<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/security/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 04 Jan 2019 16:14:55 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Luas Ransomware Incident &#8211; Offline a while now</title>
		<link>https://www.l2cybersecurity.com/luas-ransomware-incident/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 04 Jan 2019 16:14:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1543</guid>

					<description><![CDATA[<p>How did you hear about the Luas Ransomware incident? Was it on the news? Online? Facebook? Twitter? Instagram? Or did you happen to visit the website to check some fare information and get confronted by a very basic ransom demand. Whatever way you found out about it, it happened over 40 hours ago and the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/luas-ransomware-incident/">Luas Ransomware Incident &#8211; Offline a while now</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1544" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-150x150.jpg" alt="Luas Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />How did you hear about the Luas Ransomware incident? Was it on the news? Online? Facebook? Twitter? Instagram? Or did you happen to visit the website to check some fare information and get confronted by a very basic ransom demand. <span id="more-1543"></span>Whatever way you found out about it, it happened over 40 hours ago and the website is still unavailable. They say that some <a href="https://www.irishtimes.com/news/ireland/irish-news/over-3-000-luas-user-records-may-have-been-compromised-in-cyber-attack-1.3746674" target="_blank" rel="noopener">3,226 user records</a> may have been compromised in this attack. They have now been contacted and the Data Protection Commission have been notified.</p>
<p>They claim that their <a href="https://payments.luas.ie/" target="_blank" rel="noopener">Standard Fare Notices</a> and <a href="https://taxsavertickets.luas.ie/" target="_blank" rel="noopener">Tax Saver Ticket</a> pages are not affected and are still available. I wonder about this, as I went to the version of their website from <a href="https://web.archive.org/web/20181127011542/https://luas.ie/" target="_blank" rel="noopener">last December</a> and there is no other part of the site there that records personal data. So the data breached must be belonging to those types of people. We&#8217;ll hear soon enough about this. It&#8217;s not what I want to focus on.</p>
<h3>The site has been down for a long time.</h3>
<p>For a company as large as Transdev is, I&#8217;m surprised at how long the home page for their major operation in Ireland has been unavailable. If they were following best practice, then this is, at a high-level, what should have happened on Wednesday night last:</p>
<ol>
<li>Ransomware compromises the web site.</li>
<li>IT team become aware &#8211; incident response effort commences &#8211; server, web and security teams scrambled.</li>
<li>Server(s) disconnected from all networks by physically pulling the network connectors out of the server(s), but they are left powered on.</li>
<li>Security team take a forensic snapshot of the affected server&#8217;s memory and disk. This is a long slow process.</li>
<li>Server team, bring up backup server or request a new server from service provider.</li>
<li>Web team commence restore of the website from most recent backup on that server. Tests that all the pages work.</li>
<li>Replacement server(s) put into production &#8211; website back online.</li>
<li>Once the security team have completed their snapshots of the affected servers, these machines can be wiped and put to use again.</li>
<li>Security team analyse the forensic images to discover source of the compromise and any loss of data. This process could take days and even weeks.</li>
</ol>
<p>Given that the Luas site is pretty basic, step 7 above should easily have been achievable, I think, within 24 hours. Probably even faster if they had a backup server on stand-by, ready to take the restore.</p>
<h3>Why is it taking so long?</h3>
<p>I&#8217;m going out on a limb here. I&#8217;m guessing that they don&#8217;t have decent backups of their website. If they don&#8217;t have that, then they literally have to rebuild it from scratch and this will take time. Probably days.</p>
<p>Perhaps they thought they did have backups, but here&#8217;s the thing. You actually should test your backups occasionally to see if they are working OK. If they never tested that these backups work, they may have discovered that they weren&#8217;t backing up enough and they are going to have to rebuild it from scratch.</p>
<p>With good, tested backups this would not take much time at all.</p>
<h3>How did the Luas Ransomware get in?</h3>
<p>That&#8217;s a good question. We may never find out, but the likely cause is that they had a poorly secured website or webserver. It looks like they use WordPress and if you have a very old version of that, then it is trivial for a hacker to compromise it. The message from the bad guys was interesting:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1545" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message.png" alt="Luas Ransomware Messsage" width="487" height="166" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message.png 487w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message-300x102.png 300w" sizes="(max-width: 487px) 100vw, 487px" /></p>
<p>This person states that he warned the company some time ago that they had vulnerabilities and they never responded. This could be a complete lie, but it&#8217;s also quite possibly true.</p>
<p>Based on the wording of the message above, if I received a similarly worded e-mail, warning me about something wrong on my website, I might dismiss that too. However, I take my website security seriously and keep it updated on a weekly basis. I also back it up daily and finally, I have tested those backups.</p>
<h3>What can you do to avoid such a long outage?</h3>
<p>You don&#8217;t want to be affected by something like the Luas Ransomware do you?</p>
<p>There&#8217;s some simple steps that you can take. Basically keep your <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">website updated</a> regularly and have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">good backups</a> which get tested. There are more, but these two will give you a quick win.</p>
<p>You could also give us a call on <span style="color: #0000ff;">087-436-2675</span> or drop a line to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we can have a chat about the service that I can provide. We also have some Cyber Security training coming up soon too, which you can <a href="https://www.l2cybersecurity.com/upcoming-public-training-schedule/" target="_blank" rel="noopener">book a place on</a>.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/luas-ransomware-incident/">Luas Ransomware Incident &#8211; Offline a while now</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of my 2018 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2018-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 31 Dec 2018 09:28:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1533</guid>

					<description><![CDATA[<p>I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is here. &#160; &#160;&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1053" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png" alt="will 2018 bring" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300.png 300w" sizes="(max-width: 150px) 100vw, 150px" />I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is <a href="https://www.l2cybersecurity.com/will-2018-bring/" target="_blank" rel="noopener">here</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span id="more-1533"></span></p>
<h3>1. There will be another large scale incident on a similar scale to WannaCry</h3>
<p><span style="color: #0000ff;">Every year there are really large attacks using different methods to cause problems. In 2016 we saw huge floods of data <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">attacking online services</a>. This flood was caused by poorly secured internet connected security cameras. 2017 saw Ransomware worms in <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. The latter of these was quite ingenious in the way it worked, as it used different methods to move around networks, once it successfully infected a machine. I’m going to guess that we’ll see something of similar complexity being used, perhaps in a more targeted way – possibly by way of altering a widely used <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">application’s source code</a> and lying dormant until activated.</span></p>
<p>There was one huge, record breaking event, but it didn&#8217;t feature in most of the global news as it affected a US based service provider. It was a large distributed denial of service attack, which <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/" target="_blank" rel="noopener">I reported here</a>. Earlier in the year, there was a situation where websites that used <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/" target="_blank" rel="noopener">a certain popular plug-in</a> were &#8220;mining&#8221; virtual currency for the bad guys. In September, there was number of well known websites, <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/" target="_blank" rel="noopener">like Ticket Master and British Airways</a>, who had their payment pages compromised. People who used those sites had their credit card information stolen.</p>
<p>I&#8217;ll take a partial on this, as the stories above didn&#8217;t have the same kind of media frenzy or global awareness as previous incidents.</p>
<h3>2. Past Data Breaches will impact victims financially on a large scale</h3>
<p><span style="color: #0000ff;">With so many data breaches occurring throughout 2017 (and for years earlier), there is a huge amount of useful and usable data that the evil doers can, if they used some <a style="color: #0000ff;" href="https://en.wikipedia.org/wiki/Big_data">big-data methodologies</a>, mine to extract and target individuals and hit them financially. It’s not credit card numbers I’d be worried about, as the issuers are fairly good at catching fraud and protecting the card holder. It’s all of the other information that could be used to craft a very convincing e-mail/letter/WhatsApp message that will cause the victim to send money to the bad guys.</span></p>
<p>I reckon I got this one. Old passwords that were breached a long time ago (possibly from the 2012 LinkedIn breach), were used to make a <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">sextortion e-mail</a> appear more credible and a lot of people fell for it. According to <a href="https://cryptoblockwire.com/sextortion-scam-500000-bitcoin-btc/" target="_blank" rel="noopener">some reports</a>, 1,000 people paid approximately $500,000. An <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922" target="_blank" rel="noopener">earlier analysis</a> of the payments showed that some people paid up to $4,900, with the average being $1,900.</p>
<h3>3. GDPR will cause a big Facebook-type company to be fined</h3>
<p><span style="color: #0000ff;">I suspect there are individuals out there waiting in the long grass for May 25th 2018 to roll around so they can launch all manner of <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/gdpr-glossary/#subjectaccessrequest">subject access requests</a> on various companies and government departments that they don’t like. Just to be a nuisance. I do, however, expect that some large global corporation, that has a lot of personal data on a huge number of people, will end up being investigated and, either in 2018 or 2019, be levied a massive, multi-million Euro fine. But they will fight back and hold up the imposition of the fine for a number of years. They may even expose flaws in the GDPR legislation.</span></p>
<p>The cases are still under investigation, so I&#8217;ll take a partial on this, but it&#8217;s not a Facebook-type company that is going to be fined, but Facebook themselves. They currently have <a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-announces-statutory-inquiry-facebook" target="_blank" rel="noopener">multiple post-GDPR investigations underway</a> with the Data Protection Commission.</p>
<h3>4. Crypto-currency hack</h3>
<p><span style="color: #0000ff;">If BitCoin is still a valuable thing in 2018 (and hasn’t crashed and burned), I expect the evil doers will be doing their best to hack the BitCoin block chain in order to steal some of that sweet, sweet virtual currency.</span></p>
<p>This was a miss. I&#8217;ve not heard of any successful block chain hacks and BitCoin&#8217;s value has fallen so low, it&#8217;s probably not worth the effort to attempt to hack it any more.</p>
<h3>5. Data breaches will see a massive increase in reporting in Ireland</h3>
<p><span style="color: #0000ff;">While there have been data breaches reported in Ireland, they are few and far between. However, I fully expect that the requirement to report data breaches to the Data Protection Commissioner under the GDPR, will cause an increase in the reports of data breaches occurring. I have a useful <a style="color: #0000ff;" href="https://www.youtube.com/watch?v=w8CAmzboqxg">short video here</a> showing that there are many different types of data breach that might need to be reported.</span></p>
<p>This was a kinda easy one to predict. In 2017, there were on average 230 data breaches reported to the Data Protection Commissioner each month. Two months after the GDPR had been implemented, the Data Protection Commission (as it is now known) had received <a href="https://www.irishtimes.com/business/technology/dpc-receives-over-1-100-reports-of-data-breaches-since-start-of-gdpr-rules-1.3580240" target="_blank" rel="noopener">nearly 600 data breach notifications</a> per month.</p>
<h3>Results for my 2018 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad.</p>
<p>I don&#8217;t plan on doing this again next year. However, if enough people ask me to do so, then I&#8217;ll reconsider. Send me an e-mail at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and let me know if you want to see a 2019 set of predictions.</p>
<p>Wishing you and yours a safe and secure 2019.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Chinese hacking server hardware</title>
		<link>https://www.l2cybersecurity.com/chinese-hacking-server-hardware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 15:25:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[Hardware Hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1428</guid>

					<description><![CDATA[<p>You may have heard some pretty scary headlines or stories recently about a Bloomberg Businessweek article. This was about the Chinese hacking server hardware by implanting little &#8220;bugs&#8221; onto the main electronic boards of the servers. The claims, from several anonymous sources, were that this was happening on a vast scale. The Chinese had infiltrated&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/chinese-hacking-server-hardware/">The Chinese hacking server hardware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1429" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware-150x150.jpg" alt="Chinese hacking server hardware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />You may have heard some pretty scary headlines or stories recently about a <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" target="_blank" rel="noopener">Bloomberg Businessweek article</a>. This was about the Chinese hacking server hardware by implanting little &#8220;bugs&#8221; onto the main electronic boards of the servers. <span id="more-1428"></span>The claims, from several anonymous sources, were that this was happening on a vast scale. The Chinese had infiltrated SuperMicro, a manufacturer of these electronics boards. Every server that was shipped to approximately 30 US companies including Apple and Amazon had this little bug. Photos of a pencil and a little chip were doing the rounds. All very frightening indeed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1430 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek.jpg" alt="The supposed size of the chinese bug" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek-150x150.jpg 150w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<h3>Haven&#8217;t we heard about this kind of behaviour from China before?</h3>
<p>That was my first reaction to this story. Back in 2012, the <a href="https://www.reuters.com/article/us-usa-china-huawei-zte/u-s-lawmakers-seek-to-block-china-huawei-zte-u-s-inroads-idUSBRE8960NH20121008" target="_blank" rel="noopener">US Government set out to ban</a> any US telecommunications operator from using equipment supplied by Chinese companies Huawei and ZTE. This was after reports of communications equipment manufactured by them and supplied to US companies, were detected sending large packs of data back to China late at night.</p>
<h3>But doesn&#8217;t the US do this as well?</h3>
<p>Indeed thanks to the likes of Edward Snowden, we became aware that <a href="https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/" target="_blank" rel="noopener">the NSA behaves similarly</a>. In that story, they are shown to have intercepted the shipment of a new communications router. They then implanted some spying capability into it. It was then sent it on it&#8217;s way to it&#8217;s final destination.</p>
<h3>So there&#8217;s nothing really new about the Chinese hacking server hardware?</h3>
<p>Well this story from Bloomberg has stirred up quite a lot of controversy within the information security community. Apple and Amazon have been quick to categorically state that they have not been compromised. They claimed the story was completely false. Patrick Gray, an Australian information security journalist, <a href="https://risky.biz/RB517_feature/" target="_blank" rel="noopener">interviewed one of the named sources</a> in the Bloomberg story. Joe Fitzpatrick had been quite uncomfortable with the published story. Gray also raised the fact a previous story by the same journalists, quoting anonymous sources, turned out to be false. So he reckons it&#8217;s a bogus story.</p>
<p>I personally don&#8217;t think China would take the big risk of implanting &#8220;spy chips&#8221; in the all of the electronics that their own huge manufacturing companies produce. It would be a strange thing to do on such a massive scale as it would be more easily detected. They&#8217;ve been more targeted in the past, as has the US, so that&#8217;s probably more normal.</p>
<p>Certainly the supply chain is one of the weak points in a product&#8217;s creation. That&#8217;s how we ended up with <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/" target="_blank" rel="noopener">Petya/Not Petya</a> and also <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/" target="_blank" rel="noopener">the compromise of CCleaner</a>.</p>
<p>If you are in a top secret, research and development type operation, then you will need to have suitably vetted hardware, software and physical security experts on payroll or contract to be able to protect your business from these kind of efforts of the Chinese hacking server hardware.</p>
<p>For the rest of us mere mortals, there is little we can do to truly protect ourselves, without going to great expense. We just have to hope we have nothing the Chinese, the US, the UK, the Russians, the Israelis, etc., etc., etc. want. If they want it bad enough, they&#8217;ll get it.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/chinese-hacking-server-hardware/">The Chinese hacking server hardware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to deal with Ransomware.</title>
		<link>https://www.l2cybersecurity.com/deal-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 14:01:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1407</guid>

					<description><![CDATA[<p>I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. I have previously talked about how Ransomware can infect your machine. It can be by&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1408" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg" alt="Deal with Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware.jpg 500w" sizes="auto, (max-width: 150px) 100vw, 150px" />I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. <span id="more-1407"></span>I have previously talked about how Ransomware can infect your machine. It can be by <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/" target="_blank" rel="noopener">dodgy looking e-mails</a> or <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/" target="_blank" rel="noopener">legitimate looking e-mails</a>. The variety is endless, but it is generally all down to somebody clicking a link or opening an attachment. I&#8217;ve got an <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">entire commandment</a> dealing with e-mails and how you should handle them.</p>
<p>What I&#8217;ve talked about above, is all prevention. However that doesn&#8217;t help you if you are staring at a monitor with a ransom demand on it. Let me give you a couple of examples of recently reported Ransomware incidents and how they were handled.</p>
<h3>Bristol Airport recovers from Ransomware Incident</h3>
<p>On the weekend of the 15th and 16th September, <a href="https://www.theregister.co.uk/2018/09/17/bristol_airport_cyber_attack/" target="_blank" rel="noopener">Bristol Airport suffered a Ransomware incident</a>. This incident took their flight information screens off-line for much of the weekend. Luckily no other safety or flight systems were affected.</p>
<p>How did the authorities at Bristol Airport deal with Ransomware? They re-built the systems and restored backups. They did not pay the Ransom.</p>
<h3>Scottish Brewery suffered a Ransomware incident from a job application.</h3>
<p>In the last couple of weeks, the <a href="https://www.bankinfosecurity.com/scottish-brewery-slammed-by-dharma-ransomware-variant-a-11537" target="_blank" rel="noopener">Arran Brewery in Scotland had all of it&#8217;s systems affected by Ransomware</a>. They had been running a recruitment campaign, advertising for a role via their own website. The evil doers took that ad and posted it to some international recruitment websites. The brewery then started receiving several e-mails a day from interested candidates from all over the world. In among those e-mails the bad guys slipped in one with Ransomware. The CV got opened and their files got scrambled. Not only were their live files affected, but their recent backups were too. These were stored online, attached to their network. Their most recent offline backups were 90 days old.</p>
<p>How did the brewery deal with Ransomware? They also re-built their systems and restored what backups they had. In this case though, they did consider paying the (GBP) £9,600 ransom. They came to the determination that the value of the data they lost (90 days of sales data) was less than the cost of the Ransom demand. They also took into consideration that paying the Ransom does not guarantee they would get back their data.</p>
<p>The brewery then did something really sensible. They have kept a copy of the scrambled data.</p>
<h3>Help may be available from the good guys.</h3>
<p>There is a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org" target="_blank" rel="noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>
<p>So the Arran Brewery is holding onto the scrambled data in the hope that someday they will be able to unscramble it.</p>
<h3>So how should you deal with Ransomware?</h3>
<p>Prevention is always better than a cure.</p>
<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail on <span style="color: #ff0000;"><a style="color: #ff0000;" href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a><span style="color: #000000;"> to discuss your requirements.</span></span></p>
<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">shouldn&#8217;t insert strange USB devices</a> into your computers.</p>
<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">a commandment about backups</a>.</p>
<p>That&#8217;s it! With all of the above in place, <span style="text-decoration: underline;"><strong>in the</strong> <strong>very unlikely event</strong></span> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>
<h3>What if it would cost me less to pay the ransom?</h3>
<p>This is a genuine struggle for a business owner, particularly small businesses. Recovering systems from a ransomware incident takes time, which costs money, and the business may be unable to operate while recovery is ongoing, so is not generating revenue. A good business continuity plan, should reduce such risks.</p>
<p>If you are tempted to pay, I just have two things I want you to consider:</p>
<ol>
<li>There is no guarantee that you will get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noopener">100%</a> failure to recover data. If you pay and don&#8217;t get your data back, you will then have to pay the full cost of recovery anyway.</li>
<li>You are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I&#8217;m not. This is an accurate description of these people. They! Are! <span style="text-decoration: underline;"><strong>Evil!</strong></span></li>
</ol>
<p>If you pay once, then the bad guys reckon you might pay again, so you will be a bigger target. My advice to deal with Ransomware is to implement preventative measures (call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail <a href="mailto:info@L2CyberSecurity.com"><span style="color: #ff0000;">info@L2CyberSecurity.com</span></a> to have a no obligation chat) and never pay these evil doers.</p>
<h3>What else do you need to consider?</h3>
<p>Don&#8217;t forget that if the data that gets scrambled contains personal data, then you have a data breach on your hands, which may be notifiable under the new Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR). I&#8217;ve a short video here:</p>
<p><iframe loading="lazy" title="What is a data breach - Ransomware" width="500" height="281" src="https://www.youtube.com/embed/PVnq6Bu-GEA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it&#8217;s root cause.</p>
<p>#LetsBeCarefulOutThere and #StaySafe</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sextortion scam &#8211; a follow up.</title>
		<link>https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 15 Aug 2018 11:34:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1354</guid>

					<description><![CDATA[<p>This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments. The first thing to highlight is that the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1355" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg" alt="Sextortion scam follow up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />This time <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">last month I posted</a> about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.<span id="more-1354"></span></p>
<p>The first thing to highlight is that the evil doers are now using partial telephone numbers in this sextortion scam instead of old passwords. This can be more effective than the old password ruse that was used last month. This could be because many people may have changed passwords since. However not too many of us regularly change our mobile number.</p>
<h3>New development of the sextortion scam</h3>
<p>We may also be quite used to seeing our number appear in a partially redacted manner.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1356" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png" alt="" width="855" height="621" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png 855w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-300x218.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-768x558.png 768w" sizes="auto, (max-width: 855px) 100vw, 855px" /></p>
<p>So in this example, the victim sees the number +XX XXXXXX6074 instead of an old password. They have <a href="https://isc.sans.edu/forums/diary/New+Extortion+Tricks+Now+Including+Your+Partial+Phone+Number/23982/" target="_blank" rel="noopener">confirmed to the good folks</a> over at the Internet Storm Centre (ISC) that those last 4 digits match their number. So that can really make people sit up and take notice.</p>
<p>The question arises though &#8211; why are they partially redacting the number? It&#8217;s not like these guys are reputable and are trying to protect your privacy by not emailing the full number. If they truly had your full information from a hack or a data breach, why not just put the whole thing in there? It would be very much more effective.</p>
<p>No, they don&#8217;t have your full number at all and as surmised by the team over at the ISC, they are probably getting the information from password reset forms. This is where the like of Google and Amazon will send you a text message with a code as part of the reset process. Or as part of a two-factor authentication step such as the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1357" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg" alt="" width="368" height="256" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg 368w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile-300x209.jpg 300w" sizes="auto, (max-width: 368px) 100vw, 368px" /></p>
<p>So the bad guys have upped their game here. Just don&#8217;t fall for it.</p>
<h3>Are they making any money?</h3>
<p>The other update in relation to this is about the money they have actually made from this sextortion scam. A couple of weeks ago the fine people at the ISC <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922/" target="_blank" rel="noopener">did an analysis</a> of the bitcoin wallets that were included in the scam emails. These are the long string of characters and numbers that I redacted in the email example above.</p>
<p>&#8220;Wait a second&#8221; I hear you say, &#8220;Bitcoin is untraceable, anonymous money.&#8221;. Actually it&#8217;s not really untraceable as by the very nature of the blockchain on which bitcoin is based, each transaction is fully public. It would be more appropriate to say that it is unregulated money.</p>
<p>Anyway, their analysis revealed that of the many wallets they were monitoring:</p>
<ul>
<li>123 payments were received</li>
<li>$235,000 in total was paid to those wallets</li>
<li>$4,900 was the biggest payment, with an average payment of $1,900</li>
</ul>
<p>This was probably a subset of all the wallets in use across the whole campaign. However you can see that people were fooled into parting with their money in reasonably large numbers.</p>
<p>So you now want to easily protect you and your staff from these kind of scams, right? I do some pretty awesome <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">security awareness training</a>. If you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a>.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VPN Logs. Should you be concerned?</title>
		<link>https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Jul 2018 15:59:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1302</guid>

					<description><![CDATA[<p>I&#8217;ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service? Some VPN logs are more detailed than others. In some cases the VPN providers state on their website that they don&#8217;t keep logs&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/">VPN Logs. Should you be concerned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1303" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs-150x150.jpg" alt="VPN logs" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I&#8217;ve been meaning to write this up since March when I talked about a <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">VPN Leak</a> situation. Are you aware that some VPN providers maintain logs about your usage of their service? <span id="more-1302"></span>Some VPN logs are more detailed than others. In some cases the VPN providers state on their website that they don&#8217;t keep logs and yet they still do. This could potentially go against the requirements of the #GDPR as they must state clearly what personal data they process on you. So saying they don&#8217;t and then actually doing it, is a breach of the law.</p>
<h3>We don&#8217;t do VPN logs &#8230; often</h3>
<p><a href="https://www.bolehvpn.net/">BolehVPN</a> clearly states on their main site that they have a No logs policy. There for all the world to see in green and white:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1307" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1.jpg" alt="" width="640" height="146" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1.jpg 640w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1-300x68.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></p>
<p>And yet, if you mosey on over to their privacy policy, that changes things:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1308" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2.jpg" alt="" width="793" height="271" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2.jpg 793w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2-300x103.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2-768x262.jpg 768w" sizes="auto, (max-width: 793px) 100vw, 793px" /></p>
<p>This might seem a reasonable process to allow. After all nobody likes people who are abusing a service. However they are saying they turn on VPN logs to capture enough information to be able to identify a user and find out what they are up to that is causing the alleged abuse. Now bear with me on this one. It&#8217;s not as far fetched as you might think.</p>
<ul>
<li>What if the &#8220;abusive user&#8221; was actually law enforcement in a totalitarian regime?</li>
<li>What if they had compromised BolehVPN&#8217;s servers and were trying to locate &#8220;rebel activists&#8221; within their borders?</li>
<li>What if they start overloading the servers, prompting BolehVPN to initiate logging to identify the offenders?</li>
<li>If the &#8220;rebel activists&#8221; were connected at that time, then law enforcement should be able to gain access to those logs and be able to identify them.</li>
</ul>
<p>I&#8217;ll now toss in the GDPR aspect here. That privacy policy doesn&#8217;t specify what personal data is being logged, which would actually be a requirement for any EU resident using the BolehVPN service. So they would be in breach of the regulation here.</p>
<h3>Careful wording</h3>
<p>Some providers use very carefully chosen language. For example <a href="https://www.astrill.com/">Astrill VPN</a> says clearly on their main website page &#8220;No Logs kept&#8221; and then in their privacy policy they indicate that they have logging in place, but only while the connection is active. So the logs are not <span style="text-decoration: underline;"><strong>kept</strong></span>, but they still exist for the duration of the connection.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1304" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN.jpg" alt="" width="754" height="126" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN.jpg 754w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN-300x50.jpg 300w" sizes="auto, (max-width: 754px) 100vw, 754px" /></p>
<p>At least Astrill specify what data they have in the &#8220;temporary&#8221; log.</p>
<h3>Excessive VPN Logs</h3>
<p>Other providers are quite open about the information they log on you, but in some cases the amount of information they log is actually quite concerning. <a href="https://www.hidemyass.com">HideMyAss VPN</a> keeps a record of the following for at least 30 days (though it could be longer):</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1306" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN.jpg" alt="" width="716" height="264" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN.jpg 716w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN-300x111.jpg 300w" sizes="auto, (max-width: 716px) 100vw, 716px" /></p>
<p>For a company that sells a product that supposedly improves your online privacy, that is quite a lot of information about you that they are holding onto. The other concern here is that HideMyAss is a UK based company. The United Kingdom has in recent years passed what is known as the <a href="https://www.computerworlduk.com/security/draft-investigatory-powers-bill-what-you-need-know-3629116/">Snoopers Charter</a>. This gave government ministers powers to access peoples personal data without there being a suspicion of law breaking.  Also the UK is a member of the <a href="https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/">Five Eyes Countries</a>. These countries regularly ask for and are provided with intelligence about individuals, ostensibly for national security purposes.</p>
<p>With the amount of data logged by HideMyAss and easy access to it by the powers that be, you won&#8217;t be browsing the internet as privately as you may think. They have, in the past, <a href="https://www.theregister.co.uk/2011/09/26/hidemyass_lulzsec_controversy/">handed over information</a> to the US FBI about a hacker.</p>
<h3>I&#8217;ve broken no laws. Why should I be concerned?</h3>
<p>You may have broken no laws <span style="text-decoration: underline;"><strong>now</strong></span>. But what if the government introduced a law that you didn&#8217;t like and you could bypass this law by use of a VPN. You might value the fact that a good private VPN doesn&#8217;t give law enforcement enough data to convict you.</p>
<p>While this might be an unlikely scenario (though with the way things are going in the US right now, who knows), it probably isn&#8217;t something that should directly concern you. Flip this around though. There are countless people (e.g. journalists, human rights advocates), living in countries that are effectively police states, who are trying to get the truth out about what is happening in those countries and they absolutely need every bit of anonymity that they can get.</p>
<p>VPNs are absolutely essential to these type of people, but also for people who value their online privacy and security. I typically will never connect to a public Wi-Fi internet connection (e.g. in a coffee shop) as I simply do not trust how they have been set-up. I also cannot be certain that the access point to which I would connect is actually the one being provided, as an evil doer can have their Laptop &#8220;impersonate&#8221; (spoof) the coffee shop&#8217;s Wi-Fi and then record all of the data that is sent and received from my laptop.</p>
<p>Instead, I will typically use the hot-spot facility on my phone to connect to the internet. However if my signal is terrible and I really need to get on the internet, I will connect to the Wi-Fi, but then immediately establish a VPN connection, thus encrypting my connection and making all of the data meaningless to any bad guy intercepting my traffic.</p>
<p>The bottom line here is, if you value privacy, then get yourself a VPN that does not log any data about you or your activity on their service. You&#8217;ll have to read the privacy policies closely though to ensure that this is the case and that VPN logs are not recorded.</p>
<p>Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/">VPN Logs. Should you be concerned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Will your website be marked &#8220;Not Secure&#8221;?</title>
		<link>https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jul 2018 15:41:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1277</guid>

					<description><![CDATA[<p>Starting next week, some websites will be marked &#8220;Not Secure&#8221;. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. This is being done to highlight negative behaviour in respect to security, rather than reinforcing positive behaviour. The others browsers (Firefox, Opera, Internet Explorer and Edge) will&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/">Will your website be marked &#8220;Not Secure&#8221;?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1278" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-150x150.jpg" alt="be marked &quot;Not Secure&quot;" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Starting next week, some websites will be marked &#8220;Not Secure&#8221;. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. <span id="more-1277"></span>This is being done to highlight negative behaviour in respect to security, rather than reinforcing positive behaviour. The others browsers (Firefox, Opera, Internet Explorer and Edge) will do something similar in due course. If your site is affected this might come as a shock to you, but trust me it is a positive step to a better internet. Read on and be re-assured.</p>
<h3>How will I know if my website will be marked &#8220;Not Secure&#8221;?</h3>
<p>If the link to your website is <span style="color: #ff00ff;"><strong>http<span style="color: #ff6600;">s</span></strong></span>://www.<span style="color: #ff0000;"><em>mywebsite</em>.ie</span> (with <span style="color: #ff0000;"><em>mywebsite</em>.ie</span> being whatever your website name and domain is) then you will be OK. Close this article and get on with your life.</p>
<p>If however the link to your website is <span style="color: #ff00ff;"><strong>http</strong></span>://www.<span style="color: #ff0000;"><em>mywebsite</em>.ie</span> (no &#8220;<span style="color: #ff00ff;"><strong><span style="color: #ff6600;">s</span></strong></span>&#8221; after the <span style="color: #ff00ff;"><strong>http</strong></span> bit), then Chrome will highlight this in the address bar as being &#8220;Not Secure&#8221; like this:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1279" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-2.jpg" alt="" width="297" height="92" /></p>
<h3>What&#8217;s the difference between http and https?</h3>
<p>http stands for HyperText Transport Protocol. It&#8217;s how web pages are transmitted around the internet. When your website is using http, it is transmitting all of the bits and pieces of data on your website to people browsing the site &#8220;in the clear&#8221; (i.e. exactly as it is seen). If anyone was to intercept the traffic, they would see exactly what it is that people are looking at on your website. They would also be able to add (or inject) data of their own into the traffic and thus make it appear that your website is serving advertisements (for example).</p>
<p>https adds the word &#8220;secure&#8221; to HyperText Transport Protocol. What happens now is that the data from your website will be encrypted (i.e. scrambled into meaningless gibberish) before it is transmitted to people browsing your website. If somebody intercepted the data, they would not be able to determine what it is that people are looking at on your website. The integrity of the data coming from your site is also maintained and nothing could be added to the traffic from your site.</p>
<h3>My site is simple and boring. I don&#8217;t ask for peoples details or credit card information. Why is this happening?</h3>
<p>A website that is using http only is very easily compromised and such a compromise could cause your business reputation damage. If you don&#8217;t believe me check out this video. If you want to watch the whole thing (it&#8217;s 24 minutes long) please do, but to see quickly just some of the compromises, watch from about 7:04 for about 5 minutes. I&#8217;m afraid he does talk very technically, but I think you will appreciate the consequences from seeing what happens to a plain, boring blog site.</p>
<p><iframe loading="lazy" title="Here&#039;s Why Your Static Website Needs HTTPS" width="500" height="281" src="https://www.youtube.com/embed/_BNIkw4Ao9w?start=424&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The reason this is happening is because more than 50% of the websites on the internet are now being delivered by https. So we are all familiar with the sight of the word &#8220;Secure&#8221; in green along with the padlock:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1281" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure.jpg" alt="" width="436" height="48" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure.jpg 436w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure-300x33.jpg 300w" sizes="auto, (max-width: 436px) 100vw, 436px" /></p>
<p>What a lot of people would think is that this means the website is trustworthy &#8230; that is NOT THE CASE at all! All it means is the <span style="text-decoration: underline;"><em><strong>connection</strong></em></span> between the website and a person&#8217;s web browser is encrypted securely. Evil doers have lots of websites that have this &#8220;Secure&#8221; marker too.</p>
<p>So Google are switching the focus from highlighting sites using https to highlighting sites that don&#8217;t. So the green &#8220;Secure&#8221; with the padlock will disappear from &#8220;normal&#8221; sites. Then sites using http will be marked &#8220;Not Secure&#8221; in red. This will be an impetus to help drive the internet to being more secure.</p>
<h3>My web person is saying that it will cost me money to get https on my website. This is just a rip-off!</h3>
<p>Actually you can get https on your website for free, very easily. Your domain hosting provider may offer this service to you (my own host does so). If not, then Troy Hunt (the gentleman speaking in the video above) set up a website called <a href="https://httpsiseasy.com/">HTTPS is easy</a> on which he has 4 short videos on how you can set up your website to be https for free and in about 5-10 minutes (although there is one bit where you may have to wait 24 hours for the internet to work it&#8217;s magic).</p>
<h3>Anything else?</h3>
<p>If you want to get some more advice, drop an email with your questions to <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a> and we&#8217;ll be happy to address them for you.</p>
<p>Also if you are interested in learning how to use the internet more safely, check out <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf">the training that we offer</a>. If you want to find out more then call on 087-436-2675 or e-mail <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>In the meantime, watch those videos and see how you can stop your website be marked &#8220;Not Secure&#8221;.</p>
<p>The post <a href="https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/">Will your website be marked &#8220;Not Secure&#8221;?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Sextortion Scam</title>
		<link>https://www.l2cybersecurity.com/a-sextortion-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 12 Jul 2018 22:06:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1252</guid>

					<description><![CDATA[<p>The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. You receive an e-mail at your current e-mail&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1253" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg" alt="Sextortion Scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. <span id="more-1252"></span>You receive an e-mail at your current e-mail address with a subject line containing a User ID and Password from a very old account that belonged/belongs to you. The e-mail alleges that they have a video of you watching porn as well as the what porn you were viewing. They then look for money to not release the video to all of your friends, family and colleagues.</p>
<p>It is of course a scam, but having an old User ID and Password on the e-mail does seem to give it a sort of legitimacy, in that they may just have hacked your computer. If you happened to be somebody who recently viewed porn on that computer, one which has a webcam, then you may just fall victim to this sextortion scam. This is what a typical e-mail looks like:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1254" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg" alt="Sextortion Scam e-mail" width="834" height="544" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg 834w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-300x196.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-768x501.jpg 768w" sizes="auto, (max-width: 834px) 100vw, 834px" /></p>
<p>The amount payable varies between the various e-mails, as does the Bitcoin wallet address (both circled above). There may also be a number of random words towards the end of the e-mail, which are used to defeat spam filters.</p>
<p>The bottom line here is, these people did NOT hack into your machine and record you watching porn. If they did, why wouldn&#8217;t they include a frame from said footage to prove that they had something on you.</p>
<p>The old User ID and Password that they included will have been picked up by the bad guys from a data breach sometime in the past. This stuff has been knocking around the internet for a loooonnng time. I did mention this last year when I talked about another <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">scam e-mail that knew your name</a>. They will have used other indexing techniques to associate the old account with your current e-mail address and then send you the scam e-mail.</p>
<p>Well known security reporter Brian Krebs, reckons that the evil doers may refine their technique and <a href="https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/">use more recent accounts</a> that were part of a data breach.</p>
<p>As I always do in these e-mails I refer you to my <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">fifth commandment</a>. I&#8217;ll also throw in a shameless plug for the <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf">security awareness training</a> that I provide, which, if you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>Let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Posh POS was Compromised</title>
		<link>https://www.l2cybersecurity.com/posh-pos-was-compromised/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 10:58:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1292</guid>

					<description><![CDATA[<p>A headline worthy of The Register and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &#38; Taylor. These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this in a post on their site on the 1st April.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1293" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg" alt="POS compromised" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />A headline worthy of <a href="https://www.theregister.co.uk/2018/04/02/hacks_fifth_avenue_crooks_slurp_card_numbers_from_luxury_chain/">The Register</a> and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &amp; Taylor. <span id="more-1292"></span>These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this <a href="http://investor.hbc.com/releasedetail.cfm?ReleaseID=1062423">in a post on their site</a> on the 1st April. But it was no April Fool joke.</p>
<p>Basically the evil doers implanted malicious software on the Point of Sale (POS) terminals in the upmarket stores in the USA. For nearly a year (between May 2017 to March 2018) this malware was capturing customers credit/debit card details and passing this back to the bad guys. The crooks claimed to have gathered up to 5 million cards as a result of this hack and they have been selling off batches of them on the internet.</p>
<p>We are quite familiar with Chip &amp; PIN usage in Ireland as we have had it for quite some time. This does offer a great deal of protection as your card information is stored in an encrypted form on the chip. However in the US, they are only at the early stages of rolling out Chip &amp; PIN, so most people are still swiping their cards at the terminals. The magnetic stripes that are swiped do not have the data encrypted, and so the information can be accessed and passed on quite easily.</p>
<p>It&#8217;s not been revealed how the malicious software got onto their POS terminals, but it seems that the POS was compromised at all of their bricks and mortar stores in the US. Their online store was not affected.</p>
<p>Credit Card issuers are usually fairly good at detecting fraud by knowing their customers usual buying habits. So if somebody who usually spends €20-€50 on shopping items, suddenly attempts to buy high-end phones, tablets or televisions this should trigger an alert. However for the customers of Saks or Lord &amp; Taylor, such behaviour is much less likely to trigger an alert. So the crooks might be able to make away with a lot of goodies as a result.</p>
<p>The parent group, HBC, needs to put in place better segmentation and monitoring on their network, so if one store gets compromised, the malicious software cannot find it&#8217;s way easily to another store. They should also apply Commandments 1 (<a href="https://www.l2cybersecurity.com/use-automatic-updates/">automatic updates</a>), 2 (<a href="https://www.l2cybersecurity.com/use-anti-virus/">anti-virus</a>), 3 (<a href="https://www.l2cybersecurity.com/have-a-firewall-in-place/">firewall</a>) and 9 (<a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">control use of USB sticks</a>) to their POS network.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is somebody else using your password?</title>
		<link>https://www.l2cybersecurity.com/is-somebody-else-using-your-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 24 Feb 2018 10:21:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1135</guid>

					<description><![CDATA[<p>Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. ? So how do I&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1154" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg" alt="" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. <span id="c128" class="notranslate">?</span><span id="more-1135"></span></p>
<p>So how do I know these things? Where am I getting this figures from. Well just like November where I told you about the free <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad 9 service</a>, which prevents you going to know evil sites or in December where I told you about the free <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Security Planner tool</a>, which gave you simple advice on how best to protect your particular set-up, this month I give you the free <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords tool</a>, which was developed by highly respect security researcher <a href="https://www.troyhunt.com/">Troy Hunt</a>. Before you leap to the comments section highlighting my atrocious spelling &#8211; that&#8217;s how it is spelled &#8211; <a href="https://www.urbandictionary.com/define.php?term=pwned">pwned</a> is a computer gamer term for being completely dominated or compromised and is pronounced &#8220;powned&#8221; (to rhyme with &#8220;owned&#8221;).</p>
<p>So how does this pwned password tool answer the question is somebody else using your password? It&#8217;s quite simple, the Troy has got copies of online account information (including passwords) that has been breached from various sources over the last number of years. He has 500 million passwords on his database. Now he doesn&#8217;t have the passwords linked to their associated account, such that if he was hacked that somebody would get access to his juicy treasure trove of account information, it&#8217;s simply a database of passwords. He has used a certain very secure methodology to test the passwords, but there is no point in going into it here. If you&#8217;re a nerd with an itch to scratch, then you can read all about <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity">his methodology here</a>.</p>
<p>So how should you use this tool? Simple go to the <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a> page and type in your various passwords. Here is the result for &#8220;123456&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1152 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg" alt="poor choice of password" width="921" height="140" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg 921w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-300x46.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-768x117.jpg 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p>And the result for &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1153" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg" alt="better choice of password" width="925" height="99" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg 925w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-300x32.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-768x82.jpg 768w" sizes="auto, (max-width: 925px) 100vw, 925px" /></p>
<p>So what should you do if your password has been used before, particularly where it has been used a LOT? It&#8217;s kind of obvious, but you need to change it. Yes, I know it&#8217;s a pain. Yes you might forget what you changed it to. Guess what? When you change it, write your new password down on a piece of paper and put it in your drawer or maybe your wallet/purse. <span id="c126" class="notranslate">?</span></p>
<p>No I haven&#8217;t taken complete leave of my senses. But this is a case of risk reduction. Sure, you have an open copy of your password in a public-ish place, but it&#8217;s not going to be there forever. You will consult this piece of paper regularly in the first 3-4 days after changing your password. As your muscle memory starts to kick in, you will consult it less and less. After a week to 10 days you probably won&#8217;t be using the piece of paper anymore, so at that point you can destroy it.</p>
<p>Keeping this reminder of your password to hand will also enable you to do one more brilliant thing with your password and that is to make it LOOOOOONNNNNGGGGG. Don&#8217;t use &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; because that&#8217;s mine <span id="c132" class="notranslate">?</span> but either use a long passphrase (a sequence of words like my example) that is <span style="text-decoration: underline;"><strong>at least</strong></span> 15-20 characters long or use a password manager to generate a long nonsensical password which it has to remember, but you don&#8217;t. You only have to remember the master password, which you will have made it long and complicated. More details about passwords can be found under <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Commandment 8</a>, including talk about password managers.</p>
<p>Actually, one of the other really cool things Troy has done was to enable developers to create plug-ins that can query his database of passwords. One of the password managers (<a href="https://1password.com/">1Password</a>) has <a href="https://techcrunch.com/2018/02/23/1password-bolts-on-a-pwned-password-check/">incorporated this functionality</a> into it&#8217;s product, so if you chose a password that has been pwned, it will be flagged to you.</p>
<p>Finally, it would be remiss of me not to point out the main feature of Troy Hunt&#8217;s site. This has been around for many years and it&#8217;s the <a href="https://haveibeenpwned.com/">Have I been pwned?</a> feature. All you do is put in your e-mail address(es) or User IDs and it will tell you if they were part of a data breach of some online service. He has details on nearly 5 billion breached accounts, so it&#8217;s pretty comprehensive.</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
