news Canadian News
Good Morning Guest | login or register
  • Home
    • Canadian News
    • Popular News
    • News Voting Log
    • News Images
  • Forums
    • Recent Topics Scroll
    •  
    • Politics Forums
    • Sports Forums
    • Regional Forums
  • Content
    • Achievements
    • Canadian Content
    • Famous Canadians
    • Famous Quotes
    • Jokes
    • Canadian Maps
  • Photos
    • Picture Gallery
    • Wallpapers
    • Recent Activity
  • About
    • About
    • Contact
    • Link to Us
    • Points
    • Statistics
  • Shop
  • Register
    • Gold Membership
  • Archive
    • Canadian TV
    • Canadian Webcams
    • Groups
    • Links
    • Top 10's
    • Reviews
    • CKA Radio
    • Video
    • Weather

Fake ‘White House' eCard steals sensitive docum

Canadian Content
20693news upnews down

Fake ‘White House' eCard steals sensitive documents.


Tech | 206932 hits | Jan 05 8:50 am | Posted by: DrCaleb
12 Comment

A malware-laced e-mail that spoofed seasons greetings from The White House siphoned gigabytes of sensitive documents from dozens of victims over the holidays, including a number of government employees and contractors who work on cybersecurity matters.

Comments

  1. by avatar DrCaleb
    Wed Jan 05, 2011 4:55 pm
    But it's Julian Assange that needs assassinating.

  2. by avatar BartSimpson  Gold Member
    Wed Jan 05, 2011 6:07 pm
    It's just another permutaion on classic phish/Trojan stuff.

    All you need to do is just not open junk from untrusted sources and then verify that a person actually sent you something when you get something odd from a trusted source.

  3. by avatar Scape
    Wed Jan 05, 2011 7:30 pm
    Better idea:

    Block access to malicious .
    Monitor and prioritize access to web/ftp (download/upload)
    Encrypt sensitive documents
    Block executable file downloads (.exe / .bin)
    Ban all smartphones/cameras.

    That should be in place before an employee decided to download a Christmas card off a Russian web site routed through a Chinese server.

  4. by avatar BartSimpson  Gold Member
    Wed Jan 05, 2011 7:32 pm
    Scape, my 'better idea' is to show people the door who do these things despite being told not to. I'm not their nanny.

  5. by avatar Scape
    Wed Jan 05, 2011 7:46 pm
    This is how secrets are leaked though. Sensitive data is like handling nuclear waste, it's a huge undertaking that requires near draconian measures just to maintain internal integrity. One leak, however trivial, could be disastrous. You have a level of trust with the workers but that trust in their good judgment should only go so far. There should be some limits in place for the workers safety so that they don't end up breaching either intentionally or not.

    These measures would be if anything for the workers benefit. The employer should be a nanny but they should be letting sensitive documents be handled with no protocol at all either. That just asking it to be leaked.

  6. by avatar DrCaleb
    Wed Jan 05, 2011 9:50 pm
    Every 'secure' system I've ever dealt with was on a completely segregated network. No email. No Internet. No USB ports. No CD burners. The really sensitive stuff was on paper in file cabinets, in a big concrete room that only has controlled physical access through a man-trap, controlled by a person in a cage.

  7. by avatar Scape
    Wed Jan 05, 2011 9:53 pm
    That is clearly what is required. The cage is a gateway and is there for the protection of people on both sides of the glass.

  8. by avatar BartSimpson  Gold Member
    Wed Jan 05, 2011 10:22 pm
    "DrCaleb" said
    Every 'secure' system I've ever dealt with was on a completely segregated network. No email. No Internet. No USB ports. No CD burners. The really sensitive stuff was on paper in file cabinets, in a big concrete room that only has controlled physical access through a man-trap, controlled by a person in a cage.


    Hate to say, but it's easier to defeat the person in the cage then it is the computer that doesn't care who you say you are.

  9. by avatar BartSimpson  Gold Member
    Wed Jan 05, 2011 10:26 pm
    Something that happened at Intel back in 2002/2003 - security firm was hired to test Intel security and what they did was to salt the parking lot with USB sticks that had a Trojan on them. People picked up the 'free' USB sticks on their way into the office, took them to their desks, and plugged them in. Voila.

  10. by Thanos
    Wed Jan 05, 2011 11:50 pm
    Yeah, there's obviously a huge problem with people being allowed to bring outside media devices into work. If someone had bothered to make sure that the Lady GaGa CD case that Bradley Manning had at his desk had actually contained a Lady GaGa CD instead of a blank one then Julian Assange would have been SOL for most of this past year.

    I'm fairly certain though, putting all treason aside, that Manning still deserved some time in the slammer just for even buying a Lady GaGa CD in the first place. 8)

  11. by avatar BartSimpson  Gold Member
    Thu Jan 06, 2011 12:24 am
    Hate to admit it, but I like her music. :oops:

  12. by avatar DrCaleb
    Thu Jan 06, 2011 7:10 pm
    "BartSimpson" said
    Every 'secure' system I've ever dealt with was on a completely segregated network. No email. No Internet. No USB ports. No CD burners. The really sensitive stuff was on paper in file cabinets, in a big concrete room that only has controlled physical access through a man-trap, controlled by a person in a cage.


    Hate to say, but it's easier to defeat the person in the cage then it is the computer that doesn't care who you say you are.

    Quite so. But that's why he's the last line of defense to get into the secured archive, not the first. A person has to go through many card reader controlled doors to get to the secure archive, and needs several forms of authentication to get through the man trap.

    Some places take research information and security quite seriously.



view comments in forum
Page 1

You need to be a member of CKA and be logged into the site, to comment on news.

  • Login
  • Register (free)
 Share  Digg It Bookmark to del.icio.us Share on Facebook


Share on Facebook Submit page to Reddit
CKA About |  Legal |  Advertise |  Sitemap |  Contact   canadian mobile newsMobile

All logos and trademarks in this site are property of their respective owner.
The comments are property of their posters, all the rest © 2025 by Canadaka.net