Home > Blogs > Who can it be now?

Who can it be now?

The Google attack teaches many lessons.

Computerworld has several great articles on the Google attacks.  One such article is http://www.computerworld.com/s/article/9163158/More_than_100_companies_targeted_by_Google_hackers.

Read carefully.  How were people duped into providing information and running malware?  The attackers choose to mine the Social Networking sector. 

""They'll use a social network to learn about one person in the company, and then will send emails or chats messages as that person's friend," he added. "

I've been contemplating writing up why some might be targetting your account for commandeering, a concept many might feel is paranoia.  Instead, the massive amount of information available about you, about me, makes it easy to begin exploiting your organizational position to either get info from you or from someone who might trust you.  The Aurora attack seems to show that that concept is part and parcel of today's InfoWarfare tactics manual.

In the meantime, read my article that begins the discussion on Social Networks being awash with data:  http://www.informit.com/articles/article.aspx?p=1338067 .  Keep reading about Google's disregard for privacy.  Stay informed on the Aurora attack.  It will be a watershed event I'm sure.  The story on this very public and pivotal attack has changed so many times, it's hard to determine just who did it.

Irrespective of who dun it, targetting Google and all its data was no accident.

jt

Comments

comments powered by Disqus