{"id":18889,"date":"2017-10-11T06:04:20","date_gmt":"2017-10-11T10:04:20","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=18889"},"modified":"2019-11-15T22:41:02","modified_gmt":"2019-11-15T11:41:02","slug":"mr-robot-safety-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/mr-robot-safety-tips\/18889\/","title":{"rendered":"What Mr. Robot can teach us all about security"},"content":{"rendered":"<p>Mr. Robot has won the hearts and captured the minds of a lot of people around the globe by showing a captivating view of the information security world \u2014 and how vulnerable we all are to cyberattacks. When you see how main character Elliot and the hacker group fsociety hack whole corporations, never mind just regular accounts, it starts to seem like nowhere and nothing is safe.<\/p>\n<p>But if you look more closely, you\u2019ll notice most of the hackers\u2019 victims in the series exposed themselves to danger by their own ignorance or carelessness. In this post, we look at where they went wrong and come up with some rules to follow if you never want to contemplate a video featuring a Guy Fawkes mask obscuring the face of a person who has your data.<\/p>\n<p>Why are we using Mr. Robot as an example? Mainly because most security experts think the hacking methods shown in this series are very true to life.<\/p>\n<h2>Use strong passwords<\/h2>\n<p>Elliot hacks the accounts and gets access to the information of both acquaintances and strangers with very little effort \u2014 by using <a href=\"https:\/\/securelist.com\/threats\/brute-force-glossary\/\" target=\"_blank\" rel=\"noopener\">brute force<\/a>, whereby a program tries all possible combinations of characters until it finds a match, or using a simpler version of it called a <a href=\"https:\/\/securelist.com\/threats\/dictionary-attack-glossary\/\" target=\"_blank\" rel=\"noopener\">dictionary attack<\/a>. The more popular and simpler the combination of characters and words, the faster the program will discover it.<\/p>\n<p style=\"text-align:center\"><strong>WARNING! SEASON 1 SPOILERS AHEAD!<\/strong><\/p>\n<p>The pilot episode finds Elliot hacking the account of his therapist, Krista, whose password \u2014 Dylan_2791 \u2014 is her favorite singer and her year of birth with the digits reversed. Elliot has to know just a little bit about a person or use public information from their social media.<\/p>\n<p>He hacks the accounts of his colleague Ollie Parker, whose password is \u201c123456Seven\u201d (Ollie works in a cybersecurity company, so his choice of password is rather revealing). After hacking one account, Elliot easily gains access to all the others \u2014 you know that everything on the Internet is interconnected, right? To make sure this doesn\u2019t happen to you, <a href=\"https:\/\/www.kaspersky.com\/blog\/passwords-ten-ways\/\" target=\"_blank\" rel=\"noopener nofollow\">use passwords properly<\/a>.<\/p>\n<h3>Don\u2019t trust other people with your devices<\/h3>\n<p>You wouldn\u2019t lend your phone to a stranger in a hoodie, but more generally, never give anyone else access to your digital devices. In that same episode, Elliot asks Krista\u2019s boyfriend if he can use his phone to make a call. He then calls himself, thus getting the phone number \u2014 and ultimately, access to a boatload of information about the guy.<\/p>\n<p>In episode three, Tyrell Wellick, chief technology officer for E Corp, gets root access to an employee\u2019s Android phone (control of the system, actually) by adding himself as a privileged user by means of an app with a hidden icon when the employee leaves the room for just a few minutes. The takeaway here: Don\u2019t leave your phone or computer unattended, check which programs are installed on those devices, and regularly scan the system using a security solution that detects hidden software. And, of course, make sure to set passwords to unlock all your devices.<\/p>\n<h3>Keep private information to yourself<\/h3>\n<p>Don\u2019t give anyone your confidential information, especially over the phone. After getting the phone number of a man previously mostly unknown to him, Elliot uses <a href=\"https:\/\/securelist.com\/threats\/social-engineering-glossary\/\" target=\"_blank\" rel=\"noopener\">social engineering<\/a>: Posing as a bank employee, he calls the man and tells him there is a threat to the security of his account. He requests certain specific information \u2014 allegedly to solve the problem \u2014 such as the answers to his security questions.<\/p>\n<p>By the end of the conversation, the man starts getting suspicious, but by then Elliot already has enough information to add likely words to the password-hacking program\u2019s glossary and hack the account within minutes using a dictionary attack. We\u2019ve already talked about password security, but also don\u2019t forget that you should never give important information \u2014 for example, by answering security questions \u2014 over the phone to any \u201cbank employees\u201d who might call you.<\/p>\n<h3>Don\u2019t insert unknown removable media into a computer<\/h3>\n<p>Elliot thinks his colleague Ollie is stupid \u2014 not without reason; he\u2019s lax with basic cybersecurity. After choosing a simple password (remember, use strong passwords), he commits a more serious error: He inserts a disc, supposedly a music CD from a street rapper, into a computer.<\/p>\n<p>The rapper is actually a member of a hacker group, and software installed from the disc allows the hackers to start tracking Ollie through his webcam and take control of the system. That includes access to personal files, which gives the intruders fodder to blackmail him.<\/p>\n<p>Here\u2019s another example: In episode six, Elliot tosses a flash drive into a prison parking lot, where a guard picks it up and inserts it into a work computer. Luckily for the guard, the computer\u2019s antivirus prevents it from launching the malware on the flash drive.<\/p>\n<h3>Be careful about what you post on the Internet<\/h3>\n<p>Anyone can see all of the things you share online and use them against you. In episode two, Elliot turns drug traffickers over to the police, and their own tweets are used as evidence against them.<\/p>\n<p>Overall, Mr. Robot is an excellent fictional illustration of why you need to know cybersecurity basics in real life. At least in those terms, it\u2019s both realistic and informative, showing the real challenges of protecting your data and private life.<\/p>\n<p>By the way, Season 3 is just about to start. Enjoy the show!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello friend. Do you know how to protect yourself? <\/p>\n","protected":false},"author":2455,"featured_media":18890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1853,191,78,2659,187,43,97],"class_list":{"0":"post-18889","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-data","10":"tag-hackers","11":"tag-mr-robot","12":"tag-passwords","13":"tag-privacy","14":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mr-robot-safety-tips\/18889\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mr-robot-safety-tips\/11537\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mr-robot-safety-tips\/12985\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mr-robot-safety-tips\/11876\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mr-robot-safety-tips\/11421\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mr-robot-safety-tips\/14562\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mr-robot-safety-tips\/14316\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mr-robot-safety-tips\/18980\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mr-robot-safety-tips\/4343\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mr-robot-safety-tips\/19713\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mr-robot-safety-tips\/9638\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mr-robot-safety-tips\/10093\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mr-robot-safety-tips\/8314\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mr-robot-safety-tips\/14949\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mr-robot-safety-tips\/8868\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mr-robot-safety-tips\/18435\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mr-robot-safety-tips\/18880\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/security-2\/","name":"security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/18889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=18889"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/18889\/revisions"}],"predecessor-version":[{"id":24194,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/18889\/revisions\/24194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/18890"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=18889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=18889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=18889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}