Blog Posts Tagged with "Network Security"
July 07, 2011 Added by:Headlines
"The good news is no classified information has been compromised or is in danger from this attack. At this time, we have not found any indication of 'exfiltration' of information from our unclassified networks as well," said PNNL spokesman Greg Koller...
July 06, 2011 Added by:Rob Fuller
The structure of most payloads tell you exactly what they do, but not always. If it says in the description that it's 'Inline' that means it is a single, if it says 'Stager' that means it's staged. Lets break a few of the lesser known ones down...
July 05, 2011 Added by:Danny Lieberman
If we consider that cyber terror is not fundamentally different than bombers with suicide belts, we are drawn to consider the amount of damage caused by any terror attack whether on the street or in a database. Reducing the probability of attack means reducing the threat surface...
June 29, 2011 Added by:Bozidar Spirovski
Being involved in a security project requires lot of resources: a good measure of knowledge, a huge measure of experience, some amount of software and personnel. Usually time is in short supply, so this is compensated by more computers or more people...
June 28, 2011 Added by:Headlines
By concentrating on instruction and inspiration, the leadership of these now infamous hacker networks can effectively remove themselves as primary targets for law enforcement and anti-AntiSec hackers, and instead encourage their less-savvy teen minions to commit attacks and take the heat...
June 28, 2011 Added by:Headlines
"Virtually everybody gets breached. If you're going to have these advanced persistent threat guys come after you, they're going to get into your system. If you're going to make that the line, and then you're subject to these name-and-shame penalties, I think that would be a mistake..."
June 28, 2011 Added by:Andrew Herlands
In the end, no single technology will prevent all attacks from succeeding. Security best practices dictate implementing layers of security defenses, policies, and employee training to ensure that when one defense fails the hacker must contend with many other defense layers...
June 27, 2011 Added by:Dawn Hopper
In troubleshooting authentication, using specific debug tacacs+ or debug radius commands often provide too detailed and obscure output to anyone except those extremely knowledgeable in the protocols. Instead, the debug AAA authentication generic command has several advantages...
June 27, 2011 Added by:Headlines
Officials from the banking giant now assert that $2.7 million was stolen from about 3,400 accounts in the May attack. Citigroup immediately reported the security incident to law enforcement and regulatory authorities, but waited about three weeks before notifying affected customers...
June 26, 2011 Added by:Lee Munson
You are not going to find much sympathy by most people since you are out there doing something illegal. So you must be just like the rest of the criminal world and prepare to live your life by trusting very few people and always be aware that anyone can turn on you...
June 26, 2011 Added by:Kevin McAleavey
The media has been reporting that Lulzsec has folded, but they've merely gone underground and are regrouping. @Lulzboat on twitter has now become @lulzb0at and combined with AnonOps and AntiSec, releasing the following announcement on their IRC subchannels...
June 26, 2011 Added by:Scot Terban
I expect LulzSec's real legacy will be the creation of more draconian laws by the government as a backlash to their antics. Laws that will make all our lives a bit less private and a lot more prone to being misused. I also expect that the lulz will continue, though at their expense...
June 23, 2011 Added by:Kevin McAleavey
There is no excuse for your facility to provide the next round of "lulz." Examining your ability to withstand DDoS attacks and checking your SQL backend against exploits, you stand a chance of withstanding the onslaught of raging children should they turn their "cannons" your way...
June 22, 2011 Added by:Chris Blask
Threats to critical infrastructure are usually discussed in the terms of Cyber Warfare. Unlike a nation-state, however, there is no reason to believe that a sufficiently motivated individual or small group would not release malware which attacks everything it sees...
June 21, 2011 Added by:Cor Rosielle
Approaching operational trust intuitively is similar as solving security problems intuitively. Unfortunately most of what we understand about trust is based on experience, how it makes us feel. Therefore we are often not able to quantify the amount of trust...
June 16, 2011 Added by:Headlines
"The customers' account information (name, account number and contact information, including email address) was viewed. However, data that is critical to commit fraud was not compromised: the customers' social security number, date of birth, card expiration date and card security code..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013