"It's likely that everyone has already been hacked."
- Michael Wolf
Michael Wolf is someone that you should listen to when it comes to issues of technology and business.
He might just shake you out of your false sense of security.
I recently posted an essay about how and why you should protect yourself from the NSA with encryption.
What people often forget is that the NSA is not the only entity you need to protect yourself from.
"It's likely that everyone has already been hacked."
- Michael Wolf
Michael Wolf is someone that you should listen to when it comes to issues of technology and business.
He might just shake you out of your false sense of security.
Recently it was revealed at a Russian criminal gang stole 1.2 Billion username password combinations, plus another 500 million email addresses.
You do the math. Chances are that more than one of you who are reading this had your password stolen.
How did they steal so many passwords? With botnet computer viruses, and the computers most attacked are home computers.
I know what some of you are thinking. I'm careful. I'm different. I have an anti-virus.
What if I was to tell you that you aren't nearly as safe as you think? Don't believe me? You shouldn't. I could be anybody.
However, you should listen to Symantec's senior vice president Brian Dye.
Earlier this week, Symantec's senior vice president Brian Dye declared to the Wall Street Journal that antivirus "is dead." ...
Not only that, Dye bemoaned that they simply can't keep hackers out. In the interview, Dye estimated that AV only catches 45 percent of cyber attacks.
The article goes on to point out that lots of cybersecurity experts disagree with the vice president of world’s biggest IT security company.
Dye didn't say not to use an anti-virus, and no one else is saying that either. The point is that anti-virus software simply isn't very effective.
Amichai Shulman, Imperva’s chief technology officer, and a group of researchers collected and analyzed 82 new computer viruses and put them up against more than 40 antivirus products, made by top companies like Microsoft, Symantec, McAfee and Kaspersky Lab. They found that the initial detection rate was less than 5 percent.
Translated, anti-virus software simply can't detect a virus until it has been discovered by the anti-virus makers. That's a big deal because virus writers are so prolific.
In 2000 there were less than a million new strains of malware. By 2010 there were 49 million new strains.
'The traditional signature-based method of detecting malware is not keeping up.'
- Phil Hochmuth.
Even this underestimates the problem. The assumption is that anti-virus companies discover them quickly, but that isn't true. The Flame virus went two years without being discovered. It took more than a year to discover Stuxnet virus.
These aren't typical cases, but then there doesn't have to be many before its a problem.
Some of you might be thinking that once the virus is detected then the problem is over, but that isn't true either.
A popular strain of banking malware is called Zeus.
"For some perspective, we're analyzing about 400,000 binaries per week, and of that malware, about 92 percent is Zeus or Zeus-based," Cohen says. According to the Zeus Tracker, as of June 30, there were 1,149 known Zeus C&C servers being tracked. Meanwhile, only about 40 percent of Zeus malware was being detected by antivirus products, which is a selling point for fraudsters seeking a free crimeware toolkit.
As Dye pointed out, only 45% of cyber attacks are blocked. Symantec's own internal report says their product only detects about 70% of virus in the wild. Microsoft Security Essentials only catches 61% of malware.
Cyber-crime is a VERY big deal
The mistake many people make is applying too much attention to the wrong danger. For instance, people walk around scared of terrorists despite the fact that you are 8 times more likely to be killed by a cop.
A similar thing is how people are afraid of having their cars stolen, but not their ID.
Identity theft victims suffered more than $24.7 billion in direct and indirect losses in 2012 -- that's more than the combined $14 billion in losses consumers experienced from other types of theft (burglary, motor vehicle theft and other property theft) in the same period.
The Bureau of Justice Statistics highlighted these and other staggering statistics in its 2012 Victims of Identity Theft report, which was released this month. About 16.6 million U.S. residents ages 16 and older were victims of at least one incident of identity theft last year. That's about 7 percent of the population in that age group, and they most often experienced misuse of existing bank and credit card accounts.
Let that sink in for a moment: Identity theft is nearly twice as big of criminal activity than all other types of theft combined.
So many IDs are being stolen that there is a glut of stolen IDs on the market and it is driving prices down.
I've read about websites you can visit where they have databases so you can select the type and area of the ID you want to steal, as if you are shopping at Amazon.com. It's insane!
Just in time for the holidays, the price of a stolen identity has dropped as much as 37 percent in the cybercrime underground: to $25 for a U.S. identity, and $40 for an overseas identity.
For $300 or less, you can acquire credentials for a bank account with a balance of $70,000 to $150,000, and $400 is all it takes to get a rival or targeted business knocked offline with a distributed denial-of-service (DDoS)-for-hire attack. Meanwhile, ID theft and bank account credentials are getting cheaper because there is just so much inventory (a.k.a. stolen personal information) out there.
The market for traditional illegal cyberactivity has gotten so saturated, that criminals are branching out into extortion.
They are stealing sensitive information and threatening to disclose it unless their victims pay hundreds or even thousands of dollars in ransom.
They've also infected the computers of small businesses and locked up the systems, then brazenly demand ransom to undo the damage.
1 in 6 Windows computers in the world have no anti-virus. In the United States nearly 20% have no virus protection.
Between 30% of computers in the United States are already infected to 48%. As many as half of the people reading this have malware on their computer.
99.4% of virus are made for the Windows operating system.
It doesn't end with your laptop
Cell phone security is a joke. Specifically Android.
It's not Windows and its not Apple. Because of its business model, it may be the least secure of them all.
Malware written for Android is growing by leaps and bounds. In fact, between 79% and 99% of all malware for mobile is written for the Android OS.
As people move from using computers to mobile devices, criminal gangs are following.
“Cyber crime is moving to mobile but people are not aware. It’s still not as big as computer crime but it’s growing fast. The trend is a very dangerous situation,” Kaspersky said, noting that it took the Chernobyl virus in 1998 for people to properly protect their computers. “I expect something really bad to happen to change people’s minds and awareness.”
Sonatype CEO Wayne Jackson and New Enterprise Association General Partner Harry Weller shared similar sentiments in a Fox Business interview, which detailed more than 718,000 malicious Android apps have been discovered, up to June 2013.
The money in the bank isn't safe
When an ATM in Kiev started spitting out cash whether customer were in front of it or not, a Russian cybersecurity firm, Kaspersky Lab, was called to investigate. They discovered that the ATM was the least of the problems.
The bank’s internal computers, used by employees who process daily transfers and conduct bookkeeping, had been penetrated by malware that allowed cybercriminals to record their every move. The malicious software lurked for months, sending back video feeds and images that told a criminal group — including Russians, Chinese and Europeans — how the bank conducted its daily routines, according to the investigators.
Then the group impersonated bank officers, not only turning on various cash machines, but also transferring millions of dollars from banks in Russia, Japan, Switzerland, the United States and the Netherlands into dummy accounts set up in other countries.
The heist involved around 100 banks and financial institutions in 30 countries. The amount estimated stolen is up to $1 Billion.
To put this into perspective, the Great Brink's Robbery was less than $3 Million.
The bank computer hacking crime just keeps getting bigger, and even before the extent of damage has been fully assessed the idea of a taxpayer bailout is being floated.
Bankers and U.S. officials have warned that cyber-terrorists will try to wreck the financial system’s computer networks. What they aren’t saying publicly is that taxpayers will probably have to cover much of the damage.
Washington never fixed the Too-Big-To-Fail problem (which is also the Too-Big-To-Prosecute problem), thus it is simply assumed that the taxpayer will always be there for the Wall Street banks.
The full extent of the hacks is still being determined. JPMorgan Chase's computer systems were compromised for two full months before it was discovered.
The hackers unleashed malicious programs that had been designed to penetrate the corporate network of JPMorgan -- the largest U.S. bank, which had vowed two months before the attack began to spend a quarter-billion dollars a year on cybersecurity. With sophisticated tools, the intruders reached deep into the bank’s infrastructure, silently siphoning off gigabytes of information, including customer-account data, until mid-August.
How much damage was done during those two months is unknown. A new report says that "some bank records at JPMorgan were altered and possibly deleted".
It also turns out that the attack "affected seven financial organizations", not just two as originally reported.
Easily the most amusing part of this whole event is how JPMorgan Chase reported that it wasn't seeing "unusual fraud" in its investigation.
We can only assume that "unusual fraud" is different from the "regular fraud" that JPMorgan Chase typically engages in. JPMorgan has paid around $27 Billion in fines in the last few years from its "regular fraud".
Now that we have some idea of how serious this hacking event was, let's get back to the taxpayer bailout trial balloon.
The government might have little choice but to step in after an attack large enough to threaten the financial system. Federal deposit insurance would apply only if a bank failed, not if hackers drained accounts. The banks would have to tap their reserves and then their private insurance, which wouldn’t be enough to cover all claims from a catastrophic event, DeMarco and other industry officials said.
Discussions about the government’s role in cleaning up after a catastrophic cyber assault have centered on the Terrorism Risk Insurance Act, or TRIA. States are also pressing Washington to clarify how the Stafford Act, the main statute for relief from natural disasters, would factor in.
The insurance law, enacted after the 2001 attacks, authorizes the government to provide financial support for insurance companies in the wake of terrorism. It is up for renewal this year. Under TRIA, insurers cover a fixed amount of losses from terrorist attacks with the government backstopping additional costs up to $100 billion. The law gives the Treasury secretary broad latitude to invoke the backstop.
In private meetings, Treasury officials have told insurance industry lobbyists that the department would treat cyber-terror like a physical attack under TRIA, said the people involved with the talks, who spoke on condition of anonymity because the discussions were private.
So there you have it. Wall Street will be protected from its own incompetence by the taxpayer because terrorists.
Comments
Every computer system in the world is vulnerable to hackers
link
Except for HRC's, of course.
She tells us persistently that there is no proof her home server was ever hacked. She must be the only person who hasn't been.
We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass
Except that it was according to Huma Abedin
In her deposition to JW she stated that their email server was hacked and it was offline for 3 days while Justin was working on it.
I don't know if she said if or what was hacked from the account.
Maybe Mszgrin or Amanda knows.
Funny how that tidbit hasn't been reported or talked about, isn't it?
Thanks for the information GS. Great essay.
Scientists are concerned that conspiracy theories may die out if they keep coming true at the current alarming rate.
It not only doesn't get a lot of air time, it also
is still being denied by HRC. It is kind of like how they don't talk about the fact that HRC is way more computer savvy than she lead the FBI to believe (or that the FBI chose to believe).
We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass
Before the smart phone rollout, I thought the sounded like a
very bad idea. They sounded so vulnerable to hacking, I wondered how anyone could consider them a good idea. Yet on they went, tempting fate.
Not that computers are all that safe either. With all the new advancements in technology, security seems to take a back seat. I doubt things will change.
"The object of persecution is persecution. The object of torture is torture. The object of power is power. Now do you begin to understand me?" ~Orwell, "1984"
Speaking of back seats, isn't it a great idea to have
computers drive cars? While we're at it, let's put them at the helm of 18-wheelers. Hell, why not airliners too?
We can't interfere with corporation's divinely granted right to maximize profits by requiring companies to hire competent human drivers to steer their vehicles.
Cars can already be hacked
On board computers on existing cars can be hacked impacting steering and braking systems.
"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage
I mentioned smart cars online once and . . .
was called an idiot for not trusting them because of autopilot in planes. My point was that my phones have flipped out for no reason - like auto rebooting, for instance. So, I say hell no to smart cars. (I think the discussion was on Orange State, actually.)
Not sure if autopilot can be hacked and completely taken over, preventing the pilot/copilot from overriding autopilot like a hacked smart car can. I thought autopilot was wholly contained within the plane, while smart cars are on a network and can be accessed remotely. Otherwise, air traffic controllers could prevent (or deliberately cause) plane crashes.
AnyWho, hell no to "smart" cars - just look at auto correct on "smart" phones! No thanks.
Just imagine a Stuxnet type virus...
Designed for self driving cars, trucks, and buses...
One of the theories of the Stuxnet virus was that it was a US Government, and or, Israeli Government, created virus designed to infect the Iranian Nuclear Program Uranium Enrichment Centrifuges, causing them to spin out of control, and self destruct. Part of the reason why it was undetected for so long is it didn't do anything except multiply and infect more computers until it went after its target which is unconfirmed that the target was the Iranian Centrifuges...
Imagine if you will the "Billiard or Pinball Virus," which isn't detected because of no adverse effects while it multiplies and infects, until one day when all the driverless vehicles on the road careen out of control smashing into each other across the entire country at a time where the maximum number of people were calculated to be traveling...
I'm the only person standing between Richard Nixon and the White House."
~John F. Kennedy~
Economic: -9.13, Social: -7.28,
Great. So what do we do?
How do we best protect our computer systems without spending a small fortune (or with, for that matter, if it would be worth the money spent - I gave up on Norton and McAfee because they borked my computers!)?
Please check out Pet Vet Help, consider joining us to help pets, and follow me @ElenaCarlena on Twitter! Thank you.
I guess one more essay then
I'll tell you what I've been doing in my next essay.
Oh, that'd be awesome!
Not too technical for us non-techies, I hope!
Please check out Pet Vet Help, consider joining us to help pets, and follow me @ElenaCarlena on Twitter! Thank you.
http://www.washingtonsblog
http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backd...
If you haven't read this in full at source before/recently, you might want to, even if it is older material. How many hackers are out there taking advantage of these vulnerabilities?
https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-...
Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.
A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.
Linux & Cryptophone
The halcyon days of the internet are truly over and one should assume all cloud computing solutions funnel your data to the security state.
I'd say any company that has VC from Gre-ylock partners is in bed with the CIA.
This is precisely why I've wanted to learn Linux.
But what can be done about smartphones, I wonder?
"When we remember we are all mad, the mysteries disappear and life stands explained." - Mark Twain
Go Linux--
No need to hesitate. Several of the Ubuntu distributions are very easy to learn. Not much to learn, really. More like familiarize yourself with. You don't have to learn to be a terminal jockey like in days past. There is only one terminal thing you need to do after installing Ubuntu and that is open a terminal and run sudo apt-get update and then sudo apt-get install and that brings it up to speed with security patches. There are also software updates that are done with a friendly GUI. Best of all -- It's free and so is most of the needed software. You can run the live CD and play around with it without installing it. Also, it will run on very early any computer which is great if you have a older machine.
Linux, like Unix is difficult to hack because of the nature of the file system. Which is why Mac's are rarely hacked. The mac OS is built on Unix and made proprietary. If you absolutely need a windows program to run, you can set up a virtual machine that runs with in the Linux OS, e.g. you can run windows 7, 10 or whatever within the virtual machine safely as it is running in a sandbox.
https://www.ubuntu.com/download
"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage
I use the excuse that someone could steal my information
to keep my credit cards maxed out. = )
We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass
Nah, the hackers
will increase your credit limits.
dfarrah
Yikes!!!!
"The object of persecution is persecution. The object of torture is torture. The object of power is power. Now do you begin to understand me?" ~Orwell, "1984"
Bet I could spend it before they could! = )
On the other hand, there is not an established debtors prison...yet. So, if the credit card did not make the appropriate adjustments, I could just quit making payments. Who needs a credit score anyway? It is a fictional construct.
We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass
So where are the hackers transferring
Money from the 1% to the rest of us? Do something really entertaining like taking that $15T or so hidden offshore and putting $50K for each household member in everybody's account!
There's just not enough whimsy going on with our internet savants.
Orwell: Where's the omelette?
I've been wondering the same.
And why can't our side set up surveillance on the PTB so we know what they're doing all of the time?
dfarrah
withdraw from the net to be safer
encryption works, but avoidance works better.
Be a Friend of the Earth, cherish it and protect it.
Make a phone tree first!
Or else you're merely retreating to isolation. It's extremely difficult to make connections w/people anywhere but the internet now.
"More for Gore or the son of a drug lord--None of the above, fuck it, cut the cord."
--Zack de la Rocha
"I tell you I'll have nothing to do with the place...The roof of that hall is made of bones."
-- Fiver
I just bought a new box, and my backup download was hacked
just yesterday. Frozen, call a toll-free number, get a male named Jonathan with an Indian accent. In India. They will "fix" my brand-new Win10 for only $300. I canceled the charge and get a new CC number. Less than a month ago my .edu addy was stolen and locked after it was used several times in different countries simultaneously.
Antivirus software will always be behind the game, as my son told me yesterday. I was "saved" from malware installation or worse by a convenient 8 hour power outage.
Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.
And yet political officials
still insist that voting systems are safe.
Headline from Denver Post: How Colorado’s election system makes large-scale result rigging nearly impossible
“It’s not that these events never occur. It’s that we catch them.”
How can anyone reach a conclusion that rigging is 'nearly impossible' when so many systems have been hacked?
dfarrah
Colorado's election system
In Colorado, it's actually pretty simple -- and old-school.
It's called PAPER. Ballots in Colorado are still made of paper. And paper leaves, well, a paper trail.
"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar
"All power corrupts absolutely!" -- thanatokephaloides
Yes, and the
paper ballots are counted by electronic systems that can be hacked.
dfarrah
Still better than in most places.
It's still better than in most places, where the electronic systems are all there is.
"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar
"All power corrupts absolutely!" -- thanatokephaloides
My Route
I've known this would be the result of things for over a decade now. Some tips I live by:
--Block everything you can on your browser. Use Ghostery, AdBlock, Click to Flash, whatever you can to reduce or eliminate your behind-the-scenes data footprint. Clear your cookies often, and regularly expunge your persistent cookies that things like Flash embed. Or better yet, turn off Flash and Java permanently!
--Don't bank online. Don't do your taxes online. Yes, this does not help protect against the networks within the banks themselves--but, it elminates one vector (your computer to the bank) that can also be spied upon or hacked. Have paper copies of your bank/stock statements mailed to you. That way, if your bank is hacked and your account disappears, you have an official record of things as of a recent date--all your accounts should be insured to a large extent. Those paper copies are your proof so you can get your money back!
--When you shop online, use false e-mails addresses and phone numbers, and use a credit card that has a low limit. Take a screen snapshot of the confirmation number of the transaction and keep it on your desktop until your shipment arrives. YOU CAN ALWAYS CONTACT THE SHOP to find out where your package is at, using that confirmation number! They don't need to know your true email or phone number!
--Encrypt everything you can. Or, use encrypted services when you can. For example, using iMessage/Messages on iPhones/Macs is encrypted end-to-end. You actually need your device itself in hand to be able to read the texts without cracking the encryption (which is extremely difficult--not impossible, but very, very hard).
--Use hard to crack passwords. There are a couple methods to make these very difficult to crack. Use a password generator, or, if you prefer not to: 1) Use very long phrases instead of single words. The longer the phrase, the more diffcult it is to crack. 2) Alternatively, combine a favorite (long) word with a longish number that you'll easily remember. For example, "janet1985" is easily cracked. "ja19ne85t" is much harder for a computer to crack, but still easy for a human to remember once they've used it a few times. Preferably longer, though--minimum of 12 characters, but longer than that is even better.
--Don't use cloud services! Or Facebook or Google+ or Instagram or Twitter. I mean you can, but then anything you put on those is out there (personal info, pictures, political views, whatever). Back your stuff up internally onto a bootable drive at regular intervals instead of in the cloud.
--Don't use your real name on the web. Use different names at different sites.
--I run my own server, so my email isn't reliant upon Google, or Apple, or Microsoft, or anyone else. I have my own personal "Facebook" that I share only with my family and very close friends. Invite only. Strong password protected. My own encrypted VPN (kind of like a cloud service) where I can access things from wherever! Hey, it was a learning experience, and yes, this part took a lot of effort! There are constant attacks against it, but I have certain easy-to-exploit services turned off and firewalled. And I can check against my own network usage and online blocklists (like spamhaus) to see if my server has been compromised (never has been).
All except that last one are pretty easy to do. Make them habbits. Not that hard. Much safer.
Goole+ can't be removed from Android phones
I'd love a non droid, but can't afford one.
Lol
Lol about the farmhouse!
Yeah, I'm not an Android person. But I assume you can just not use all that Google stuff, yes? I'd imagine--on Android in particular--it must be simple to use another e-mail client.
Apple doesn't allow removal of most of their built in apps. I just relegate them to a "never used" folder and use what I want instead.
Google+ can't be removed from Android phones
But you can have a very fake profile...
I have numerous ones i use for different reasons...
Keep things compartmentalized...
I'm the only person standing between Richard Nixon and the White House."
~John F. Kennedy~
Economic: -9.13, Social: -7.28,
Android
That's because Google owns the Android OS. It's Linux-based, but most of the serious fuck-ups are Google's. And Google Play is the app store (reposiitory) for Android, which is why you can't remove it.
I'm working on a permanent rooting for my Android ZTE Maven Z812. Once I have it, I'm looking at Ubuntu Touch (straight Linux) for it.
"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar
"All power corrupts absolutely!" -- thanatokephaloides
Neuromancer
Eventually the gloves will come off and hackers will just quietly disappear, one by one. Only State actors will be allowed to hack.
It's funny how influential books can be.
Neuromancer re-sorted and reset my processors. I was different after reading it. I suppose it was a brain hack.
One of my gmail accounts was hacked.
Somehow they managed to associate the account name with my clever password. I won't be using that account anymore. It was the one I gave to various political campaigns and organizations so at least I won't have to waste time deleting DCCC spam anymore.
We wanted decent healthcare, a living wage and free college.
The Democrats gave us Biden and war instead.
Azazello, Russians (Hillbots) hacked your Gmail account
Seriously, though, the fact that you used it for political stuff made my aluminum foil antennae pop up from my head like a scene from My Favorite Martian! Creepy! So, my subject line is only partial snark.
You know what pisses me off?
Is that I don't use any cell or landline phones and everytime I go to sign up for some Internet service I need one for a fucking verification code.
From the Light House.
Sort of ironic
but while I was reading this c99% logged me out and forgot my password. I would have been worried, but this happens about every 2 weeks.
On to Biden since 1973