Personal cybersecurity a challenge even for top experts

Advertisement
By Reuters | Updated: 17 May 2013 16:45 IST
Nobody is safe in the digital world and even the smartest minds in the cybersecurity world constantly struggle to fend off hackers in their personal lives.

Be discerning, be suspicious, and be very paranoid, advised top government and private-sector computer security experts at the Reuters Cybersecurity Summit this week.

"There are two types of people: those who've been hacked and those who don't know they've been hacked," said former Homeland Security Secretary Michael Chertoff, sharing an adage commonly repeated in cybersecurity circles.

Advertisement

In their professional lives, cybersecurity experts use the latest technological innovations to defend computer networks from attack. But when it comes to personal protection, many employ surprisingly low-tech tactics.

Chertoff, who formed The Chertoff Group security consultancy after leaving government in 2009, says he did not use email while in office to cut off one channel of access to his networks. Current Homeland Security Secretary Janet Napolitano does not use email either.

Advertisement

Eugene Kaspersky, whose company makes one of the top-selling anti-virus programs, uses a six-year-old Sony Ericsson cellphone as it is more difficult to hack into than the latest Internet-enabled smartphones.

"I'm a conservative man," said Kaspersky, whose Moscow-based Kaspersky Lab has conducted some of the most in-depth research on the Stuxnet virus and other malicious software. "I am paranoid. I suspect every link and every email."

Advertisement

Other cybersecurity wonks caution people to keep critical data off hard drives, avoid putting sensitive information in writing and post little personal data on social media.

But not everyone listens, sometimes not even family members.

Advertisement

"My sister is a Petri dish for malware. When I go home to New Jersey, I have to play tech support," said George Kurtz, chief executive of security firm CrowdStrike.

He added, "Yeah, I'm pretty paranoid at home and even firewall off my kids."

FBI Executive Assistant Director Richard McFeely said his daughter, who recently returned home after graduating from college, asked him to look at a link she was sent that urged her to download something in order to watch a YouTube video.

"I made a call and sure enough, it's phishing," McFeely said, referring to a common online scam in which users are sent plausible-looking links, which when clicked will infect computers with malicious software. "My daughter easily would have done that if I was not sitting there."

McFeely said his daughter's Facebook postings have in the past led to the hacker group Anonymous publicizing her college house address to get at him and his family.

Phishing test

Phishing is one of the most common tools used by hackers. It was through a phishing campaign that hackers managed to break into the Twitter account of the Associated Press and send a fake message last month about explosions at the White House, briefly driving down financial markets.

To avoid such attacks, the North American Electric Reliability Corp, which oversees the security of the electric grid, tests its 200 employees with a fake phishing email every quarter, according to CEO Gerry Cauley.

Anyone who clicks on the link has to undergo an hour of training with the IT department and the CEO himself.

"I explain to them how really important it is. It's the predominant path into any network security," Cauley said. He added that 20 employees had clicked on the fake link when he first ran the test, and only eight did in the latest test.

Several experts highlighted the importance of being careful about putting personal information online, though there was also a recognition that social media is here to stay.

"If you're living in the modern world if you're not in the social media, you don't exist," said Kaspersky. "But please, keep your mind switched on, don't post personal stuff."

Then again, social media can aid cyber investigators as well as crooks. CrowdStrike said it has managed to build profiles of many hackers, including their photographs, thanks to social media.

"We often bemoan, outside of cybersecurity, that we don't have privacy anymore, that Google and Facebook know so much about us," said CrowdStrike Chief Technology Officer Dmitri Alperovitch.

"That's true for the adversaries, too, right? They're all on social networks, they're all on Twitter, accumulating a digital trail that often goes back years."

© Thomson Reuters 2013

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Cybersecurity, Internet
Advertisement

Related Stories

Popular Mobile Brands
  1. Redmi Note 15 SE 5G Roundup: Here's Everything That We Know So Far
  2. Oppo K15 Pro Series With Active Cooling Fan Launched: See Price
  1. Crimson Desert Has Sold 4 Million Copies, Pearl Abyss Announces
  2. Axis Bank Introduces Aadhaar Face Authentication: How to Update Your Axis Bank Mobile Number
  3. Meghalaya Government Signs MoU With Starlink to Boost Connectivity in Region and Reduce Digital Divide
  4. Samsung Galaxy A27 5G Visits Geekbench With Older Snapdragon 6 Gen 3 Chip, 6GB RAM
  5. Interactive Brokers Expands Crypto Trading to Retail Investors in Europe
  6. Blinkit Launches Inside Mumbai Airport, Lets Users Order Essentials From Across the Terminal
  7. Smartphone Exports From India Could See a Notable Decline as Iran Conflict Persists: Report
  8. Redmi A7 Pro Launched With 6,000mAh Battery, 13-Megapixel Rear Camera: Price, Features
  9. Gen Z Reportedly Dominates India’s Crypto Futures Market With 61 Percent Share
  10. Nvidia’s New DLSS 4.5 Update Brings AI-Powered 6X Multi-Frame Generation Feature
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.