Blog Posts Tagged with "SecurID"
June 27, 2012 Added by:Headlines
"RSA has received many inquiries, press pickups, blog entries, and tweets regarding an alleged crack by researchers of the RSA SecurID 800 authenticator... an alarming claim and should rightly concern customers who have deployed the RSA SecurID 800 authenticator. The only problem is that it’s not true..."
June 25, 2012 Added by:Headlines
"[These products are] designed specifically to deal with the case where somebody gets physical access to it or takes control of a computer that has access to it... Here, if the malware is very smart, it can actually extract the keys out of the token.That's why it's dangerous"...
February 10, 2012 Added by:Kevin McAleavey
The Symantec leak could pose a risk to RSA's SecurID. Examination of the source code for PCAnywhere turned up something disturbing - numerous header files and several libraries belonging to RSA, and SecurID code is part of the exposed PCAnywhere product source code...
What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...
December 06, 2011 Added by:Headlines
New analysis from researchers at Qualys suggests that the success of the attack may have hinged on RSA's use of the older Windows XP operating system and the failure to enable the DEP (data execution prevention) security option...
November 11, 2011 Added by:Headlines
F-Secure's Mikko Hypponen urged organizations to reconsider the continued use of Adobe Reader given the tendency for attackers to exploit the application's frequent vulnerabilities. "These attacks are not against PDF - these attacks are against Adobe Reader," said Hypponen...
October 05, 2011 Added by:Headlines
"Not a day goes by that I do not see some indication of a cyberattack in the press... The problem is that when consumers see time and time again nothing happens to correct it, they throw up their hands. There's no amount of consumer education to make them smart enough to resist attacks..."
September 07, 2011 Added by:J. Oquendo
RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...
August 26, 2011 Added by:Headlines
"The e-mail was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached Excel file. It was a spreadsheet titled 2011 Recruitment plan.xls," said an April 1 blog posting by RSA's Head of New Technologies, Uri Rivner...
July 20, 2011 Added by:Headlines
June 21, 2011 Added by:Headlines
“We can have networks that can cause... existential damage without a nation-state involved. With the confluence of globalization and technology, these groups now have the ability to cause the kind of damage that used to involve national effort. We got a taste of this on 9/11..."
June 20, 2011 Added by:Gurudatt Shenoy
The past few months have seen a shock and awe campaign being launched by a series of hacker organizations such as Anonymous hackers and LulzSec. The most serious of recent events is the breach of RSA's SecureID. Whew. If the guardians of security cannot protect their own, who else can?
June 17, 2011 Added by:Headlines
"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."
June 14, 2011 Added by:J. Oquendo
Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...
June 13, 2011 Added by:Headlines
"There are still dozens of similar yet still undisclosed breaches that have taken place in the U.S. government and defense domain during the same time frame. My guess is that it is the same set of bad actors who are behind the attacks focused on military, government and economic intelligence...
June 09, 2011 Added by:Andrew Baker
The issue of disclosure is a sensitive one, and it is important not to feed more bad guys with more information that will allow them to have greater success, but it is abundantly clear that two months of saying essentially nothing is at least just as bad as saying too much, if not worse...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013