SHARE
Facebook X Pinterest WhatsApp

Security Tips From <i>Anatomy of a Hack</i>

Written By
thumbnail
David Needle
David Needle
Jan 3, 2006

As if there weren’t enough problems with the recent onset of new virus and spyware attacks. Mobile workers face an additional set of problems all their own.

Fiberlink Communications has released a free on demand video at its Web site that details what it calls ongoing security risks and vulnerabilities that threaten mobile workers.

The Anatomy of a Hack video shows some of the techniques, skills and tools used by hackers to exploit vulnerabilities on mobile, notebook computers in order to gain access to corporate systems.

The Blue Bell, PA-based enterprise security firm said attackers are focusing on poorly protected applications, such as the Kazaa file-sharing program, Windows Media Player, and even the Firefox browser, even though it’s generally considered safer than Internet Explorer. Their intent, the firm said, is to grab information that can be used to gain access to corporate systems.

Although some of the video is spent touting its own Extend 360 security solution, the 36-minute Fiberlink video mainly details how an intruder can surreptitiously take over another person’s notebook with just a little knowledge and certain software tools.

Once in the system, passwords and access to other corporate data are an easy next step. The intruder can also shut down an anti-spyware’s ability to detect a break in. An additional free best practices report, also at Fiberlink’s Web site, details preventative steps organizations can take.

In an early part of the video, Fiberlink’s Chris Rogers’ introduction is suddenly interrupted by voices coming out of his computer. It’s the start of the demo by Dan Hoffman, the company’s mobile workforce security expert, who has hacked into Roger’s system and launched a text to speech application.

Hoffman explains that someone who wants to gain access to another person’s notebook can do it very easily at a coffee shop or other Wi-Fi hotspot. “If I know my IP address, I can pretty well figure out everyone else’s IP address on the network,” says Hoffman.

Hoffman does emphasize that an enterprise-grade, personal firewall can protect mobile workers from these kind of attacks. Much as a burglar might pass by the house with a strong alarm and protection systems, he says “hackers prefer the path of least resistance.”


Adapted from Internetnews.com.





Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!

Recommended for you...

Networking With Address Reservations
Joseph Moran
Aug 15, 2021
5 Open Source Network Security Tools SMBs Should Consider
Cynthia Harvey
Dec 21, 2016
New Spiceworks Apps Solve IT Networking Mysteries
Spiceworks Expands Its Free Toolset with Networking Tools
Small Business Computing Logo

Small Business Computing addresses the technology needs of small businesses, which are defined as businesses with fewer than 500 employees and/or less than $7 million in annual sales. To address the needs of these small businesses, Small Business Computing offers detailed coverage of cost-effective technology solutions, including lists of top vendors, product comparisons, and how-to guides that offer specific tools to help solve issues.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.