The Dangers of Living in the Digital World

dangersWe often talk about a “connected life.” But is it possible to have a “too connected life”?

The web was abuzz this week after Wired writer Mat Honan published a detailed description of how hackers were able to exploit holes in the security procedures of Amazon and Apple customer service. His piece is well worth reading, as it includes information provided by the actual hackers who hijacked his life and destroyed his data. In order to take control of Honan’s Twitter handle, these digital hooligans compromised his Amazon, Apple and Gmail accounts and wiped the data from his iPhone, iPad and iBook. Among the data he lost was all of the photos he had ever taken of his young daughter, which for some reason he had never backed up.

According to reports, both Apple and Amazon have quietly changed the policies that led to the epic hack. But for everyone who is a true technophile—everyone whose entire life now resides online—it’s certainly a cautionary tale.

Here are a few lessons to be learned from Honan’s ordeal:

1. Our security is only as good as the companies that protect it.

Amazon’s security processes allowed basically anyone to add a new credit card to a user’s account without verification. The protocols then allowed a password reset based on the recently added credit card, which gave access to the entire account (including the last four digits of all other cards associated with the account).

Apple admitted, when pressed, that their own employees didn’t follow their security rules. Whether or not that’s true, their customer support agents allowed the hackers to get access to Honan’s apple accounts using the last four digits of the primary credit card, which of course the hackers knew because of Amazon’s security flaw.

When you think of the vast amounts of information that we put in the hands (and databases) of our banks, credit card companies, employers, government agencies, and all of the other entities with which we do business, the overall picture is staggering. Identity theft is made ridiculously easy by this proliferation of connected data. Remember: as this case has proven, it’s much easier to “socially engineer” data out of a gullible customer service agent than it is to hack into a system through brute force.

2. If you don’t use a backup service, get one now.

Whatever it costs, it’s a small price to pay. When you eventually need it, if it’s not due to hacking, it’ll be due to loss or hardware failure. Do you know what the most common cause of cell phone damage is? Dropping the darned thing in the toilet. How many photos are on your mobile phone? Have you backed them all up?

And make sure you use a remote, offsite service. One of my favorite security stories is told in a 20-minute clip from DefCon (an underground hacking conference), in which an accomplished hacker describes his experience when his own computer was stolen. He had dutifully made multiple redundant backups but had kept them in the same room as his computer. When the computer was stolen, the backups were too. (Google “don’t mess with a hacker’s computer” if you want to listen to the hacker tell his story, but be forewarned—the language is pretty salty.)

3. If you use a Mac, log into iCloud and turn off the “Find My Mac” feature.

Being able to wipe your computer drive in case it’s stolen is a great idea in theory. But the same “feature” allows someone who gains access to your accounts to wipe your computer, tablet and phone remotely. The benefits just don’t out weigh the risks.

4. Reduce your data footprint and eliminate daisy-chaining of accounts.

Do what you can to prevent someone who gets access to one account from getting access to another. When it’s an option, choose NOT to allow a company to keep your credit card on file. Turn off “one-click” shopping. If a site offers two-factor authenticationby all means, turn it on and use it.

Never use the same password for critical online accounts. I know people who use the same password for everything they do online. It’s not like they’re using “password” or their birthday or anything; they have a solid password, but use it everywhere. A good rule of thumb is to have unique passwords for the critical stuff you do (places you habitually shop and important services you use). You can feel okay about having a single “throwaway” password for certain other sites that require a login. Just make sure that you don’t have any personal information in those accounts that would allow a hacker to gain access to other accounts (with more sensitive information) if they get compromised.

The more we do business and live our lives in a virtual world, the more vulnerable we are to people who want to take our identities, our money and our peace of mind.

Control4 Blog

CineMate® Series II digital home theater speaker system

This 2.1-channel system from Bose is compact, but still outpaces the competition by far. The two main drivers provide a spacious, strong sound experience by using Bose’s proprietary TrueSpace digital processing. Also, the Acoustimass module provides deep bass with no distortion wherever you hide it. This system is also available with smaller Gemstone speakers, and a universal remote, or an articulated array speaker package, and a smaller, simpler 4 button remote.  These different options can make or break a room depending on its volume and shape, so be sure to choose wisely! This is a great choice if you’re looking to get the most out of your HDTV.

The Bose Blog

Panaray® System Digital Controller

If you’re a professional performer, chances are that you’ll need on of these. Bose produces some of the best speakers on the planet, so they should be controlled by the best digital controllers around, right?

There are three main things that this digital controller solution has going for it; versatility, maximum efficiency, and standard control.

As for versatility, this controller is based off of bose’s DSP platform that allows you to upgrade the software on the controller and not the hardware once there is a new product out. That’s a great money and time saver.

Efficiency is unmatched when using this device as it consolidates all control settings and system information onto one display. This single display system reduces troubleshooting time while setting up, and ensures a more accurate and immediate changes to system settings if they need to be adjusted. Also, the great ‘lockout’ feature prevents others from tampering with your settings once you’re done.

Lastly, Standard control. The great part about this controller is that you can set individual speakers to different settings so that you can control exactly where you want more sound, less sound, more bass, more treble, and much more.

As you can see, the Panaray System is a feature packed controller that will exceed your expectations on the dance floor as well as entertaining a bar.

The Bose Blog