visit
Safe in Boston Public Library (Credits: ) I realize that the word “Security” is not really glitzy. It’s a topic difficult to approach, as many people think it’s dull or too complex, they don’t feel concerned. That’s a mistake. Security concerns everyone, not just Software engineers. I tried many times to bring awareness about information security to a wider audience, and I realized how challenging it can be. After many years I started to notice that a couple of things make it easier. Here are the top 5 tips to help you make Security more engaging to everyone. Because an attacker always target the weak link. And I have bad news, the weak link, it’s probably you.
with his fake Oscar , managed to sneak into the Academy Awards ceremony in Hollywood, using just a tuxedo and a fake Oscar Statuette. He fooled the security guards, they let him in without asking any question. He also managed to get a free meal because the owner thought he was serving a VIP. This is what we call social engineering attacks. In this scenario, Mark is the Attacker, the ceremony is the Asset and the Security guard is a Vulnerability. Now you can transpose this story to computers. Let’s say the Attacker (Mark) wants to access someone else bank account (The Asset) using the Bank Website (The Vulnerability). If the attacker to look enough like someone else he can impersonate his victim and access his account, that is called Spoofing. You could even do simpler to get a free meal.
(Credits: ) Social engineering attacks are extremely frequent and powerful. Like hackers exploit a bug, attackers exploit human cognitive biases. Think about bait or more elaborate phone call to gain access to personal information. If you phone enough random people in a company claiming to be the technical support, you will eventually reach a genuine employee with an issue. Those examples help the audience to relate as we all received a phishing email at least once.
USB killer (Credits: ) Free Candy is a technique used by attackers to attract potential victim into a trap. When you give your email address it can be used to send you phishing emails. When you connect to an insecure WiFi, attackers can intercept all the data you send, it includes authentication token, that can be then used to impersonate you and access your account. Free Candy is a successful technique used by hackers. So, why not use it to attract innocent co-worker into a security conference.
(Credits: )
Bradley Copper taxi trip in 2013 (Credit: ) From that data, a researcher was able to get valuable information. For instance tracking celebrities. On this picture posted on Twitter by a tourist, he could read the cab plate number, combined with the picture timestamp, he queried the dataset to find the corresponding trip to get the destination. Just by looking at the drop off address, he was also able to identify men who spent a night at a Gentlemen’s club in a fairly isolated location in Hell’s Kitchen.
In 2013, a lot of Adobe password’s hash leaked with all their hints. If I give you list of hints can you find the corresponding password? Inspired by an comics, someone turned that into a crossword game, to show how easy it could be to crack it. Can you find the number 4 given the following hints?
4 food - candy - yummy - sweet - dulce - favorite food - brown - favorite candy - cocoa - dark - tasty - coco - dessert - favorite flavor
8 name - daughter - dog - grandson - 23 - basketball - michael - boy - bball; mj - basket - granddaughter - bulls - last name - country- sun - shoes - mike
If you liked this game, you can find more crosswords grids : Gaming can be really addictive, the interaction of the game helps to remember the content. Once I wanted to demonstrate how easy it was to access useful information. So I organized a small game, I called that the “Speed Dating Game”. I would divide the audience into 2 equal groups. To group — called group A — I just say they will participate a speed dating event. They will meet different people for 5 minutes and they just have to introduce and have a small talk. But for the group B, the briefing is different — I assigned them a secret goal: to get one of this information: The address of the person in front of them, the name of their pet, the name of their parents or the high school they went to. This information can be so valuable. A pet name is a common password, the name of the high-school is often question to recover a lost password.Play your opponent (Credits: ) If you just ask “what’s your address?” You will never get an answer, worse the person in front of you will probably be upset or suspicious and could leave. It’s the same with servers, a stupid brute force approach could raise warnings and alarms you could be blacklisted, and will not get another chance. You need to be subtle, learn your target and use what they say against them. Security is really easier than you think, you could even try to be more hands-on, play with a key-logger or contest to a Capture the Flag competition for beginners like the one, or . Just make sure you are doing it on a safe and legal space.
Be smart, think out of the box, find the loophole in everyday life situation. is notable for winning $110,237 by memorizing the patterns used on the Press Your Luck TV show. He also found a bank giving out $500 for every new checking fund. He used fake names to open dozens of accounts, waited the minimum necessary duration, then withdrew the money. On another occasion, he registered a business under a family member’s name, hired himself as an employee, then fired himself to collect unemployment benefits. (As a reminder both are fraud, so don’t do it).
in a London Street I worked with many security experts but I learned more from meeting a couple of hackers. They don’t obey by the same rules. For the same reasons I started an immersive exploration of the Street Art Scene in London. Street Artists are hackers in some way. Where you see a wood fence, Mr Doodle, a street artiste, sees a white page. I took this picture really early in the morning, where London streets are empty. Obviously never do something illegal, I am just saying you should try to perceive different opportunities and keep an open mind. Security threats change fast, hackers are usually ahead of you because they think out of the box. Hackers spend time trying to attack, as engineers try to defend. But you have to understand how the attack works to defend it properly. Like chess you want to anticipate your opponents move. It’s easy to understand that stealing credit card numbers can be used to get money. But that’s not the only way. Have you thought about , airlines company miles stolen , or private information about a company’s IPO. Finally it’s not all about money. It’s also about Power, think about fake news, information about future voters to influence elections etc…