原创 How your mother could be become a hacking victim

2015-2-12 20:32 1418 17 18 分类: 消费电子

A recent New York Times article details how the author’s mother got hit by the CryptoWall virus, which encrypted her mother’s files and demanded a $500 ransom for access to the key.


I had three reactions to this article.

First, is the threat itself. Like most of us I was aware of ransomware but didn’t really think that much about it. Just another nasty virus that can corrupt the system. But this one seems to be spreading quickly.

It’s insidious in that all files on all drives mapped to letters will be encrypted. That backup drive? You’ll lose access to it. A networked drive? Ditto. Mapped cloud services, too, will be attacked. This is a serious problem in that we really need to use automatic backups; ones that are scheduled daily (at least). But because of these sorts of threats, that backup drive must be disconnected from the network to preserve the files if the main system gets compromised.

It would be nice to have a command-line utility that locked access to a drive with a password, so the automatic backup program can invoke a batch file to open it, do the backup, and then lock the drive down. I have not been able to find such a program.

Here in Ganssleville we use SecondCopy to roll changed files to a separate internal disk and to a USB-connected disk every night. Once a week I swap that USB drive with another, which is kept at a remote area. So we’re at risk for, at most, a week’s worth of data, which can be rather a lot. I may change to a daily swap, but that is really a pain.

Weekly, I do a manual backup to a Mac and to a big thumb drive. Both are air-gapped from the network at all times except during the backup. The flash drive is stored off-site.

My second reaction was one of disgust. Pre-computers one had to actually walk into a bank with a gun to commit a robbery. That barrier which required physical presence and entailed considerable risk seems to have kept a lid on this sort of behavior. Today any script kiddie or 419er can drain someone’s accounts from thousands of miles away. Cloak some in the anonymity of the Internet and the veneer of civilization evaporates. Presumably this applies to a small portion of society. But how were these people brought up? What moral sense debases, in their minds, human beings to nothing more than targets of opportunities? What makes these people (I use that word loosely) so amoral? It’s terribly sad the world is rife with these criminal predators.

My last thought was of the author’s mother. The article leads me to suspect she is relatively young. Many aren’t. My parents, in their very late 80s, recently moved to an elder-care facility. A computer room there has a handful of PCs, all with bright yellow keys emblazoned with huge letters for the faint of sight. Other residents, like my folks, have their own computers. I often give them the rules for safe surfing, but those rules, which have been explained many times, are now received as new information with each retelling. Increasing confusion makes me worry that a costly mistake is just a click away. The elderly, most of whom are not particularly computer literate, have always been targets for the evil who prey on our society.

We engineers take computer-savviness to be a given, but a preponderance of PC users know little about their machines or the threats to them. One mistaken click on what looks like a completely innocent link can lead to CryptoWare or thousands of other viruses to hugely disrupt life. Probably very few outside of the cognoscenti have an in-depth defense system. Their machines are like unguarded banks whose vaults are stuffed with cash, unlocked, and a big sign outside reading “easy-to-steal cash.”

What’s your take?

文章评论1条评论)

登录后参与讨论

用户1406868 2015-8-27 06:30

Based on my research, after a in focselorure process home is marketed at a sale, it is common with the borrower to still have the remaining unpaid debt on the bank loan. There are many loan merchants who attempt to have all fees and liens repaid by the future buyer. Nonetheless, depending on selected programs, laws, and state legislation there may be some loans that aren't easily settled through the shift of personal loans. Therefore, the responsibility still rests on the consumer that has got his or her property in focselorure process. Thank you sharing your notions on this website.

sead_cn_562752139 2011-3-7 11:57

明白了,谢谢!

用户1332716 2011-3-7 09:45

了解了,谢谢

用户1012360 2011-2-28 12:03

谢谢支持,一定努力。

用户1277994 2011-2-28 09:56

謝謝博主這樣的介紹文章,歡迎一篇篇地寫下去!
相关推荐阅读
用户3671694 2016-04-18 17:49
What would you change about C?
If you’re an old-timer you’ve most likely written code in a large number of languages that have ma...
用户3671694 2016-04-18 17:33
A look at a new embedded heap manager
Many of us don’t give much thought about the math our compilers do. Toss off a call to a sine func...
用户3671694 2016-04-15 17:12
Why names are critical
The Linux printk function has various logging levels, which include KERN_EMERG, KERN_ERR and other...
用户3671694 2016-03-14 19:02
What do you think of ultra-low power watchdogs?
I have written extensively about designing ultra-low power systems that operate from coin cells. U...
用户3671694 2016-02-26 21:58
Comment headers: The best and the worst
I read a great deal of code. The vast majority is in C with some C++ and a bit of assembly sprinkl...
用户3671694 2016-02-12 17:58
What's your take on knobs?
In a recent Embedded Muse Richard Wall reviews the latest version of Digilent’s Analog Discovery U...
我要评论
1
17
关闭 站长推荐上一条 /2 下一条