identity theft

Name, Birthday, and Email…Why Not.

by kriggins on October 27, 2009

in Awareness

I post a lot of links in my daily bits post, but every once in a while I come across something that I think needs to be singled out. This is one of those occasions.

Graham Clueley of Sophos put up this post which I think is a must see. Not necessarily for those of us in the profession, but for our families and friends. Contained in the post is a video where they ask random strangers on the street for their full name, birthday and email address.

Check out what happens and then forward it on to those important to you to help drive home that they need to be careful with their information.


Reblog this post [with Zemanta]


Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Some interesting stats, however, the title is a bit misleading, the percentages for 20's, 30's and 40's are 25%, 23% and 20% respectively. Not exactly what I would call significant regarding 20's.
    ID theft up, and 20somethings suffer most | Security - CNET News
    Tags: ( theft identity )
  2. A very nice diagram depicting risk. Hat tip: Gunnar Peterson
    Telic Thoughts: Threats, vulnerabilities and risk
    Tags: ( risk )
  3. Time to update your PHP installations.
    PHP plugs security holes | Zero Day |
    Tags: ( vulnerability patches php )
  4. Christofer waxes poetic on cloud computing.
    Rational Survivability: Ron Popeil and Cloud Computing In Poetic Review...
    Tags: ( cloud )
  5. A nice post that shows you how to build a u3 USB keyfob that will gather information from a windows system using nothing but built in tools.
    Syn: USB Enumerator vs USB Hacksaw
    Tags: ( tools usb u3 information-gathering )
  6. A nifty little how-to on using self-signed certs with Burp. >> Blog Archiv >> Self-signed Certificates in Burp
    Tags: ( pentest burp )
  7. Woot! L0phtCrack is alive again. I'm jealous of those who will get to see the launch live at Source Boston.
    L0phtCrack 6
    Tags: ( cracking password windows )
  8. Irongeek has written a set of PHP scripts that demonstrate all 10 of the vulnerabilities described by the OWASP Top 10. Very cool stuff.
    Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10
    Tags: ( tools )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.


{ 1 comment }

Rich Mogull has a post up that points to the New Identity Theft Stats provided by Debix. Interesting to actually see some numbers.

Amrit Williams has some interesting thoughts on the iPhone creating a mobile malware tipping point.

Russell Handorf gives us some guidance on How-to easily deploy honeypots for production networks.

Kai Roer gives us a look at how someone might go about gathering information about you or your company.

I came across this from friend feed. - videos for security folks. Some interesting stuff there.

Finally, are you a computer security professional. Read the the article and see how many of the observations you agree with or exhibit.

Have a good day.


Technorati Tags: , , , , ,