CyberSecurity – What are some things that get a bad rap, but are actually quite secure?
Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.
There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.
1- PGP
PGP is a Form of Minimalism
As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:
- You get from them a PGP identity (public key). How you do that is entirely up to you.
- Your PGP program uses that identity to perform a single public key encryption of a message key.
- Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
- Your correspondent does the opposite operations to get the message.
If you want to sign your message then you:
- Hash the message.
- Do a public key signature operation on the hash and attach the result to the message.
- Your correspondent checks the signature from your PGP identity, which they have acquired somehow.
The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.
As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:
- Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
- A Signal session requires the storage and maintenance of a lot of state information.
- Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
- Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
- Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.
The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.
I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.
2- Very long passwords that are actually a sentence
It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”
3- Writing passwords down.
I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.
We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.
Did I say passwords? I meant encryption keys.
4- Changing default ports for certain services like dbs
Most of the gangs out there use tools that don’t do a full search, so they go through the default port list
5- MFA in general.
Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.
If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.
If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.
6- Oauth for 3rd party apps.
Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.
7- Two-step verification.
Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.
8-Biometric Authentication.
The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.
Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.
One example of this is https://passage.id/ which is about as secure as you can get.
9- Zoom.
Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.
10- Unplugging the ethernet cable.
11- Browser password managers?
Rant moment: reasons cybersecurity fails
<Rant>
People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.
No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.
This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.
</Rant>
Why do cyber attackers commonly use social engineering attacks?
Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.
Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.
To conclude:
Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.
source: r/cybersecurity
Source: r/cybersecurity
- Preferred way of receiving alerts?by /u/AutomaticCarpet2957 (cybersecurity) on December 8, 2023 at 1:38 am
Do you or your team have a preferred way of receiving alerts and incidents? How does severity play a part in that? Do you have a centralized platform to review events caught by exclusions? submitted by /u/AutomaticCarpet2957 [link] [comments]
- How do you stay on top of new vulnerabilities or CVEs?by /u/SecOpsEngineer (cybersecurity) on December 8, 2023 at 1:08 am
With so many new vulnerabilities being announced daily, it seems harder and harder for me to stay on top of new vulnerabilities. How do you stay on top of new CVEs or related news? So you have specific sites or blogs you use? submitted by /u/SecOpsEngineer [link] [comments]
- Happy Holiday Patching!by /u/CyberSecPixie (cybersecurity) on December 8, 2023 at 12:43 am
submitted by /u/CyberSecPixie [link] [comments]
- New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devicesby /u/bagaudin (cybersecurity) on December 7, 2023 at 11:51 pm
submitted by /u/bagaudin [link] [comments]
- Acing SOC Interviewby /u/Both_Philosopher_318 (cybersecurity) on December 7, 2023 at 10:41 pm
Asking current professionals, how would you go about preparing for a SOC analyst interview to be able to answer any and everything they might ask. Resources, certs, bootcamps, youtube, whatever. submitted by /u/Both_Philosopher_318 [link] [comments]
- MS Defender - Looking for GAPSby /u/BallOk6712 (cybersecurity) on December 7, 2023 at 10:07 pm
Hello family, I do not have a lot of experience with MDE G3/G5, but the company that I support just contracted for it and we are currently deploying it. The IT PM asked me to make sure that I have an understanding of all its features, provide business use case(s) for each, and to identify gaps (remaining residual risk) from what MDE does not protect. Does anyone know of any whitepapers or perhaps you can share your own experience? I have heard mostly positive comments about MDE in its current evolved state, but I would assume, like all tools, leaves some room for improvement. What are your favorite MDE features and where should I consider implementing compensating controls to best protect the network? Thank you. submitted by /u/BallOk6712 [link] [comments]
- Spoofing DNS records by abusing Microsoft DHCPby /u/oridavid1231 (cybersecurity) on December 7, 2023 at 9:26 pm
submitted by /u/oridavid1231 [link] [comments]
- Hashing it Out in the Kitchen: A Chef’s Guide to Understanding Cryptographic Algorithmsby Ybbus (Cybersecurity on Medium) on December 7, 2023 at 9:20 pm
Introduction Picture yourself in the bustling kitchen of a grand digital restaurant, a place where recipes are executed with lightning…Continue reading on Medium »
- K8s PodSecurityContext vs ContainerSecurityContextby Nick Gibbon (Security on Medium) on December 7, 2023 at 9:16 pm
Different types of security context in kubernetesContinue reading on Pareture »
- Navigating Your Digital Footprint: The Essentials of Egosurfingby David Baldoví (Security on Medium) on December 7, 2023 at 9:05 pm
Continue reading on Medium »
- An easier way to visualize and manage OAuth scopes in Google Workspaceby /u/dayowolf1 (cybersecurity) on December 7, 2023 at 9:03 pm
submitted by /u/dayowolf1 [link] [comments]
- Key Steps Involved in Handling PII databy Jagadesh Jamjala (Cybersecurity on Medium) on December 7, 2023 at 9:02 pm
Photo by Markus Spiske on UnsplashContinue reading on Data Nuggets »
- From Barrel to Boardroom: Crafting Your Brand with Cybersecurity Excellenceby William Knobles (Cybersecurity on Medium) on December 7, 2023 at 8:59 pm
In the world of mezcal, producers rely on the Denominación de Origen system, a regulatory framework that establishes standards and…Continue reading on Medium »
- Mastering Kubernetes Security: A Comprehensive Guide to Secure Configuration Managementby BlackCatDev (Security on Medium) on December 7, 2023 at 8:59 pm
In the dynamic realm of container orchestration, Kubernetes has emerged as the de facto standard for managing and orchestrating…Continue reading on Medium »
- Best Smart Locks for Storm Doorby Ava James (Security on Medium) on December 7, 2023 at 8:59 pm
Smart locks designed for storm doors offer a seamless blend of security and convenience.Continue reading on Medium »
- Fortifying Digital Battlements: Top Cybersecurity Strategies for 2024by Nate Crisler (Cybersecurity on Medium) on December 7, 2023 at 8:54 pm
As we embark on 2024, the digital landscape continues to be a battleground for cybersecurity. With cyber threats evolving rapidly, it’s…Continue reading on Medium »
- Linux quiz completed, moving forwardby 365 Days Of Learning Cybersecurity (Cybersecurity on Medium) on December 7, 2023 at 8:51 pm
Today I completed the Linux module and started another one called: System and Endpoint Protection. I scored 100% on the Linux quiz, but it…Continue reading on Medium »
- How allowPrivilegeEscalation works in Kubernetesby Nick Gibbon (Security on Medium) on December 7, 2023 at 8:49 pm
Making sense of the confusing details around use of the container security context allowPrivilegeEscalation featureContinue reading on Pareture »
- Team Secure Becomes a Silver Sponsor of the Open Web Application Security Project (OWASP)by Cybrient Technologies (Security on Medium) on December 7, 2023 at 8:41 pm
Geneva, Switzerland — 22.11.2023 — Team Secure, a premier cybersecurity firm dedicated to providing top-tier security solutions, proudly…Continue reading on Medium »
- Navigating the Cybersecurity Landscape: A Comprehensive Guide by Perdition Securityby Perdition Security (Cybersecurity on Medium) on December 7, 2023 at 8:41 pm
In today’s digital age, cybersecurity is no longer a luxury but a necessity.Continue reading on Medium »
- Navigating the Cybersecurity Landscape: A Comprehensive Guide by Perdition Securityby Perdition Security (Security on Medium) on December 7, 2023 at 8:41 pm
In today’s digital age, cybersecurity is no longer a luxury but a necessity.Continue reading on Medium »
- Blue Team Labs — “Malicious PowerShell Analysis”by Alexander (Cybersecurity on Medium) on December 7, 2023 at 8:38 pm
Scenario:Continue reading on Medium »
- The Dark Web: A Deep Dive into Cybercriminal Activitiesby Mustapha Aitigunaoun (Cybersecurity on Medium) on December 7, 2023 at 8:26 pm
In the shadowy corners of the internet lies a realm shrouded in mystery and intrigue — the Dark Web.Continue reading on OSINT TEAM »
- The Dark Web: A Deep Dive into Cybercriminal Activitiesby Mustapha Aitigunaoun (Security on Medium) on December 7, 2023 at 8:26 pm
In the shadowy corners of the internet lies a realm shrouded in mystery and intrigue — the Dark Web.Continue reading on OSINT TEAM »
- Unlocking Cyber Resilience: The Managed SIEM Key — RSI Security and Sumo Logic Join Forces in a…by RSI Security (Cybersecurity on Medium) on December 7, 2023 at 8:17 pm
Click Here for RecordingContinue reading on Medium »
- Learn security best practicesby /u/rga_alpha (cybersecurity) on December 7, 2023 at 8:16 pm
I frequently come across technical posts highlighting how a specific rule on the firewall caused a hack or how account permissions were misused and other ancillary issues. What are your go to security best practices for OS, network and cloud? A lot of it is indeed common sense but where can I read more and develop that security mindset. submitted by /u/rga_alpha [link] [comments]
- Multi-dimensional Approach to Combat Ransomwareby D Kaufman (Cybersecurity on Medium) on December 7, 2023 at 8:01 pm
What an exciting announcement — definitely one of the best posts I’ve come across lately! Kudos to the Counter Ransomware Initiative (CRI)…Continue reading on Medium »
- Multi-dimensional Approach to Combat Ransomwareby D Kaufman (Security on Medium) on December 7, 2023 at 8:01 pm
What an exciting announcement — definitely one of the best posts I’ve come across lately! Kudos to the Counter Ransomware Initiative (CRI)…Continue reading on Medium »
- How to Create a New Secret in AWS Systems Manager Parameter Store (SSM) Using Node.jsby cloud & nodejs tutorials (Security on Medium) on December 7, 2023 at 8:01 pm
IntroductionContinue reading on AWS Tip »
- Common topics difficult to understand?by /u/HedgeFundDookie (cybersecurity) on December 7, 2023 at 7:50 pm
This is kind of for beginners, but I’m curious what topics are commonly badly explained or are hard to understand. I’m looking to create some free content that will break down these topics into layman terms. This is mainly to help people I know personally, who are trying to get into the space. I have just noticed that a lot of topics are explained so horribly that you have to already be in the space to understand what they mean. So if you have any personal ones let me know so I can at least he'll someone out haha. submitted by /u/HedgeFundDookie [link] [comments]
- Meta Ups the Ante on Privacy: Facebook Messenger Gets End-to-End Encryptionby /u/DRVX92 (cybersecurity) on December 7, 2023 at 4:35 pm
submitted by /u/DRVX92 [link] [comments]
- TCM Security Coursesby /u/iis2h (cybersecurity) on December 7, 2023 at 4:24 pm
Hi, Does anyone have subscribed to TCM Security? I wanna subscribe for 299$ a year. Is it worth? submitted by /u/iis2h [link] [comments]
- Qilin Ransomware malware analysisby /u/ShadowStackRE (cybersecurity) on December 7, 2023 at 3:22 pm
submitted by /u/ShadowStackRE [link] [comments]
- 23andMe: Data Breach Was a Credential-Stuffing Attackby /u/KolideKenny (cybersecurity) on December 7, 2023 at 3:00 pm
submitted by /u/KolideKenny [link] [comments]
- New 'Pool Party' Process Injection Techniques Undetected by EDR Solutionsby /u/KolideKenny (cybersecurity) on December 7, 2023 at 2:55 pm
submitted by /u/KolideKenny [link] [comments]
- Which country for cybersecurity?by /u/Doublemirrors (cybersecurity) on December 7, 2023 at 2:44 pm
Hi everyone! I had a chance to embark on an overseas trip to either US, Israel or Shanghai for my work/internship experience from my university. As a cybersecurity professional and student, I would like to seek advice on which country might be the most ideal. I’ve heard that Israel is a cyber powerhouse. Would anyone have any experience to share on any of the above countries? Thank you so much and appreciate any advice given! submitted by /u/Doublemirrors [link] [comments]
- UK accuses Russian FSB of multi-year campaign of cyber-attacksby /u/KI_official (cybersecurity) on December 7, 2023 at 2:41 pm
submitted by /u/KI_official [link] [comments]
- CSA on Star Blizzard Targeting UK Government with Sustained Campaignby /u/Theomatch (cybersecurity) on December 7, 2023 at 2:06 pm
submitted by /u/Theomatch [link] [comments]
- New BlueNoroff loader for macOSby /u/EspoJ (cybersecurity) on December 7, 2023 at 1:56 pm
submitted by /u/EspoJ [link] [comments]
- Laid off without warningby /u/Roycewho (cybersecurity) on December 7, 2023 at 11:04 am
I landed what felt like my dream job. My first cyber security position working on a SOC. After only about a month with very minimal training given, I was just let go without warning. The sad part is, I had reached out voluntarily for a one on one with my supervisor just last week. I was told I was coming along well and to just keep working... At the end of the day today I found my access revoked. No performance review. No improvement plan. No conversation, just gone. I suppose I'm just here venting to the community. I was ready to make a success post just a week ago. But here I am. Jobless and back at square one right before the holidays submitted by /u/Roycewho [link] [comments]
- Struggle to make new contacts on the cybersecurity/hacking communityby /u/Ok_Succotash_5009 (cybersecurity) on December 7, 2023 at 10:47 am
The only goal for this contact seeking is mainly to share and learn new things. I pretty much always find myself just exploring subjects on my own whenever my job becomes boring. But still, I’m working now for 3 years in cybersecurity but I have some difficulties to build new connections. Does going (and thus paying cause my startup won’t ) to conferences will help? Will contacting researchers about their work if I have questions might be a good idea ? Tell me I’m not the only one haha Maybe I should just change job submitted by /u/Ok_Succotash_5009 [link] [comments]
- Anyone here listen Jack rhysider.by /u/insane_dark_07 (cybersecurity) on December 7, 2023 at 3:41 am
What you guys think about "Darknet Dairies", Is that the actual reality in INFOSEC or just Jack exaggerating things. submitted by /u/insane_dark_07 [link] [comments]
- Musk fired Twitter exec for raising security concerns, lawsuit claimsby /u/SoiledOrangeJumpsuit (cybersecurity) on December 7, 2023 at 3:06 am
submitted by /u/SoiledOrangeJumpsuit [link] [comments]
- Governments spying on Apple, Google users through push notifications - US senatorby /u/SpongederpSquarefap (cybersecurity) on December 7, 2023 at 12:00 am
This is extremely concerning - app notifications all go through Google or Apple servers and the feds aren't letting Google or Apple disclose anything about information requests submitted by /u/SpongederpSquarefap [link] [comments]
- Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackby /u/cos (cybersecurity) on December 6, 2023 at 11:43 pm
submitted by /u/cos [link] [comments]
- Mentorship Monday - Post All Career, Education and Job questions here!by /u/AutoModerator (cybersecurity) on December 4, 2023 at 12:00 am
This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]