Life Hack

Being kind to others, being generous and forgiving, is magical and rewarding.

Latest

Mr. Wright is more active on Google Plus.

Cyberbullying Investigation

To put a stop to cyberbullying, a parent or school official needs to gather reliable evidence.   A common form of evidence is a text message on a cell phone.

Also, I have compiled a series of videos teaching how to capture and store cyber evidence for legal purposes.

Bank Sues Customer/Victim of Cyberheist

PlainsCapital Bank v Hillary Machinery is a Web 2.0 lawsuit, unlike anything we have seen in the history of computer law.

Not only is it remarkable because the bank is suing the customer; it is remarkable because the small customer is exploiting web PR tactics as an asymmetrical weapon against a much more powerful adversary.   The  lawsuit is a case study in modern conflict and public relations.  It demonstrates the web as a populist political machine.

–Ben Wright

Public Relations of an Information Security Crisis

Many organizations (banks, schools, hospitals, non-profits, corporations, government agencies) are being forced to announce to the public that they have experienced a data security breach, such as a compromise of social security numbers or credit card numbers.   An organization must prepare for and think carefully about its public statements and the perception created in the news media.   The public relations dimension of data security is just as important as the technical dimension.   IT professionals must learn new skills and come to understand their jobs differently.

–Benjamin Wright, Senior Instructor on IT Law, SANS Institute

I am G-Buzzing the power of  publicity in lawsuit over an online bank account break-in.

FB Business Records

Facebook Records

Update:   I have published fresh ideas on how to record Facebook messages when employees use them for official company or government business.  Social networks are becoming a more commonly-accepted tool of commerce.

They are also the source of many records needed for lawsuits, investigations and conflict resolution.  http://www.google.com/sidewiki/entry/benwright214/id/lr8I0ChURBgd6x6HWKssukeRgWo

–Ben

Block Viruses Distributed by Web Pages

Computer Security for Schools and Small Businesses

For a small-to-medium enterprise like a business or library, protection of its computer network is not easy.  Hackers are constantly concocting new ways to infect the network (with viruses and other malware) by way of the web pages that network users visit.  Although the enterprise can choose from an array of tools to protect its network, those tools can be expensive and cumbersome.  No tool or combination of tools is perfect.  Finding the right mix of cost, effectiveness and easy of use is a problem.

To answer this problem, CyberPatrol has developed a smart service for steering network users away from dangerous web sites.  Known as SiteSURV, the service relies on CyberPatrol’s SiteCAT system, which constantly crawls (spiders) the web to assess and categorize web pages.  The service provides two layers of filtering.  One layer examines sites according to their content and purpose, and then blacklists those that appear to be dangerous.  The second layer specifically analyzes files and downloads from each site to ascertain whether they contain signatures for known malware.

I asked Chris Overton, VP of CyberPatrol, to explain these two layers of protection.  First, he highlighted the security achieved just by keeping users away from sites of questionable content:  “Certain types of sites tend to deliver malware more than others.  Along with adult and XXX sites, “parked domains” and “warez” sites are more likely to deliver malware than other site categories.  We know this because files pulled from these sites have a higher percentage of malware infection than files from other sites.  So, we can infer that preventing access to these dangerous site categories will advance the fight against malware infections.  Preventing access to a dangerous site protects against all the malware at that site, regardless of whether anyone has developed signatures to detect any or all of the different malware there.”

Chris further described what SiteCAT does when it crawls a web site:  “SiteCAT’s algorithms analyze a web site based on several factors – content, structure, link count, link references, and so on.  Based on this analysis, our system decides which pages/files to download from that site.  Typically we’ll download the main index page of a site and analyze it; then our algorithms decide how much deeper to dig.  All files we want to analyze are pulled by the crawler and saved into our analysis archive.  Then the files feed into a malware detection engine, which looks for the signatures of malware such as a virus or a worm.  If we detect any malware when we crawl the site, we can blacklist it and prevent all of the malware the site might deliver, even malware that we have not specifically detected.”

In other words, SiteSURV allows an enterprise to adopt a conservative, one-strike-and-your-out approach toward web sites.  If a site either contains suspicious content or manifests one instance of infection, the enterprise can block it entirely.

–Ben Wright, advisor to CyberPatrol

Follow

Get every new post delivered to your Inbox.