This blog is one of several resources intended to provide consumers with additional information related to my book on Information Security.

There are a number of other websites that I maintain that are related to this subject. In the list below, the first link is to my book on the subject which is the final repository for everything new that I learn. Information I obtain by reading other security related articles on the Internet first go into one of the listed eMagazines, and eventually the information gets incorporated into an update to the book. After the book is updated and republished, the articles are removed from the eMagazines, but the links are retained in the bibliography (on this blog) for anyone who wishes to read the original source information.

Here are links to the book, my Amazon author page, the eMagazines, and the presentation:

  1. Best Book About Computer Security (on Amazon.com)
  2. Author page (on Amazon.com)
  3. eMagazine (on Scoop.it) - Cybercrime and You
  4. eMagazine (on Scoop.it) - Best How-to Guides For Protecting Your Computer And Network
  5. eMagazine (on Scoop.it) - Help! I got a virus
  6. Best Presentation About Computer Security (on Slideshare.net)

The Menu Tabs of this blog contain lists of source articles, organized by book chapter, that provided the source material for the book (in addition to my own knowledge and experience). This information is provided for those who wish to explore or understand a topic better. The present and previous versions of the book are/were in e-Book format only. At some point, I will likely also provide a print edition. It is for that reason that, I am moving all of the links (URLs) in the book to this website so that both e-Book and printed book users can access the information via this website.

What good passwords look like


Email account hacked, What happens next (a true story)

About a month ago, an old friend of mine had her Yahoo mail account hacked. It was most unfortunate, because not three months before, I alerted her to my book about Computer Security and sent her a free copy. I say unfortunately, because she didn’t take the time to read it, and because of that, she also didn’t follow my advice about having a strong password for her mail account. I have no idea what her password was, but that isn’t really important. Here is what happened after a hacker got control of her account:

First (and this was how we learned she had been hacked), myself and everyone else in her contact list received one of those very common scam emails from her account, but not sent by her, that indicated she was in Dubai with her family, had been mugged, and was in need of cash since (supposedly) she had her passport and credit cards stolen. Many of her friends responded by phone call, or by reply to the email. Since I am more aware of these scams than most people, I immediately saw that this was  a fake and upon closer examination, I saw that the scammer had created a throw away email account on Yahoo that differed from her correct email by one character. The letter “o” in her email had been replaced by the number “0”. As a result, everyone but me replied to the scammer directly, whereas I wrote to her correct email account and also contacted her by phone to advise her to have her account password changed.

She contacted Yahoo (difficult enough) and was able to get that (password reset) done so that her account was once again secure. Once she was able to get into her account, she realized that all of her mail folders had been deleted and her contact list purged. This was only the beginning of troubles, of course. Yahoo was unable (or unwilling) to restore the information that had been deleted, so she was left with an account without any historical information. Like many people today, she had been doing her email on-line (as webmail) rather than using an email client such as Outlook or Thunderbird. As a result, she had no local copy on her computer of all her emails and contact list. It has taken her lots of time to recreate her contact information and it still is incomplete. She has also had to respond to everyone she could to inform them of the mishap.

Some weeks passed, and then more things started to happen. The hacker, who now was in possession of her entire contact list, either began using the list for other purposes, or more likely, sold the list to someone else. This is common too, and there is a thriving underground where such information is bought and sold on a daily basis. In any case, new scam emails began to arrive in peoples inboxes. This time, the hacker using her contact list no longer needed access to her Yahoo account, but instead sent out emails spoofing her return address. This is so easy to do that anyone can look up how to do it using Google.

The new scam emails sent out suggested that everyone check out a link that purported to be a news article about best job opportunities. The link inside the note was made to appear like it is msnbc.msn.com. Had she read my book, she would have learned how to read a URL. I received the email and it was very obvious to me that the link was bogus. The actual link used (don’t click on it!) was  http://msnbc.msn.com-career8.us/jobz/   – and the domain you would visit by clicking on the link would be com-career8.us. Since I have implemented many protective measures on my computer, I felt safe in visiting the site to see what it looked like.  As suspected, the page was a mockup to make you think you are looking at an article on the real msnbc.msn.com.  The article listed several “new” job opportunities that were supposedly helping many people find employment. The top one on the list was a work from home job that required limited computer skills and involved posting links on the web for big companies like Google, Amazon, etc. The journalist who supposedly wrote the article was telling the story of a woman in Texas who had bought a “kit” for $10 that helped her get into this new job and had immediately been earning over $5,000.00 per month in her spare time. Of course, any fool would recognized this “easy money” claim as a scam, but there are many fools among us. The article of course provided a link to another site where anyone could obtain this kit and begin earning money themselves.

After receiving this email myself, I examined the header of the email to verify that my friends email account had been spoofed (the sender address, that is), and indeed discovered that the email had originated from an Android smart phone from an IP address in the Ukraine. I then had to advise my friend how her contact list was being misused and what email recipients might expect:

One or two things could happen. Anyone who visited the bogus webpage might fall for the scam and pay money for the offered get rich quick “kit.”  It could be worse though. It was also possible that the page contained a malicious script that would attempt to run and install what is known as a “drive-by download.” The purpose of such a download would be to attempt to infect their computer system by attacking the OS, or a common application like Java, Adobe Reader, etc. If successful, the users system would be compromised and who knows what the hacker would then be able to do.

I advised my friend that she should notify all her contacts of what is going on, and the possible outcomes of clicking on the link in the latest email. I also told her that she should alert them that it is possible their computers have been infected and that they should run anti-virus and rootkit scans. Finally, I suggested she get a new email account on another service like gmail and to inform her contacts of the change and in the future disregard any emails from her old address, since those were now likely to be sent from scammers.

As you can see from this story, having your email hacked can cause you, your familiy, and you friends a good deal of grief for some time to come. Don’t put yourself and everyone you care about through this trouble.  To learn how to protect yourself, I of course recommend my book. But if you buy it, you must read it and implement the measures suggested within. If like my friend, you don’t bother with taking the time to do what is necessary, you will someday take even more time cleaning up after you have been hacked.



Tricks for Safe Use of Public Computers in Internet cafes

What if you are on vacation and you need to do something important on the Internet but you don’t have your computer with you? Maybe you need send an email to your boss or  access your bank account to transfer money. You should be rightfully concerned that using a computer in an Internet cafe is unsafe since a keylogger might capture your account log-in information.

Here I will discuss how to thwart a keylogger from capturing your sensitive information with a couple of simple tricks. Be aware, however, that another program on the computer might also capture screen shots of your activity so you must be careful.
Trick #1 is to use “onscreen keyboard” to enter text by clicking keys with your mouse.

Read the rest of this entry

How Hackers Can Easily Create Hotspots To Lure You To Connect

There are a number of easy to use tools which a hacker can use to create a HotSpot using only their laptop computer to appear as a wireless router. On Windows 7, for example, there are Connectify, and mHotSpot.

Connectify transforms your laptop into a Wi-Fi- Hotspot and enables you to share your internet wiht other wireless devices such as other laptop computers, smartphones, and tables. Neither solution requires a physical router or external hardware to function. Read the rest of this entry

We Are Losing Control Over Our Security

In a recent speech at an RSA conference (see article at this link)  Bruce Schneier, famous computer security specialist and cryptographer, highlights two emerging threats to the Internet Infrastructure.

The first threat he labels Big Data. He points out that Big Data is OUR data and more and more is being saved, and it’s being bought and sold.

It is being used to make decisions about us – primarily (at present) advertising decisions. But more and more we are seeing this been used for things like employment decisions or college admission decisions. Government makes the use of this data too. His fear is that right now we are seeing companies pushing for legislation, or more often lack of legislation that limits what they do. These companies are very big, very profitable, and they are big lobbying forces. And they are agitating for more data, more access, less controls over what they can do.

Read the rest of this entry

The Internet: A Modern Day Demolition Derby

If you live in a first world country, your experience driving a car is most likely somewhat leisurely because there are rules that you learn in order to get a license to drive, there are signs on the road to provide directions and warn you of hazards, and most drivers obey the laws, ie, they use turn signals, turn on their lights at night, and they don’t run stop signs or stop lights – except for the occasional drunk (or an idiot texting on their phone).

Having traveled and lived in the third world, I can tell you that driving is a very different experience there.

Read the rest of this entry

 Page 3 of 3 « 1  2  3