forced to change it to something else.  One does wonder about this “master list of passwords”.   I’m guessing these were service or admin account passwords rather than the organization knowing individual user passwords.  At least I hope so.

The post FBI Investigates the Cardinals appeared first on Roger’s Information Security Blog.

]]>
http://www.infosecblog.org/2015/06/fbi-investigates-the-cardinals/feed/ 1 http://www.infosecblog.org/2015/06/you-wouldnt-grow-your-own-electricity/ http://www.infosecblog.org/2015/06/you-wouldnt-grow-your-own-electricity/#comments Thu, 11 Jun 2015 20:35:34 +0000

http://www.infosecblog.org/?p=6407
I’m going through RackSpace’s free CloudU training. They use the analogy of infrastructure a couple of times.   It would be bizarre, given widespread availability of electricity on tap, that an organization would create their own electricity plant to power their factory, so too is it becoming more bizarre to host one’s own software or buy one’s …

Continue reading ‘You wouldn’t grow your own electricity’ »

The post You wouldn’t grow your own electricity appeared first on Roger’s Information Security Blog.

]]>

Leave a Reply