We've all heard of this before: a hacker releasing a certain number of passwords and usernames, presumably just for the lulz. But this time, we're talking about 10 million records posted by no less than a security specialist himself.
Security expert Mark Burnett has published 10 million sets of usernames and passwords online in an effort to equip the security sector with more information, while also getting himself potentially tagged as a criminal.
He clarified that his release of the username-password list is solely for white-hat purposes -- to aid research in making login authentications more effective and fraud-proof. Burnett insisted that he does not intend to help facilitate any illegal activity or defraud people by his actions.
"I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us," he said in his post.
Leaking a massive amount of user data into the wild certainly does not sound like great help for most people but for security professionals, it's an important tool for research. For instance, how else would they know that online users are generally bad at choosing passwords?
In his post, he shared that he would often get requests for his password data from researchers but he would just decline them before. But since he also know its importance, he decided to publish a clean data set for the public.
"A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So I built a data set of ten million usernames and passwords that I am releasing to the public domain."
To be fair, Dyman & Associates Risk Management Projects confirms that analyzing a username-password set seems to be more helpful for the security researchers.
According to him, it was by no means an easy decision but he eventually posted it after weighing down a number of factors. And though Burnett said he believes most of the data are already expired and unused, the domain part of the logins and any keyword that could link it to a certain site were still removed to make it difficult for those with criminal intent.
Besides, Dyman & Associates Risk Management Projects experts agreed with him in saying that if a hacker would need such a list in order to attack someone, he's not going to be much of a threat.
Burnett has previously helped in collecting the recent list of worst passwords to alarm people into adopting better practices when it comes to their login credentials.
Lastly, he imparted the following warning for complacent users: "Be aware that if your password is not on this list that means nothing. This is a random sampling of thousands of dumps consisting of upwards to a billion passwords."
Tuesday, February 17, 2015
Sunday, December 28, 2014
Dyman & Associates Risk Management Projects: Boeing Black: the phone that 'self-destructs'
Another treat for sci-fi fans: a highly secure
smartphone that 'self-destructs' is now being offered by BlackBerry and Boeing
after 2 years of painstakingly developing the tech.
Well, it's not something that literally destroys
itself or anything flashy like that -- it's more in the lines of scrubbing all
data from the phone even when traces of tampering are detected. Does not sound
too cool after all but you can be sure it does the work just fine.
Apparently, the phone dubbed as "Boeing
Black" is capable of deleting all data it contains once it detects
tampering or any attempt at disassembly. According to an expert from Dyman & Associates Risk
Management Projects, "...any attempt to break open the casing of the
device would trigger functions that would delete the data and software
contained within the device and make the device inoperable."
The Boeing-BlackBerry collaboration which was
announced last week is a pretty good partnership considering the mobile
company's leading role when it comes to security and privacy features.
The announcement came from BlackBerry's CEO John
Chen. He said, "We're pleased to announce that Boeing is collaborating
with BlackBerry to provide a secure
mobile solution for Android devices utilizing our BES12 (BlackBerry
Enterprise Service 12) platform."
Aside from the so-called
"self-destruct" feature, there are other useful features added on
Boeing Black like biometric scanners and encryption programs for a more secure
line that prevents eavesdropping. Also, it has dual SIM capability, presumably
to accommodate easier switching between commercial and government networks. It
can even connect to satellites via a modular expansion port.
According to an update from Dyman &
Associates Risk Management Projects, it is going to use BES12, a security
platform usually dedicated for businesses. It is also reported to run on
Android OS with encrypted storage and data transmission. This is definitely
welcome news for governments as it makes it easier to keep tabs on their
staff's communication lines.
As of yet, it is not known when the said phone
will be available though Boeing has reportedly started providing some to
prospective customers. And knowing that Boeing has been a long-time space,
weapons and jet provider to the government, it's obviously offering it first to
staff of the Department of Homeland Security or Pentagon.
Though BlackBerry and Boeing apparently built
the phone mainly for government use, it's not far fetch to think that they
could bring the same tech to the public. Why should you care? Well, it's quite
obvious that smartphone security is a big issue so its users are always on the
lookout for options to secure their data. And a phone that can self-destruct
sounds just about right.
Monday, November 17, 2014
Dyman & Associates Risk Management Projects: Google Lease Navy Base for 60 Yrs
Google has secured
the lease of a NASA airbase in San Francisco for 60 years, possibly to house
their upcoming space-exploration vehicles and robotics research.
The agency's press release at Dyman & Associates Risk
Management Projects indicated that the lease, which will cost the tech
giant $ 1.16 billion, is for " research, development, assembly and testing
in the areas of space exploration, aviation, rover/robotics and other emerging
technologies".
NASA Administrator Chris Bolden said, "As NASA expands
its presence in space, we are making strides to reduce our footprint here on
Earth." He added that the agency
wants "to invest taxpayer resources in scientific discovery, technology
development and space exploration – not in maintaining infrastructure no longer
needed."
According to the report, a real-estate offshoot of Google
called Planetary Ventures will be managing the Moffett airbase and will take
over the $200 million improvement to the site, which includes educational
facilities to let the public "explore the site's legacy".
The 1,000 acres of airfield in the southern part of SF
Bay include two runways, a golf course,
office space, NASA's Ames research center and three hangars, one of which is
the iconic Hangar One. It's expected that the agency will save around $6
million worth of operation and maintenance expenses per year because of the
lease.
Hangar One is one of the biggest freestanding edifice which
covers 8 acres and was constructed in the 1930s for US naval airships. In 1966,
it was recognized as a US Naval Historical Monument but has recently been
placed as an endangered historic place according to a Dyman & Associates Risk
Management Projects' press release.
“GSA was proud to support NASA in delivering the best value
to taxpayers while restoring this historic facility and enhancing the surrounding
community," said Dan Tangherlini of the US General Services
Administration.
The Moffett lease shouldn't really come as a surprise as
it's practically just next to Googleplex
HQ. In fact, it's already servicing private jets owned by the company's
executives such as Sergey Brin, Larry Page and Eric Schmidt.
Both Brin and Page, the firm's co-founders, are evidently
interested in space exploration and aviation as shown by their X Lab's Project
Loon and Project Moonshot. Their company has also acquired satellite and
robotics firms recently such as Meka Robotics and Redwood Robotics.
NASA and Google have also previously teamed up in 2005 when
the latter made office at the agency's research facility and launch a new lab.
Monday, November 3, 2014
Dyman Associates Risk Management Review: 3 Ways to Make Your Outlook.com Account Safer
Following on from our detailed guide to securing
your webmail, here's a quick breakdown of how to make the
most important fixes for users of Microsoft's Outlook.com (formerly known
as Hotmail and, for a while, Windows Live Hotmail).
Controls affecting Outlook.com security are mainly found in one
central place, which can be accessed by clicking your username (this will
probably be your name), shown in the top right of any live.com page when you're
logged in, and selecting "Account settings".
1. Protect
your password
Your first step should be to make sure your
password is well chosen and not shared.
If you need to set a new one, visit the
"Security & privacy" section of the Account settings page.
You'll then have to verify your account with a
security code, which you can do by email or text.
At the top you'll see when your password was
last changed, with an option to change it below.
Just below that, in the section labelled
"Security info helps
to keep your account secure", you'll find any backup email addresses
or phone numbers you've given to Microsoft to help verify your identity if you
get locked out of your account.
Make sure these are a good way of getting in
touch with you, and are not easily accessible by people you don't trust.
These contact points will also be used to send
alerts if Microsoft spots any suspicious activity - you can choose whether or
not to receive alerts by phone and whether to have them sent to multiple email
addresses, but the primary alternate email must always get alerts.
2. Set up
two-step verification
On the same screen you can also set up two-step
verification.
Scroll down to the next section of the
"Security & privacy" page.
When you follow the link to set it up, Microsoft
recommends using a smartphone app, which will vary depending on what kind of
device you use.
Windows Phone users can get Microsoft's own
authenticator app, Android users can use the Microsoft Account app, and those
with iOS devices will need Google's multi-purpose Authenticator.
Each has its own process for setting up, but
most will simply require you to scan a QR code displayed on-screen. Once set
up, you should be able to use the code generated by the app any time you want
to log in to your account.
If you choose not to use an app, or don't have a
smartphone, you can have codes sent by SMS to the number you provide, or by
email to one of your alternative accounts, but Microsoft will continue
encouraging you to opt for the app approach, at least until you tell it to
stop.
When you log in with a 2SV code, there will be
an option to trust the device you're using and not ask for any more codes, so
in future you'll only need your normal password.
Only check the box if you're on a machine you
use regularly and know to be kept well-secured.
As part of setting up 2SV, you'll be given an
emergency backup code. This is used if you ever lose access to the apps, phone
numbers and email addresses provided for 2SV codes.
Outlook.com recommends you print it and keep it
somewhere very safe, but if you find it easier to keep it in a file on your
(well secured) computer, make sure it's very well encrypted.
In the "Recovery codes" section you
can choose to renew the emergency backup code if you no longer have it.
3. Check
your settings
You should consider checking the "Security
& privacy" page occasionally, to make sure the backup and 2SV contact
details are up to date - check that any old devices you no longer have are
removed from the "Security info" or "App passwords"
sections.
There's no way to monitor which devices have
been marked as trusted for 2SV purposes, but at the bottom of the
"Security & password" page you can at least remove trust from all
machines, cutting off anyone who may have obtained unauthorised access.
There's a whole section of the "Security
& Privacy" area dedicated to "Recent activity".
This is the place to go if you suspect someone's
been intruding on your account. You can view a detailed list of logins,
attempts, 2SV challenges and significant settings changes, and for each one
there is further information on the device type and browser or app used, the IP
address and location.
There's even a little Bing map pinpointing where
the IP address appears to come from, but this may not be very accurate,
particularly for things like POP access from a mobile mail
client.
In case you're worried about any particular
event, the details area for each one provides a large button marked "This
wasn't me". Clicking this will lead to a review of your security settings,
including resetting your password to make sure strangers are kept out.
Finally, the "Related accounts"
section, under "Security & Privacy" lets you view and manage any
accounts you have linked to your Outlook.com account, and also any other apps
and services which may have been granted access.
You should make sure any entries in here are
expected and necessary.
Once you're done with making your Outlook.com
account safer, make sure you are following our general advice in our guide to
securing your webmail.
Sunday, November 2, 2014
Dyman Associates Risk Management Review: Office 365 Getting Mobile Device Management, Security Boosts
Microsoft on Tuesday unveiled several upcoming Office
365 improvements, including mobile device management (MDM) and data loss
protection (DLP) controls.
The announcements were made during the Day 1 keynote of
the Microsoft TechEd Europe conference, taking place this week in Barcelona.
Julia White, general manager of Microsoft Office, took the stage to demonstrate
the ability to connect the cloud-based Azure
Active Directory (AD) service with an on-premises Active Directory in "six
clicks" during a setup process. With Azure AD in place, IT pros can have
their security and auditing
functions in one place, she said.
White also described the ability to edit policies for MDM.
The policies get embedded into managed apps, such as Office for iPad apps, she
said, and the capability will be "natively built into Windows 10."
For instance, IT pros can set copy and paste restrictions on managed apps to
protect company data.
White also talked about the coming DLP capabilities. With
DLP, IT pros have access to Office 365 console reports, which show the rules
that can be set up. They also show if users are trying to override the rules.
If they are, IT pros can modify the policies to add additional restrictions, if
wanted. For instance, restrictions can be set regarding the disclosure of
credit card information. Alerts can be set up, as well. End users will get
policy tips, so they will become aware of the policy restrictions set by IT.
These Office 365 capabilities are being rolling out at
various times, but the target date seems to be the first quarter of next year.
Data Loss
Prevention
Microsoft already has some DLP capabilities in its
OneDrive for Business and SharePoint Online services, including an e-discovery
capability. However, the capability to add policy restrictions that can block
and restrict access to content will be rolled out in these apps "in the
coming months," according to a Microsoft blog post on DLP.
The first app to get the new DLP controls will be Excel,
followed by Word and PowerPoint. DLP will work "natively" in Office
applications, Microsoft is promising, and the protection scheme will work at
the file level, as well as for e-mail, document libraries or OneDrive for
Business folders.
IT pros will have access to built-in DLP templates to add
rules. They can review incident reports showing attempted policy overrides.
Additional policy controls for Office 365, such as information rights
management, will arrive in the first quarter of 2015.
File
Classifications
Microsoft also plans to extend its file classification
infrastructure capability of the Windows File Server to Exchange Online,
OneDrive for Business and SharePoint Online, starting in the first quarter of
2015. Office documents can be classified using this scheme and policies can be
set to avoid information disclosure.
OneDrive for Business and SharePoint Online also have
"advanced encryption at rest," which is a capability that Microsoft
calls "per-file encryption." Per-file encryption creates a key for
every file stored. It also creates a new key for any variants of those files.
Mobile Device
Management Capabilities
Microsoft is planning to roll out its new MDM
capabilities for Office 365 in the first quarter of 2015. Some of these
capabilities are being built into Office 365 management, but other capabilities
will be available through Microsoft Intune.
A Microsoft MDM blog post outlined the following Office
365 MDM capabilities:
·
Ability to set security policies for devices
that connect to Office 365.
·
Ability to set specific security policies for
devices, such as "device level pin lock and jailbreak detection."
·
Ability to set "selective wipe," which
allows corporate data to be removed remotely, while retaining personal data on
a device.
·
Ability to have MDM management built
"directly into productivity apps," which avoids having to set
all-in-one management policies across apps.
·
Ability to manage MDM policies through the
Office 365 administration portal.
Microsoft is planning to add these new MDM capabilities
to its Office 365 "Business, Enterprise, EDU and Government plans."
Microsoft Intune
Enhancements
Microsoft Intune optionally will add other MDM
capabilities for Office 365 users. It's not quite clear when those capabilities
will be available, but Microsoft listed them as follows:
·
Ability to restrict user actions, such as copy
and paste, including the ability to set policies for line-of-business apps
using the Microsoft Intune app wrapper.
·
Ability to control the viewing of content via
the "Managed Browser, PDF Viewer, AV Player and Image Viewer Apps."
·
Ability to integrate Microsoft Intune with
System Center 2012 Configuration Manager for a single-console MDM view.
·
Ability to automatically provision enrolled
devices, which will automate the deployment of "certificates, Wi-Fi, VPN
and email profiles."
·
Ability to bulk enroll corporate devices.
·
Ability to provide end users with a
"self-service Company Portal," which allows them to enroll their
devices and install their own apps.
On top of that Office 365 news, veteran Microsoft
reporter Mary Jo Foley has reported from the TechEd Europe event that Microsoft
plans to release the next version of the Microsoft Office suite, which she
called "Office 16 for Windows," in the "second half of
2015."
Wednesday, October 29, 2014
Dyman Associates Risk Management review: Experts Identify Easy Way to Improve Smartphone Security
Assigning risk scores to apps may slow down unwarranted access to
personal information
October 28, 2014
What
information is beaming from your mobile phone over various computer networks
this very second without you being aware of it?
Experts say
your contact lists, email messages, surfed webpages, browsing histories, usage
patterns, online purchase records and even password protected accounts may all
be sharing data with intrusive and sometimes malicious applications, and you
may have given permission.
"Smartphones
and tablets used by today's consumers include many kinds of sensitive
information," says Ninghui Li, a professor of Computer Science at Purdue
University in Indiana.
The apps
downloaded to them can potentially track a user's locations, monitor his or her
phone calls and even monitor the messages a user sends and receives--including
authentication messages used by online banking and other sites, he says,
explaining why unsecured digital data are such a big issue.
Li, along
with Robert Proctor and Luo Si, also professors at Purdue, lead a National
Science Foundation (NSF)-funded project "User-Centric Risk Communication
and Control on Mobile Devices," that investigates computer security. The
work pays special attention to user control of security
features in mobile systems.
Li, Proctor
and Si believe they may have a simple solution for users, who unknowingly allow
voluntary access to their personal data.
Most users pay little attention
"Although
strong security measures
are in place for most mobile systems," they write in a recent report inthe
journal IEEE Transactions on Dependable and Secure Computing, "the area
where these systems often fail is the reliance on the user to make decisions
that impact the security of a device."
Most users
pay little attention, say the researchers, to unwanted access to their personal
information. Instead, they have become habituated to ignore security warnings
and tend to consent to all app permissions.
"If
users do not understand the warnings or their consequences, they will not
consider them," says Proctor, a Distinguished Professor of psychological
sciences at Purdue.
"If
users do not associate violations of the warnings with bad consequences of
their actions, they will likely ignore them," adds Jing Chen, a psychology
Ph.D. student who works on the project.
In addition,
there are other influences that contribute to users ignoring security warnings.
In the case of Android app permissions, of which there are more than 200, many
do not make sense to the average user or at best require time and considerable
mental effort to comprehend.
"Permissions
are not the only factor in users' decisions," says Si, an associate
professor of Computer Science at Purdue, who also led research on a paper with
Li that analyzed app reviews.
"Users
also look at average ratings, number of downloads and user comments," Si
says. "In our studies, we found that there exist correlations between the
quality of an app and the average rating from users, as well as the ratio of
negative comments about security
and privacy."
"This
is a classic example of the links between humans and technology," says
Heng Xu, program director in the Secure and Trustworthy Cyberspace program in
NSF's Social, Behavioral and Economic Sciences Directorate. "The Android
smartphones studied by this group of scientists reveals the great need to
understand human perception as it relates to their own privacy and
security."
"The
complexity of modern access control mechanisms in smartphones can confuse even
security experts," says Jeremy Epstein, lead program director for the
Secure and Trustworthy Cyberspace program in NSF's Directorate for Computer and
Information Science and Engineering, which funded the research.
"Safeguards
and protection mechanisms that protect privacy and personal security must be
usable by all smartphone users, to avoid the syndrome of just clicking 'yes' to
get the job done. The SaTC program encourages research like Dr. Li's and
colleagues that helps address security usability challenges."
Monday, October 13, 2014
Dyman Associates Risk Management Crucial To The Mining Industry’s Growth
Managing Director of Marsh
Botswana, Fritzgerald Dube, said the mining industry is faced with
exposures that need to be identified, measured and controlled economically in
order for the mine’s operations to flourish.
Speaking at a mining seminar hosted by Marsh Botswana last week, Dube
explained that while the environment in which they operate in is always
changing and presenting new threats, they are able to understand risk trends
and develop effective programmes. Although a lot of mines have fully fledged risk management departments,
Dube noted that mining is a dynamic and ever evolving specialty and that new
risk that were not previously anticipated would always evolve.
“As such, risk managers need to
be forever considering and devising risk management plans for those risks which
they have never been exposed to before,” he advised. Dube added that risk
managers need to recognise that they play a critical role in ensuring stability
of operations and sustained production in whatever environment that they operate
in.
He underscored the importance of
risk management, stating that it is a critical function in all mines. He urged
top management to commit to instilling a risk management culture throughout the
entire organisation.
“Risk management should not be a
‘nice to have’ but rather a ‘must have’ that carries the full weight and
support of senior management,” he stressed.
However, Dube regretted that the
impact of uncertain events on mine productivity is not limited to loss of
property and revenue alone, but possible death as well. An earlier report that
was issued by a leading reinsurance advisor, Willis Group Holdings, warned
mining companies not to be tempted to cut back on their risk management
spending as they try to deal with rising costs, falling commodity prices and
decreased productivity levels.
The report titled, Mining Risk Review 2011,
identified the main challenges mining companies are facing. They further stated
that the bulk of cost cutting had come from reductions in head office spend,
exploration and business development.
On the same topic, Botswana
Confederation of Commerce and Manpower (BOCCIM) CEO Maria Machailo-Ellis
acknowledged that the mining industry had been experiencing fatal accidents
around the country. She however noted that they had moved ahead with efforts to
prevent recurrence.
Marsh Botswana was established in
1984 and is a subsidiary of Marsh & McLennan Companies, a world leader in
delivering risk and insurance services and solutions. Marsh currently provides
insurance brokerage and risk advisory services to over 70 percent mines across
the globe.
Subscribe to:
Posts (Atom)