Ever wonder how passwords get stolen? I like to imagine a team of hackers like The Lone Gunmen from The X-Files, all crowded in some hideout conducting illegal computer business based on tips from rogue FBI Agents.
Turns out there’s a little more to hacking than waiting for Fox Mulder to show up with hints.
Most of the common tactics involve guessing passwords utilizing online and offline techniques to acquire entry. One of the main methods is a dictionary attack.
This method automatically tries everything listed in a small file, the “dictionary,” which is populated with common passwords, like 123456 or qwerty. If your password is something tragically simple, you’re out of luck in a dictionary attack.
To protect yourself, use strong single-use passwords for each individual account. You can keep track of these with a password manager, because no one is expecting you to remember a string of nonsensical numbers, letters, and characters that make up a strong password.
Of course, there are still ways for hackers to figure out even complex passwords.
In a brute force attack, every possible character combination is tried. For example, if the password is required to have at least one uppercase letter and one number, a brute force attack will meet these specifications when generating potential passwords.
Brute force attacks also include the most commonly used alphanumeric combinations, like a dictionary attack. Your best bet against this type of attack is using extra symbols like & or $ if the password allows, or including a variety of variables whenever possible.
Spidering is another online method similar to a dictionary attack. Hackers may target a specific business, and try a series of passwords related to the company. This usually involves using a search “spider” to collate a series of related terms into a custom word list.
While spidering can be devastating if successful, this kind of attack is diverted with strong network security and single-use passwords that don’t tie in easily searchable personal information.
Malware opens up some more fun options for hackers, especially if it features a keylogger, which monitors and records everything you type. With a keylogger, all your accounts could potentially be hacked, leaving you SOL. There are thousands of malware variants, and they can go undetected for a while.
Fortunately, malware is relatively easy to avoid by regularly updating your antivirus and antimalware software. Oh, and don’t click on sketchy links or installation packages containing bundleware. You can also use script blocking tools.
The delightfully named (but in actuality awful) rainbow table method is typically an offline attack where hackers acquire an encrypted list of passwords. The passwords will be hashed, meaning it looks completely different from what you would type to log in.
However, attackers can run plaintext passwords through a hashtag algorithm and compare the results to their file with encrypted passwords. To save time, hackers can use or purchase a “rainbow table”, which is a set of precomputed algorithms with specific values and potential combinations.
The downside here is rainbow tables take up a lot of space, and hackers are limited to the values listed in the table. Although rainbow tables open up a nightmare storm of hacking potential, you can protect yourself by avoiding sites that limit you to very short passwords, or use SHA1 or MD5 as their password algorithms.
There’s also phishing, which isn’t technically hacking, but is one of the more common ways passwords are stolen. In a phishing attempt, a spoof email requiring immediate attention links to a fake login landing page, where users are prompted to input their login credentials.
The credentials are then stolen, sold, used for shady purposes, or an unfortunate combination of all the above. Although spam distribution has greatly increased over the past year, you can protect yourself with spam filters, link checkers, and generally not trusting anything requesting a ton of personal information tied to a threat of your account being shut down.
Last but certainly not least, there’s social engineering. This is a masterpiece of human manipulation, and involves an attacker posing as someone who needs login, or password, building access information. For example, posing as a plumbing company needing access to a secure building, or a tech support team requiring passwords.
This con is avoidable with education and awareness of security protocol company wide. And also you know, not providing sensitive information to anyone who asks. Even if they seem like a very trustworthy electrician, or promise they definitely aren’t Count Olaf.
Moral of the story? Your passwords will never be completely safe, but you can take steps to prevent some avoidable hacking methods.
Always have a single-use password for each account, use a password manager to store complex passwords, update malware, keep your eye out for phishing attempts, and don’t you dare make your password “passoword.”
China no longer dependent on U.S. for smartphone components
(TECH NEWS) Trump’s trade war, more specifically, the ban on shipping phone components, to China has begun to take a toll on chip manufacturing.
Once upon a time, the U.S. and China were buddies, exporting and importing from each other with ease. However, President Trump’s recent actions regarding trade with China is certainly putting a damper on things.
It seems that Chinese companies have moved past the need to import certain products, like smartphone chips, from the U.S. – something they previously relied heavily on by working with American companies like Qorvo, Inc. in North Carolina, Skyworks, Inc. in Massachusetts, Broadcom, Inc. in California, and Cirrus Logic in Texas.
Since the ban in May, Trump specifically barred shipments from the U.S. from companies like Qualcomm and Intel Corp to companies like Chinese tech conglomerate, Huawei Technologies Co. But much like the bans that came before the Trump administration, it didn’t last long. With tensions high, the U.S. actually recently started rolling back some aspects of the ban and started making exceptions that allow American tech companies to continue to work with Chinese companies like Huawei.
Of course, China’s lack of U.S. parts hasn’t stopped them from rolling out new and improved products. As a matter of fact, in September, Huawei unveiled its newest phone, the Mate 30, which boasts highly-desired features, such as a curved screen and a wide angle camera. This makes the phone a pretty solid competitor of Apple’s newest iPhone, the iPhone 11, of which China was sent 10 million of in September and October.
After Huawei’s announcement, investment and banking firm UBS, and Japanese technology lab Fomalhaut Techno Solutions, partnered up and took to their labs to analyze the phone’s components. Their analysis was simple and straightforward. They found that there were absolutely zero American components in the phone. In fact, the chips in the Mate 30 are actually from Huawei’s in-house chip design agency, HiSilicon. They also provided Huawei with WiFi and Bluetooth chips. With HiSilicon’s 20 + years experience in the industry, 200+ chipsets, and 8000+ patents, it’s no wonder U.S. chip companies are getting nervous. Qualcomm, for example, announced a 31-40% decrease in estimated chip shipments over the next year.
Although the chip ban has made a big impact on larger U.S. companies who make and supply chips to China, there are still many other businesses that have been affected in Trump’s trade war. As it happens, U.S. Commerce Secretary Wilbur Ross recently confessed that, since May, when the ban was put in place, the U.S. has received at least 260 requests, asking that they excuse them from the ban and be allowed to work with China as they previously had.
But really, at the end of the day, with so many American companies relying on China for both import and export, it’s probable that the ban will be short-lived and that exceptions won’t need to be made. As Americans, we can be hopeful that the end-result of this trade war will be a positive one, but only time will tell.
AI cameras could cut down traffic deaths, but there may be flaws
(TECH NEWS) Traffic accidents have plagued humanity since motor vehicles were created, can AI help cut down on text and drive incidents?
What if we told you Australian officials believe they have found a way to reduce driving deaths by almost 30% in just two years? It’s a pretty appealing concept. After all, Australia alone faces an average of over 3 deaths a day due to driving accidents. And Australia’s average death rate clocks in at just half of what we face in the United States.
There’s just one problem with Australia’s proposed solution: it’s basically Big Brother.
Basically, Australia plans to use AI cameras to catch people texting and driving. There are plenty of places that have outlawed texting and driving, but that rule is very hard to enforce – it basically means catching someone in the act. With AI cameras, hands free driving can be monitored and fined.
Australia has already started rolling out some of these systems in South Wales. Because this is a new initiative, first time offenses will be let off with a warning. The following offenses can add up quickly, though, with fines anywhere from $233 to $309 USD. After a six month trial period, this program is projected to expand significantly.
But there are real concerns with this project.
Surprisingly, privacy isn’t one of these worries. Sure, “AI cameras built to monitor individuals” sounds like a plot point from 1984, but it’s not quite as dire as it seems. First, many places already have traffic cameras in order to catch things like people running red lights. More importantly, though, is the fact these machines aren’t being trained to identify faces. Instead, the machine learning for the cameras will focus on aspects of distracted driving, like hands off the wheel.
The bigger concern is what will come from placing the burden of proof on drivers. Because machine learning isn’t perfect, it will be paired with humans who will review the tagged photographs in order to eliminate false positives. The problem is, humans aren’t perfect either. There’s bound to be false positives to fall through the cracks.
Some worry that the imperfect system will slow down the judicial system as more people go to court over traffic violations they believe are unfair. Others are concerned that some indicators for texting while driving (such as hands off the wheel) might not simply apply texting. What if, for instance, someone was passing a phone to the back seat? Changing the music? There are subtleties that might not be able to be captured in a photograph or identified by an AI.
No matter what you think of the system, however, only time can tell if the project will be effective.
DeepComposer: AWS’ piano keyboard turns AI up to 11
(TECH NEWS) Amazon has been busy with machine learning, which includes a camera, a car, and now DeepComposer that’s able to add to classics on the fly
Musicians, listen up, there’s a new kid in town, its name is DeepComposer and it’s coming to take your creativity and turn it up to 11.
Artificial Intelligence has taken a leap into what has long been considered the “pinnacle of human creativity”, as Amazon revealed what is said to be the world’s first machine learning-enabled keyboard capable of creating music.
Amazon unveiled its AWS DeepComposer keyboard Monday during AWS re:Invent, a learning conference Amazon Web Services hosted for the global cloud computing community in Las Vegas.
Demonstrating DeepComposer’s abilities, Dr. Matt Wood, Amazon’s VP of Artificial Intelligence, played a snippet of Beethoven’s “Ode to Joy” and then let the keyboard riff on it with drums, synthesizer, guitar, and bass, sharing a more rockin’ version of the masterpiece.
Generative AI, is considered by scientists at MIT to be one of the most promising advances in AI in the past decade, Wood told the crowd. Generative AI allows for a machine not only to learn from example, as a human would but to take it next level and connect the dots, making the next creative step to composing something completely new.
“It [Generative AI] opens the door to an entire world of possibilities for human and computer creativity, with practical applications emerging across industries, from turning sketches into images for accelerated product development, to improving computer-aided design of complex objects, Amazon said on its AWS re:Invent website.
How does it work? The Generative AI technique pits two different neural networks against each other to produce new and original digital works based on sample inputs, according to Amazon. The generator creates, the discriminator provides feedback for tweaks and together they create “exquisite music”, Wood explained.
A user inputs a melody on the keyboard, then using the console they choose the genre, rock, classical, pop, jazz or create your own and voila, you have a new piece of music. Then, if so desired users can share their creations with the world through SoundCloud.
This is the third machine learning teaching device Amazon has made available, according to TechCrunch. It introduced the DeepLens camera in 2017 and in 2018 the DeepRacer racing cars. DeepComposer isn’t available just yet, but AWS account holders can sign up for a preview once it is.
Court green lights demoting an employee for physical disabilities
Small metros may have cheaper homes, but they might not have the jobs
Pantone Color of the Year is ‘Classic Blue,’ hoping for calm this year
Upwork revealed its top 100 skills job seekers should aim to have
Tiktok: Did they really just censor disabled users?
‘OK, Boomer’ can get you fired, but millennial jokes can’t?
Ageism: How to combat discrimination in the workplace
6 simple self-care tips to keep any busy entrepreneur sane
WeWork chaos over the weekend = employees in a new version of purgatory
This LinkedIn graphic shows you where your profile is lacking
Anti-surveillance mask – creepy, ingenious, or potentially illegal?
Amy’s Ice Cream founder on Austin’s business risks and rewards #WhyAustin
Turns out a lot of people are in between introverted and extroverted
P. Terry’s founder on the booming economy in Austin #WhyAustin
Ladies and gentlemen, the U.S. National Anthem
Our Great Partners
news neatly in your inbox
Subscribe to our mailing list for news sent straight to your email inbox.
Thank you for subscribing.
Oh boy... Something went wrong.
Tech News2 weeks ago
Tesla’s Cybertruck windows are the least of their growing manufacturing crises
Business Finance2 weeks ago
Overtime pay laws are changing, are you ready for them?
Social Media6 days ago
‘Secret sister’ gift exchanges are not just lame, they’re ILLEGAL – tell your friends
Tech News2 weeks ago
TikTok is fresh and new, but trouble is brewing at the Chinese company
Business News2 weeks ago
Rev rips pay rates; here are alternatives to hire for your transcriptions
Business Marketing2 weeks ago
Startup pays $10K for people to leave The Bay
Business Finance2 weeks ago
6 questions to ask when considering a startup accelerator
Tech News2 weeks ago
Google AI just isn’t as shiny as it was, or could have been