yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Email Hackers: Are You Next? | @CloudExpo #Cloud #Encryption #Cybersecurity
Believe it or not, passwords still matter. Authentication also matters

Russian Email Hackers: Are You Next?

Experts are debating whether the Democratic National Committee’s (DNC) email system was hacked by the Russian military intelligence service (G.R.U.) or Guccifer 2.0, a lone wolf Romanian hacker. While this is a very important question, the answer will not change the results: over 20,000 DNC emails ended up on WikiLeaks. How did this happen? How likely is it to happen to you or your company? What can you do to protect your email system from a similar fate?

Are the Russians Going to Hack Your Email System?
The chances that the G.R.U. or some other Russian-based hackers will target your email system are not huge (unless you work for a big company or are relatively famous, in which case they are trying several times each day). That said, you are going to be hacked by someone, and it could happen at any time.

If you are targeted and attacked by a motivated, organized team of criminals, you will need a better-motivated, better-organized team of anti-criminals to enable you to emerge from the battle unscathed.

It’s not like the movies where you see a stereotypical geek with a laptop tapping a few keys and accomplishing the task in a few minutes. An organized team of criminals will do a thorough job of reconnaissance. They will find out which operating systems you are running and what ports are open, and they will examine your subsystems and how they interconnect.

Next, the bad guys will check their favorite sources for known vulnerabilities. A quick Google search will result in dozens of sites that contain vulnerability disclosures along with the proof of concept code used to discover the vulnerability. For professionals, this is a fruitful path to travel, as it leads to strategies to exploit computer systems where servers are not properly patched or are sloppily configured. Well-maintained, up-to-date systems are safe from the usual tactics associated with exploiting known vulnerabilities. After all, they’re “known.” But sadly, not everyone is as diligent with system updates and security patches as they should be.

Then they will take a hard look at your online presence. You publish your life on Facebook, Twitter, Instagram, Tumblr, Snapchat, LinkedIn, blogs, etc. You probably don’t realize how much information you make available for anyone to gather and analyze. In truth, you (the employee) are the biggest security risk to your company, and you are by far the easiest to exploit. We’ll get to this in a minute.

Next, the hackers will use some tools from outside of your system, or get you to install some tools that put them inside your system to get to your information. At that point, it’s over. You’ve been hacked. So here are a few things you need to know.

Passwords Still Matter
Believe it or not, passwords still matter. It is pretty rare for a hacker to spend time trying to hack your password, but the tools are readily available. I won’t list them here because I’m not promoting the dark side, but just Google “email hacking tools” and you’ll understand. Your best defense against any of these tools is a password that is long, the longer the better; strong, the more cryptic the better; and unique, as in one password per system (never reuse a password). How good are your mobile passwords? iOS allows for six-digit alphanumeric passwords. Are you still using a four digit pin number? If you’re serious about security, long, strong, unique passwords are one of the best defenses you can mount.

Authentication also matters. You’ve heard of two-step authentication. You should use it? Does your login system lock after five attempts to login? How secure is your password recovery or password reset protocol? Does your computer lock after sitting idle for 60 seconds and require a password to regain access? Do you lock your computer every time you step away from your desk? This kind of stuff is inconvenient in the extreme, but all of it should be part of any cybersecurity initiative.

It’s Easier to Hack You than to Hack Your Computer
Which brings me to the most common way to get awesome malware onto your computer or into your network: social engineering.

Known as Phishing (pronounced “fishing”), an email technique that tricks email recipients into performing specific behaviors, or Spear Phishing, a highly targeted version of Phishing that is customized for a small group, this type of social engineering exploits the weakest link in your cybersecurity chain – you! You’ve heard it before, but I’ll say it again. Unless you have asked for it or know the person who sent it (although this is no guarantee of safety), never, ever, under any circumstances click on a link in an unsolicited email. Just don’t do it. Phishing is now high art. The best templates are almost indistinguishable from the emails they are pretending to be. When in doubt, don’t click, because that one click would be all it takes to enable a hacker to put you into a world of hurt.

Remember when Apple CEO Tim Cook adamantly refused to discuss weakening the encryption system on iPhones? He was thinking of you. If you are serious about not seeing your emails on WikiLeaks in the future, then start encrypting them now. Fully encrypted email systems are a pain to use. They can require an extra password, take extra time to deal with and add a layer of complexity to your life that you may not enjoy. However, when hackers get their hands on encrypted emails, those emails are unreadable and useless.

There are many places to learn about best practices email encryption. Google, Microsoft and almost every tech company that sells enterprise-grade solutions can help you. If you’re just a normal person or a small business, there are excellent solutions like Virtru and ProtonMail that offer best practices solutions. A quick Internet search will yield products and reviews galore.

Classified Documents
Which emails must always be encrypted? Which emails probably should be encrypted? And which emails don’t need to be encrypted? Stratifying communication into classified, semi-classified and unclassified is a common practice. But I’ll leave you with this thought: the hacked email that hit Sony the hardest contained no financial information, legal documents or personal health information – it was executive banter. The same can be said for the email that forced the chairwoman of the DNC to resign. So, I’ll ask you again: which emails should be encrypted?

Time to Rethink Email Communication
You or your company may already have excellent cybersecurity measures in place. I hope you do. If you’re in doubt, now would be a great time to start asking about it and getting satisfying answers. After all, when you see your sensitive emails on WikiLeaks, you’re not going to care whether it was the G.R.U. or Guccifer 2.0 or the proverbial Red-Bull-drinking, chocolate-covered-coffee-bean-eating teenager with skills and an attitude who ruined your professional life. So let’s make it as hard for the hackers as we possibly can.

The post Russian Email Hackers: Are You Next? originally appeared here on Shelly Palmer

Read the original blog entry...

About Shelly Palmer
Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Cloud Developer Stories
@DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the worl...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online co...
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the I...
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golde...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers