Hi all,
I put up another video presentation that might be of interest here. While the presentation is about attackers crossing your air gap and what you can do about it, there is about a 2:30 section that is important to everyone with a Mac. From about 6:40 to 9:12 in the video I show how easy it is to infect your Mac from a flash drive, even if you are fully patched and running multiple antivirus packages on your computer.
So even if no one cares about running audit trails, I hope to discourage anyone from looking at what might be on a flash drive you find in the parking lot, or at the cafe, or on the commuter train.
Thanks,
Todd
(PS. I am using the <video> tag for HTML5 for the first time. If you have any problems viewing the video, please let me know)
Espionage in the 21st Century Protecting Your Air Gap
Cyber espionage is different than traditional cybercrime in that the attackers aren't interested in commodity data such as credit card numbers and social security numbers that they can quickly convert to cash. Cyber espionage is interested in more strategic information, the type of information that is most valuable to an organization. Often this information is kept on a seperate network air gapped from the rest of the Internet. The presentation shows that attackers can still bridge these air gaps and move data out of the network and push new software into the network, and they can largely do this undetected. This presentation also shows how to look for this type of activity.
|