The problem with security is you cannot stop vulnerability

For discussions about security.
Post Reply
Message
Author
gcmartin

The problem with security is you cannot stop vulnerability

#1 Post by gcmartin »

In the past, our intelligence agencies have used tools, even before the dawn of the Internet, to examine how to infiltrate. The Nazi's perfected it, and other countries adopted it and it has extended the same approaches even into the age of the Internet. These methods has been used against a country's citizens as well as others throughout the world.

Here is an article that examines and shows that EVERYONE and everything electronic or not, can become exposed ... even if you are a Security specialist.

There are steps that can be taken to minimize the WAN impact even after you are hacked, but that discussion is outside of the article. Most citizens are not given that information and those tools are not widely known; much less used by normal citizen Internet users. Those methods involve what large and govt industries use: "Reviewing IP transits" and presenting alerts to reviewers.
Last edited by gcmartin on Tue 15 Dec 2015, 01:25, edited 1 time in total.

cthisbear
Posts: 4422
Joined: Sun 29 Jan 2006, 22:07
Location: Sydney Australia

#2 Post by cthisbear »

Sorry to say....She is a Miss Dumbness.

Knows she is going to be attacked...so keeps using Windows.

Replies to unknown emails.

Clicks on an attachment...in Windows.
" I decided to try opening the attachment on my laptop at home "

My brain hurts.

Chris.

gcmartin

#3 Post by gcmartin »

I can see, though, what she is trying to show: That even those who are expecting and attempting to defeat an attacker, you can be duped. Its not that hard; especially if you have profiled the person you are tryng to get attention to. Kinda like what us guys do to gain favor with some female...appeal to something that catches their attention...even momentarily. This may be a bad example, but, I think we get the point. There are multiple other ways, depending upon what info the profiler has, to gain access to crucial information beyond the means that is shown by her.

In this case, she shows what/how this is done to someone who is positioned to thwart those attempts and who knows that the attacker is presently (acting on her request) to see if they could, in fact, penetrate.

Now, knowing this, envision it is the "all-seeing-eye" who has gathered that information using the same methods of profiling you and you didn't know it.

Post Reply