Blog Posts Tagged with "SecurID"

69dafe8b58066478aea48f3d0f384820

RSA: Claims of SecurID 800 Token Crack are Whack

June 27, 2012 Added by:Headlines

"RSA has received many inquiries, press pickups, blog entries, and tweets regarding an alleged crack by researchers of the RSA SecurID 800 authenticator... an alarming claim and should rightly concern customers who have deployed the RSA SecurID 800 authenticator. The only problem is that it’s not true..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Crack RSA SecurID Tokens, Extract Keys

June 25, 2012 Added by:Headlines

"[These products are] designed specifically to deal with the case where somebody gets physical access to it or takes control of a computer that has access to it... Here, if the malware is very smart, it can actually extract the keys out of the token.That's why it's dangerous"...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Did the 2006 Symantec Breach Expose RSA's SecurID?

February 10, 2012 Added by:Kevin McAleavey

The Symantec leak could pose a risk to RSA's SecurID. Examination of the source code for PCAnywhere turned up something disturbing - numerous header files and several libraries belonging to RSA, and SecurID code is part of the exposed PCAnywhere product source code...

Comments  (23)

0ff0a77035f9569943049ed3e980bb0d

The Proliferation of Cyber Janitors

January 20, 2012 Added by:

What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

RSA Hack Analysis: Windows DEP Not Enabled

December 06, 2011 Added by:Headlines

New analysis from researchers at Qualys suggests that the success of the attack may have hinged on RSA's use of the older Windows XP operating system and the failure to enable the DEP (data execution prevention) security option...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mikko Hypponen Warns of Adobe Reader Threats

November 11, 2011 Added by:Headlines

F-Secure's Mikko Hypponen urged organizations to reconsider the continued use of Adobe Reader given the tendency for attackers to exploit the application's frequent vulnerabilities. "These attacks are not against PDF - these attacks are against Adobe Reader," said Hypponen...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

RSA CEO: There is Too Much Security Awareness

October 05, 2011 Added by:Headlines

"Not a day goes by that I do not see some indication of a cyberattack in the press... The problem is that when consumers see time and time again nothing happens to correct it, they throw up their hands. There's no amount of consumer education to make them smart enough to resist attacks..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

RSA Attack: All That Glitters Isn't China

September 07, 2011 Added by:J. Oquendo

RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Simple Email Message That Brought Down RSA

August 26, 2011 Added by:Headlines

"The e-mail was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached Excel file. It was a spreadsheet titled 2011 Recruitment plan.xls," said an April 1 blog posting by RSA's Head of New Technologies, Uri Rivner...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Chertoff Warns of Threat from Small Hacker Collectives

June 21, 2011 Added by:Headlines

“We can have networks that can cause... existential damage without a nation-state involved. With the confluence of globalization and technology, these groups now have the ability to cause the kind of damage that used to involve national effort. We got a taste of this on 9/11..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Richard Clarke: China's Cyberassault on America

June 17, 2011 Added by:Headlines

"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IMF May Be Latest Victim of RSA SecurID Hack

June 13, 2011 Added by:Headlines

"There are still dozens of similar yet still undisclosed breaches that have taken place in the U.S. government and defense domain during the same time frame. My guess is that it is the same set of bad actors who are behind the attacks focused on military, government and economic intelligence...

Comments  (2)

70e177868d7bc383ce3ea10b6f976ada

To Disclose or NOT to Disclose...

June 09, 2011 Added by:Andrew Baker

The issue of disclosure is a sensitive one, and it is important not to feed more bad guys with more information that will allow them to have greater success, but it is abundantly clear that two months of saying essentially nothing is at least just as bad as saying too much, if not worse...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

How Secure is RSA’s SecurID?

June 08, 2011 Added by:Headlines

Once installed on the authentication server, most of the cryptographic protection of the seed values could be removed by anyone with sufficient time and effort, and in fact the previous secret 64-bit algorithm was revealed about 10 years ago through such reverse engineering...

Comments  (0)

Page « < 1 - 2 > »