No Security Solution is Perfect…
Every security device or system has a “weak link” that makes it vulnerable to being exploited. For example, the strongest encryption is vulnerable to a weak passkey which is used to encrypt the data it’s protecting.
Windows, Mac OS X and Linux (which is used by the Chromebook) are vulnerable to DNS attacks where the DNS servers were compromised or settings were replaced. For example there is a new attack where a machine infected by a certain type of malware sets itself up as a DHCP server on a network. This allows the malware author to redirect unsuspecting users into using tainted DNS servers. (Note: for more information search for “TDSS Rootkit” [http://en.wikipedia.org/wiki/TDSS])
As more data gets stored in the “Cloud” the need to compromise local computers becomes less important. Popular web sites or service providers will become a more highly valued target to an attacker. Smaller companies are even more enticing targets to data thieves’ because generally they don’t have the money or expertise to properly secure their data.
Another exploit that attackers use now are weaknesses in web applications that we use every day. Some web sites don’t always their encrypt authentication process, which made it possible for someone to steal the browser cookie used to authenticate that web browser’s session. For example, this exploit was used against several popular web sites, it has since been patched but it took a few months for the companies to fix this vulnerability. (Note: for more information search for “Firesheep” [http://en.wikipedia.org/wiki/Firesheep])
Any unencrypted information is fair game on the Internet. Whether you enter into a web site or you store files on servers in the cloud your data is vulnerable. Protect yourself by:
Are You the Weakest Link?
If someone does something like click on links in spam, or download an executable from some site or person that they don’t know. Then it’s those people that you almost can’t build enough protections into the system to guard them from themselves.
Sometimes there can fine line between exploit and foolhardiness, and sometimes there is foolishness. It’s also hard for system prevent person from giving away their personal and private information such as a social security number, bank account information, username and password, etc.
Its situations like this that it’s up to person using the Internet to learn about some basic data security techniques, such as:
For more tips, check out my book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition).
(Read part 1 of this article)