Archive for RB

LG Uses TVs in an Elevator to Freak Out Riders

LG Electronics (LGLD) wanted to show off how realistic the image on their new IPS monitors is, so they decided to play a prank and scare the crap out of a bunch of people.

They replaced the floor in an elevator with a grid of nine IPS monitors that look like floor tiles, then the “floor” falls away just as the elevator starts to move, leaving an image of the elevator shaft.

 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Attacking Electronic Door Access Control Systems

Attacking Electronic Door Access Control SystemsDarkReading pointed out research by independent security researcher, Shawn Merdinger, into vulnerabilities within embedded door access control systems. The researcher investigated the inner workings of electronic door access controls (EDAC). Mr. Merdinger disclosed some of his findings at the 2010 CarolinaCon conference.

S2 Security logoThe DarkReading article Attacking Electronic Door Access Control Systems reports that the researcher found several flaws in the S2 Security NetBox. According to the firm’s website, more than 9,000 customers in 50 countries worldwide use S2 Security Corporation’s integrated security management platforms. Among the flaws in the system, he found an unauthenticated factory reset and unauthorized access to backup data. The author says the first issue is obviously a pretty serious one that could lead to a potential denial of service, but it’s the last one that turns heads.

According to the CarolinaCon presentation, the backup files are stored in a location with predictable file names that do not need authentication to access. Inside a software dump of the electronic door access control system, an attacker can find goodies like the configuration and something that might come in handy like the administrator’s password hash. From there, the attacker can do pretty much anything he or she wants, including unlocking doors at will.

door access control system, administrator’s passwordThe article further states that Mr. Merdinger found that the door access control database also has the user names, passwords, and IP addresses for the network cameras and digital video recorders (DVRs). Now the attacker can watch the facility, learn traffic patterns, and plan for a physical penetration of the facility. The stolen credentials will allow the attacker to turn off cameras and/or recordings during their assault on the facility. To make matters worse, Mr. Merdinger points out that marketing folks for these products will actually state that it’s safe to put these management systems on the Internet. And apparently, people do, because in the presentation he demonstrates production systems that are online with a Shodan search.

DarkReading acknowledges that the presentation doesn’t stop at showing the scary stuff. It takes the next step that most audiences are dying to see, but don’t always get, and that’s how to fix these things as both the vendor and the customer. The blog recommends the video, the detailed paper, and his updated presentation from Hack in the Box 2010 (in Dubai) on attacking electronic door access control systems.

Related articles
  • New Access Control Technology Holds the Key to Safer Schools: Unique RFID-based System Addresses the Shortcomings of Expensive and Inefficient Alternatives (prweb.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

SNL Slams Apple & Tech Press

NL Slam Apple & Tech PressRemember when Saturday Night Live was funny? Super Bass-O-Matic, Killer Bees, Hot Tub, Joe Cocker, Samurai Delicatessen, Coneheads, or Schweddy Balls. Well SNL hit another home run with it jab at Apple.

In the clip below, they take up the hypocrisy of tech journalism. They poke fun at the nit-picking they are famous for versus the real human toll that Foxconn (2038) and Apple (AAPL) take on Chinese workers that churn out the latest igadget.

Saturday Night Live Pokes Fun at iPhone 5 Tech Pundits from Ahmad Nazir Afiq on Vimeo.

rb-

LOL at the classic Chinese satirical dance. Too bad nobody in China will ever see this.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Do One Thing at a Time

Do One Thing at a Time at workTony Schwartz asks in a recent post The Magic of Doing One Thing at a Time at Harvard Business Review, why is it that between 25 and 50 percent of people report feeling overwhelmed or burned out at work? The author suggests that it’s not just the number of hours we’re working. He says we spend too many continuous hours juggling too many things at the same time.

Wherever we go, our work follows usIn the article he argues that we’ve lost stopping points, finish lines and boundaries. Mr. Schwartz believes that technology has blurred them beyond recognition. Wherever we go, our work follows us, on our digital devices, ever insistent and intrusive. It’s like an itch we can’t resist scratching, even though scratching invariably makes it worse.

Not Helping

Mr. Schwartz points out that “time savers” don’t save time. He argues that answering emails during conference calls; eating lunch at your desk or make calling or sending texts while driving are not helping you be more productive.

sending texts while driving are not helping you be more productive.The biggest cost, assuming you don’t crash, is to your productivity. You productivity crashes because you are splitting your attention. You are partly engaged in multiple activities but rarely fully engaged in any one. The author explains this impacts your productivity when you switch away from a primary task to do something else. By switching between tasks you’re increasing the time it takes to finish that task by 25%.

The HBR article warns that if you’re always doing something, you’re relentlessly burning down your available reservoir of energy over the course of every day, so you have less available with every passing hour.

Increase focus at work

Mr. Schwartz suggests three policies for managers to increase focus:

Maintain meeting discipline1. Maintain meeting discipline. Schedule meetings for 45 minutes, and not an hour or longer, so participants can stay focused, take time afterward to reflect on what’s been discussed, and recover before the next obligation. Start all meetings at a precise time, end at a precise time, and insist that all digital devices be turned off throughout the meeting.

2. Stop demanding or expecting instant responsiveness at every moment of the day. It forces your people into reactive mode, fractures their attention, and makes it difficult for them to sustain attention on their priorities. Let them turn off their email at certain times. If it’s urgent, you can call them — but that won’t happen very often.

Encourage renewal3. Encourage renewal. Create at least one time during the day when you urge your people to stop working and take a break. Offer a mid afternoon class in yoga, or meditation, organize a group walk or workout, or consider creating a renewal room where people can relax, or take a nap.

Steps to take

The blog says that people have to set their own boundaries:

1. Do the most important thing first in the morning, preferably without interruption, for 60 to 90 minutes, with a clear start and stop time. If possible, work in a private space during this period, or with sound-reducing earphones. Finally, resist every impulse to distraction, knowing that you have a designated stopping point. The more absorbed you can get, the more productive you’ll be. When you’re done, take at least a few minutes to renew.

scheduled times to think2. Establish regular, scheduled times to think more long-term, creatively, or strategically. If you don’t, you’ll constantly succumb to the tyranny of the urgent. Also, find a different environment to do this activity — preferably one that’s relaxed and conducive to open-ended thinking.

3. Take real and regular vacations. Real means that when you’re off, you’re truly disconnecting from work. Regular means several times a year if possible, even if some are only two or three days added to a weekend. The research strongly suggests that you’ll be far healthier if you take all of your vacation time, and more productive overall.

Stop multitaskingA single principle lies at the heart of all these suggestions. The author concludes that when you’re engaged at work, fully engage, for defined periods of time. When you’re renewing, truly renew. Stop living your life in the gray zone.

rb-

My personal experience reinforces the authors conclusions. My experience has been that I was able to get 2x the work done on a single telecommute day, than when I am at the office. Now that I have to be on-site everyday, my work output has decreased because I can’t work without interruption for any period of time.

I have found that you can’t focus on anything when you’re moving 90 mph and you can’t stop to take a breath. Maybe someday I will get an office and see the magic of doing one thing at a time.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

A History of Mac Malware: Part 2

A History of Mac Malware: Part 2Graham Cluley at Sophos recently wrote an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. (rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)

Click here to read part 1 of the History of Mac Malware. Click here to read my recent series commemorating the 25th anniversary of the computer virus.

Sophos logoBig changes to the Mac malware scene arrived with the release of Mac OS X – a whole new version of the operating system which would mean that much of the old malware would no longer run. All future, Mac-specific malware would have to be written with a new OS in mind.

2004 – The Renepo script worm (also known as “Opener”) attempted to disable Mac OS X security including the Mac OS X firewall. The author reports that the Renepo worm would download and install hacker tools for password-sniffing and cracking, make key system directories world-writable, and create an admin-level user for hackers to later abuse.

Renepo script wormIn 2004, hackers also wrote a proof-of-concept program called Amphimix which demonstrated how executable code could be disguised as an MP3 music file on an Apple (AAPL) Mac. Amphimix appeared to been written as a proof-of-concept highlighting a vulnerability in Apple’s software.

2006 – The first virus for Mac OS X was discovered in 2006. OSX/Leap-A was designed to use the Apple iChat instant messaging system to spread itself to other users. As such, it was comparable to an email or instant messaging worm on the Windows platform.

iChatThe author concludes that it was correct to call OSX/Leap-A a virus or a worm. It was not correct to call OSX/Leap-A a Trojan horse. Not that that stopped many in the Mac community claiming it wasn’t a real virus.

2007 – Sophos discovered an OpenOffice multi-platform macro worm capable of running on Windows, Linux, and Mac computers. The BadBunny worm dropped Ruby script viruses on Mac OS X systems and displayed an indecent JPEG image of a man wearing a rabbit costume.

BadBunny wormThe first financial malware for Mac appeared in 2007. The OSX/RSPlug-A Trojan horse was first detected by researchers at Intego. Mac users infected themselves by downloading and running a fake codec that claimed to help users view pornographic videos. Once on a victim’s Mac, RSPlug changed that machine’s DNS settings so that, while browsing the web, users would redirect to phishing sites or sites containing advertisements for other pornographic sites.

According to Kasperskey’s Threat Post, RSPlug’s various incarnations are all forms of the DNSChanger malware. DNSChanger featured prominently as the target of the FBI’s 2011 take-down of the malware network, dubbed Operation Ghost Click.

2008 – Apple malware became more sophisticated in 2008. Cybercriminals targeted Mac and PC users in equal measure, by planting poisoned ads on TV-related websites. If accessed via an Apple Mac, surfers would be attacked by a piece of Macintosh scareware called MacSweeper. Close relatives of MacSweeper including Imunizator, claimed to find privacy issues on the user’s computer.

The author details the growing sophistication of Mac malware in 2008.

  • Mac scarewareThe OSX/Hovdy-A Trojan horse would steal passwords from Mac OS X users, open the firewall to give access to hackers, and disable security settings.
  • Troj/RKOSX-A a Trojan horse is a Mac OS X tool to assist hackers to create backdoor Trojans, which can give them access and control over your Apple Mac computer.
  • The Jahlav Trojan was similar to other malware campaigns, cybercriminals created a bogus webpage claiming to contain a video. Visiting the site produces a message saying that you don’t have the correct codec installed to watch the video whereupon the site offers you a DMG file for Apple Macs.

Ironically Apple issued a support advisory in 2008 urging customers to run anti-virus software – but after media interest, rapidly deleted the page from their website.

OSX/iWorkS-A Trojan horse2009 – ThreatPost reports that in 2009 Symantec found the OSX/iWorkS-A Trojan horse. The malware was added to a version of Apple’s iWork ’09 software suite that popped up on BitTorrent file sharing sites. The incident was noteworthy because the trojan was packaged with the actual iWork application, so the Mac users, many of which do not use an antivirus solution, would have no reason to suspect that their machines were infected because of the download. The trojan itself communicated with a remote server and was intended to scan machines for data and track Internet history and keystrokes. A new variant of the Trojan was distributed in a pirated version of Adobe (ADBE) Photoshop CS4.

Online video was a major conduit for Mac malware in 2009.

  • Sophos reported on how hackers were planting versions of the RSPlug Trojan horse on websites, posing as an HDTV program called MacCinema.
  • Hackers planted a version of the Jahlav Mac Trojan horse on a website posing as a portal for hardcore porn videos.
  • The Twitter account of celebrity blogger Guy Kawasaki had a malicious link posted onto it, claiming to point to a sex video of Gossip Girl actress Leighton Meester. In reality, however, the link leads unsuspecting users to malware that could infect Mac users.

Leighton MeeterIn 2009 Apple finally began to build some rudimentary anti-malware protection into Mac OS X. Although it wasn’t really equal to a true anti-virus product (it only protected against a handful of Mac malware, doesn’t defend you if you try to copy an infected file from a USB stick for instance, and doesn’t offer clean-up facilities), it was still encouraging to see some attempt to offer more protection for Mac users.

2010 – Throughout 2010 Mac malware was distributed disguised as a legitimate application.

  • The OSX/Pinhead Trojan (aka HellRTS) was disguised as iPhoto, the photo application which ships on modern Macs. The backdoor Trojan horse can allow hackers to gain remote control over your iMac or MacBook.
  • Boonana cross-platform wormA Java applet distributed via Facebook (FB) was used to target not just Windows computers but Mac OS X and Linux too. The Boonana cross-platform worm appeared, disguised as a video and runs in the background, and reports system information to servers on the Internet, which can be a big breach of personal information. The Trojan also attempts to spread itself by sending messages from the user account to other people through spam.
  • A piece of Mac spyware called Spynion (also known as OpinionSpy or PremierOpinion) came to light, attached to screen savers and other add-ons for users’ Macs. it’s a variant of Windows spyware that has existed since 2008. Spynion would take advantage of users not properly reading End User License Agreements (EULAs), allowing it to spy on browsing habits and search behavior.

In late 2010, Sophos issued a free anti-virus for Mac home users. Early reports indicated that there are plenty of Mac users with malware on their computers – some of it Windows malware, some Mac OS X, and some cross-platform. The author states that there’s no doubt that the Windows malware problem is much larger than the Mac threat, but that doesn’t mean that the danger of malware infection on Mac OS X is non-existent.

The events of 2011 would make it clearer to Mac users than ever before that the malware threat was real..

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.