Berkeley CSUA MOTD:Entry 54228
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

2011/11/14-30 [Computer/SW/Security] UID:54228 Activity:nil
11/14   Social Engineering call centers:
        http://www.itbusiness.ca/it/client/en/home/News.asp?id=64887
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
Cache (4620 bytes)
www.itbusiness.ca/it/client/en/home/News.asp?id=64887
Print Printer friendly page Underground call-centre for identity theft uncovered by security researchers Identity thieves use professional calling services to obtain missing pieces of information about victims. spotted an advertisement for making on-demand calls in English and other European languages to private individuals, banks, shops, post offices and similar organizations. missing pieces of information they needed to pull off attacks. Fraudsters can either use malware to steal personal and financial information or buy it from the underground market in bulk, said Amit Klein, Trusteer's chief technology officer. However, sometimes this information is insufficient to perform fraud, he added. Cybercriminals are commonly faced with this problem because a large number of financial institutions have implemented advanced anti-fraud mechanisms. one-time-use passwords (OTPs) to authenticate customers on their Web sites. Others require unique codes sent to mobile devices (mTANs) to authorize transactions. However, not every cybercriminal is skilled in such techniques and those who are capable of pulling off these attacks are often faced with a language barrier. This is where call services like the one found by Trusteer come in. Their staff is trained to impersonate bank employees, computer technicians, travel agents, recruiters and other people to whom targeted individuals are likely to disclose information. The callers receive background information about the targets from cybercriminals and use it to establish trusting relationships with the victims. For example, if a fraudster wants to log into an account by using stolen online banking credentials, but is prompted for an OTP because he uses a different IP address than the real account holder, he can give a caller the information needed to impersonate a bank employee. Armed with things like the victim's name, account number, birth date and other personal information, the caller can claim that he's performing system checks and ask the targeted individual to read back the code sent to their phone. biz, a service that allowed cybercriminals to bypass phone verification checks enforced by US banks. However, the number of rogue call centres has increased in recent years. This year security companies reported cold-calling campaigns throughout the UK, Canada, US, Australia and other countries, in which the callers impersonated computer technicians from ISPs (Internet service providers) or Microsoft to trick people into installing malware on their computers. Some of the schemes were tracked back to India, where because of low-cost labour, these businesses are very profitable. In this case the advertisement was seen on a Russian forum, so there is a high probability that the service is managed by Russian-speaking individuals. "In addition, since the service is available during American and European working hours, it might indicate that the group is operating in these regions," said Trusteer security researcher Ayelet Heyman. According to Heyman, the service is still operational at this time and Trusteer is not aware of any types of actions taken to shut it down. There is also a possibility that the people behind it are routing the calls through compromised phone systems in order to decrease the costs of the operation, she said. Users should treat all unsolicited calls with caution, regardless of what kind of information the person on the other end of the line has about them, Klein advised. They should also confirm any suspicious requests with the organization the caller is claiming to represent, but they should do so by calling its publicly listed numbers, not those provided by the caller. Case Study: Auto service and sales shop goes Wi-Fi When Scott McPhail, owner of McPhail Auto Service and Sales, wanted to embrace smartphone technology to better connect with his customers, he found that GSM unreliable in his concrete- and steel-heavy auto shop. A business-grade wireless access point and Rogers Wi-Fi Calling gave seamless wireless access while reducing costs. net founder Art Maat has developed a unique Web service that helps workers with iPhones and iPads be more productive and make better decisions when building and maintaining outdoor spaces. Hosted IP Voice: Levelling the Playing Field for Small Business As a small business, you need to stay connected with your customers, suppliers and other stakeholders, and your telephone system is a critical way of maintaining that connection. Not all business phone solutions are created equal, and they dont all deliver on the key needs of small businesses.