Sunday, February 1, 2015

Top 5 infosec links of the week (LXII)

"If words of command are not clear and distinct, if orders are not thoroughly understood, the general is to blame. But if his orders ARE clear, and the soldiers nevertheless disobey, then it is the fault of their officers". 'Craining training' passage from Sun-Tzu's 'The Art of War' ends with a tragic outcome: the leading companies are beheaded. To set example. For anyone or anything dudes on the power of the general from then on. Its orders must not become a scoff.

Likewise, hacking a twitter account (better to say "usurp"), may not be the most important industry news. Surely the labored work of thousands of researchers looking up to conjure risks, patch systems and neutralize cyberattacks is more important. Yes, but when the Twitter account is the global fourth most followed and responds to the identity of Taylor Swift, to hack it is an "exemplary" action; not an "exemplary" behavior, of course, but as a sign of how much are we exposed to digital risks day by day. And that's why it has been one of the most visited news of this week, at least here within CIGTR's community.

We often wonder: how is it possible that celebrities suffer such a thing? Well, it happens. Maybe there are celebrities who choose weak passwords. Or maybe they give their credentials to who should not do, even inadvertently. Just click on the site you think is but that it is NOT, because the identity of that site was fogged. There are so many techniques to achieve this goal, and our adviser Pablo Fernández Iglesias provided the most common ones days ago on his blog. It's a recommended post and also one of the most read this week.

Besides these ones, we found this week keys for avoiding phishing, thanks to an extensive and instructive post from Laura Grau on Ontinet's blog. When the subject to be treated is exposed with calm, clear language and examples, it seems logical to go for it. And there are the facts: top 5 links this week closes with two dense, lengthy readings that need to be taken with more than a single break. They are two PDF studies, the first one on the safety of two cloud storage services as popular as Dropbox and Mega, and the second one under the unambiguous title 'Internet of things. Privacy and security in a connected world'.

There's no better time than a Sunday to be devoted to those readings, that require dedication and time. It is the best example we can give ourselves: to be informed. Happy first day of February.


Post a Comment