Featured

My First Blog Post

Data Traveling Safely

Even though our world is almost completely connected through the internet. Which provides us the opportunity to video chat, instant message, call or email – sometimes it just isn’t the same as face to face and a handshake.

That is why I am on travel for work – though the technology of today allows me to do all mentioned above, when the customer ask, you oblige.

How to keep company data secure, first if your company is able to provide you with a loaner laptop that would be best. By packing a “clean” laptop one without company files and data stored. A user will authenticate onto the computer and VPN into the network allowing them access to all company files. By doing so the computer does not store company data directly onto the hard drive.

If unable to provide a loaner laptop, the next best thing is to encrypt the hard drive. By encrypting a laptops hard drive, it can require two factor authentication, having multi factor authentication as a requirement.

AI Hacking

While reviewing articles regarding Autonomous Intelligence (AI) and how like any and all technology are able to be hacked. I feel new technology released each day and within the same day someone is trying and succeeding in creating a hack for malicious use.

The good news is, those reviewing for the bugs and items that can be hacked into it isn’t always the “bad” guys. A University of Washington student is studying AI self driving vehicles, how the computer systems see and interpenetrate road signs that have been modified in some way.

The modifications are not unlike what we see on a day to day basis, such as a stop sign with a sticker on it or graffiti. The research which is paper basis as stated this has not been tested on a self driving vehicle. However, the study shows with slight changes to a stop sign an AI self driving vehicle went through the stop sign. This was also shown with speed signs as well, the vehicle would speed up instead of slow down.

Though this has been tested, the proof is only for self driving cars which solely rely on video cameras and a computer to process the information seen. Cars such as Subaru’s with EyeSight which assist in braking and alerting the driver when a vehicle is in the blind spot.

Watching

A recent vulnerability was located last month regarding the popular video conferencing application known as Zoom. This is a application used by many for business and personal conversation throughout the world.

The issues is, when someone sends a request to another for a video conference the application does not require the user to agree to the conference call. Once the call is sent the recipients web camera is automatically turned on. Anyone with the application downloaded to their computer can remove the app, but this will not remove the web server on your machine.

This is dangerous for anyone who has downloaded the application as any other user could potentially send a conference request and view what you are doing or saying in front of your computer. Thinking of this from a business protective, the phone calls and conversations discussed in front of a computer, could possibly give away trade secrets, company information, and personal information.

While the company Zoom works to provide an update, users can disable the video setting for conference calls. Which would still allow a hacker to listen in to your conversations.

You’re Being Watched

I’m sure you like me, have come to grips with the truth of the matter – we are all being watched. Whether it is by Google monitoring your searches and using them to provide ads specific to your taste, or your favorite store monitoring your purchases based on your membership number, could even be the mailman noticing the ridiculous amount of Amazon boxes delivered to your home. We all know by some extent that to hide what you do now-a-days is quiet difficult.

But these are things we have come to accept in our society, in someways it is hidden but in the end we understand what is being done. Where do we draw the line? These are companies that watch your purchases for their best interest, what if someone you knew personally was monitoring you either for your or their best interest?

Seven applications have been located available for download on Google Play store to assist in stocking or “monitoring” your spouse, employee, or child as they are marketed.

These apps require physical interaction with the mobile device – the stocker would have to download the app directly onto the users device, which would require knowing or hacking into the victims passwords.

These applications have all been taken down by Google, however in total there have already been 130,000 downloads completely. Though these apps have been removed from the Play store – they are still available for download on the application owners websites.

Working with Emotions

Today we find more people turning to their computer to keep in touch with their favorite shows instead of relying on cable. Most often because users are able to locate a more effective cost saving way to watch or to simply view by live stream on illegal websites.

Unfortunately, while users believe they are pulling one over on the cable company many are to busy feeling triumph to notice that they are too being taken. Some versions of this attack are while the user watches – malicious code is inserted to their personal computer. Or users are required to enter personal information such as their phone numbers, and email addresses which are later used in spear phishing attacks.

This is a great example of social engineering, hacker work to locate the “big ticket items” ones that pull emotion from a user, such as not wanting to miss an episode of a large fan based TV show.

Of course there are ways to protect yourself from these types of attacks which are simply paying for the services. Though the services could potentially as any item on the internet have malicious or hidden attack, the chances are much less.

Dangers of Instant Messaging

The dangers of Instant Messaging on Mobile Devices

The popular messaging application known as Whatsapp and application Telegram are known to be vulnerable to the new vulnerability known as “media file jacking”.

Whatsapp and Telegram are both known for end to end encryption for private and secure messaging, however there is a security flaw. The end to end encryption is not the issue, the issue lies in the applications themselves as they are not encrypted.

Each time a user agrees to the policy of a application -it will state that the user is allowing the application to their phones internet, contacts, location, sending push notifications, etc. This is where the exploit is occurring. The attacker is accessing the application which allows them access into the phones direct storage.

This is not a man in the middle attack, as the hacker is not sitting by reviewing the traffic. The hacker has access to view all media data and delete the data. It has not been determined exactly why a hacker would enter a users mobile device to delete some or all of their photos. But the risk is there, it is suggested to protect yourself by disabling the feature that saves files to external storage.

Introducing Me

Riding the gondola up to Maokong village

Hello,

I’m Alicia, a information technology student at Green River College. This blog does not come from my personal love of writing or love of IT. Its a class assignment, not a person who enjoys writing , so bear through this.

What do I know about blogging…well I know its a mix of who you are and what you know. Since this blog is suppose to be about IT, I guess I’ll discuss current IT issues and throw in a bit about myself.

Currently I am in Taipei, Taiwan for a month for my job. I am an Airplane on the Ground (AOG) specialist for Boeing – which is really awesome because I get to travel to places I’ve never thought I would. So I’ll throw in some tidbits about my travel in this blog.

Design a site like this with WordPress.com
Get started