Archive for RB

Why Don’t Users Protect Themselves

Why Don't Users Protect ThemselvesA new report (PDF) from recently swallowed and swallowed again Webroot, says that American technology users overestimate their levels of cyber hygiene. Cyber hygiene is a cybersecurity risk mitigation technique introduced by Vinton Cerf in 2000 where you train yourself to think proactively about your cybersecurity. The goal is to resist cyber threats and online security issues to protect and maintain IT systems and devices and implement cybersecurity best practices, just as you do with your daily personal hygiene.

Webroot logoThe report says U.S. users do not know how to protect themselves from cyber threats. Americans are overconfident in the perceived protection they have. The endpoint security and threat intelligence provider found that 88% of interviewed Americans believe they are taking the appropriate steps to protect themselves from cyber-attacks.

Their confidence is misplaced. Instead, Americans have only a surface-level understanding of the most common types of cyber threats according to Webroot. We can recognize some of the names of the most common cyber-attacks such as malware (79%) or phishing (70%), but for most, that’s where their knowledge ends. Very few (less than 1 in 3) actually know what these common cyber-attacks are or what they do.

While Americans claim to have heard of some of the most common cyber-attack terms when prompted, very few actually understand what those cyber-attacks are. When asked about critical cyber-hygiene issues like malware, backups passwords, and identity theft surveyed Americans reported:

20% update their AV software regularlyMalware – 79% have heard of malware, but only 28% can confidently explain what it is. 82% are using some sort of AV software on their personal devices. 62% of those who use AV software use a free product. Only 20% update their AV software each time they are prompted.

Backups – are another weakness. 78% of respondents report backing up their data. However, 57% are still leaving themselves susceptible to risk by only backing up using one method, rather than backing up online (cloud) and offline.

  • 22% rarely or never backup their data.34% Automatically backup to the cloud
  • 27% Backup to an external hard drive
  • 24% Backup to a USB stick
  • 22$ backup locally on My Computer
  • 17% backup manually to the cloud
  • 22% rarely or never back up their data.

Among those who are backing up their information by uploading it to the cloud, only 43% are taking the extra step in ensuring that it’s stored in an encrypted format.

33% of Americans admit to sharing their passwordsPasswords – Followers of Bach Seat know that passwords suck and the Webroot report confirms it. 33% of Americans admit to sharing their passwords with others. To make matters worse, 63% are reusing passwords across multiple accounts. The research found that Americans have on average 9 passwords for 17 accounts.

Mobile – While on the go, 67% of Americans use public Wi-Fi, but only 35% take the extra step to protect themselves by using a VPN. Additionally, 34% use a work device as their primary personal device at home.

Identity theft 74% of Americans believe their identity stolen has never been stolen.

According to the Webroot whitepaper, the 5 most cyber risky U.S. states are:

  1. Mississippi most cyber risky stateMississippi
  2. Louisiana
  3. California
  4. Alaska
  5. Connecticut

The 5 least risky U.S. states are

  1. New Hampshire least cyber risky stateNew Hampshire
  2. North Dakota
  3. Ohio
  4. Idaho
  5. Kentucky

rb-

According to the research conducted by Wakefield for Webroot, Michigan ranked 31 among the 50 states. Overall, the average home user scored a 60% for cyber-hygiene. The researchers also found that those who they classified as “Superstars” tended to be:

  • A Boomer
  • Married or in a relationship
  • Suburbanite
  • Not a parent.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Xerox May Buy HP

Updated 02/27/2020 HP has returned fire on the heels of beating Wall Street expectations for ‘Q1 20. HP announced a “value creation plan” to return $16 billion to shareholders to fight the hostile takeover bid from Xerox. This will come in the form of HP stock buybacks and dividends powered in part by cost-cutting.

But Xerox has not backed down and plans to launch a tender offer starting “on or around” March 2, which will ask all HP shareholders to sell their shares to Xerox.

There is now speculation that HP could buy out Xerox.

Updated 02/10/2020 Xerox has fired another salvo in its hostile take-over attempt of HP. CNBC is reporting that Xerox has boosted its offer for HP Inc. to $34 billion (from $22 to $24 a share). A billion here, a billion there, and pretty soon you’re talking about real money.

___

Updated 01/24/2020 – “People familiar with the matter” are saying the HP share-holder Xerox plans to nominate up to 11 people to the 12-person HP Inc. board of directors as the next step in its hostile takeover bid of HP, 2019’s global PC sales leader.

In response, HP publicly called out billionaire activist shareholder Carl Icahn. In a presser, HP claimed Mr. Icahn’s interests were not aligned with those of other HP shareholders.“Due to Mr. Icahn’s ownership position, he would disproportionately benefit from an acquisition of HP by Xerox at a price that undervalues HP.” Mr. Icahn owns about 11% of Xerox and a representative for Icahn wasn’t immediately available for comment to Yahoo.

Updated 12/10/2019 – And the story goes on – Xerox CEO John Visentin is meeting with some HP shareholders to walk them through the key points of the proposed acquisition. In what it describes as “undisputed” logic. ZDNet has some of the slides.

___

Updated 11/25/2019 – This morning, HP rejected Xerox’s follow-up demand to either agree to formal merger talks otherwise, Xerox would present a “compelling case” for a buy-out directly to HP shareholders. Seems a proxy fight is brewing with activist contrarian investor Carl Icahn holding shares on both sides of the deal.

___

Updated 11/17/2019 –  HP’s Board of Directors has unanimously rejected Xerox’s bid to acquire HP. But, HP did not completely shut down Xerox’s efforts to merge the two aging tech giants.

___

Xerox May Buy HPHP inc. could be bought out on the heels of its second round of layoffs in 15 months. According to reports, Xerox (XRX) sent a buyout proposal to HP Inc. on November 5. The PC giant confirmed the offer on 11/06/2019. HP issued a vague statement that reads in part;

Xerox logo… we have had conversations with Xerox Holdings Corporation (XRX) from time to time about a potential business combination. … We have a record of taking action if there is a better path forward and will continue to act with deliberation, discipline, and an eye towards what is in the best interest of all our shareholders.

The ambiguous HP (HPQ) statement may be a ploy to bring additional bidders to the negotiating table. Norwalk, CT-based Xerox is reportedly backed by Citigroup Inc. CRN reports that Xerox is set to gain $2.3 billion by selling its 25% stake in the Fujifilm Xerox joint venture.

HP logoBloomberg claims that remaining independent is only going to become more difficult for both HP and Xerox. Gartner predicts that global printer shipments set to decline by 2% annually through 2023. Teaming up would reduce costs and competition in the segments where they overlap; HP is generally stronger in the market for smaller printers, while Xerox holds the lead in larger ones. That could boost profitability even as revenue stagnates.

A Xerox-HP merger would result in significant job reductions around the world as the new company would seek to cut costs through the elimination of back-end costs associated with supply chain, finance, HR, and other OPEX expenses. The impact on the two companies’ respective channels would be most felt in the printer segment, where there’s the greatest overlap. Another likely outcome is the spin-off of HP’s 3D printing division, which is not core to either of the companies.

So how did we get here? Xerox is still finding its way after splitting from its professional services business in 2016, which formed the new business Conduent, and the failed merger with FujiFilm in 2018. Xerox relies on a dying business for the bulk of its sales and profit. It sells and services copy machines and printers, primarily for corporations. But sales are falling, declining for the past seven quarters.

HP announced plans to reduce headcount by as much as 9,000, or 16% of its 55,000 employees. The staff reductions, through layoffs and voluntary early retirement, are expected to be completed by the fiscal year 2022. In June 2018, the company laid off 5,000 employees over several months.

HP's struggles in the printer and printer supplies businessWhile HP appears to be holding its own in the PC space — both Gartner and IDC place HP Inc. in second place behind Lenovo for unit shipments as of this 2019 Q2. HP’s ongoing struggles in the printer and printer supplies business, where HP has long been the market leader, has been under stress from third-party suppliers selling toner and ink at significantly lower prices. Reports are that HP’s printer business accounts for a whopping 75% of its total profits and roughly half of its total revenues.

Xerox started in 1906 as the Haloid Photographic Co. The photographic supply company in Rochester, NY, paved its way to mega-success in March 1960, when it shipped its first office copier. The Haloid Xerox contraption was the size of two washing machines and weighed 648 pounds. It also occasionally caught on fire. The Xerox copier’s core technology -— a process called xerography, invented by Chester Carlson — is still widely used in copy machines five decades later.

HP traces its origins to 1938 when Bill Hewlett and Dave Packard rented a garage in Palo Alto, CA. That year, they invented their first product: the HP Model 200A, an audio oscillator used to test sound equipment. The company became the pioneer of Silicon Valley, building its first computer in 1966 and the famous HP-35 in 1972 — the world’s first hand-held scientific calculator. Hewlett-Packard, split into two companies in 2014. HP Inc. got printers and PCs. HP Enterprise got servers and enterprise software.

rb-
Marketwatch has some good data on why these firms are planning to hook up. They write that globally consumers will print 210 billion pages, down 20% from 2015. In 2018, U.S. consumers printed an average of 38.4 pages a month, down 40 pages per month in 2017. In addition to printing less, U.S. consumers have purchased 11% fewer inkjet printers so far in 2019.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Celebrities You Shouldn’t Google in 2019

Celebrities You Shouldn't Google in 2019It is time once again for McAfee’s annual search for the most dangerous celebrity online. The 2019 version of the cyber-security firm’s research found which celebrities’ internet searches expose users to the most risk from malicious websites, malware, and ransomware, and other risky outcomes. McAfee says that criminals use deceptive websites to dupe unsuspecting consumers into accessing malicious files or content.

McAfee logoMcAfee crowned actress Alexis Bledel the riskiest celeb online for 2019. Searches for the actress, known for her role as Rory Gilmore. in the TV show Gilmore Girls landed the most users on risky websites that carry viruses or malware in 2019.

McAfee speculates that the Texas-born Bledel’s role as Ofglen in the fan-favorite Hulu series “The Handmaid’s Tale” and big-screen role in the “Sisterhood of the Traveling Pants” movies led to her top ranking.

Alexis Bledel is McAfees 2019 riskiest celeb onlineThe actress takes over the number one spot from Ruby Rose, who topped last year’s list mainly because of fans’ interest in her playing Batwoman.

The second most dangerous celebrity online was British comedian and actor and host of the Late Late Night show, James Corden. The popularity of viral videos from the Late Late Show gives attackers more options to spread their malware.

Sophie Turner made the list at number 3. She has been trending lately due to her role on “Game of Thrones,” as well as her relationship with singer Joe Jonas.

Lupita Nyong'o is McAfees 5th riskiest celeb onlinePitch Perfect series’ actress Anna Kendrick reached 4th place.  She was followed by Lupita Nyong’o as the 5th riskiest position on the risky celebrity list. McAfee speculates that interest in “Star Wars: The Rise of Skywalker” put Ms. Nyong’o on the list.

Comedian, former SNL star, and current Tonight Show host Jimmy Fallon is ranked number 6. Viral videos from Tonight Show are popular with threat actors.

Martial arts master Jackie Chan, who came in at 7. McAfee  explained that rumors circulated about his return to the big screen in “Rush Hour 4” and “The Karate Kid 2.” His team denied the gossip, but cyber-criminals took advantage of fans’ nostalgia to spread their malware.

Rappers take the #8 and 9 positions on McAfee’s list. Lil Wayne was named the eighth most dangerous driven by his summer tour with Blink-182  and fans search for illegal downloads. Nicki Minaj came in at 9. She caused many of her fans to panic in September after she tweeted she was retiring from music and attackers took advantage of her fans’ quest for more information by poisoning her searches.

Tessa Thompson is McAfees 10th riskiest celeb onlineTessa Thompson, known for her role as ValkyrieMarvel’s first LGBTQ superhero, was listed as the number 10 riskiest popular search term this year thanks to her leading roles in “Men in Black: International” and “Avengers: Endgame.”

Cyber-criminals also use the same celebrity-baiting tactics internationally. According to McAfee, the most dangerous online celebs around the world are:

Gary Davis, chief consumer security evangelist at McAfee explained the risks involved with searches for these celebrities.

Camila Cabello is McAfees riskiest celeb online in SpainConsumers may not be fully aware that the searches they conduct pose risk, nor may they understand the detrimental effects that can occur when personal information is compromised in exchange for access to their favorite celebrities, movies, TV shows, or music

He warns celebrity seekers to be cautious.

It is essential that consumers learn to protect their digital lives from lurking cyber-criminals by thinking twice before they click on suspicious links or download content.

rb-

Cord-cutting could be driving some of this risky behavior. McAfee found that the names of the risky celebs like Bledel, Fallon, and Chan are strongly associated with searches including the term “torrent.”

These users are bypassing the subscription services like Hulu and Amazon to save a few bucks put their digital lives at risk in exchange for pirated content.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Halloween 2019

NASA’s Hubble space telescope has discovered this haunting specter with glowing eyes glaring at us from deep space for Halloween.

Halloween 2019

 

Space.com explains that the halloween visitor is. The piercing “eyes” of this creepy space face are two distant galaxies in the middle of a head-on collision. A ring of young blue stars contours the shape of the eerie face. The dense clumps of stars have come together to form its nose and mouth.

This galaxy merger is known as Arp-Madore 2026-424. The designation combines the names of the two astronomers that first documented it. Arp-Madore 2026-424 is about 704 million light-years away from Earth in the constellation Microscopium.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Church Wearable Device Very Holey

Church Wearable Device Very HoleyThe Vatican recently launched a holey wearable app onto the Internet of Things (IoT). The Church’s wearable IoT device, Click To Pray eRosary, is a bracelet of rosary beads along with a smart cross. The device is part of the Vatican’s mission to pray for peace. But the app is bedeviled by what sources call a “significant cybersecurity flaw.”

Pope’s Worldwide Prayer NetworkThe $110 device syncs with Click to Pray, the official prayer app of the Pope’s Worldwide Prayer Network. It tracks the user’s progress as they work through different sets of themed prayers. Oh, it also tracks your steps, too, for those that want to exercise both body and soul.

The Verge reports the gadget, designed by GadgeTek, a division of Acer, and pairs with an iOS or Android app you can download. The device can be bought through Amazon Italy or , the specs include:

  • eRosarySix-axis inertial sensing
  • Bluetooth 5.0
  • IP67 water and dust resistance
  • Wireless charging
  • a 15mAh lithium-ion battery
  • 10 black agate beads and 11 hematite beads

The “smart cross” stores all technical data. The app, however, appears to handle all of the actual user-interaction — the “smart cross,” does not appear to interact directly with the user. Engadget claims that the device also tracks health-related information. It’s basically an adapted fitness tracker, and it still doubles as a fitness tracker. The Vatican News explained the Church’s moved to the IoT like this:

The Click To Pray eRosary is an interactive, smart and app-driven wearable device that serves as a tool for learning how to pray the rosary for peace in the world. It can be worn as a bracelet and is activated by making the sign of the cross. It is synchronized with a free app of the same name, which allows access to an audio guide, exclusive images and personalized content…

Its target audience is:

the peripheral frontiers of the digital world where the young people dwell (rb- Maybe something got lost in translation)

The Catholic Church proved it is merely mortal when it comes to the Internet of Things. Like Most things IoT it was released with security holes. Sopho’s Naked Security blog explains that Fidus Information Security discovered a flaw in the prayer app’s authentication mechanism. The pious can safely log in via Google and Facebook but in the good catholic tradition, any alternatives cause issues.

flaw in authentication mechanismThe flaw rises when a user resets their account using the Click to Pray app. it makes an API call to the server, which then sends the PIN to the user’s email. The server also returns the PIN in its response to the API request, meaning that someone accessing the API directly could get the user’s PIN without having access to their email.

The researchers say they used this method to easily log in and obtained phone numbers, height, weight, gender, and birth dates. CNet says the Android version of the app also asks for access to location data and permissions to make calls.

Also, there was no limit to the number of login attempts, which is a dream for any hacker who wants to make automated, or brute force, attempts to break in.

brute force attackSecurity researcher Elliot Alderson not only found the eRosary vulnerability, but he also reported it to the Vatican first.  And of course, the Vatican respond via Twitter with appreciation. The Vatican’s representative, a self-described “Digital Jesuit in Rome,”  Father Robert Ballecer, understood the significance of having a security researcher attempting to contact the Vatican.

The church’s developers reportedly patched the eRosary within 24 hours.

rb-

The quick response by the Vatican is more than we can say for most organizations. So when it comes to the security of the Vatican’s new wearable device, it’s a good thing the Digital Jesuit is on the team.

They moved pretty fast for an organization that took 350 years to forgive Galileo.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.