Świątkiewicz, Michał. “Online Tengwar Transcriber.” Online Tengwar Transcriber. N.p., 2002. Web. 22 Dec. 2012. <http://tengwar.art.pl/tengwar/ott/english.php>.
Google Hacking is not new but surprisingly few outside the security community understand what it is, it’s risks, and it’s rewards. Whether your sharpening your security skills or improving your ability to find information on the Internet; this article is for you. Once your SearchFu is strong, how you choose to use your new super hero powers are up to you.
What exactly is Google Hacking? Google hacking is not breaking into Google computers as the name might suggest. Google hacking is a multipurpose term; it’s both a noun and a verb. As a noun, Google Hacking it’s a groundbreaking book written by security super hero Johnny Long (Twitter, @ihackstuff). As a verb, Google hacking is the activity of using Google advanced searching commands and techniques to find the proverbial — needle in the Internet haystack. You may wonder, how could searching with Google advanced search commands possibly become a security concern?
Content you place on the Internet may live for very along time. In fact, content predating the Internet sometimes finds its way back into the Internet. Case in point, old Bulletin Board System(BBS) message threads(e.g., textfiles.com) are available online for anyone. If you mistakenly publish content to your web servers, it may be downloaded by archiving bots like Wayback Machine or available in Google’s caches. It’s difficult to know which deep dark corners of the Internet your content may live and for how long.
Safety in Numbers
People often feel a misguided sense of anonymity when they consider the large number of people on the Internet. Many feel their personal information will get lost in all the billions of results. Or better yet, their personal information is not interesting to anyone. These are myths. You will learn some simple and practical techniques to improve your search skills while raising your awareness.
Google provides powerful search commands to locate information of interest. The security concern is that there’s no active defense against reconnaissance since corporate servers are not queried directly. For instance, Apache HTTPD web logs will not contain any entries since the server is not accessed at the time of the search.
Some Advanced Google Search Techniques (Google’s Full Reference, Adv Page)
I’m not going to compress the Google Hacking book into a few paragraphs; to do so is an injustice. Instead, I’ll provide practical examples you can apply to your business and personal life. Following are some practical uses for Google’s search commands.
Limit search scope to a single website
The following is one of the most useful commands ever. With this command you can limit all search results to a single web site of interest. Use the site: command where host.something.com is the web site of interest. Alternatively, you can drop the host and only include the target domain like, something.com. The word, foo is your search term(s).
When I first cracked the cover on Johnny’s book, for laughs, I tried to find all confidential information on my current employer’s web site. I was not planning the search would produce anything of interest. After all, who would publish confidential information to a public company web site, right? Bingo! I found a lot of fluff but there were some interesting results I shared with horrified executives. A good run of thumb, don’t rule out the obvious. Don’t assume people think the same way as you. What is obvious to you may not be so obvious to someone else. Always confirm your suspicions.
Reduce noisy search results
The next useful search is a slight alteration of the preceding command by adding the minus operator to the search term. Adding a minus operator to the search term(s) excludes matching criteria from the search result set. In the following example, I use the minus operator with the site command but you can use it with other commands as well. Consider the following.
The preceding query produces a result excluding any references to content served from www. It may not be immediately apparent why such a search is useful but the query is useful to identify content on servers other than the primary (e.g. ,www).
When Google’s robots scan sites they cache the results. You can use the info command to view cached page results. Combine search terms with the info command produces no effect. Consider the following example.
When you type of the preceding command you will see information like shown in Figure 1 in your browser.
|Figure 1: Google info command to fetch cached page|
In the past, there was a command to retrieve cached pages directly, cached. The command is no longer supported. While the caching feature is still available it’s not as prominent as it once was. The purposes of these changes are not entirely clear since the feature is still supported.
If your an IT administrator you can remove your web site or areas of your site from the gaze of Google’s bots with a properly crafted robots.txt file but there is a tradeoff. Attackers can see any entries you include — so it’s somewhat defeating. Still it’s likely better a better alternative than an archive of your site stuffed into Google’s caches, if that bothers you.
Limit results to specific file types
How many times have you wanted to find only a list of PDF, XLSX, of TXT files for your searches. Well thanks to Google’s filetype command you can. Consider the following.
higgs boson filetype:pdf
The preceding search will produce a search result containing only PDF documents. The salient point of filetype is that Google knows how to index file content for popular file types, not only HTML pages.
Dark Uses of the Google Search Commands
Attackers are creative, often combining information from Google hacking sessions with other Internet resources like password databases. Internet web cams are a popular target. Attackers use search techniques to find specific web cam models of interest. With the detailed make, model, and version information, attackers find default administrative credentials in password databases available on the Internet. Once the administrative interfaces are known and account credentials are compromised, the web cam is hijacked. A hijacked web cam may used to check if your home or not, monitor discussions, and far more creepy things. Some higher end gimbaled models can moved or repositioned remotely via web controls — downright creepy. The following is partial list of darker uses for Google search.
- Social security numbers
- Credit card numbers
- Personal passwords
- Service or application passwords
- Vulnerable software
- Insecure web cams & embedded devices
- Sensitive corporate information
If you want to learn more about Google hacking you can grab a copy of Johnny’s book. He also has a web site Hackers for Charity and maintains an up to date database of advanced Google searches. Simply cut and paste search template commands into your web browser to see the latest results.
The reason I decided to write this article was a search query of mine from years ago produced many more results recently then the time of my original presentation years ago. I was perplexed. I assumed since Google hacking has been around for years people must have made improvements. I was wrong. Time to start talking more about Google hacking. ;o)
Tatica. “Clipart – Kung Fu.” Clipart – Kung Fu. 19 July 2011. Clipart.org. 16 Dec. 2012 <http://openclipart.org/detail/150409/kung-fu-by-tatica>.
 Long, Johnny. “Google Hacking for Penetration Testers [Paperback].” Google Hacking for Penetration Testers: Johnny Long: 9781597491761: Amazon.com: Books. 2 Nov. 2007. Syngress. 14 Dec. 2012 <http://www.amazon.com/Google-Hacking-Penetration-Testers-Johnny/dp/1597491764>.
 Long, Johnny. “GHDB « Hackers For Charity.” GHDB « Hackers For Charity. Hackers for Charity. 16 Dec. 2012 <http://www.hackersforcharity.org/ghdb/>. (Note: there are also other Google hacking DBs on the Internet)
 “Block or remove pages using a robots.txt file.” Google.com. 16 Dec. 2012. Google. 20 Dec. 2012 <http://support.google.com/webmasters/bin/answer.py?hl=en&answer=156449>.
The content for this year’s BlueHat is not posted but you can view previous years materials. I noticed a session by Jeremiah Grossman (Twitter @jeremiahg), “A Statistical Journey through the Web Application Security Landscape”. Jeremiah is the founder and CTO of WhiteHat Security. There’re some points that struck home with me in his session so I thought I should share them. The session is last years but it’s still painfully relevant.
Some background worth mentioning, WhiteHat Security provides services and software to help businesses identify and resolve their application vulnerabilities. WhiteHat has learned over the years to provide customers the best value, they must do more than report vulnerabilities; they must encourage customers to resolve their vulnerabilities. Companies that don’t remediate their vulnerabilities usually cancel their subscriptions since it’s like paying for the same security reports year over year. With the preceding in mind, WhiteHat asks it’s customers why don’t you fix your vulnerabilities? Following are some of the top answers they receive.
Why don’t you fix your vulnerabilities?
- Nobody at the organization understands or is responsible for maintaining the code.
- The development group does not understand or respect the vulnerability.
- Lack of budget to fix issues (vulnerabilities).
- Effected code is owned by unresponsive 3rd party vendor.
- Web site will be replaced or decommissioned soon. Jeremiah noted, some of these sites have been on this status for over a year.
- Risk of exploitation is accepted.
- Solution conflicts with business use cases (aka, the vulnerability is a feature)
- Compliance does not require fixing the issue.
- Feature enhancements are prioritized ahead of security fixes. Jeremiah noted, this one of the more fundamental challenges in software security.
At first I thought I missed an excuse but I reviewed the presentation again and only counted 9 not 10. Anyway, I don’t see these excuses going away anytime soon. I have listened to them many times myself. Jeremiah also mentions a 2010 survey noting a difference between where consumers perceive security problems and where they focus their IT resources and spending. The point was that organizations are not allocating resource and spending where they should to address their security concerns. Epic fail, sigh. I encourage anyone interested to check out some the BlueHat presentations as well as Jeremiah’s presentation.
Rgyle. “Clipart – Hat Outline.” Clipart – Hat Outline. 13 Jan. 2008. Clipart.org. 14 Dec. 2012 <http://openclipart.org/detail/10458/hat-outline-by-rygle-10458>.
 Grossman, Jeremiah. “A Statistical Journey through the Web Application Security Landscape, BlueHat Security Briefings: Fall 2011 Sessions, ” Channel 9. 3 Nov. 2011. Microsoft. 13 Dec. 2012 <http://bit.ly/TWZS1m>. (url shortened)
[Updated December 11, 2012]
Security theories and best practices abound, and then there’s the practical application ugly stuff we really do in the field. Consider for a moment a medical analogy, a critically traumatized patient arrives to your unit. Do avoid them until you can wash your hands? No, you jump in and save a life! It’s really the same with security. Often we are called to perform security triage under less than ideal circumstances. If your engaged late with a Mission Impossible security review it’s best to set clear expectations about what you can reasonably accomplish. Realigning expectations is not fun but it’s better to do this up front in project rather than surprise everyone at the end.
Many organizations have legal reviews and other qualification procedures but assuming all that is the concern of others, let’s concentrate on security. We agreed the evaluations will not be comprehensive but still beneficial. With that in mind, role up your sleeves, there are some things you can do. One of key things I like to know about an organization is their value or emphasis on security. How do you gauge an organizations interest in security? It’s not easy, after all security is a sensitive subject for most organizations any many are not forthcoming about their security practices.
Often the best insight into an organizations dedication to security is the information they communicate without directly communicating. Confused? I’ll explain, if you know the key questions to ask and signs to watch, you can learn a lot about an organizations willingness to invest in security. Almost every organization says security is important. But we need to select the organizations that put what they say into practice and invest in security. A companies willingness and dedication to security is oftentimes at least as valuable to understand as the security maturity of their products. Companies serious about security learn from their mistakes and drive their own security program improvements. Companies not dedicated to security are doomed to fail and driven to improve largely by angry customers. Not a fun experience — especially if your the angry customer.
The point of this thought exercise is to assess the organizations interest or dedication to security not necessarily to assess their product offerings. Of course, a product security assessment is absolutely essential for a comprehensive review. For the review, I’m assuming you have some access to key personnel at each perspective organization to ask at least a few questions. Now for the fun stuff.
Company Security Leadership
Most publicly traded companies publish a leadership web page describing corporate executive profiles. Does the leadership page include a security executive? Is there a security executive listed like Chief Security Officer, Chief Information Security Officer, VP or Director of Security? If so, it’s a good sign the security function is well-leveled within the organization. Why is leveling important? Security is a tough job and it almost always comes directly into conflict with production schedules. Leveling security properly within organizations helps drive plans and priorities favorable to the security mission. If security is not represented on the leadership page then the security responsibility, if it exists, is included within the responsibilities of other executives. If no security executive position is listed it’s not necessarily a cause for concern but a if a position is shown it’s definitely positive.
How Many Individuals are Dedicated Full-Time to Security?
Ask how many individuals are dedicated full-time to security. An integer less than one is a bad response. What is a good response? It really depends on the type of organization, number of products, and many other factors. One vendor I interviewed responded with zero. Their reasoning was that security is everyone’s job and the function is divided among staff. A reasonable answer but hardly a confidence builder given the size and scope of product offering under our consideration at the time. Needless to say, the vender didn’t win my vote. Don’t make any assumptions about the people securing the software — ask! Don’t be surprised if the organization pushes back and does not share all the information you request. If they don’t share specifics focus more about the related details. For instance, if they will not share information about staffing focus questions on what they do. If they will not discus location and composition of the security team ask instead about the engineering team (or see if it’s in their financial reports).
If you do receive some information around staffing levels consider the scope of products you plan to purchase along with the size of the organizations security program. The level of security program investment commensurate with the software’s operational capabilities and risks. If it’s an enterprise or cloud offering you should expect some significant investments in security. If purchasing a non-critical application used by a few individuals behind the corporate firewalls then perhaps less investment in security is appropriate.
The Software Life Cycle
There are many ways to structure a security program depending upon the assets to defend. In the development of software, integrating security into the software life cycle is important The software life cycle is a multi-phase engineering model organizations follow for creating and delivering software. The exact phases or steps of the model depend upon the life cycle model in use but most start with concept and requirements gathering. Progressing into design and development then software testing. Finally into delivery and deployment. Consider asking which operational and security activities occur at each stage of the life cycle. Your looking for a continuum of security activities throughout the life cycle.
During your review, you will receive all types of responses but consider the following. In early product development phases, security must be involved to influence product architecture. Security is the foundation and you can’t very well build a house first and then go back and pour the foundation — although oddly enough this happens all the time in security. Moving into design and development, what measures are in place to ensure engineers write secure code? Does the company provide training and tools to help automate security reviews? Can the organization certify anyone updating code in source control has security training? What types of security tests are executed and when? Are all code changes or improvements tested completely before moved into production? Who has authority to move changes into production? Do coders have direct access to deploy their code into production? What documentation artifacts are delivered in each development phase? Are there any automated security tests, if so, what are they? Answers to all or some of these questions will help you understand more about the organization and it’s security practices.
How is the Security Program Organized?
Not all organizations are structured the same way. However, positions such as the following are typical across industry.
Program leadership. Responsible for the overall security program. Establishing policies and tracking program effectiveness.
Ensure projects are designed securely from the start. Create security requirements. Create software security policies.
Program software security features. Work with engineers to ensure software changes comply with security policies. Perform security reviews. Maintain specialized security tools. Implement cryptography functions.
Help develop and execute non-functional software security tests. Often times Architects will be involved in test to ensure test cases support requirements and policies. Security tests are important because without them it’s impossible to understand product security posture.
Security compliance teams ensure changes adhere to security policies. For example, if a new web server is deployed in the production environment and not listed in an approved software specifications document compliance may follow-up with management or shutdown the non-compliant server.
These people watch network traffic going over the wire. They are usually the first to see bad guys knocking on the door.
Forensics teams preserve evidence. Often this includes, imaging desktops and servers for trial. Computer data used in a court of law must be handled properly to preserve evidence and ensure it’s free from tampering.
Details about the organizations security functions are important to ensure the organization has security visibility across the entire software life cycle. For instance, simply testing for vulnerabilities after the software is complete is not generally acceptable since software vulnerabilities are costly to remediate after they have been fully developed. Your looking for a continuum of security activity across the development and operational processes.
On-Shore vs. Off-shore Staff
Is the organizations security staff on or off shore or a mix of both? Don’t assume staff are onshore. This may or may not be a concern for you but some organizations are highly concerned about off shore security staff. You may consider asking which responsibilities are charged to each group.
Security Patch Programs
Does the organization provide regular product security patches? Do they issue emergency fixes as necessary? How are patches communicated to customers? You may consider checking the support area of the organizations web site. You may find some patching information, security communications, or public policy information.
If your purchasing a cloud solution, are security vulnerabilities quietly fixed and pushed or are they communicated? Are mitigating controls like Web Application Firewalls(WAF) available? The industry loves to hate WAFs. WAF’s are not a perfect technology but engineering can often take significant time to code, test, and deliver a solution. In the interim, your servers are wide open with a “kick me” sign. The sweet spot for the WAF is that they deliver temporary protection very quickly while your teams deploy a more fully baked solution.
Security and Exchange Commission Fillings
US companies that are traded publicly must file documents like the yearly statements with the commission such as the 10-K or quarterly statements like the10-Q. Sometimes you can find some security bugaboos in these statements or worthwhile information about the company concerns, engineering practices, onshore vs. offshore development, locations/practices for data storage, etc.
Social media is also another organization barometer. Sites like Twitter, LinkedIn, and Glassdoor can provide some insight into what current and past employees have to say about the company. I would not place too much emphasis on social media but it’s worth a look. Keep in mind you may not be reviewing objective or fair commentary. It’s not likely you will find information directly related to the organizations security program but you can definitely find interesting details about engineering or IT practices. If the engineers are pushed hard and frustrated to grind out basic software features it’s not likely the organization will invest time in security polishing. You might also search for leadership blogs but it’s unlikely these yield much since this crowd is well versed about what they should or should not say.
Other Non-Functional Requirements
Hunt for any information you can find on product performance. Is there significant positive or negative chatter in the support or news groups on performance issues? Product performance is an interesting indicator since it’s something difficult to evaluate until the solution is deployed deeply. The point being, if an organization is not investing in performance it’s likely they are not making adequate security investments either. Like performance, security is difficult to evaluate without tools and expertise.
Does the organization have any recent IT audit results they are willing to share with you? SAS70’s are common and typically provide some IT information. Rather than focus on the result of the audit, an obvious thing to do, consider reviewing other information around IT organization and processes. Often organizational clues can help piece together a more comprehensive operational picture along with other data you collect elsewhere. Be careful about placing too much trust upon audit conclusions. Some audits allow for those under review to craft their own control objectives which diminishes their effectiveness. Independent audits are a good tool but form your own opinion based upon several sources of information. Trust but verify is a good tenant of security.
My article is not a comprehensive set of techniques to profile organizations by any measure. Instead my intent is to increase your confidence around an organizations appetite for security where perhaps you had no confidence previously. Ultimately, if you don’t have what you need for a proper security review you will need to stop the review and escalate. But if I can help you reach some comfort in your decision making process, then I will have saved you from stepping in front of project steam rollers and freight trains which is far easier on your nerves. :o)
Paper with Pen. Digital image. Openclipart.org. http://openclipart.org/, 12 Feb. 2012. Web. 7 Nov. 2012. <http://openclipart.org/people/jhnri4/Exquisite_kwrite.svg>.
As difficult as technology change is to anticipate, it’s even more difficult to determine its impact on our security and privacy. Our security choices are predicated upon knowledge and assumptions that may have been appropriate at one time, but are no longer appropriate. Attackers feed upon our complacency and our misguided sense of trust. This is why when attacks occur people are taken by surprise.
Before I get started, I feel some explanation is worthwhile about my use of Security Old School vs. Security New School. Old School is simply our security attitudes, thoughts, or actions around a topic at some point in the past. New School is how we should think and act about the same topic given changes in the world and industry.
Following are a few points I would like to lightly touch upon to educate and raise awareness of readers. It’s not an exhaustive list but some points I’ve considered at the time of writing.
Old School, Organizations can be destroyed or rendered ineffective by targeted attacks
New School, Leaderless organizations difficult to control or destroy
Combating terrorist organizations is difficult enough for nation states, consider the years of searching for Osama Bin Laden and resources required. Now consider an organization like Anonymous. Leaders emerge from the organization’s background from time to time, rise to prominence, execute their agendas, and sublime into the background. It’s hard to imagine how nation states will be successful against Anonymous. Anonymous is essentially an ideology. Fighting an ideology requires a different type of program and techniques. It was difficult enough to find one man let alone thousands of individuals. This is why governments abhor anonymity; it’s impossible to fight what cannot be seen.
Old School, Researchers reporting vulnerabilities to organizations for industry recognition
New School, Researchers sell vulnerabilities to highest bidder
In the past, independent security researchers reported vulnerabilities to companies out of professional courtesy. To be the researcher who finds a 0-day vulnerability in a package deployed on everyone’s computer creates fear, fear commands attention, and more importantly recognition and respect. The objective of reporting was to earn some individual credit, garner a fan club, and move on to better paying or more interesting jobs.
Increasingly gray hats are getting a little dirtier and becoming more militant and mercenary. Vulnerabilities are a traded commodity. If you possess the commodity then you can conduct business. A single unpublished vulnerability resulting in a complete host compromise may fetch as much as $100,000 USD. Find a vulnerability or two and you can pay off the mortgage on your home. A tempting proposition for talented gray hats living in impoverished countries; deliver pizza or sell vulnerabilities for lots of money? Not much of a choice. Resting on the good nature or professional courtesy of these individuals is far too much to trust in my opinion.
Vulnerability bounty programs are essential tool to motivate gray hats to make the best choice for organizations. There’s no guarantee organizations will not be double-crossed. For instance, a researcher sells a vulnerability to a bounty program and also sells it on the black market, doubling their money. The one real guarantee a vulnerability bounty program provides is that, in addition to Internet baddies, organizations will also be informed of their vulnerabilities. It might feel like borderline extortion but this is the world we live in today. The best way for organizations to avoid such dilemmas is to ensure security investments are commensurate with level of risk. Don’t let pride or arrogance stand in the way, you either play by the new rules or you’re not included.
Vulnerability buyers may be anyone from nation states to corporations and well-funded individuals. Why hire and manage a team of security ninjas when you can amass a battery of vulnerabilities to launch like scuds at your command? Cash is King, is the saying. The security ecosystem is changing like global warming.
Old School, Your enemies dropped bombs causing terror, people hurt or die.
New School, Your enemies tamper with critical infrastructure, no terror, people hurt or die.
What is a Cyber Weapon? A cyber weapon is malware engineered for military purposes. When a bomb falls from the sky, explodes on it’s target, it’s terrifying and lots of people can be hurt or killed. A cyber weapon is different. No explosive impacts, or directions you can run, and quite likely no terror. But the effects are very real. A city may find itself without critical infrastructure like electric power or water and kill lots of people. Imagine a hospital in the summer with no electricity and air conditioning. Attacks against critical infrastructure have been around for many years. My favorite was a disgruntled worker releasing millions of gallons of raw sewage on the Australian countryside .
Truth in Numbers
Old School, A product or service is good if it has lots of “likes” and positive reviews.
New School, A product or service is good if people you know personally like it.
It’s more or less common sense that large numbers of “likes” or positive reviews for a product or service mean it’s good, right? Well, it’s not exactly a guarantee anymore. Economic incentives to fake “likes” and positive reviews are powerful motivators. Couple economic incentives with low cost of labor in many nations and what do you have — Internet Water Armies. Internet Water Armies are large virtual labor forces used to artificially inflate like counts and write positive reviews for products and services. Water armies are used to influence crowd behaviors like purchase decisions and public opinion. The best way for individuals to combat opinion manipulation is improved fact checking. Check with friends you trust, check multiple sources, are the reviews good quality (e.g., grammar, misspellings, etc). The amount of fact checking should be proportional to the value of product you’re purchasing or decision you’re making. Really expensive decisions require careful checking whereas inexpensive less checking is required.
Service Anonymity in the Cloud
Old School, Internet services can be traced back easily to host providers
New School, Internet services deployed into cloud infrastructure are difficult to trace to host providers
The Pirate Bay(TPB) provides file sharing technology infrastructure to individuals throughout the world. TPB servers do not host users files but their infrastructure helps users locate and share files with network peers. Often the files shared by users of TPB are commercial, software programs, books, movies and songs covered by copyrights.
TPB servers have been raided many times. Like the evolutionary processes of mutating genes, TPB has evolved from locally hosted services into globally hosted cloud services. TPB services are virtualized as a disk images for quick deployment and encrypt data during transit as well as data at rest. Encryption makes shutting down TPB very difficult since it’s not easy for ISP’s to know there hosting TPB services. Load balancers as well as services are virtualized and deployed in many locations around the globe. TPB encrypted cloud deployment paradigm is likely to be adopted by organizations placing a premium on operational and user anonymity. We will see more of this innovative architecture in the future I’m sure, Tor exit relays, there’s lots of possibilities.
Incidentally, even if you feel you’re completely anonymous and untraceable I don’t recommending downloading from TPB or similar services. I have nothing against the TPB or copyright holders. My concerns are limited to security and privacy. Aside from the questionable legalities, such downloads are rumored malware vectors. Perhaps, it’s a rumor started by copyright holders. Nevertheless, I don’t recommend it.
News and Information
Old School, News is reported by journalists distributed via tv, paper, or electronic media outlets
New School, Everyone with a smart phone is a journalist, reporting is blistering fast and raw
Social media is changing the world. When hurricane Sandy struck the east coast I knew everything about it before I saw my first news cast on television. The power of Twitter really impacted me when I saw tweets of a collapsed crane in New York. I received the tweets an entire day before I saw it on the news. Likewise when the conflict in Gaza heated up, many people on the ground armed with smart phones posted news and photos. Some of the pictures were shocking showing the good, bad, and ugly of war raw and unedited right on our smart phones. Of course, some individuals confuse fact and fantasy or conflate facts in their reports but its no more or less worrisome to me than the highly polished and expertly crafted nightly news.
Old School, AV protects your computer from miscreants
New School, Be afraid…be very afraid
Anti-virus(AV) is definitely helpful but it’s not the panacea it once was. The weakness with AV is signature-based technology and if you don’t have updated signatures or if there is no signature then you are vulnerable if exploited. AV can also create weird performance problems sometimes difficult for novices to identify especially video gamers. AV when combined with personal firewalls it’s even more helpful.
A few quick tips for personal safety, use firewalls to block inbound network traffic. Many AV programs come with built-in firewall controls, check your documentation. Shutdown any operating system components or services you don’t use. Uninstall any unnecessary components you no longer use. Don’t run as root on *NIX or with administrator privileges on Windows. If you’re really cavalier about security you might consider full disk encryption.
Old School, Data was stored in data center of the company providing the service
New School, Data is securely stored and in the cloud
To me the Cloud is like All Natural or Organic. If you’re telling me your cloud is secure you might as well be selling me Sal Pimento or St. John’s Wort for my health. Most claim their solutions are secure but evaluating them is difficult and time consuming for those of us with technical background. For those with little technical background, you’re forced to trust in the claims of cloud providers at face value.
Even if your data is secure, it may be stored in offshore data centers without your knowledge. How would you feel if your data is stored in China? If you’re a US government agency or government contractor you may care. Likewise it’s getting difficult to find good applications that are not cloud enabled. Users are almost forced to put data into the cloud. Often features like syncing between, desktop, mobile, and tablet require cloud support. Cloud security is not a technology problem it’s a security and privacy problem. The industry needs better rules over handling, use, distribution, and disclosure of personal data.
Abnormally Large Energy Bills
Old School, Increased energy use is an indicator of residential marijuana farm
New School, Increased energy use caused by residential Bitcoin mining
I included this in for fun and it’s a classic case of mistaken assumptions. I was watching a DEFCON 19 video and Skunkworks describes a home profiled by law enforcement and raided due to high energy consumption. A little background, law enforcement uses electric energy consumption profiles as an indicator for marijuana growing. Stealthy indoor marijuana growers use energy hungry lighting and hydroponics for growing plants. During the police raid it was discovered the homeowner was not farming marijuana but instead mining Bitcoin. Generating Bitcoin is a computationally intensive task. The homeowner deployed a significant number of computers in his home, likely SLI GPU style gaming rigs, increasing his energy usage over other residences. And thus a target for an power profiling by law enforcement agencies.
Our society is becoming more and more Internet enabled every day. The implications of our technological capabilities and connectedness often evade our notice. As a colleague of mine would say, the genie is out of the bottle and the genie likes to be free. There’s no going back to the way things were before. The world is forever changed. Our information systems are growing explosively across national boundaries and it’s sure to surprise us on occasionally.
 Pisa. Digital image. Openclipart.org. Openclipart.org, 2 Nov. 2006. Web. 1 Dec. 2012. <http://openclipart.org/detail/1186/leaning-tower-of-pisa-by-johnny_automatic>.
 Chickowski, Ericka. “How The Sale Of Vulnerabilities Will Change In 2013.” Http://www.darkreading.com/. Dark Reading, 30 Nov. 2012. Web. 02 Dec. 2012. <http://www.darkreading.com/vulnerability-management/167901026/security/news/240142947/how-the-sale-of-vulnerabilities-will-change-in-2013.html>.
 “Internet Water Army.” Wikipedia. Wikimedia Foundation, 20 Nov. 2012. Web. 02 Dec. 2012. <http://en.wikipedia.org/wiki/Internet_Water_Army>.
 Danchev, Dancho. “Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge.” : SCADA Security Incidents and Critical Infrastructure Insecurities. Blog, 5 Oct. 2006. Web. 02 Dec. 2012. <http://ddanchev.blogspot.com/2006/10/scada-security-incidents-and-critical.html>.