- Dutch receiving Malaysia plane bodies irked at Putin’s daughter in Holland
- Algerian airplane goes missing over Mali: ‘Emergency plan’ launched
- Colorado judge strikes voter-backed gay marriage ban, but issues stay
- Brooklyn Bridge flag-swapping suspects identified by nickname
- Christian woman in Sudan spared for apostasy flies to Italy
- Iraq: 60 dead in attack on prisoner convoy
- Marco Rubio: U.S. at social, moral crossroads
- ‘We’re coming for you, Barack Obama’: Top U.S. official discloses threat from ISIL
- White flags baffle NYPD: ‘We’re lucky it wasn’t a bomb’
- N.Y. Gov. Cuomo’s office interfered with, pressured corruption commission: report
Average computer users need to be on their guard for hackers, too
Question of the Day
With nations trading charges of high-level cyberespionage, security specialists are warning that there are a whole host of reasons why hackers may target their computers and smartphones.
"The fact is there are a lot of different groups out there trying to break into computer systems," said Tom Cross, director of security research at Lancope, a Georgia-based network security firm. "You have spies trying to steal intelligence. You have financially motivated criminals trying to make a buck. You have politically motivated attackers that hack computer systems to make a political statement. If they don't like a company, they might try to take their website down to demonstrate their disagreement with that company."
Or, he added, "maybe they're just joy-riding."
Earlier this week, Mandiant Corp., a security firm in Alexandria, accused the Chinese government of cyberespionage. Intelligence-motivated attacks such as these don't affect the average consumer, Mr. Cross explained. Instead, they target government agencies, government contractors and their employees.
"Governments are spying on each other, because they want to understand what's being planned in the future and what technologies they're developing," Mr. Cross said. "It's not just the government agencies that are targeted by these attacks. It's also the companies that do business with them."
These attacks aren't limited to work computers and emails -- they also go after personal information, looking for a back door into secret government information.
"If you're someone who works with this kind of information, both your work and personal email could be targeted," Mr. Cross explained.
One vulnerability, he said, is the increasingly ubiquitous cellphone.
"Mobile devices know where users are located, their emails, telephone calls, text messages. They have microphones and cameras, so potentially if someone got control of it, they could use it to record audio or take photographs. It's a very valuable source for an attacker."
But how can people avoid these sort of cyberattacks? Anti-virus software isn't always the answer, technology analyst Jeff Kagan said. While it helps, it doesn't protect from everything.
"We think if we load this stuff up, we're safe, but we're not," he warned. "It protects us to a point."
Mr. Cross suggests using different passwords for different accounts. He also suggests using more secure "passphrases" rather than simple passwords. Passphrases are longer, so it's harder to crack. But the words in the passphrase should not be related to each other.
"Really today, people need to stop thinking about passwords and start thinking about passphrases," he said.
Other practices to frustrate hackers, analysts say, include regularly downloading security update "patches"; disconnecting from the Internet when your device is not in use; always being aware of the dangers of sharing files; and not opening emails from unknown or suspicious sources.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Tim Devaney is a national reporter who covers business and international trade for The Washington Times. Previously, he worked for the Detroit News, Grand Rapids Press, Portland Press Herald and Bangor Daily News. Tim can be reached at email@example.com.
- Dysfunction, disarray at Homeland Security management cited in IG's report
- GM's Barra to be first woman to run top American carmaker
- Treasury sells last shares in 'Government Motors'
- U.S. businesses reach out quickly to partners in Iran
- General Motors ending Chevrolet sales in Europe to focus on Opel and Vauxhall
Latest Blog Entries
TWT Video Picks
The subsidies are a hit with patients who don't exist
- 'We're coming for you, Barack Obama': Top U.S. official discloses threat from ISIL terrorists
- Algerian airplane goes missing over Mali: 'Emergency plan' launched
- Despite rhetoric, gun prosecutions plummet under Obama
- House task force to recommend National Guard on border, faster deportations
- Obama orders Pentagon advisers to Ukraine
- Obama says public not familiar enough with issues
- CROWLEY: The good-time president
- Hamas rejects Kerry's call for cease-fire; Hezbollah in Syria could join fight against Israel
- NAPOLITANO: What if our democracy is a fraud?
- EDITORIAL: Poor Hillary, rock-star wannabe
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq