Skip to main content
  • Media
    • Solutions >
    • Products
    • CRN Media Kit >
    • Brand Awareness
    • CRN Online Display Ads
    • CRN Smartphone
    • CRN Magazine
    • CRN CloseUp
    • ChannelCasts
    • Partner Recruitment
    • ChannelCasts
    • Content Syndication
    • CRN360
    • CRN Online Display Ads
    • Thought Leadership
    • CRN360
    • ChannelCasts
    • CRN CloseUp
    • CRN Snapshot
    • Custom Microsites
    • Partner Enablement
    • Learning Centers
    • Custom Microsites
    • Virtual Partner Conferences
    • Virtual Training Centers
    • ChannelCasts
    • Partner Communications
    • Account Based Marketing
    • CRN Newsletter Sponsorships
    • CRN Online Display Ads
    • Solutions
    • Products >
    • CRN Media Kit >
    • Digital Advertising
    • CRN Online Display Ads
    • CRN Newsletter Sponsorships
    • WOTC Online
    • CRN Snapshot
    • CRN Smartphone
    • Print
    • CRN Magazine
    • Custom Print Products
    • Native Advertising
    • CRN360
    • CRN CloseUp
    • Learning Centers
    • Custom Microsites
    • Online Events
    • Virtual Partner Conferences
    • Virtual Training Centers
    • ChannelCasts
    • Inbound Marketing
    • Content Marketing Services
    • Content Syndication
    • Social Media
    • Email Marketing
    • CRN Newsletter Sponsorships
    • Account-Based Marketing
  • Events
    • Best of Breed (BoB) Events
      • Best of Breed Conference 2022
      • Best of Breed Virtual 2022
    • Midsize Enterprise Summits
      • MES IT Security 2023
      • MES Spring 2023
      • MES Fall 2022
      • MES IT Leadership Network
    • NexGen 2022
      • NexGen 2022
      • NexGen Security Workshop
    • Women of the Channel
      • Women of the Channel West 2022
      • Women of the Channel East 2022
      • WOTC Leadership Network
    • XChange Events
      • XChange Security 2022
      • XChange August 2022
        • Inclusive Leadership Network Workshop 2022
      • Inclusive Leadership Network Workshop 2022
      • XChange March 2023
    • Inclusive Leadership Network Workshop 2022
    • Custom Events
    • Health and Safety
    • 2022 Events Calendar (.PDF)
    • Past Events
  • Services
    • Audienz
    • IPED Consulting
      • Channel Leadership Forum
      • Channel Masters
      • Channelytics
      • Education
    • Partner Demand Services
      • Solution Providers
      • Technology Suppliers
  • Company
    • About
    • Management
    • Careers
    • Contact
  • Media
  • Events
    • Midsize Enterprise Summits
      • Midsize Enterprise Summit Spring
      • Midsize Enterprise Summit Fall
        • MES IT Security Workshop
    • Women of the Channel Events
      • Women of the Channel West
      • Women of the Channel Europe
      • Women of the Channel East
      • Women of the Channel Singapore
      • 2019 WOTC Calendar
    • BOB 2019
    • NexGen 2019
    • IoTConnex Virtual Event
    • Custom Events
    • 2019 Events Calendar (.PDF)
    • 2020 Events Calendar (.PDF)
    • 2019 Past Events
  • Insights
    • IPED Consulting
    • Channelytics
    • Channel Masters
    • Channel Leadership Forum
    • Education
  • Marketing
    • PartnerDemand Services
    • Marketing Automation
    • Partner Experience Platform (PXP)
  • Company
    • About
    • Management
    • Careers
    • Newsroom
    • Contact
  • Resources
    • Partner's Journey
    • Newsletter
    • The Partner Experience
    • Newsletters
  • Blog
    • Channel Advocate
 

Search form

Blog

Home / Blog / Channel Chatter / Cybersecurity The Battle For Our Connected World
08 Aug

Cybersecurity: The Battle for Our Connected World

Carolyn Herr 0 Comment(s)

Marc Goodman - NGC 2016 Speaker

NexGen Cloud Conference & Expo is beyond excited to have Marc Goodman, one of the world’s leading authorities on global security, delivering the keynote address on December 7th in Anaheim, CA.

You, like most, probably have various online accounts linked to one another in a self-referential web of purported digital trust: the same credit card number on an Apple profile and an Amazon account; an iCloud e-mail address that points back to Gmail. Each has information in common, including login credentials, credit card numbers, and passwords with all the data connected back to you. And as Marc Goodman explains, all or most of the information needed to destroy your digital life is readily available online to anybody who is the least bit devious or creative.

To illustrate this point, read on for an excerpt from Chapter 1 of Goodman’s latest bestseller, Future Crimes.

"Mat Honan’s life looked pretty good on-screen: in one tab of his browser were pictures of his new baby girl; in another streamed the tweets from his thousands of Twitter followers. As a reporter for Wired magazine in San Francisco, he was living an urbane and connected life and was as up-to-date on technology as anyone. Still, he had no idea his entire digital world could be erased in just a few keystrokes. Then, one August day, it was. His photographs, e-mails, and much more all fell into the hands of a hacker. Stolen in just minutes by a teenager halfway around the world. Honan was an easy target. We all are.

Honan recalls the afternoon when everything fell apart. He was playing on the floor with his infant daughter when suddenly his iPhone powered down. Perhaps the battery had died. He was expecting an important call, so he plugged the phone into the outlet and rebooted. Rather than the usual start-up screen and apps, he saw a large white Apple logo and a multilingual welcome screen inviting him to set up his new phone. How odd.

Honan wasn’t especially worried: he backed up his iPhone every night. His next step was perfectly obvious—log in to iCloud and restore the phone and its data. Upon logging in to his Apple account, he was informed that his password, the one he was sure was correct, had been deemed wrong by the iCloud gods. Honan, an astute reporter for the world’s preeminent technology magazine, had yet another trick up his sleeve. He would merely connect the iPhone to his laptop and restore his data from the hard drive on his local computer. What happened next made his heart sink.

As Honan powered up his Mac, he was greeted with a message from Apple’s calendar program advising him his Gmail password was incorrect. Immediately thereafter, the face of his laptop—its beautiful screen— turned ashen gray and quit, as if it had died. The only thing visible on the screen was a prompt: please enter your four-digit password. Honan knew he had never set a password.
Honan ultimately learned that a hacker had gained access to his iCloud account, then used Apple’s handy “find my phone” feature to locate all of the electronic devices in Honan’s world. One by one, they were nuked. The hacker issued the “remote wipe” command, thereby erasing all of the data Honan had spent a lifetime accumulating. The first to fall was his iPhone, then his iPad. Last, but certainly not least, was his MacBook. In an instant, all of his data, including every baby picture he had taken during his daughter’s first year of life, were destroyed. Gone too were the priceless photo- graphic memories of his relatives who had long since died, vanquished into the ether by parties unknown.

Next to be obliterated was Honan’s Google account. In the blink of an eye, the eight years of carefully curated Gmail messages were lost. Work conversations, notes, reminders, and memories wiped away with a click of a mouse. Finally, the hacker turned his intention to his ultimate target: Honan’s Twitter handle, @Mat. Not only was the account taken over, but the attacker used it to send racist and homophobic rants in Honan’s name to his thousands of followers.

In the aftermath of the online onslaught, Honan used his skills as an investigative reporter to piece together what had happened. He phoned Apple tech support in an effort to reclaim his iCloud account. After more than ninety minutes on the phone, Honan learned that “he” had just called thirty minutes prior to request his password be reset. As it turns out, the only information anybody needed to change Honan’s password was his billing address and the last four digits of his credit card number. Honan’s address was readily available on the Whois Internet domain record he had created when he built his personal Web site. Even if it hadn’t been, dozens of online services such as WhitePages.com and Spokeo would have provided it for free.

To ascertain the last four digits of Honan’s credit card, the hacker guessed that Honan (like most of us) had an account on Amazon.com. He was correct. Armed with Honan’s full name and his e-mail and mailing addresses, the culprit contacted Amazon and successfully manipulated a customer service rep so as to gain access to the required last four credit card digits. Those simple steps and nothing more turned Honan’s life upside down. Although it didn’t happen in this case, the hacker could have just as easily used the very same information to access and pilfer Honan’s online bank and brokerage accounts.

The teenager who eventually came forward to take credit for the attack—Phobia, as he was known in hacking circles—claimed he was out to expose the vast security vulnerabilities of the Internet services we’ve come to rely on every day. Point made. Honan created a new Twitter account to communicate with his attacker. Phobia, using the @Mat account, agreed to follow Honan’s new account, and now the two could direct message each other. Honan asked Phobia the single question that was burning on his mind: Why? Why would you do this to me? As it turns out, the near decade of lost data and memories was merely collateral damage.

Phobia’s reply was chilling: “I honestly didn’t have any heat towards you . . . I just liked your [Twitter] username.” That was it. That’s all it was ever about—a prized three-letter Twitter handle. A hacker thousands of miles away liked it and simply wanted it for himself.

The thought that somebody with no “heat” toward you can obliterate your digital life in a few keystrokes is absurd. When Honan’s story appeared on the cover of Wired in December 2012, it garnered considerable attention . . . for a minute or two. A debate on how to better secure our everyday technologies ensued but, like so many Internet discussions, ultimately flamed out. Precious little has changed since Honan’s trials and tribulations. We are still every bit as vulnerable as Honan was then—and even more so as we ratchet up our dependency on hackable mobile and cloud-based applications."

Marc Goodman will be presenting live at NexGen Cloud on Wednesday, December 7th in Anaheim, CA.  For more information and to reserve your seat, visit www.nexgencloudcon.com

Excerpted from Future Crimes by Marc Goodman. Copyright © 2015 by Marc Goodman. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.

 Share this post

Carolyn Herr's picture

Posted by Carolyn Herr

Recent comments

  • IOT Success 4 years 6 months ago
  • digital marketing plan 4 years 7 months ago
  • UNDERSTANDING THE SCALE OF THE PARTNER’S JOURNEY VERSUS THE BUYE 5 years 1 month ago

Categories

  • Business Transformation 4
  • Channel Advocate 21
  • Channel Chatter 1
  • Channel Marketing 13
  • Channel Strategy 2
  • Channel Voices 5
  • Partner Programs 2

Tag Cloud

management midsize CIO HPE Security big data hyperconvergence SimpliVity career development midmarket IT cybersecurity cloud digital transformation Midmarket communications Scale Computing it leader IT Midsize Enterprise Summit gartner IT security middle market Iot leadership BI MES fall 2017 IT leadership midsize enterprise MES MES spring 2018

Blog

  • February 2018 (1)
  • January 2018 (1)
  • December 2017 (1)
  • November 2017 (1)
  • October 2017 (2)
  • September 2017 (1)
  • August 2017 (1)
  • July 2017 (1)
  • June 2017 (4)
  • April 2017 (2)
  • March 2017 (2)
  • February 2017 (2)
  • January 2017 (2)
  • December 2016 (1)
  • November 2016 (2)
  • October 2016 (2)
  • September 2016 (3)
  • August 2016 (3)
  • July 2016 (2)
  • June 2016 (2)
  • May 2016 (2)
  • April 2016 (3)
  • March 2016 (1)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (1)
  • October 2015 (3)

Blog

  • Recent
  • Popular
  • Spectre and Meltdown Spotlight Vendor Opportunity
  • Spectre, Meltdown Issues Challenge Vendors To Keep The Channel Educated, Informed
  • Artificial Intelligence Is Getting Real: It's Time To Get Ready
  • Spectre and Meltdown Spotlight Vendor Opportunity
  • Spectre, Meltdown Issues Challenge Vendors To Keep The Channel Educated, Informed
  • Artificial Intelligence Is Getting Real: It's Time To Get Ready
The Channel Company Share & Follow

© 2022 The Channel Company           Privacy Policy  |  Terms of Service  |  Contact  |  Email Preferences

x
Email Preference Center

Thank you for your interest in updating your email preferences at The Channel Company. In order to provide you with the most appropriate listing of available communications, please select the option below which best describes you/your business:

Technology
Vendor
Solution
Provider
Technology
Buyer