See how easily Hackers can take over your life

See how easily Hackers can take over your life

Cyber security awareness month is coming to a close, and I wanted to close with this new video. It is a follow up to “Amazing mind reader reveals his ‘gift’“.

In this followup video, it features a gentlemen assuming the identity of a random man he selects as his mark on Facebook. Using social media, he acquires information about his personal life, including people his mark knows in real life.

Using movie stage makeup, he assumes his mark’s complete physical attributes. He later physically stands before his mark. See the entire video below:

Be vigilant on who you add as a friend on social media. Moreover, do not overshare information. It is amazing what one can find on the internet. Anything you say on the internet can and will be used against you.

Remember, if you give a hacker a cookie, he (or she) is going to want a glass of milk

Amazing mind reader reveals his ‘gift’

Amazing mind reader reveals his 'gift'

Now that I have your attention, over the weekend, I remembered this video that debuted back in 2012.

It was a great public service announcement piece from Belgium. What made the video such a hit was the eccentric individual was no ordinary mind reader – he gets all his information from Facebook, Twitter, Social Media, and the web.

He is also warning you against sharing too much private information.

[The video] begins with random people being selected from the streets of Brussels.  They are asked if they would like to participate in an upcoming TV program featuring Dave, described as a gifted clairvoyant.  Once they agree, they are ushered into a white tent to meet Dave. He hugs them and dances around as he seemingly tries to get a sense of the person’s energy.  As people are seated across from him, Dave tells them random facts about them, from the color of the motorcycle they own to their bank account number and even the types and locations of their tattoos.

As the unassuming subjects become absorbed in Dave’s trance and the factual information he is providingthe truth behind his magic is revealed.  A curtain drops, and behind it is a group of computer hackers dressed in all black searching the Internet for information about each of the individuals.  In fact, a large monitor sits in front of the hackers, displaying pictures and personal information about the subjects.  Each person seems astonished, first at the curtain dropping and then at the reveal as they realize what has taken place.  [Emphasis added]

Over here at Net Force, we still see too much over sharing of information on social media sites. Even the most harmless and innocuous pieces of information individuals share on social media is worth its weight in gold when combined with other pieces of information.

We all need a little reminder to “Be vigilant, because Internet fraudsters can (and will) use information against you.”

See the entire video below:


Teaching CyberSecurity in Higher Academia

Teaching CyberSecurity in Higher Academia

Teaching Cyber Security in Higher Academia has always been a subject that’s struck a chord with both academia and industry. There is always this balance that both sides seek to achieve.

On one hand, there are risks when teaching such a subject, including, having the proverbial “Dog biting the hand that feeds it.” Reading this thread on Reddit made my stomach churn as I see students try to advance their careers, knowledge and understanding of cyber security.

I won’t go down this rabbit hole too much on pointing the negatives out, but I would like to point out the obvious: The students are meeting in an unofficial capacity.

Whether it is sanctioned or unsanctioned by Higher Academia, the students have formed a community to share and learn. The very fact these students want to take it to the next level with the blessing of the administration indicates the willingness by students to do this the right way and ensure this community stays out of trouble.

It is also a wonderful opportunity for the administration to teach and help students learn the right ethics, morals, and understanding the consequences of ‘going to the dark side’. These students will be this academic institution’s first line of cyber defense in future years as they may notice suspicious and unusual behavior of computers they use on campus. They may even join the ranks as staff members of a higher academia institution, including the one they currently attend.

This is a relationship I encourage any student and higher academia to grow, nurture and cultivate. The benefits will always outweigh the concerns, and I ask that higher academia to avoid simply saying no and let that be the end of the conversation and dialogue.

Rather, identify the concerns (and yes they are legitimate concerns) and find ways to teach and educate these young minds that “With great power comes great responsibility.

How strong is your Password?

In the wake of the League of Legends security incident, we thought it best to remind everyone of some startling statistics about passwords and on how weak some passwords that are being used on a day to day basis.

Remember to use a service like LastPass to help you generate unique passwords or create your own unique PassPhrases (as in a phrase, not a word) for each service you use, with the minimum following complexity:

  • at least Two instances of Upper Case letters
  • at least Two instances of Lower Case letters
  • at least Two instances of Numbers
  • at least Two instances of Special Characters
  • at least 16 characters in length (the longer the better)

PWG_Infographic copy