Blog Posts Tagged with "SecurID"

69dafe8b58066478aea48f3d0f384820

China Linked to RSA and Defense Contractor Breaches

June 07, 2011 Added by:Headlines

"If it's any kind of military espionage, military adversaries are going to be high on the list. The question then is who in China--is it government agents or independent contractors selling to the Chinese government?" asked Veracode's Chris Wysopal...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

RSA Tokens, Lockheed Martin, APT, OH MY!

June 03, 2011 Added by:Infosec Island Admin

I can hear certain people in the community now groaning at the use of the APT acronym but let me put it to you all straight. If there was a hack on LMCO, maker of the JSF and numerous black type projects to boot, then it was likely China or another nation state’s actors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

RSA SecurID Breach Spreads to L3 and Northrop

June 02, 2011 Added by:Headlines

"We're seeing are targeted attacks against the defense industry. The RSA attack was very sophisticated, probably executed by people who had plans for what to do with the keys. Think about the data that those companies have. They have our nation's military technology secrets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lockheed Systems on Lock Down After Cyber Attack

June 01, 2011 Added by:Headlines

“As a result of the swift and deliberate actions taken to protect the network and increase IT security, our systems remain secure. No customer, program or employee personal data has been compromised...”

Comments  (0)

43559f6a0465c923b496a260211995c0

SecurID: No Need for the Seed!

May 30, 2011 Added by:Pascal Longpre

An attacker who has installed the target's VPN client and configuration patiently waits for the user to authenticate. When the user begins to enter its 6 digit SecurID password, the Trojan captures the characters entered and immediately sends them through SSL to the attacker's machine...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

RSA's SecurID Hack Leads to Lockheed Network Disruption

May 27, 2011 Added by:Headlines

"Whoever hacked the RSA network got the algorithm for the current tokens and then managed to get a key-logger installed on one or more computers used to access the intranet at this company. With those two pieces of information they were then able to get access to the internal network..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Adobe Flash Zero Day Bug Central to RSA Hack

April 04, 2011 Added by:Headlines

Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...

Comments  (0)

Aecf1189abe745df32ec68f5864649a6

RSA Breach Long Term Impact for Security Professionals

March 30, 2011 Added by:Nick Owen

With the explosion of cloud-based services, organizations are relying on the security of their vendor's vendors. What lessons can we learn from the RSA and Comodo episodes, and how should it impact decision making? Here are some longer-term items to think about...

Comments  (0)

C6b9a422851928980389afe33c48e213

The RSA Hack: Don't Overreact

March 27, 2011 Added by:Eric Cissorsky

When IT Security panics, it causes ripple effects throughout the enterprise. In the event this turns out to be a serious breach, you will be credited with keeping your cool and weathering the storm. Overreacting to any security incident can undermine your department's credibility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EMC's Security Division Hacked

March 18, 2011 Added by:Headlines

"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."

Comments  (2)

Page « < 1 - 2 > »