<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6936134049134982166</id><updated>2026-04-08T06:25:24.594-04:00</updated><category term="security humor"/><category term="physical security"/><category term="identity theft"/><category term="full disk encryption"/><category term="encryption"/><category term="IPhone security"/><category term="Facebook Security"/><category term="antivirus"/><category term="digital forensics"/><category term="passwords"/><category term="phishing"/><category term="risk assessment"/><category term="truecrypt"/><category term="higher education security"/><category term="social engineering"/><category term="Firewalls"/><category term="IPhone"/><category term="breach notification"/><category term="data breach"/><category term="email scams"/><category term="malware"/><category term="password security"/><category term="security certification"/><category term="tools"/><category term="webappsec"/><category term="ATM security"/><category term="DHS"/><category term="MacOS"/><category term="OSX"/><category term="SSN"/><category term="incident response"/><category term="penetration testing"/><category term="ssl"/><category term="Black Hat"/><category term="High Tower Software"/><category term="MacOS security"/><category term="McAfee"/><category term="OS X"/><category term="P2P"/><category term="PCI"/><category term="PCI-DSS"/><category term="RFID"/><category term="RFID tags"/><category term="SEM"/><category term="SIM"/><category term="atm skimming"/><category term="botnets"/><category term="cell phone security"/><category term="credit card skimming"/><category term="disaster recovery"/><category term="free"/><category term="information security program"/><category term="password standards"/><category term="proprietary encryption"/><category term="security basics"/><category term="security best practices"/><category term="security jobs"/><category term="security mentality"/><category term="tokens"/><category term="two factor authentication"/><category term="virtualization"/><category term="web application"/><category term="xss"/><category term="5958 DAT"/><category term="ATM skimmers"/><category term="AV"/><category term="ColdFusion security"/><category term="DEFCON"/><category term="EDUCAUSE"/><category term="FDE"/><category term="GIAC"/><category term="Google Alerts"/><category term="Heartland Payment Systems"/><category term="Leopard security"/><category term="Listing"/><category term="Log management"/><category term="Mac"/><category term="Microsoft Office"/><category term="PHP"/><category term="Passport"/><category term="PayPal scam"/><category term="RFID blocking"/><category term="RFIDIOt"/><category term="RSA"/><category term="SANS"/><category term="SIEM"/><category term="SMS"/><category term="Twitter"/><category term="Windows security"/><category term="acquisitions"/><category term="big brother"/><category term="biometrics"/><category term="bots"/><category term="browser exploit"/><category term="browser security"/><category term="communications"/><category term="computer forensics"/><category term="consumer databases"/><category term="data security"/><category term="disk wipe"/><category term="email security"/><category term="false positive rate"/><category term="filesharing"/><category term="firewall management"/><category term="forensic tools"/><category term="free antivirus"/><category term="hardware encryption"/><category term="iPhone worm"/><category term="key management"/><category term="log analysis"/><category term="md5"/><category term="password re-use"/><category term="password safe"/><category term="privacy"/><category term="regulatory compliance"/><category term="remnant data"/><category term="ruleset management"/><category term="secure configuration"/><category term="secure delete"/><category term="security benchmarks"/><category term="security deals"/><category term="security mindset"/><category term="security practices"/><category term="security questions"/><category term="security standards"/><category term="security through obscurity"/><category term="security tools"/><category term="social networking spam"/><category term="spam"/><category term="swatting"/><category term="thawte"/><category term="tricks utilities"/><category term="virus"/><category term="vmware"/><category term="vulnerability scanning"/><category term="wireshark"/><category term="(ISC)²"/><category term="16 CFR Part 68"/><category term="ACID"/><category term="Abe Torkelton"/><category term="Android malware"/><category term="Apple"/><category term="Apple security"/><category term="BASE"/><category term="BIOS security"/><category term="BP"/><category term="Bang Goes The Theory"/><category term="Banner"/><category term="BlackHat 2008"/><category term="Blackberry security"/><category term="CFATS"/><category term="CISSP"/><category term="COFFEE"/><category term="CSRF"/><category term="CSSLP"/><category term="CVV2"/><category term="Caribou"/><category term="CheckFree"/><category term="ColdFusion"/><category term="Comodo hack"/><category term="Computrace LoJack"/><category term="Craigslist"/><category term="Credit card theft"/><category term="Cringely"/><category term="DAT file"/><category term="DECAF"/><category term="DEFCON 16 badge"/><category term="DMCA"/><category term="DNS"/><category term="DNS hijaacking"/><category term="Debian"/><category term="E-gold"/><category term="EFF"/><category term="EULA"/><category term="Encrypted Spaces"/><category term="FERPA"/><category term="FTC"/><category term="Facebook"/><category term="Facebook Application Security"/><category term="Facebook Privacy settings"/><category term="FakeAV"/><category term="FileVault"/><category term="Find My iPhone"/><category term="GAIA"/><category term="GPG"/><category term="Gmail S/MIME campaign"/><category term="Godwin&#39;s law"/><category term="Google Buzz security"/><category term="Google as a security tool"/><category term="Google security"/><category term="HIPAA"/><category term="Helix"/><category term="Homeland Security"/><category term="ISC diary"/><category term="ISC2"/><category term="Infosec jobs"/><category term="Intrusion Detection"/><category term="Java versions"/><category term="Kapersky"/><category term="LRAD"/><category term="LastPass"/><category term="LastPass breach password security"/><category term="LinkedIn"/><category term="LogMeIn"/><category term="Mac OS security"/><category term="MacOS OS X secure delete DOD wipe"/><category term="MacOS antivirus"/><category term="MacOS application layer firewall"/><category term="MacOS compliance"/><category term="MacOS encryption"/><category term="MacOS full disk encryption"/><category term="MacOS malware"/><category term="Martinis"/><category term="Mobile Security"/><category term="NACUBO"/><category term="Nagios"/><category term="Nessus"/><category term="OWASP"/><category term="OpenSSH"/><category term="OpenSSL vulnerability"/><category term="PGP"/><category term="PIX EOL"/><category term="PIX EOS"/><category term="PayPass"/><category term="Photoshop disasters"/><category term="Ponzi schemes"/><category term="PowerPoint"/><category term="Practical Security"/><category term="President Obama"/><category term="QSA"/><category term="Qualys"/><category term="RAM"/><category term="S/MIME"/><category term="S/MIME certificates"/><category term="SHA-1"/><category term="SMB"/><category term="SMB2"/><category term="SPIM"/><category term="Science in Information Security"/><category term="SecurID"/><category term="Secure Computing"/><category term="Security policy"/><category term="Snort"/><category term="Social network security"/><category term="System Availability"/><category term="TCG"/><category term="UC Berkeley data breach"/><category term="USB device security"/><category term="Ubuntu"/><category term="VoIP"/><category term="Vundo"/><category term="Web of Trust"/><category term="ZY2K9"/><category term="Zune"/><category term="Zunicide"/><category term="account security tricks"/><category term="accounting"/><category term="ad feed viruses"/><category term="advanced persistent threat"/><category term="aggressor mentality"/><category term="anti-forensics"/><category term="anti-qa"/><category term="auditing"/><category term="audits and compliance"/><category term="background checks"/><category term="backtrack"/><category term="bad passwords"/><category term="badge hacking"/><category term="badly behaved software"/><category term="blog news"/><category term="book review"/><category term="browser exploits"/><category term="browser fingerprinting"/><category term="browser plugins"/><category term="bugs"/><category term="captcha"/><category term="cell phone jamming"/><category term="certificates"/><category term="chisec"/><category term="citysec"/><category term="cloud computing"/><category term="coding best practices"/><category term="conficker worm downadup"/><category term="confidentiality"/><category term="consumer profiles"/><category term="contract"/><category term="cookies"/><category term="copyright infringement"/><category term="corrupt files"/><category term="counterfeiting"/><category term="cracking crypto"/><category term="credit card breach"/><category term="credit score"/><category term="css"/><category term="culture of paranoia"/><category term="cyber insurance"/><category term="cyberforensics"/><category term="cyberlaw"/><category term="cybersecurity month"/><category term="data carving"/><category term="destroy flash drive"/><category term="device disposal"/><category term="digital photo forensics"/><category term="disclosure"/><category term="disk encryption"/><category term="dns change malware"/><category term="documentation"/><category term="dr. no"/><category term="drive encryption"/><category term="dumb criminals"/><category term="ePO"/><category term="economics of security"/><category term="electronic submission"/><category term="embedded device security"/><category term="emergency communication"/><category term="energizer battery charger trojan"/><category term="entry access card security"/><category term="ephemeral ports"/><category term="ethereal"/><category term="evil maid"/><category term="exploits"/><category term="extrusion detection"/><category term="face recognition"/><category term="facebook background checks"/><category term="fake av"/><category term="file headers"/><category term="file integrity monitoring"/><category term="firewall troubleshooting"/><category term="firmware security"/><category term="flash drive"/><category term="foot-shooting"/><category term="foremost"/><category term="forensic imaging"/><category term="forms"/><category term="free security tools"/><category term="general failure"/><category term="getting into information security"/><category term="gift card theft"/><category term="gmail"/><category term="government security resources"/><category term="gps"/><category term="hacks"/><category term="hardware forensics"/><category term="hardware hacking"/><category term="hashing"/><category term="homework"/><category term="honeypots"/><category term="hostage ware"/><category term="hostageware"/><category term="how to spot a liar"/><category term="iPhone exploits"/><category term="iPhone forensics"/><category term="iPhone hacks"/><category term="ikee"/><category term="information security jobs"/><category term="information security management"/><category term="information security program 101"/><category term="insecure as designed"/><category term="insecurity"/><category term="irony"/><category term="it lessons learned"/><category term="kiosk security"/><category term="laptop encryption"/><category term="laptop recovery"/><category term="laptop theft"/><category term="law enforcement"/><category term="laws"/><category term="legal document"/><category term="liveCD"/><category term="mac antivirus"/><category term="malware analysis"/><category term="mcaffe"/><category term="mebroot"/><category term="media destruction"/><category term="monster.com"/><category term="netForensics"/><category term="network miner"/><category term="no fly list"/><category term="non-lethal weapons"/><category term="online payments"/><category term="open source"/><category term="packet capture"/><category term="packet sniffer"/><category term="panopticlick"/><category term="passswords"/><category term="password resets"/><category term="payment card fraud"/><category term="phonography"/><category term="phpbb security"/><category term="poll hacks"/><category term="precision hack"/><category term="preventing forum spam"/><category term="proxcard security"/><category term="psychology of security"/><category term="reconnaissance"/><category term="redhat"/><category term="remote control software"/><category term="removable storage"/><category term="remove page from google"/><category term="risk management"/><category term="risk transfer"/><category term="risk word map"/><category term="robots.txt"/><category term="safeword"/><category term="search engine removal"/><category term="secret shopper scams"/><category term="secure erase"/><category term="security"/><category term="security advertising"/><category term="security analysts"/><category term="security appliances"/><category term="security architecture"/><category term="security blogs"/><category term="security cameras"/><category term="security career tracks"/><category term="security configuration"/><category term="security education"/><category term="security education failures"/><category term="security experts"/><category term="security eye chart"/><category term="security feeds"/><category term="security job skills"/><category term="security livecd"/><category term="security metaphor"/><category term="security metrics"/><category term="security models"/><category term="security non-event"/><category term="security operations"/><category term="security paranoia"/><category term="security plugins"/><category term="security processes"/><category term="security scripting"/><category term="security software"/><category term="security survey"/><category term="security technical support"/><category term="security via psychology"/><category term="security videos"/><category term="security worst practices"/><category term="securitye education"/><category term="selling security"/><category term="separation of duties"/><category term="service"/><category term="sha1"/><category term="sha256"/><category term="sinoval"/><category term="software development"/><category term="software exploits"/><category term="software flaw"/><category term="software security"/><category term="software updates"/><category term="software vulnerability"/><category term="source code thefts"/><category term="spear phishing"/><category term="spyware"/><category term="ssn exposure"/><category term="standards"/><category term="stateful firwalll troubleshooting"/><category term="steadystate"/><category term="swatters"/><category term="tax fraud"/><category term="text messages"/><category term="text to speech"/><category term="theft recovery"/><category term="thumb drive"/><category term="torpig"/><category term="training"/><category term="trojan"/><category term="trojans"/><category term="truecrypt 6.0a"/><category term="trust"/><category term="unique id"/><category term="user agent fingerprinting"/><category term="vendor requirements"/><category term="virtual firewall"/><category term="web application security"/><category term="web application vulnerability scanning"/><category term="web infrastructure"/><category term="webcasts"/><category term="webinspect"/><category term="webpage removal"/><category term="winpcap"/><category term="wipe thumbdrive"/><category term="wireless insecurity"/><category term="wireshark portable"/><category term="wiretapping"/><title type='text'>Devil&#39;s Advocate Security</title><subtitle type='html'>&lt;center&gt;Devil&#39;s Advocate Security is a blog dedicated to even handed discussion of security topics, security news, and  observations from the front lines of the daily business of IT security.&lt;/center&gt;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>367</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-1122136062661969208</id><published>2011-10-14T20:00:00.003-04:00</published><updated>2011-10-14T20:00:03.075-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="password security"/><category scheme="http://www.blogger.com/atom/ns#" term="security education"/><title type='text'>Part 2: On Passwords, Password Policies, and Teaching</title><content type='html'>I noted in yesterday&#39;s post that I used the answers to drive a conversation with a student employee, but didn&#39;t provide details. I was asked what the assignment was, and thought that it might be of interest.&lt;br /&gt;&lt;br /&gt;I provided the initial question, and my response about what drives institutional policy - essentially what I summarized &lt;a href=&quot;http://devilsadvocatesecurity.blogspot.com/2011/10/on-passwords-and-password-expiration.html&quot;&gt;here&lt;/a&gt;. The assignment was:&lt;br /&gt;&lt;br /&gt;Explain how you would answer this question for a user, and for IT management, and how your policy might differ for each of these environments:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;A large multinational corporation&lt;/li&gt;&lt;li&gt;A commercial website like Amazon, or a cloud service like Dropbox or Picasa&lt;/li&gt;&lt;li&gt;A small company or non-profit&lt;/li&gt;&lt;/ul&gt;This sort of thought exercise is one that I feel is crucial for those who are learning information security, and is similar to questions I ask my employees when we discuss why our policies are what they are.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/1122136062661969208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/1122136062661969208' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1122136062661969208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1122136062661969208'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/10/part-2-on-passwords-password-policies.html' title='Part 2: On Passwords, Password Policies, and Teaching'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-5271712666248277777</id><published>2011-10-13T22:00:00.001-04:00</published><updated>2011-10-13T23:13:35.298-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="Security policy"/><title type='text'>On Passwords and Password Expiration</title><content type='html'>One of the things that I believe is an important part of my job is to answer user questions in a way that educates them about the topic they ask about in addition to providing the answer. At times, this can be frustrating, but it also challenges me to think about why I&#39;m providing the answer that I do.  It also means that I have to review the choices I, and my organization make about policy, process, and the reasons for both.&lt;br /&gt;&lt;br /&gt;I recently exchanged email with one of our users who questioned our password policy which requires periodic changes of passwords. The user contended that periodic password changes encourages poor password choice, that users who are forced to choose new passwords (even on a relatively infrequent basis) will choose poor passwords, and that in the end, that password changes serve no purpose.&lt;br /&gt;&lt;br /&gt;In my institution&#39;s case, there are a number of reasons why password changes make sense, and I believe that these are a reasonable match for most companies, colleges, and other organizations - but not necessarily for your Amazon account, or your banking password. It is critical to understand the difference between a daily use password for institutional access that provides access to things like VPN access, email, licensed software, and the rest of the keys to the kingdom, and a single use password that accesses a service or site. Thinking about your password policy in the context of institutional risk while remaining aware of how your users will react is critical.&lt;br /&gt;&lt;br /&gt;The reasons that help drive password change for my institution, in no particular order are:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Password changes help to prevent attackers who have breached accounts, but who have not used them, or who are quietly using them, from having continued access.&lt;/li&gt;&lt;li&gt;Similarly, they can help prevent shared passwords from being useful for long term access.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;They can help prevent users from using the same password in multiple locations by driving changes that don&#39;t match the previously set passwords elsewhere.&lt;/li&gt;&lt;li&gt;They can help prevent brute forcing, although this is less common in environments where there are back-off  algorithms in place. In many institutions, that central monitoring may not exist, or may not be easy to implement.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Password changes continue to be recommended by most best practice documents (including PCI-DSS and others). Including password expiration in your password policy can be an element in proving due diligence as an organization.&lt;/li&gt;&lt;/ul&gt;When you read the list from a user perspective, it is difficult to see a compelling reason for them to change their passwords. There isn&#39;t a big, disaster level threat that is immediately obvious, and the &quot;what&#39;s in it for me&quot; is hard to communicate. When you read it from an organizational perspective, you will likely see a set of reasons that when taken as a whole mean that a reasonable password expiration timeframe is useful at an organizational level. Here&#39;s why:&lt;br /&gt; &lt;br /&gt;The environment in which most of us work now has two major external threats to passwords: malware and phishing. With malware targeting browsers and browser plugins, and institutional policies that accept that users will visit at least common sites like CNN, ESPN, and other staples of our online lives, we have to acknowledge that malware compromises that gather our user&#39;s passwords are likely.&lt;br /&gt;&lt;br /&gt;Similarly, despite attempts we make at user education, phishing continues to seduce a portion of our user population into clicking that tempting link, or responding to the IT department that needs to know their password to ensure that their email isn&#39;t turned off. Again, we know that passwords will be exposed.&lt;br /&gt;&lt;br /&gt;Bulk compromises of passwords are likely to involve captured hashes, which most organizations have spent years designing infrastructure to avoid as tools like Rainbow Tables and faster cracking hardware became available. Thus, we worry more about what access to our networks, and what individual accounts, or small groups of compromised accounts can do. In the event of a large-scale breach of central authentication, the organization will require a password change from every user, typically with immediate expiration of all passwords.&lt;br /&gt;&lt;br /&gt;In this environment, we will require our users to change their passwords when their account is compromised, but will we know to require that? We know that advanced persistent threats exist, and that some attackers are patient and will wait, gathering information and not abusing the accounts they collect. We can continue to fight those threats with periodic password changes for the accounts that provide access to our institutions.&lt;br /&gt;&lt;br /&gt;It would, of course, be preferable to use biometrics, or tokens, or some other two factor authentication system. It is also expensive, and difficult to adapt into a diverse environment where credentials are used across a variety of systems that are glued (or duct taped, bubble gummed, and bailing wired) together in a variety of ways. For now, passwords - or preferably passphrases - remain the way to make these heterogeneous systems authenticate and interoperate.&lt;br /&gt;&lt;br /&gt;In the end, I learned a lot from my exchange with the user. Over the next few months, I&#39;ll be adding additional information to our awareness program reminding users that password changes that change from &quot;Password1&quot; to &quot;Password2&quot; aren&#39;t serving a real use, we&#39;ll add additional information about tools like Password Safe to our posters and awareness materials, and I&#39;ll be working with our identity and access management staff to see if we can leverage their tools to prevent similar poor password practices. In addition, I&#39;ve been using it as a learning opportunity for my staff, and as a challenge for my student employee.&lt;br /&gt;&lt;br /&gt;I&#39;m aware that I won&#39;t win with every user - I&#39;ll still have the gentleman who resets his password once a day for as many days as our password history and minimum password age will allow so he can get back to his favorite password. I&#39;ll still have the user who changes their password to &quot;Password1!&quot; and claims that yes, they have used a capital and a number and a symbol, and that thus they have met the requirements for a strong password. But I also know that our population continues to grow more security aware, and that many of our users do get the point.&lt;br /&gt;&lt;br /&gt;If you&#39;re interested in this topic, you may enjoy &lt;a href=&quot;https://docs.google.com/viewer?url=http://research.microsoft.com/en-us/um/people/cormac/papers/2009/SoLongAndNoThanks.pdf&amp;amp;pli=1&quot;&gt;this Microsoft research&lt;/a&gt; about users, security advice, and why they choose to ignore it, and NIST&#39;s &lt;a href=&quot;http://csrc.nist.gov/publications/drafts/800-118/draft-sp800-118.pdf&quot;&gt;password guidance&lt;/a&gt; provides a well reasoned explanation of everything from password choice to mnemonics and password guessing.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/5271712666248277777/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/5271712666248277777' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/5271712666248277777'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/5271712666248277777'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/10/on-passwords-and-password-expiration.html' title='On Passwords and Password Expiration'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2414962828667726949</id><published>2011-10-10T20:00:00.000-04:00</published><updated>2011-10-10T20:00:00.150-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="getting into information security"/><category scheme="http://www.blogger.com/atom/ns#" term="security career tracks"/><title type='text'>How to handle &quot;I want to be a security guy&quot; with an easy assignment</title><content type='html'>As the manager of a security team I&#39;m often approached by technologists who are interested in information security. Their reasons range from a long term interest in the subject to those who simply want a change of pace, or think that the grass may just be greener in infosec.&lt;br /&gt;&lt;br /&gt;Over the years I&#39;ve developed a simple list of things that I tell people who express an interest:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Get a copy of &lt;a href=&quot;http://www.amazon.com/Hacking-Exposed-Network-Security-Solutions/dp/0071613749/ref=sr_1_1?s=books&amp;amp;ie=UTF8&amp;amp;qid=1318276703&amp;amp;sr=1-1&quot;&gt;Hacking Exposed&lt;/a&gt;. Anything recent will do, and a good alternative is &lt;a href=&quot;http://www.amazon.com/Counter-Hack-Reloaded-Step---Step/dp/0131481045/ref=sr_1_1?s=books&amp;amp;ie=UTF8&amp;amp;qid=1318278831&amp;amp;sr=1-1&quot;&gt;Counterhack Reloaded&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Skim the book, and read anything that catches your eye. Don&#39;t try to read it cover to cover, unless you really find that you want to.&lt;/li&gt;&lt;li&gt;Come back and talk to me once you&#39;ve done that, and we&#39;ll talk about what you found interesting.&lt;/li&gt;&lt;/ol&gt;It&#39;s a very simple process - but I&#39;ve found it immensely valuable. Those who are really interested, and who will put the time into the effort will buy the book, and will come back with questions and comments. A certain percentage will get the book and will realize that information security isn&#39;t really what they want to do, or they will realize that they need or want to know more before they tackle a career in security. A final group are interested, but not enough to take the step to follow up.&lt;br /&gt;&lt;br /&gt;Once you have an interested candidate, the conversation or conversations that you can have next are far more interesting. Hopefully, you&#39;ve read the book yourself, as you&#39;ll be answering questions, and often providing references to deeper resources on the topics that interest them. Favorite resources for follow-up activities include:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.owasp.org&quot;&gt;OWASP&lt;/a&gt; - particularly &lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project&quot;&gt;WebGoat&lt;/a&gt; and &lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_Mutillidae&quot;&gt;Multilldae&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Investigation of vulnerability scanners like &lt;a href=&quot;http://cirt.net/nikto2&quot;&gt;Nikto&lt;/a&gt; and &lt;a href=&quot;http://www.tenable.com/products/nessus&quot;&gt;Nessus&lt;/a&gt; and&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Exploration of tools like Metasploit and the &lt;a href=&quot;http://www.bindshell.net/tools/beef.html&quot;&gt;BeEF&lt;/a&gt; browser exploitation framework using DVL or a similar vulnerable OS&lt;br /&gt;&lt;/li&gt;&lt;li&gt;SANS courses like SANS 401 and 501&lt;/li&gt;&lt;/ul&gt;A whole range of options exists once you start to have the conversation - but you&#39;re certain you&#39;re having the conversation with someone who is interested enough to follow up, and who has helped you identify what they&#39;ll have some passion for.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2414962828667726949/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2414962828667726949' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2414962828667726949'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2414962828667726949'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/10/how-to-handle-i-want-to-be-security-guy.html' title='How to handle &quot;I want to be a security guy&quot; with an easy assignment'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-7259810807651979172</id><published>2011-08-01T21:17:00.003-04:00</published><updated>2011-08-01T21:20:15.580-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security humor"/><title type='text'>What do hackers look like?</title><content type='html'>&lt;a href=&quot;http://boingboing.net&quot;&gt;Boingboing&lt;/a&gt;&#39;s Rob Beschizza &lt;a href=&quot;http://boingboing.net/2011/08/01/hackerstockart.html#more-111723&quot;&gt;surveyed&lt;/a&gt; stock photos of hackers from &lt;a href=&quot;http://www.shutterstock.com/cat.mhtml?searchterm=hacker&quot;&gt;Shutterstock&lt;/a&gt; and Reuters - the writeup should make security professionals and hackers laugh...and wince.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/7259810807651979172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/7259810807651979172' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7259810807651979172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7259810807651979172'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/08/what-do-hackers-look-like.html' title='What do hackers look like?'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-7536900740760010451</id><published>2011-05-19T20:29:00.003-04:00</published><updated>2011-05-19T20:53:42.180-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="LastPass breach password security"/><title type='text'>What does the LastPass security breach mean?</title><content type='html'>Most people in the security world - and many Internet users - have read over the past two weeks about the possible exposure of &lt;a href=&quot;http://lastpass.com/&quot;&gt;LastPass&lt;/a&gt;&#39;s password database. Since LastPass (which I&#39;ve written about &lt;a href=&quot;http://devilsadvocatesecurity.blogspot.com/2009/04/lastpass-answering-security-questions.html&quot;&gt;before&lt;/a&gt;) is a cloud password management tool, this was a major cause for concern, despite the fact that the passwords were &lt;a href=&quot;https://secure.wikimedia.org/wikipedia/en/wiki/Salt_%28cryptography%29&quot;&gt;salted&lt;/a&gt; - which would make them harder to figure out - many users still use poor passwords which could be easily retrieved.&lt;br /&gt;&lt;br /&gt;The good news is that LastPass did a lot of things right, starting with their first blog post: &quot;We noticed an issue yesterday and wanted to alert you to it. As a precaution, we&#39;re also forcing you to change your master password.&quot; They went on to explain why they were worried &quot;we saw a network traffic anomaly for a few minutes from one of our non-critical machines&quot; and &quot;we found a similar but smaller matching traffic anomaly from one of our databases in the opposite direction (more traffic was sent from the database compared to what was received on the server)&quot;.&lt;br /&gt;&lt;br /&gt;They explained what this might mean: &quot;We know roughly the amount of data transfered and that it&#39;s big enough to have transfered people&#39;s email addresses, the server salt and their salted password hashes from the database. We also know that the amount of data taken isn&#39;t remotely enough to have pulled many users encrypted data blobs.&quot;&lt;br /&gt;&lt;br /&gt;Best of all, they then explained who might be in danger: &quot;If you have a strong, non-dictionary based password or pass phrase, this shouldn&#39;t impact you - the potential threat here is brute forcing your master password using dictionary words, then going to LastPass with that password to get your data. Unfortunately not everyone picks a master password that&#39;s immune to brute forcing.&quot;&lt;br /&gt;&lt;br /&gt;They even note that they&#39;re not sure that the whole thing is an actual issue - but that they want to do the right thing: &quot;We realize this may be an overreaction and we apologize for the disruption this will cause, but we&#39;d rather be paranoid and slightly inconvenience you than to be even more sorry later.&quot;&lt;br /&gt;&lt;br /&gt;Since then, LastPass has done a lot more things right and they&#39;ve described it on &lt;a href=&quot;http://blog.lastpass.com/2011/05/lastpass-security-notification.html&quot;&gt;their blog&lt;/a&gt;. They&#39;ve done everything from providing frequent updates to trying to make sure that any future issues are handled properly. They&#39;ve analyzed the mistakes they&#39;ve made, and have acted to correct them, and have implemented a number of improvements to their infrastructure, design, and their overall processes.&lt;br /&gt;&lt;br /&gt;Some of the things that I&#39;m happiest to see are:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;They have engaged 3rd party code reviewers and have committed to doing several reviews per year and sharing the results of the reviews.&lt;/li&gt;&lt;li&gt;They are soliciting community feedback at &lt;a href=&quot;https://lastpass.com/support_security.php&quot;&gt;https://lastpass.com/support_security.php&lt;/a&gt;&lt;/li&gt;&lt;li&gt;They&#39;ve split their infrastructure to keep back end systems away from their production service systems.&lt;/li&gt;&lt;li&gt;They&#39;ve created a bastion host log server&lt;/li&gt;&lt;/ul&gt;To enterprise security folks, these will all look like normal best practices, and they are - but the fact that the folks at LastPass learned, and learned quickly is a great sign.&lt;br /&gt;&lt;br /&gt;So, if you&#39;re a LastPass user, should you be worried? The answer is...probably not. While storing passwords in the cloud has some innate security risk, their reaction to the event had all the things I would want to see, and their basic technology not only appears well founded, but it also continues to get better. For now, my recommendation remains the same: if you&#39;re interested in cloud based password storage, LastPass is a good choice - and it appears that it will continue to improve. Regardless of what you use for password storage, a good master password is critical.&lt;br /&gt;&lt;br /&gt;If you&#39;re not comfortable with a solution like LastPass, &lt;a href=&quot;http://passwordsafe.sourceforge.net/&quot;&gt;Password Safe&lt;/a&gt; and similar solutions can still be kept in the cloud - you just need to keep a client handy to access them once you retrieve the encrypted file.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/7536900740760010451/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/7536900740760010451' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7536900740760010451'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7536900740760010451'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/05/what-does-lastpass-security-breach-mean.html' title='What does the LastPass security breach mean?'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-6194537987521927393</id><published>2011-04-01T17:15:00.001-04:00</published><updated>2011-04-01T17:15:00.080-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BP"/><category scheme="http://www.blogger.com/atom/ns#" term="laptop encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="ssn exposure"/><title type='text'>BP Loses Personal Data</title><content type='html'>The &lt;a href=&quot;https://www.nytimes.com/2011/03/30/us/30brfs-BPLOSESPERSO_BRF.html?partner=rss&amp;emc=rss&quot;&gt;AP&lt;/a&gt; and other &lt;a href=&quot;http://www.bbc.co.uk/news/world-us-canada-12912432&quot;&gt;news sources&lt;/a&gt; are reporting that BP lost a laptop containing the personal information of 13,000 people who applied for compensation for damages. The laptop was unencrypted, but was password protected. BP has sent notification letters to those effected.&lt;br /&gt;&lt;br /&gt;This is just another reminder that laptop encryption makes life easier...and may even cost less than notification letters!&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/6194537987521927393/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/6194537987521927393' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/6194537987521927393'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/6194537987521927393'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/04/bp-loses-personal-data.html' title='BP Loses Personal Data'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2907443173453782911</id><published>2011-03-30T21:11:00.000-04:00</published><updated>2011-03-30T21:11:35.591-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Comodo hack"/><title type='text'>Messages from the (purported) Comodo Hacker</title><content type='html'>The purported Comodo hacker has posted a number of documents on &lt;a href=&quot;http://pastebin.com/u/ComodoHacker&quot;&gt;pastebin&lt;/a&gt;. The hacker claims to have used API access to generate the certificates mentioned in&lt;br /&gt;&lt;br /&gt;Comodo has also recently announced that two additional resellers &lt;a href=&quot;http://www.scmagazineus.com/two-more-comodo-resellers-owned-in-ssl-hack/article/199620/&quot;&gt;were also breached&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The documents are well worth a read to understand how web based infrastructure services might be breached, and where we might expect to see attacks in the future. API accessibility and vulnerable servers make for a nasty combination when a trust based infrastructure is in play.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2907443173453782911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2907443173453782911' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2907443173453782911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2907443173453782911'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/messages-from-purported-comodo-hacker.html' title='Messages from the (purported) Comodo Hacker'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2133500012020188068</id><published>2011-03-28T17:15:00.000-04:00</published><updated>2011-03-28T17:15:00.442-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="how to spot a liar"/><category scheme="http://www.blogger.com/atom/ns#" term="psychology of security"/><title type='text'>How to Spot a Liar</title><content type='html'>Forensic Psychology&#39;s &quot;How To Spot A Liar&quot; infographic is a great overview of what research shows liars do - and don&#39;t when asked questions.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;clear: both; margin: 0pt; padding: 0pt; font-family: Arial; color: rgb(0, 0, 0); height: auto; border: 0pt none;&quot;&gt;&lt;div style=&quot;position: absolute; margin-top: 600px; height: 50px; margin-left: 11px; font-size: 12px; font-family: &#39;Arial&#39;; color: rgb(255, 255, 255);&quot;&gt;&lt;a style=&quot;color: rgb(207, 207, 207); background: none repeat scroll 0% 0% rgb(0, 0, 0); padding: 2px 8px; text-decoration: none;&quot; href=&quot;http://www.forensicpsychology.net/how-to-spot-a-liar/&quot;&gt;&lt;b&gt;How To Spot A Liar&lt;/b&gt;&lt;/a&gt; &lt;i style=&quot;font-size: 9px; padding: 5px;&quot;&gt;by&lt;/i&gt; &lt;a style=&quot;color: rgb(255, 255, 255); font-family: arial;&quot; href=&quot;http://www.forensicpsychology.net/&quot;&gt;Forensic Psychology&lt;/a&gt;&lt;/div&gt;&lt;iframe src=&quot;http://forensicpsychology.s3.amazonaws.com/liar/how_to_spot_a_liar.html&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; height=&quot;625&quot; width=&quot;521&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2133500012020188068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2133500012020188068' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2133500012020188068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2133500012020188068'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/how-to-spot-liar.html' title='How to Spot a Liar'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-7183152755068165740</id><published>2011-03-27T11:49:00.003-04:00</published><updated>2011-03-27T12:14:22.676-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="secret shopper scams"/><title type='text'>Anatomy of a Scam - Secret Shoppers</title><content type='html'>Here&#39;s a recent example of a secret shopper scam. Like many scams, this one attempts to lure people who think that accidentally receiving a secret shopper invitation is a way to free money. In the end, it is merely an attempt at identity theft - though it may also involve a fee scam as well!&lt;br /&gt;&lt;br /&gt;If the recipient bothers to check who it is from, it purports to come from Dow Chemical, with an email address that is&lt;span class=&quot;gI&quot;&gt;&lt;span class=&quot;go&quot;&gt; &lt;span style=&quot;font-style: italic;&quot;&gt;recruit@hsbrv.net&lt;/span&gt;,  with a cc to &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot; class=&quot;gI&quot;&gt;david212@blumail.org&lt;/span&gt;&lt;span class=&quot;gI&quot;&gt;&lt;span class=&quot;go&quot;&gt;. The hsbrv.net domain points back to a Betty Prevo, with an email address listing &lt;span style=&quot;font-style: italic;&quot;&gt;mark212@blumail.org&lt;/span&gt;. That sounds suspiciously like our david212 address as well. The whois results are below:&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;blockquote&gt;Administrative Contact:&lt;br /&gt;     Prevo, Betty  mark212@blumail.org&lt;br /&gt;     1368 X W. Estes Ave&lt;br /&gt;     Chicago, Illinois 60626&lt;br /&gt;     United States&lt;/blockquote&gt;For those who are interested, that address points to &lt;a href=&quot;http://maps.google.com/maps?q=1368+X+W.+Estes+Ave+Chicago,+Illinois+60626&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1368+W+Estes+Ave,+Chicago,+Cook,+Illinois+60626&amp;amp;gl=us&amp;amp;ll=42.010402,-87.663581&amp;amp;spn=0.00861,0.016522&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;layer=c&amp;amp;cbll=42.011576,-87.66535&amp;amp;panoid=M6qKYMmTSu8sLrz-zdiuGw&amp;amp;cbp=12,38.52,,0,6.12&quot;&gt;an apartment building in Chicago&lt;/a&gt;. Interestingly, Betty Prevo apparently exists and does live in that area in Chicago, but she&#39;d probably be interested to find out that she&#39;s running various domains.&lt;br /&gt;    &lt;br /&gt;&lt;span class=&quot;gI&quot;&gt;&lt;span class=&quot;go&quot;&gt;Blumail? Well, it&#39;s a free email service that, &quot;&lt;/span&gt;&lt;/span&gt;provides global e-mail accounts, educational content, employment  needs, entrepreneurship, networking, story / experience sharing,  mentoring and volunteering opportunities to youth and others who are  coming online in developing countries.&quot; In this case? It&#39;s a great place for a scammer to get free email hosting. It&#39;s also a &lt;a href=&quot;http://www.419scam.org/419-blumail-org.htm&quot;&gt;well known 419 scam domain&lt;/a&gt;. Blumail is a legitimate service, unlike the &lt;span style=&quot;font-style: italic;&quot;&gt;hsbrv.net&lt;/span&gt; domain we first looked at.&lt;br /&gt;&lt;br /&gt;Now, the actual scam letter:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Hello there,&lt;br /&gt;&lt;br /&gt;  My Name is David Anderson and I am your group regional Instructor from within the USA.Henceforth you will be working with me on the completion of  your Mystery Shopper&#39;s Position application. Like you already know, your weekly per assignment is $300:00 Flat for working with us and will come in  payments of $300 each per assignment you complete for the company.&lt;/blockquote&gt;Note that the name actually somewhat matches the email address - that&#39;s often a missed detail for our scammers.&lt;br /&gt; &lt;blockquote&gt;PAYMENT TERMS:&lt;br /&gt;  Your payment would be sent ($300) per assignment , Also the company is in  charge of providing you with all expense money for the shopping and other  expenses incurred during the course of your assignment.All the tools you will needing would be provided to you with details every week you have an  assignment.&lt;br /&gt;&lt;br /&gt;  JOB Description :&lt;br /&gt;  1} When an assignment is given to you,You would be provided with details to  execute the assignment and in a timely fashion.&lt;br /&gt;  2} You would be asked to visit a company or store in your area and they are  mostly our competitors as a secret shopper and shop with them to know more  about their sales and stock , cost sales and more details as provided by the  company then report back to us with details of whatever transpired a  the  store. But anything you buy at the shop belongs to you,all we want is an effective/quick job and reports.&lt;/blockquote&gt;Free money, and what sounds like a somewhat reasonable reason why the company would want you to do this. The grammar is even better than most letters of this type.&lt;br /&gt; &lt;blockquote&gt;ASSIGNMENT PACKET :&lt;br /&gt;  Before any assignment we would provide you with the resources needed {cash}Mostly our company would send you a check which you can cash and use  for the assignment. Included to the check would be your assignment packet  .Then we would be providing you details on here. But you follow every single  information given to you as a secret shopper .&lt;br /&gt;&lt;/blockquote&gt;It starts to fall apart here with lines like &quot;Then we would be providing you details on here&quot;.&lt;br /&gt;&lt;br /&gt;And now for the meat of the scam:&lt;br /&gt; &lt;blockquote&gt; KINDLY RECONFIRM YOUR INFORMATION BELOW TO PROCEED ON FIRST ASSIGNMENT:&lt;br /&gt;  Full Legal Name :&lt;br /&gt;  Full Physical Address :&lt;br /&gt;  City :&lt;br /&gt;  State :&lt;br /&gt;  Zip code :&lt;br /&gt;  Age:&lt;br /&gt;  Nationality :&lt;br /&gt;  Home and Cell # :&lt;br /&gt;  Present Occupation:&lt;br /&gt;  Email:&lt;br /&gt;&lt;br /&gt;  Thank you for reading.&lt;br /&gt;  Yours sincerely.&lt;br /&gt;  Contact Person: David Anderson&lt;br /&gt;  Time: 24 Hours daily by e-mail&lt;/blockquote&gt;And that&#39;s the anatomy of a secret shopper scam. A simple way to hook the gullible into providing details for identity theft.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/7183152755068165740/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/7183152755068165740' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7183152755068165740'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7183152755068165740'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/anatomy-of-scam-secret-shoppers.html' title='Anatomy of a Scam - Secret Shoppers'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-493403187769984552</id><published>2011-03-18T12:30:00.001-04:00</published><updated>2011-03-18T12:30:00.478-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="advanced persistent threat"/><category scheme="http://www.blogger.com/atom/ns#" term="RSA"/><category scheme="http://www.blogger.com/atom/ns#" term="SecurID"/><title type='text'>RSA Hacked - SecurID Information Exposed</title><content type='html'>EMC&#39;s RSA division announced that they had been hacked and it appears that they&#39;re doing the right thing for their customers by telling them. From their &lt;a href=&quot;http://www.rsa.com/node.aspx?id=3872&quot;&gt;announcement&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;&quot;Our investigation also revealed that the attack resulted in certain  information being extracted from RSA&#39;s systems. Some of that information  is specifically related to RSA&#39;s SecurID two-factor authentication  products. While at this time we are confident that the information  extracted does not enable a successful direct attack on any of our RSA  SecurID customers, this information could potentially be used to reduce  the effectiveness of a current two-factor authentication implementation  as part of a broader attack.&quot;&lt;/blockquote&gt;If you&#39;re a current SecurID customer, you&#39;ll likely want to keep track of this as further detail is released. RSA notes that they expect to release details to the community -&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&quot;As appropriate, we will share our experiences from these attacks with  our customers, partners and the rest of the security vendor ecosystem  and work in concert with these organizations to develop means to better  protect all of us from these growing and ever more sophisticated forms  of cyber security threat.&quot;&lt;/blockquote&gt;I&#39;ll post further detail as it becomes available.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/493403187769984552/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/493403187769984552' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/493403187769984552'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/493403187769984552'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/rsa-hacked-securid-information-exposed.html' title='RSA Hacked - SecurID Information Exposed'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-415133558690179696</id><published>2011-03-18T07:30:00.000-04:00</published><updated>2011-03-18T07:30:03.001-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Caribou"/><category scheme="http://www.blogger.com/atom/ns#" term="entry access card security"/><category scheme="http://www.blogger.com/atom/ns#" term="proxcard security"/><title type='text'>Caribou and Cardkey Door Control Systems</title><content type='html'>&lt;a href=&quot;http://www.cybersecurityguy.com/caribou.html&quot;&gt;Caribou&lt;/a&gt; is a proof of concept exploit application that targets cardkey systems like the prox cards that you&#39;re likely familiar with from parking lots, apartment complexes, and possibly your entry access system at your employer.&lt;br /&gt;&lt;br /&gt;Per the site and demo:&lt;br /&gt;&lt;blockquote&gt;&quot;By providing Caribou only with the IP address of the target cardkey  device, a single-button &quot;Unlock&quot; will access the cardkey system, unlock  all available doors in sequence, allow 30 seconds for entry, and then  re-lock all those same doors.  Caribou has the capability of performing a  brute-force of any customized security PIN used with the system.&quot;&lt;/blockquote&gt;While the proof of concept code isn&#39;t provided, the speed with which is unlocks the door indicates that the keyspace for the pin is likely relatively small, and the author provides a &lt;a href=&quot;http://www.cybersecurityguy.com/hoa.html&quot;&gt;series of tips&lt;/a&gt; on securing HOA and other common spaces that use devices of this type. The most important item is the common sense (but often ignored) need to place the entry access system on a private network so that it can&#39;t be brute forced via open wireless or wired networks.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/415133558690179696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/415133558690179696' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/415133558690179696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/415133558690179696'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/caribou-and-cardkey-door-control.html' title='Caribou and Cardkey Door Control Systems'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2325375706953058791</id><published>2011-03-02T12:30:00.000-05:00</published><updated>2011-03-02T12:30:00.579-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android malware"/><title type='text'>Android Malware in the Android Marketplace - the dangers of free</title><content type='html'>&lt;a href=&quot;http://www.androidpolice.com/&quot;&gt;Android Police&lt;/a&gt; today reports that 21 applications (which have since been pulled) in the Android market, with between 50,000 and 200,000 downloads included malware, with capabilities including the rageagainstthecage or exploid root exploits, and that they upload data including &quot;product ID, model, partner (provider?), language, country, and userI&quot;. Worse, their analysis shows the ability to self update.&lt;br /&gt;&lt;br /&gt;Most of these apps appear to have been copies of existing apps, made available for free. This points out both the danger of the relatively open Android Market, and of uncontrolled app downloads for your users.&lt;br /&gt;&lt;br /&gt;The original article is worth a read, and includes a list of the malware laden apps.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2325375706953058791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2325375706953058791' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2325375706953058791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2325375706953058791'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/android-malware-in-android-marketplace.html' title='Android Malware in the Android Marketplace - the dangers of free'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2829613900316739594</id><published>2011-03-01T17:15:00.000-05:00</published><updated>2011-03-01T17:15:00.456-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="free antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="mac antivirus"/><title type='text'>Free Mac Antivirus from Sophos</title><content type='html'>I often recommend AVG to Windows users looking for a free antivirus product, but I haven&#39;t had a good recommendation for Mac users - until now.&lt;br /&gt;&lt;br /&gt;Sophos makes their Mac Home Edition antivirus software available for free at &lt;a href=&quot;http://www.sophos.com/products/free-tools/free-mac-anti-virus/&quot;&gt;http://www.sophos.com/products/free-tools/free-mac-anti-virus/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Sophos has impressed me in the past, and this looks like a very nice solution for Mac users.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2829613900316739594/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2829613900316739594' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2829613900316739594'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2829613900316739594'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/03/free-mac-antivirus-from-sophos.html' title='Free Mac Antivirus from Sophos'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-3670897901417421916</id><published>2011-02-24T17:30:00.000-05:00</published><updated>2011-02-24T17:30:01.967-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FileVault"/><category scheme="http://www.blogger.com/atom/ns#" term="full disk encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="MacOS full disk encryption"/><title type='text'>Mac OSX 10.7 to include full disk encryption</title><content type='html'>Apple&#39;s recent &lt;a href=&quot;http://www.apple.com/pr/library/2011/02/24macosx.html&quot;&gt;developer preview announcement&lt;/a&gt; for 10.7 notes that it will include:&lt;br /&gt;&lt;br /&gt;&quot;the all new FileVault, that provides high performance full disk  encryption for local and external drives, and the ability to wipe data  from your Mac instantaneously&quot;&lt;br /&gt;&lt;br /&gt;This means that both Windows (BitLocker) and MacOS (FileVault) will have free, OS integrated full disk encryption.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/3670897901417421916/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/3670897901417421916' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/3670897901417421916'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/3670897901417421916'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/02/mac-osx-107-to-include-full-disk.html' title='Mac OSX 10.7 to include full disk encryption'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-8482960742756517808</id><published>2011-02-11T17:15:00.001-05:00</published><updated>2011-02-11T17:15:00.096-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>How the President&#39;s Security Motorcade Works</title><content type='html'>&lt;a href=&quot;http://jalopnik.com/#%215756354/this-is-how-president-obamas-motorcade-rolls&quot;&gt;Jalopnik&lt;/a&gt; links to The Atlantic&#39;s Marc Ambinder&#39;s &lt;a href=&quot;http://www.theatlantic.com/magazine/archive/1969/12/inside-the-secret-service/8390/&quot;&gt;great article&lt;/a&gt; on how the Secret Service handles a significant event, including details of how the motorcade is organized and run. For those who think about physical security, this is an interesting read including a diagram of each vehicle and its role.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/8482960742756517808/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/8482960742756517808' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/8482960742756517808'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/8482960742756517808'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/02/how-presidents-security-motorcade-works.html' title='How the President&#39;s Security Motorcade Works'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-447259443553914591</id><published>2011-01-17T20:40:00.000-05:00</published><updated>2011-03-17T20:37:12.053-04:00</updated><title type='text'>Google Cache Prowling and Useful Firefox Security Plugins</title><content type='html'>I find that I often check Google&#39;s cache of sites that have been taken down, either as part of an incident investigation or to verify that data has been removed. One of the nicer ways to do this is using a tool like &lt;a href=&quot;http://userscripts.org/users/jefferyto&quot;&gt;Jeffrey To&lt;/a&gt;&#39;s &lt;a href=&quot;http://userscripts.org/scripts/show/30878&quot;&gt;Google Cache Continue&lt;/a&gt; script.&lt;br /&gt;&lt;br /&gt;This joins my toolbox of existing Firefox plugins such as:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;    &lt;a href=&quot;http://noscript.net/&quot;&gt;NoScript&lt;/a&gt; - script blocking&lt;/li&gt;&lt;li&gt;    &lt;a href=&quot;https://addons.mozilla.org/en-us/firefox/addon/urlparams/&quot;&gt;URLParams&lt;/a&gt; - website get/post parameters&lt;/li&gt;&lt;li&gt;    &lt;a href=&quot;http://getfirebug.com/&quot;&gt;Firebug&lt;/a&gt; - editing of pages, including Javascript variables&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/&quot;&gt;FoxyProxy&lt;/a&gt; - a Firefox based proxy switcher that works very well with web app testing tools.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;    &lt;a href=&quot;https://addons.mozilla.org/en-us/firefox/addon/ie-tab/&quot;&gt;IETab&lt;/a&gt; - to pop an IE tab into a Firefox testing session&lt;/li&gt;&lt;li&gt;    &lt;a href=&quot;https://addons.mozilla.org/en-us/firefox/addon/leet-key/&quot;&gt;Leet Key&lt;/a&gt; - for Base64, Hex, BIN, and other transforms&lt;/li&gt;&lt;li&gt;    &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/showip/&quot;&gt;ShowIP&lt;/a&gt; - shows the current site&#39;s actual IP address, as well as enabling a number of other useful host lookup tools.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;   You can find a whole relation mapped list of Firefox plugins in the &lt;a href=&quot;http://www.security-database.com/toolswatch/+-FireCAT-+.html&quot;&gt;FireCAT listing&lt;/a&gt; - enjoy!&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/447259443553914591/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/447259443553914591' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/447259443553914591'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/447259443553914591'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/01/google-cache-prowling-and-useful.html' title='Google Cache Prowling and Useful Firefox Security Plugins'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-1322405235969782226</id><published>2011-01-04T20:00:00.002-05:00</published><updated>2011-01-04T20:00:00.815-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phonography"/><category scheme="http://www.blogger.com/atom/ns#" term="security humor"/><title type='text'>Security Humor: DMC-Eh?</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho-HjVEJAbgcH4bAtdBATpC38vCZn-mMXUVaQyrxQ4zuVHQFoc70HuWxxwuTHmxAaN_XLNObuLNh91otZkh0uUWfHpS_uKiZfTMP9234LErD6iq12Jep7amLtw9mtVlkgxC5UxP7yuNWQ/s1600/4851782691_6b4a55e886.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho-HjVEJAbgcH4bAtdBATpC38vCZn-mMXUVaQyrxQ4zuVHQFoc70HuWxxwuTHmxAaN_XLNObuLNh91otZkh0uUWfHpS_uKiZfTMP9234LErD6iq12Jep7amLtw9mtVlkgxC5UxP7yuNWQ/s400/4851782691_6b4a55e886.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5558457935977174770&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;A recent take-down notice (which was of course sent to the wrong address) contained what has to be one of the best typos I&#39;ve ever seen in such a missive:&lt;br /&gt;&lt;blockquote&gt;&quot;&lt;span style=&quot;font-size:100%;&quot;&gt;Hereby we inform you that the material listed hereunder are of Phonographic nature and are deemed harmful to minors by many governments and non-governmental organizations.&quot;&lt;/span&gt;&lt;/blockquote&gt;We all knew the Internet was full of phonographic material, right?&lt;br /&gt;&lt;span style=&quot;font-size:11pt;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:11pt;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Flickr Creative Commons attribution licensed image courtesy &lt;a href=&quot;http://www.flickr.com/photos/cristinabe/&quot;&gt;cristinabe&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/1322405235969782226/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/1322405235969782226' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1322405235969782226'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1322405235969782226'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2011/01/security-humor-dmc-eh.html' title='Security Humor: DMC-Eh?'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho-HjVEJAbgcH4bAtdBATpC38vCZn-mMXUVaQyrxQ4zuVHQFoc70HuWxxwuTHmxAaN_XLNObuLNh91otZkh0uUWfHpS_uKiZfTMP9234LErD6iq12Jep7amLtw9mtVlkgxC5UxP7yuNWQ/s72-c/4851782691_6b4a55e886.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-6141431490357318575</id><published>2010-09-17T11:30:00.000-04:00</published><updated>2010-09-17T11:30:01.164-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social network security"/><title type='text'>Facebook Status and Burglaries</title><content type='html'>WMUR in New Hampshire &lt;a href=&quot;http://www.wmur.com/r/24943582/detail.html&quot;&gt;reports&lt;/a&gt; what is one of the first large-scale burglary cases based on Facebook status messages that I&#39;m aware of. For those of us who need to communicate about Facebook and social network security concerns to varied populations, this is a great example to cite. According to the article, &quot;Investigators said the suspects used social networking sites such as Facebook to identify victims who posted online that they would not be home at a certain time.&quot;&lt;br /&gt;&lt;br /&gt;The article mentions $100,000-200,000 of stolen property that was recovered, and that the case was solved due to an officer who noticed that fireworks of the same brand reported stolen in a burglary were being shot off and investigated on orders to check out any fireworks they heard being fired.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/6141431490357318575/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/6141431490357318575' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/6141431490357318575'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/6141431490357318575'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/09/facebook-status-and-burglaries.html' title='Facebook Status and Burglaries'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-4592342948854069619</id><published>2010-09-16T20:43:00.002-04:00</published><updated>2010-09-16T20:49:57.413-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><title type='text'>A Different Angle on Identity Theft: When Identity Thieves Use Your Identity</title><content type='html'>The story of Dr. Gemma Meadows, as &lt;a href=&quot;http://redtape.msnbc.com/2010/09/it-started-out-as-a-routine-case-of-credit-card-fraud-dr-gemma-meadows-an-optometrist-in-virginia-got-a-call-from-bank-o.html&quot;&gt;reported by MSNBC&lt;/a&gt; is an intriguing one. Like many victims of identity theft, she was contacted by her bank and informed of fraudulent activity. What happened next though, is a bit off the normal path for identity theft victims.&lt;br /&gt;&lt;br /&gt;Various packages with a wide range of values started to show up, and have continued to show up. Now, Dr. Meadows spends time tracking and returning packages, as well as fielding calls from various vendors from whom the items are ordered.&lt;br /&gt;&lt;br /&gt;Why? According to the article, and what she has been able to determine, the identity thieves are using her information to test validation scripts on e-commerce websites. Her valid address, phone, and other details are being used to make transactions appear valid.&lt;br /&gt;&lt;br /&gt;Interestingly, the scripts seem to work in some cases, flagging the transactions as possible fraudlent. The article mentions that some sites note that the item is to be shipped thousands of kilometers away from the order location, and that others call to verify that she is the one placing the order. Many others, however, don&#39;t do as well, and the stream of packages continues.&lt;br /&gt;&lt;br /&gt;The article is well worth a read. We&#39;re used to seeing lives disrupted by identity theft and the credit and financial issues that can go with it. Receiving packages when criminals use your identity to support their crimes in a different way is an entirely different event, and appears to be one that law enforcement and our database driven society isn&#39;t geared to handle.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/4592342948854069619/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/4592342948854069619' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/4592342948854069619'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/4592342948854069619'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/09/different-angle-on-identity-theft-when.html' title='A Different Angle on Identity Theft: When Identity Thieves Use Your Identity'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-7992594546283732914</id><published>2010-07-29T21:01:00.004-04:00</published><updated>2010-07-29T21:30:54.419-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ATM security"/><category scheme="http://www.blogger.com/atom/ns#" term="embedded device security"/><title type='text'>Blackhat, ATMs, and Money Fountains, Oh My!</title><content type='html'>Security blogs and websites are all buzzing with the news of Barnaby Jack&#39;s Blackhat demonstration of ATM insecurity. Wired has &lt;a href=&quot;http://www.wired.com/threatlevel/2010/07/atms-jackpotted/&quot;&gt;coverage&lt;/a&gt;, our favorite &lt;a href=&quot;http://it.toolbox.com/people/chiefmonkey/&quot;&gt;security monkey&lt;/a&gt; &lt;a href=&quot;http://it.toolbox.com/blogs/securitymonkey/blackhat-2010-video-the-atm-hack-and-jackpot-40245&quot;&gt;has a video&lt;/a&gt;, and others including  Tony Bradley from PC World covers the &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/202172/important_lessons_to_learn_from_the_black_hat_atm_hack.html?tk=hp_blg&quot;&gt;important lessons&lt;/a&gt; from the talk.&lt;br /&gt;&lt;br /&gt;So does the hack tell us something truly new? I don&#39;t really think so. For years, many ATMs have been poorly embedded systems, often running commodity operating systems that rely more on physical security provided by locked boxes than on heavily secured operating systems with appropriate security controls. I&#39;ve written about the insecurity of some &lt;a href=&quot;http://devilsadvocatesecurity.blogspot.com/2008/11/how-does-your-atm-uplink-or-physical.html&quot;&gt;ATM uplinks&lt;/a&gt; before, and accessing their network connection is often very simple in public locations.&lt;br /&gt;&lt;br /&gt;What the exploit does do is serve to point out vulnerabilities in the specific ATMs, both of which were running Windows CE. It also serves as a reminder that any operating system that can be remotely accessed, or that allows its filesystem to be written, or to mount USB devices is vulnerable. Since many ATMs run Windows XP, or even Windows NT, they make attractive targets to those who have pre-written malware that works on Windows systems.&lt;br /&gt;&lt;br /&gt;It should also remind us to review what devices we rely on that have embedded PC platforms in them. Windows CE, NT, XP, and various flavors of Linux appear throughout our IT infrastructure, and while we&#39;re used to locking down network access, often embedded devices don&#39;t provide strong local security. I&#39;ve run into everything from AV controllers and music players to embedded systems running animal feeding systems for research. Most of the time, my only ability to secure them is to lock them away, limit access to the room they live in, and to ensure that they&#39;re on a secured network.&lt;br /&gt;&lt;br /&gt;How do you secure your embedded systems? Have you gone so far as to modify appliances that manufacturers don&#39;t want changed?&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/7992594546283732914/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/7992594546283732914' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7992594546283732914'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/7992594546283732914'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/07/blackhat-atms-and-money-fountains-oh-my.html' title='Blackhat, ATMs, and Money Fountains, Oh My!'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-2806885216134432511</id><published>2010-05-21T19:35:00.004-04:00</published><updated>2010-05-21T19:39:41.011-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security deals"/><title type='text'>O&#39;Reilly Book Deal - Get Security and Other Ebooks Cheap Today</title><content type='html'>&lt;a href=&quot;http://oreilly.com/store/index.html&quot;&gt;O&#39;Reilly&lt;/a&gt; has a coupon available for today only that makes any one ebook in their store $10. If you&#39;re like me and like to have an electronic edition handy, this is a great deal for books that are updated and searchable. Their security books can be found &lt;a href=&quot;http://oreilly.com/pub/topic/security&quot;&gt;here&lt;/a&gt;. You&#39;ll want to use coupon code &quot;FAVFA&quot;.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/2806885216134432511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/2806885216134432511' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2806885216134432511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/2806885216134432511'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/05/oreilly-book-deal-get-security-and.html' title='O&#39;Reilly Book Deal - Get Security and Other Ebooks Cheap Today'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-105177389284967244</id><published>2010-05-18T23:21:00.002-04:00</published><updated>2010-05-18T23:23:44.787-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Privacy settings"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Security"/><title type='text'>Check Facebook Privacy Settings with ReclaimPrivacyRights.org&#39;s Scanner Bookmarklet</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMxYSPq4qa8i-Xe60uaxlBII_NEZEFYYOjl4Q08vvUKLixkmQJXGyBojIMKDP68fvfRvDv9PSf1bkfopgj9je7QZocvaftwXZXab4sP5l7JAKO2HVRGIfOhqDfYxnZn1N7SxD_2yJj95g/s1600/reclaimprivacyrights.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 93px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMxYSPq4qa8i-Xe60uaxlBII_NEZEFYYOjl4Q08vvUKLixkmQJXGyBojIMKDP68fvfRvDv9PSf1bkfopgj9je7QZocvaftwXZXab4sP5l7JAKO2HVRGIfOhqDfYxnZn1N7SxD_2yJj95g/s400/reclaimprivacyrights.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472816375971115298&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;ReclaimPrivacyRights.org provides a&lt;a href=&quot;http://www.reclaimprivacy.org/&quot;&gt; simple bookmarklet&lt;/a&gt; that works simply by loading it when you visit your Privacy settings page on Facebook. Simple, neat, and it appears to be a neat way to get a basic checkup. Better, the &lt;a href=&quot;http://github.com/mjpizz/reclaimprivacy&quot;&gt;source code&lt;/a&gt; is available for review.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/105177389284967244/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/105177389284967244' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/105177389284967244'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/105177389284967244'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/05/check-facebook-privacy-settings-with.html' title='Check Facebook Privacy Settings with ReclaimPrivacyRights.org&#39;s Scanner Bookmarklet'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMxYSPq4qa8i-Xe60uaxlBII_NEZEFYYOjl4Q08vvUKLixkmQJXGyBojIMKDP68fvfRvDv9PSf1bkfopgj9je7QZocvaftwXZXab4sP5l7JAKO2HVRGIfOhqDfYxnZn1N7SxD_2yJj95g/s72-c/reclaimprivacyrights.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-4553153418872706833</id><published>2010-05-13T21:33:00.003-04:00</published><updated>2010-05-13T21:42:31.842-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Security"/><title type='text'>Facebook Friend Suggestions - Not a Virus!</title><content type='html'>Facebook status updates are quickly being populated with warnings that the suggest a friend notes that are appearing in users inboxes are virus driven. They&#39;re not - in fact, Facebook has released a notice that AllFacebook.com &lt;a href=&quot;http://www.allfacebook.com/2010/05/friend-requests-virus/&quot;&gt;posted&lt;/a&gt; stating&lt;br /&gt;&lt;blockquote&gt;&quot;This is neither a bug nor a virus, and the “Virus Alert” status update is incorrect. Friend suggestions are now mutual and will appear for both users involved. That is, if I suggest that one person become friends with another, both the person I suggested and the person to whom I sent the suggestion will receive the notification.&quot;&lt;/blockquote&gt;The fact that the Facebook populace quickly communicates about a potential issue is good - the fact that false information is spreading quickly is not as good - but I&#39;d rather my users avoid a fake virus than not avoid a real one.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/4553153418872706833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/4553153418872706833' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/4553153418872706833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/4553153418872706833'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/05/facebook-friend-suggestions-not-virus.html' title='Facebook Friend Suggestions - Not a Virus!'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-646546959466032860</id><published>2010-05-09T11:37:00.002-04:00</published><updated>2010-05-09T11:41:33.470-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Science in Information Security"/><title type='text'>Experiments in Security: Magstripe Reading Using Rust Particles</title><content type='html'>&lt;a href=&quot;http://www.tetherdcow.com/&quot;&gt;Tetherdcow&lt;/a&gt; via &lt;a href=&quot;http://boingboing.net&quot;&gt;BoingBoing&lt;/a&gt; has  a great &lt;a href=&quot;http://www.tetherdcow.com/?p=7497&quot;&gt;science experiment&lt;/a&gt; to try with magstripes on credit cards and other ID cards: using rust particles to read the magstripe. This looks like a great hands on and visible way to talk about how data is encoded when teaching students.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/646546959466032860/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/646546959466032860' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/646546959466032860'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/646546959466032860'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/05/experiments-in-security-magstripe.html' title='Experiments in Security: Magstripe Reading Using Rust Particles'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6936134049134982166.post-1988110595790733893</id><published>2010-05-04T17:30:00.000-04:00</published><updated>2010-05-04T17:30:00.602-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Security"/><title type='text'>Opting out of Facebook&#39;s Instant Personalization</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9j69flDlYIa5cawAm5a5eygObBhQ3WxFqM-p_dDRqsTmVDEhfynlbqc6i-nrUAEUeHUaRJuuttcreMrL6WMN-gXAVwoqYiTv9n4pSNeZfewQ6GHE1aV9a36HWOklX8YYvZhEHEn_wdm0/s1600/facebook_instant_personalization.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 211px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9j69flDlYIa5cawAm5a5eygObBhQ3WxFqM-p_dDRqsTmVDEhfynlbqc6i-nrUAEUeHUaRJuuttcreMrL6WMN-gXAVwoqYiTv9n4pSNeZfewQ6GHE1aV9a36HWOklX8YYvZhEHEn_wdm0/s400/facebook_instant_personalization.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5467458607541610226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The EFF as a quick look at &lt;a href=&quot;http://www.eff.org/deeplinks/2010/04/how-opt-out-facebook-s-instant-personalization&quot;&gt;how to opt out&lt;/a&gt; of Facebook&#39;s new Instant Personalization capabilities. Of note, you must block ALL of the Instant Personalization websites if you use them, rather than just setting one master setting. They provide both written steps and a video, as well as a suggestion on how to make your voice heard about this new &quot;feature&quot;.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script src=&quot;http://www.google-analytics.com/urchin.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
_uacct = &quot;UA-1423386-1&quot;;
urchinTracker();
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://devilsadvocatesecurity.blogspot.com/feeds/1988110595790733893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6936134049134982166/1988110595790733893' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1988110595790733893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6936134049134982166/posts/default/1988110595790733893'/><link rel='alternate' type='text/html' href='http://devilsadvocatesecurity.blogspot.com/2010/05/opting-out-of-facebooks-instant.html' title='Opting out of Facebook&#39;s Instant Personalization'/><author><name>David</name><uri>http://www.blogger.com/profile/00465683521970634631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9j69flDlYIa5cawAm5a5eygObBhQ3WxFqM-p_dDRqsTmVDEhfynlbqc6i-nrUAEUeHUaRJuuttcreMrL6WMN-gXAVwoqYiTv9n4pSNeZfewQ6GHE1aV9a36HWOklX8YYvZhEHEn_wdm0/s72-c/facebook_instant_personalization.jpg" height="72" width="72"/><thr:total>1</thr:total></entry></feed>