Friday 3 April 2009

Scottish hospital leaves medical records in corridor for days!


The BBC have reported that Southern General in Glasgow had boxes of medical records unsecured for days.

The records were spotted by a concerned member of the public but nothing was done. 

Perhaps someone would like to tell all the people who's records were there if anyone has accessed their data....oh sorry, they can't as they have no idea!

Yet another example of the powers that be really not caring about our information security. The second problem for Scotland's health bodies in recent weeks

Full story here...

Photochaining - Great art, terrible security

Photochaining.com is a new website that encourages the sharing of random memory cards.

Whilst this may provide a fantastic variation of images and input it presents a very significant security problem.

'Seeding' memory devices (including memory cards and USB keys) is a classic way to covertly install spyware such a keylogging software. It is now a common practice by the criminal fraternity (or unscrupulous Private Detectives)  to leave 'seeded' usb keys in your target companies favorite Starbucks. People will often take a found memory key and plug it into their computer 'to have a little look around'. when you put the 'seeded' USB key in you may find something like a PowerPoint presentation called 'honeymoon pics, open in private, i love u'. If you open it you will see some apparently private and intimate pictures. Unfortunately at the same time keylogger software will be installed on your machine recording and reporting back everything you ever type. 

If you think this is the realms of super-criminals you should be aware that these kind of programs are readily available for about £50.00. 


Vista and XP password recovery using Backtrack 4

Have you ever wondered how passwords are recovered. One way is to boot from a Linux Live CD/DVD/USB device running special software such as Backtrack 4

This is readily available software and whilst a little outside the average users skill-set, anyone who has a basic understanding of command line code should be able to use it.

The link here is from Cybexin's blog (one of my favorite's). He posts many informative video's about how-to which can be quite shocking if you ever thought your information was secure. If your information has value and you want to know how to protect it from these kinds of attacks contact FaberBrent.

Backtrack 4 video here. Warning do not try this at home kids.


Another article about workstation security

As reported recently there is finally a trend towards awareness of physical endpoint security.

The following article talks about some of the risks including bootable Linux Live CD's with programs such as Backtrack (read more about Backtrack here)

Are people beginning to grasp that security needs a holistic approach to be effective?

Article here...