Share on Social Media:

The Russian Hackers Are Coming! The Russian Hackers Are Coming!

Those damned Russians will stop at nothing! They stole the last U.S. Presidential election, according to highly esteemed sources close to Hillary Clinton (cough.. cough…). But now they’re up to something even more nefarious: hacking your office equipment so they can spy on you.

Image result for soviet posters

The last statement actually is true. Microsoft announced last Monday that Russian hackers have been invading corporate computer networks by attacking their most vulnerable connected devices. Typically, these are devices we don’t think of as computers: VOIP phones, printers, refrigerators, and even coffee brewers.

How are the intruders getting in?

For such devices, security is often an afterthought, if thought about at all. Since IT experts seldom expect attacks on such devices, they often fail to update their security protocols. And the password for a peripheral- if it’s protected by a password at all- is usually an obvious one such as ‘password’ or a consecutive series of numerals.

The Russian hackers, who go by names such as Fancy Bear, Strontium, and APT28, are said to work in connection with the GRU, Russian military intelligence.

Their hacking activity dates to at least to 2007. It includes such infamous intrusions as:

  • the NoPetYa attacks in Ukraine,
  • attacks on NATO,
  • overriding of the French TV network TV5Monde’s programming in 2015,
  • hacking of the International Olympic Committee,
  • attempted 2018 thefts of data from U.S. conservative political think tanks.

For the Russian hackers, peripheral devices are beachheads, the weakest links in corporate communication systems. Once they have penetrated a poorly protected camera, printer, or video decoder, the hackers can easily take over other devices connected to them. This includes the supposedly impregnable central computer system.

We warned about this two years ago. We said that the Internet of Things (IoT) would multiply headaches for online security professionals– and for us.

What can you do about the threat?

The more connected devices we own: Alexa hubs, Fitbits, ‘smart’ TV sets, etc., the more avenues of attack we leave for hackers. This means we must be all the more vigilant about guarding everything.

We’re not suggesting you should panic about this. Just be careful. Use secure passwords or biometric authentication, or two-factor authentication. Be sure to keep your security protocols updated. And be sure to protect all of your devices, including the ones most of us never worry about.

For the internet connection you need, shop with Satellite Country. We can help.

Share on Social Media:

VPN: Do You Need One?

How much of your life is on the internet? How much do you communicate online?

If you’re like most of us, you probably reveal much more about yourself than you intended. Your schedule, your relationships, your general location, your political and religious loyalties- all are open to public scrutiny on the web. Skilled hackers can also obtain your credit card, social security, and bank account numbers, plus your identification codes.

The web is notoriously insecure. What’s even more alarming is that your ISP is allowed to sell your browsing history.

Image result for vpn images

How, then, can you keep your data secure?

One of the most effective methods is the virtual private network (VPN), an encrypted connection between you and the network’s private server. Some experts call such connections “tunnels”. The network masks your identity, because to a hacker or a spy, your web surfing appears to originate from the VPN’s address. It’s highly unlikely your data will be intercepted, especially if the sites you visit are secured with HTTPS protocol. If it is intercepted, though, it’s almost impossible for anyone to trace it back to you.

What level of protection do you need?

How do you know you need a VPN? It depends on how concerned you are about data privacy. If you never use public WiFi networks, you never buy anything online, and you keep a low profile, ordinary internet precautions may be enough. Even in this case, an extra level of protection may be wise.

You certainly should consider a VPN if you use public WiFi. You need to be especially wary on public networks. Not only is public WiFi  vulnerable to spies, some such networks are actually run by the thieves. The Applebee’s name on the network doesn’t always mean Applebee’s operates it. Anyone spying on the airport or coffee shop WiFi, though, will be unable to intercept data you’ve routed it through a VP network.

Consider, also, whether and how often you shop via the internet. Buying online can expose your credit card numbers, bank account numbers, personal I D codes, and other private data.

Finally, what is your profession? What are your hobbies? How do you use social media? If you’re a journalist, a public official, or a celebrity, you could be a high-profile target. Countless people may have powerful incentive to ruin your life, and an insecure web connection may be the opening they need.

 

If any of this applies to you, you need an extra measure of online security. You may need a VPN.

 

(For a secure home internet connection, talk to us. We can help.)

Share on Social Media:

FACES IN THE CROWD

Facial recognition software has come a long way in just a few years. Law enforcement agencies sometimes use it an an investigative tool. Some corporations use it as a screening tool; the faces of their employees are their ‘keys’ to company buildings. ‘Smart cameras’ recognize their faces and activate automated door to admit them.

There is a sinister aspect in facial recognition software, though. The people of Russia, for example, are finding out that it can be used for underhanded purposes. No matter where a person goes, anyone with the right connections or enough resources can track him down by picking his likeness out of a crowd photo.

FindFace, an advanced facial recognition platform launched a mere two months ago, enables 70% reliability in recognition of individual faces in photographs of crowds. The FindFace software compares the images to photos on Vkontakte, a social network popular in Russia and other states that were once in the Soviet Union. Vkontakte hosts more than 200 million accounts.

The Findface platform has seen phenomenally heavy use, given that it’s only two months old. It has already conducted more than three million searches of its database of about a billion photographs.

According to The Guardian, a London newspaper: “In future, the designers imagine a world where people walking past you on the street could find your social network profile by sneaking a photograph of you, and shops, advertisers, and police could pick your face out of crowds and track you down via social networks.”

Alexander Kabakov, one of the founders of FindFace, said that its facial recognition service could enhance dating and romance. “If you see someone you like”, he said, “you can photograph them, find their identity, and then send them a friend request.” If this seems a bit creepy to you, Kabakov said the platform need not involve surreptitious street photography. “It also looks for similar people”, he said. “So you could just upload a photo of a movie star you like, or your ex, and then find ten girls who look similar to her, and send them messages.” Well, okay, then. You have nothing to worry about, right?

A 70% success rate may not seem especially impressive, but with a bigger database, better software, and one or two hardware upgrades, the system’s accuracy could approach 100%. All faces, in all public places, will be vulnerable.

Despite Kabakov’s breezy insouciance about it, FindFace is a serious potential threat to privacy and freedom. The platform could be a boon to stalkers, rapists, and vengeful ex-lovers. Advertisers would find it valuable for targeting ads by viewer interest and location. Despotic regimes and political activists could use it to identify opposition demonstrators, exposing them to harassment, intimidation, assault, or even murder. FindFace even admits being willing to consider an offer from the FSB, the Russian security bureau that succeeded the Soviet KGB and that employs many of the same rough methods.

Kabakov brushes aside privacy concerns, insisting that we must accept living under nearly constant surveillance. “In today’s world we are surrounded by gadgets”, he said. “Our phones , televisions, fridges, everything around us is sending real-time information about us. Already we have full data on people’s movements, their interests, and so on. A person should understand that in the modern world he is under the spotlight of technology. You just have to live with that.”

There is no perfect way to protect our privacy. With every advance in computer and internet technology, it becomes even more difficult. If strangers can recognize us by tracing our likenesses in crowd photos to our social media accounts, our only sure protection lies in remaining homebound. No faces are completely safe. All faces may betray their owners.

We are not completely helpless, though. There are a few steps we can take to enhance our privacy.

Follow a few common-sense security protocols any time you’re online. And consider wearing dark sunglasses whenever you leave your house.

(Do you need better computer security? Do you need a more reliable internet connection? Talk to us. We can help.)