I watched the video and I think there is some sloppy journalism and scaremongering going on there. It really brings steam out of my ears and nose with anger.There's actually a lot of factors involved in that
In return for this honesty the expert gets reprimanded and the dumbing down sets in"and the wireless is on their wirelss.
The expert assumes that he has access to the neighbours wireless. Assuming the neighbours did not give him access he would need to use an ARP cache poisoning attack. CIS will protect from that (it needs to be enabled though)It may sometime take less than 5 minutes sometimes to get in.
If the ARP cache poisoning attack had succeeded you would still need to crack the encryption. The outdated and now depricated WEP encryption can be hacked that quickly. Most people are no longer using that. WPA/WPA2 takes much much longer.there are ports open that allow that to happen
That is only if sharing files and folders over the local network is enabled. Otherwise there will not be an open port when using CIS.ports are like a door, when you open that door anybody can come in just as long as you know how to get there.
Standard ports are related to a specific program or Windows service and hacktools will try to target vulnerabilities for those. Only when unpatched vulnerabilities exists hacktools can abuse the entrance an open port provides. That's why it is important to have your OS and programs up to date. That way you will be sure there as little vulnerable programs or services as possible. On top of that the Buffer Overflow protection of CIS will catch almost all of the unpatched vulnerabilities.We may not be secure as we think we are,.. particular with wireless...
That's the scare mongering punch line Dr Phil wanted to makeIf somebody has access to your local network it is really easy
The expert restated that
assumption. Remember how he started with "There's actually a lot of factors involved in that". Let's give him the benefit of the doubt that he is now trying to tell a more complete story after he has been run over by Dr. Phil and his desire to make a scaremongering punch line
In the introduction the expert states the following:
- There is a new school of thought in security.We used spend all our money and everything on trying to prevent people from coming in.When looking with the Comodo, and other HIPS based firewalls, perspective. With D+ and sandbox preventing malware from entering the system in the first place is what sets these products apart from the classical solution with AV program and network only firewall.
- That's no longer the case. Now it's about monitoring how people have come in, how fast you can detect people and how to get rid off them from coming in.Not something Comodo believes in. Prevention is what Comodo brings; malware is not infecting the system. Remember that when infected with an information seeking malware all the information it is after is send in the first 2-3 minutes after infection. We don't want it in and CIS does a very good job preventing it entering in the first palce
And before I forget. There is another very simple solution everybody can take. Put a something over the lens when not using the camera.
I chose to respond to quotes from the show and that may scatter the information. I hope my comments help to understand that things are not as simple as presented in the show, that it takes more effort than suggested to break in and enter and that CIS will protect you from getting infected in the first place.