Insights For Success

Strategy, Innovation, Leadership and Security

Research

5 Interview Mistakes to Avoid: Tips for Acing Your Next Job Interview

GeneralEdward Kiledjian

Interviews can be intimidating, and it's easy to make mistakes, especially if you're feeling nervous or unprepared. However, there are certain mistakes that people tend to make more frequently than others. Here are five common mistakes that people make during interviews, along with tips on how to avoid them:

  1. Not researching the company beforehand: It's important to do your homework before an interview to show the interviewer that you are genuinely interested in the company and its mission. Research the company's history, products or services, and company culture. This will also help you to ask informed questions during the interview.

  2. Not dressing appropriately: Make sure to dress appropriately for the job and the company culture. If you're unsure what to wear, it's better to err on being too formal rather than too casual.

  3. Not being on time: Arriving late to an interview is a surefire way to make a wrong impression. Make sure to allow extra time for traffic or other unexpected delays. If you do arrive late, be honest and apologize.

  4. Failing to prepare for common interview questions: Certain questions come up in almost every interview, such as "Tell me about yourself" and "Why do you want to work for this company?" Make sure to practice your responses to these questions beforehand to answer them confidently and clearly.

  5. Not asking questions: Asking questions shows that you are engaged and interested in the position and the company. Come prepared with a list of questions to ask the interviewer, such as about the company's goals and objectives or the day-to-day responsibilities of the role.

By avoiding these common mistakes, you can increase your chances of making a positive impression during an interview and increase your chances of getting the job. Best of luck on your next interview!

Keywords: job interview, mistakes, preparation, research, attire, punctuality, common questions, questions to ask

Fun with Shodan and IOT

Edward Kiledjian

Read this related article: Find phishing and malware with a simple search

Search engines have become a favourite starting point for threat actors, so it should also be your starting point. Beyond Google, there are a bunch of specialized search engines that are powerful and scary. This article talks a bit about Shodan. Think of this article as a gentle introduction.

What is shodan

Shodan is often called the world's most dangerous search engine. Shodan attempts to catalogue metadata about its targets and its targets are often Internet of Things (IOT) devices. Hackers and security researches use Shodan daily to find vulnerable webcams, open traffic light systems, SCADA in manufacturing plants and much more.

I'm going to assume you have a free Shodan account.

Browse the categories

If you visit the Shodan Explore section, you can find all kinds of interesting systems listed.

Unprotected webcam

For this example, I searched for the Axis 212 webcam which is known to have many vulnerabilities and a known default password.

As an example, the webcam I highlighted seems to be in a daycare facility and isn't even password protected.

I've blurred out the children and teacher.

Some are unprotected. Some have kept their default passwords (there are lots of default password lists like this one). Obviously many of these cameras are made by a handful of manufacturers in China and are never updated. Once you find a vulnerability on one model it is often workable on dozens of others.

Routers

You can search Shodan for common router brands like Belkin, D-Link, Netgear, etc and then try to log in using the default admin passwords. Above is an example of a Linksys router exposed to the internet without a password. Others are exposed with the default password.

Intel AMT Exposed to the internet

There is a major Intel AMT vulnerability but Shodan shows that 4,647 devices with AMT (on July 22) were connected to the internet.

If you search for "http intel active management" in Shodan, you will get a listing of these devices.

Other searches you can perform

Netgear device with port 80 open to the internet

Bitcoin servers

You can even use the Shodan ShipTracker dashboard to track realtime ship

ShipTracker is harmless on its own, but combined with data available from other sources and the knowledge that many ship systems use default passwords and it is a disaster waiting to happen.

There is a known vulnerability that allows a threat actor to steal or modify information from a Memcached server. This vulnerability was used to target GitHub with a massive DDoS attack. Not all Memcached servers are vulnerable ( I won't show you how to find the vulnerable ones) but how would you search for Memcached servers on the net? The answer is with a Shodan query.

 

Conclusion

Obviously, this is just the tip of the iceberg. A true threat intel specialist will be able to automate Shodan queries and then combine them with known vulnerabilities, exploits or default credentials. I am hoping this article created a bit of interest in you to learn more. 

For this article, I only chose examples that were exposed to the internet and were not password protected. Be careful as laws differ around the world. In some countries even testing default passwords could be considered "hacking". 

Snapchat usage grows among teens

GeneralEdward Kiledjian

Pew Research publishes interesting surveys, and they recently shared results about what teens use most. Contrary to public opinion, Snapchat is still king with teens, followed by Youtube. Facebook usage amongst teens is down 71% compared to the 2014-2015 Pew report. 

  • 45% of teens admitted to being online "almost constantly."
  • 24% of teens admitted to being online "several times a day."

Girls are more likely to be "almost constantly" online (50%) compared to boys (39%). 

Provided by Pew Research

Instagram is still going strong and 72% of teens now use it (up from 52% in 2015). 70% of teens use Snapchat (up from 41% in 2015). 

Most platforms have an equal amount of creation and consumption except Youtube, where the most significant proportion is consumption. 

You will notice that Snapchat and Instagram have higher usage than Facebook. Interestingly you will note:

  • Instagram/Snapchat are designed to post pictures, whereas Facebook supports photos but videos, links, text updates, etc.
  • Instagram/Snapchat are designed to be used on a smartphone, whereas Facebook is multiplatform. This is confirmed when the stats show that 95% of teens have or have access to a smartphone (88% of teens have access to a computer at home).

31% of teens believe social media has a positive impact on their lives while 24% think it has a negative one. 45% believe it has a neutral effect on their lives. 

Cheap clean water from a book

GeneralEdward Kiledjian

Living in Canada, I often take clean drinking water for granted. During my many travels to Africa, it became abundantly clear that fresh, clean drinking water was a global problem and I'm happy to see organizations working hard to solve this epidemic. 

A team of university researchers have created the Drinkable Book. The book teaches readers about how to purify water and the actual pages turn into usable water filters capable of removing 99.9% of harmful bacteria (cholera, typhoid, E.Coli, etc).

The best part of the solution is that it costs pennies per page (which is far cheaper than most other options). Each filter is usable for 30 days and therefore a single book can provide this life nourishing clean water for 4 years.

Clench your hand to improve memory

StrategyEdward Kiledjian
A study published in journal PLOS One indicates that clenching your right hand (aka making a fist) may help improve your memory. Later clenching your left hand will help remember that memory.

"The findings suggest that some simple body movements -- by temporarily changing the way the brain functions -- can improve memory," Ruth Propper, researcher, Montclair State University.

Additional research will have to be conducted to determine if this action can help with other functions.