Blown To Bits

Did Google Get “Hacked” by Social Deception?

Saturday, February 6th, 2010 by Harry Lewis
People buy colchicine online may need to research the specific type they are taking artane for order or ask their doctor to understand the risks. Although they buy free cephalexin best price jelly are not bacterial to begin with, bacterial infections can start buy generic lumigan as a complication of colds and flu. Antibiotics have links buy serevent online to antibiotic resistance, reduced microbial diversity, allergies and eczema, metabolic buy vibramycin conditions, and digestive conditions, such as IBD. People who experience nasonex for order nausea during migraine attacks can ask a healthcare professional about get viagra prescription treatments for migraine and migraine-related nausea. To discover more purchase cheap buy low cost consultation evidence-based information and resources for headaches and migraine, visit our online for sale dedicated hub. The amount of prune juice a person should discount cheapest without prescription give their baby for constipation varies depending on their age cheap purchase low free price and a pediatrician's advice. The outlook for babies with constipation generic erythromycin no prescription jelly is generally good, and constipation in infants and young children purchase xalatan online is typically temporary and treatable. Researchers previously thought the mesentery buy generic allopurinol cost oral comprised multiple but separate parts that connected centrally. Lymph nodes in.

Marc Ambinder of the Atlantic reports an interesting theory of how the Chinese managed to penetrate Google’s security barrier, which should be about the best in the world. Very little of the attack was technologically novel, according to his source, University of Texas Computer Science Professor Fred Chang. The key steps were figuring out the names of key system administrators, and looking at their profiles on Facebook and other social networks. The attackers then masqueraded as social network “friends” of the sysadmins, tricking them to click on links that turned out to embed malware on their computers. From that point on the theft of passwords was easy. The masquerade required exploiting an unpatched security hole in Internet Explorer; we knew that part. But the sysadmins are presumably pretty sophisticated about suspect email, so getting the identities of their “Friends” was essential.

Of course, by Facebook’s new policy, there is no way to hide your Friends list. I wonder if stories like this one will put any pressure on Facebook to change that policy.

This is all speculation, Ambinder notes. But Chang used to have a high level job at the NSA, so it’s a fair guess he’s familiar with some of the tricks that cyberattackers have tried in the past.

Comments are closed.