Skip to main content

Hacker honeypot could help secure networks everywhere

honeypot network security hack canary2
Image used with permission by copyright holder
One of the biggest problems with the major hacks that hit firms like Sony and Target last year is that it often takes a while for them to be detected. That gives those responsible plenty of time to use their position within the network to sniff or phish out more credentials, which can move them higher up the chain to where the really valuable data is. But what if a trap was set for intrepid hackers that tipped off the admins to their presence?

That’s the idea being proposed by South African digital security company Thinkst. It wants to add a honeypot to enterprise networks that represents too valuable a target for hackers to pass up. When they attempt to read its contents or bypass its lax security, network admins and potentially even the authorities, can be alerted.

Related: Do theaters still matter? Amazon knows they do, even after The Interview

Of course this isn’t some brand new technique that has just been thought up. The problem with a traditional honeypot though is it requires regular management and a lot of technical know-how to make it consistently tempting to hackers, without looking too good to be true. Where Thinkst comes in, is that it’s created a piece of hardware that can sit on a network and reliably report intrusions without much maintenance.

The piece of kit is called Canary, after the poor avians that were taken into coal mines back in the day. Its simple set up involves the pressing of a single button, after which an admin can connect to it over Bluetooth to adjust how the system appears on the network, with several OS options. They can also choose to add tempting looking files that sound like they’re related to valuable data.

If any are ever accessed, an alert is sent out.

Installation of two honeypots and their annual management from Thinkst costs $5,000. While unlikely to be perfect, they offer what sounds like a solid solution for use in augmenting other security features.

Jon Martindale
Jon Martindale is the Evergreen Coordinator for Computing, overseeing a team of writers addressing all the latest how to…
Google just made this vital Gmail security tool completely free
The top corner of Gmail on a laptop screen.

Hackers are constantly trying to break into large websites to steal user databases, and it’s not entirely unlikely that your own login details have been leaked at some point in the past. In cases like that, upgrading your password is vital, but how can you do that if you don’t even know your data has been hacked?

Well, Google thinks it has the answer because it has just announced that it will roll out dark web monitoring reports to every Gmail user in the U.S. This handy feature was previously limited to paid Google One subscribers, but the company revealed at its Google I/O event that it will now be available to everyone, free of charge.

Read more
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more