A Chromebook can increase the protection of air-gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when a computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read more

A Chromebook can increase the protection of air gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think that the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when the computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the Internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer, in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read more

Defensive Computing for email attachments

Credit to Author: Michael Horowitz| Date: Wed, 15 Mar 2017 12:12:00 -0700

Email attachments remain an effective way to infect/compromise computers because people trust them too much. Blindly opening them is easy, simple and quick, but, it’s also not secure. What is secure?

Never open email attachments using Microsoft Office or Adobe’s PDF reading software.

Really should go without saying at this point.

Never open attachments on a Windows, Mac or Linux computer you care about or use regularly.

These old desktop systems are simply not as secure as more modern operating systems.

The safest computers for opening suspect files run iOS or Chrome OS.

To read this article in full or to leave a comment, please click here

Read more

Spyware on a Chromebook

Read more