by timw6n on 11/3/13, 7:23 PM with 92 comments
by Amadou on 11/3/13, 9:10 PM
by Theodores on 11/3/13, 9:18 PM
A few years ago I worked at some company where the computers were well and truly locked down. No facebook, no YouTuBe, no nothing. If it could not be accessed on Internet Explorer 6 for the strict purposes of getting the job done then you was not having it.
However, a charming young lady in some admin department was able to work her charms on the IT department. Somehow it became imperative that, unique in the company, she was able to access all the tedious sites of the internets. It only took a week or two before her computer was well and truly soiled with viruses, e-coli, everything. She did her own 'social engineering' to wreck her computer, however, someone on the outside, had they known that her computer was the weak one, could have social engineered her to install whatever.
Times have moved on since IE6. Nowadays everyone has a smartphone in their pocket and they can do whatever they need to do on that. We also now know that computers are vulnerable. People understand this, they did not back then (IE6 days).
So maybe it is time for offices where confidential stuff gets done to tighten up the firewalls, block the websites and make the office internet access a bit more locked down, with no need to pander to people who 'need' Facebook access at work. Reasons can be provided as to why this has to be and people can be encouraged to use their gadgets for anything social-network-y.
by AndrewKemendo on 11/4/13, 5:09 AM
The key reason why I think most confidence penetrations work is because in most cases the "system" doesn't work smoothly enough to not have usability issues. So when you know of credible people who are vetted but are still not "in the system" that becomes an instance of the "system" not working.
Then, inevitably in the few boundary cases where it doesn't work, you get to the point that you know how it will break and will wave over anyone in that specific sitution. If someone knows of these specific "breaks" then by definition they will exploit those knowing that it is a common issue.
If however you stick to the "I don't care what you say, you aren't in the system" then you are now "the inflexible security nazi." Security really is an ethos and it takes only a few pinpricks to make it crumble.
by dguido on 11/3/13, 8:46 PM
by justinmk on 11/3/13, 11:31 PM
> ... training employees to: Question suspicious behavior and report it to the human relations department.
> Refrain from sharing work-related details on social networks.
> Not use work devices for personal activities.
This reminds me of something Cory Doctorow[1] said regarding the NSA. Paraphrasing: the more locked-down an organization becomes, the more ineffective it becomes. When you can't trust your employees to the point that it becomes actual institutional policy to discourage information-sharing (communication), you are guaranteed to be dysfunctional.
There is a parallel, of course, regarding the red tape surrounding procurement for large government projects in order to mitigate corruption.
Addressing symptoms, not causes, is the theme.
---
[1] correction, Julian Assange: "the more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie". Which isn't precisely applicable to my comments above, so I guess that's my own conjecture.
by verteu on 11/3/13, 11:45 PM
by mattdeboard on 11/3/13, 11:57 PM
by smsm42 on 11/3/13, 8:33 PM
by judk on 11/3/13, 8:18 PM
by 001sky on 11/3/13, 11:00 PM
She had 60 Facebook connections.
She garnered 55 LinkedIn connections with employees from
the targeted organization and its contractors.
She had three job offers from other companies.
The 3x job offers seems a bit rich...wtf
by gaius on 11/3/13, 8:49 PM
by dcJoker on 11/3/13, 9:56 PM
by rbanffy on 11/3/13, 11:40 PM
"Silly little planet. Anyone could take over the place with the right set of mammary glands."
"I always thought the opposable thumb was... overrated"
I don't think much more needs to be said.
by jloughry on 11/3/13, 9:27 PM
http://www.computerworld.com/s/article/9179507/Fake_i_femme_...
by PhasmaFelis on 11/4/13, 5:54 AM
Ah, I'm so glad I don't work in security. In the library field, you seldom hear people say "Our employees are decent human beings. How can we fix this?" with a straight face.
by xerophtye on 11/4/13, 6:11 AM
by Paul12345534 on 11/4/13, 1:47 AM
by TwoBit on 11/4/13, 6:36 AM
That's not to say I an confident I wouldn't screw up in some other way, but Java should not be on the computers of anybody who cares about security.
by monksy on 11/4/13, 11:39 AM
by jokoon on 11/4/13, 1:00 AM
If the trick worked, it was because java had vulnerabilities and because they were male, so how should it be fixed ?
DUH
by sp332 on 11/4/13, 3:40 AM
by Bulkington on 11/4/13, 4:42 AM