Blog Posts Tagged with "hackers"

Bd07d58f0d31d48d3764821d109bf165

Mobile Infrastructure: The Elephant in the Data Center

August 25, 2012 Added by:Tripwire Inc

One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

False Flags, Geopolitics and Cyber Spies

August 22, 2012 Added by:Rafal Los

False flag is when an operation of some kind is carried out by one group but falsely attributed to another. Whether it's a rogue attacker attributing an attack to a rival group or a nation-state attempting to cause tensions between rival nations for their own benefit - the conspiracy theories write themselves...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is Your IT Posture that of a Protector, a Detective, or a Warrior?

August 19, 2012 Added by:Richard Stiennon

The attackers are going to breach your network to get what they want. The question is: how fast can you discover an intrusion, figure out what the attacker is after, stop the attack, clean up – and prepare for their return? After all, motivated attackers will be back...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Pro-Syrian Hackers Target Activists with Fake Anti-Hacking Tool

August 16, 2012 Added by:Electronic Frontier Foundation

The latest malware campaign plays into users' concerns about protecting their security by offering a fake security tool called AntiHacker, which promises to provide "Auto-Protect & Auto-Detect & Security & Quick scan and analyzing." AntiHacker instead installs a remote access tool called DarkComet RAT...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

The BSides Las Vegas Innovation Challenge

August 16, 2012 Added by:Security BSides

It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Is a Password Enough? A Closer Look at Authentication

August 16, 2012 Added by:Robert Siciliano

Yahoo and LinkedIn were recently breached and usernames and passwords were stolen. These sites did something wrong that allowed those passwords to get hacked. However passwords themselves are too hackable. If multi-factor authentication was used, then the hacks may be a moot point and the data useless...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Secploitation...

August 14, 2012 Added by:Javvad Malik

To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

The Weakest Link in the Security Chain: Is it in Your Controls?

August 11, 2012 Added by:Tripwire Inc

Rather than brute-forcing the account, the hackers gained access by doing some creative social engineering by contacting Apple customer support. The problem is that we often turn over our data to 3rd-party providers without understanding what protocols they have in place to keep our data safe...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Network Security: Presence, Persistence, and Pivoting

August 08, 2012 Added by:Rob Fuller

Explaining what goes through an attackers head when they get a shell is virtually impossible, even more so to generalize into a methodology, but I’ve tried to do that with the "Three P’s of Post Exploitation” - they are in a certain order for a reason, but certainly up to circumstance to what order is best...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Find Out Which Companies Dropped the Security Baton

August 05, 2012 Added by:Kelly Colgan

Find out which organizations experienced the thrill of a well-designed privacy plan and which ones endured the agony of an easily prevented data breach. The goal is simple. We want organizations to get smarter about data security to better protect consumers’ personally identifiable information...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)

4bc4991ebc3bd722765f157c77924e7a

Rebooting Infosec Cons

July 31, 2012 Added by:Dan Klinedinst

I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Don’t Freak Out, It was Only DefCon

July 31, 2012 Added by:Brent Huston

Disregard tales of drunken hackers menacing Vegas hotels, changing signs and doing social engineering attacks. They are good for amusement and awareness, but they are NOT really useful as a lens for viewing your organization’s risk or the steps you should be taking to protect your data. Instead, stick to the basics...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Information Security, Hackers, and Vigilance

July 30, 2012 Added by:Tripwire Inc

The bottom line: Attackers are always looking for mistakes, outliers, and inconsistencies so they can use them against you. This means your security programs need to be robust, resilient, measurable, and – as much as possible – consistent (vs. ad hoc)...

Comments  (0)

4777ea0d573c51027a097399006f228a

An Urgent Message to My Supporters

July 27, 2012 Added by:ʞɔopuooq ʇuıɐs

On this first day of Defcon, it appears my @th3j35t3r twitter account has been suspended. Coincidence? Probably not. We all know I have some pretty desperate enemies who will stop at nothing to see me inconvenienced, discredited or otherwise annoyed. So here’s the upshot...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »