Blog Posts Tagged with "hackers"
August 25, 2012 Added by:Tripwire Inc
One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...
August 22, 2012 Added by:Rafal Los
False flag is when an operation of some kind is carried out by one group but falsely attributed to another. Whether it's a rogue attacker attributing an attack to a rival group or a nation-state attempting to cause tensions between rival nations for their own benefit - the conspiracy theories write themselves...
August 19, 2012 Added by:Richard Stiennon
The attackers are going to breach your network to get what they want. The question is: how fast can you discover an intrusion, figure out what the attacker is after, stop the attack, clean up – and prepare for their return? After all, motivated attackers will be back...
August 16, 2012 Added by:Electronic Frontier Foundation
The latest malware campaign plays into users' concerns about protecting their security by offering a fake security tool called AntiHacker, which promises to provide "Auto-Protect & Auto-Detect & Security & Quick scan and analyzing." AntiHacker instead installs a remote access tool called DarkComet RAT...
August 16, 2012 Added by:Security BSides
It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...
August 16, 2012 Added by:Robert Siciliano
Yahoo and LinkedIn were recently breached and usernames and passwords were stolen. These sites did something wrong that allowed those passwords to get hacked. However passwords themselves are too hackable. If multi-factor authentication was used, then the hacks may be a moot point and the data useless...
August 14, 2012 Added by:Javvad Malik
To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...
August 11, 2012 Added by:Tripwire Inc
Rather than brute-forcing the account, the hackers gained access by doing some creative social engineering by contacting Apple customer support. The problem is that we often turn over our data to 3rd-party providers without understanding what protocols they have in place to keep our data safe...
August 08, 2012 Added by:Rob Fuller
Explaining what goes through an attackers head when they get a shell is virtually impossible, even more so to generalize into a methodology, but I’ve tried to do that with the "Three P’s of Post Exploitation” - they are in a certain order for a reason, but certainly up to circumstance to what order is best...
August 05, 2012 Added by:Kelly Colgan
Find out which organizations experienced the thrill of a well-designed privacy plan and which ones endured the agony of an easily prevented data breach. The goal is simple. We want organizations to get smarter about data security to better protect consumers’ personally identifiable information...
August 02, 2012 Added by:Bill Mathews
General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?
July 31, 2012 Added by:Dan Klinedinst
I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...
July 31, 2012 Added by:Brent Huston
Disregard tales of drunken hackers menacing Vegas hotels, changing signs and doing social engineering attacks. They are good for amusement and awareness, but they are NOT really useful as a lens for viewing your organization’s risk or the steps you should be taking to protect your data. Instead, stick to the basics...
July 31, 2012 Added by:Infosec Island Admin
With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...
July 30, 2012 Added by:Tripwire Inc
The bottom line: Attackers are always looking for mistakes, outliers, and inconsistencies so they can use them against you. This means your security programs need to be robust, resilient, measurable, and – as much as possible – consistent (vs. ad hoc)...
July 27, 2012 Added by:ʞɔopuooq ʇuıɐs
On this first day of Defcon, it appears my @th3j35t3r twitter account has been suspended. Coincidence? Probably not. We all know I have some pretty desperate enemies who will stop at nothing to see me inconvenienced, discredited or otherwise annoyed. So here’s the upshot...
Wireless Home Technologies Create Security R... Bill Phillips on 12-19-2014
Mobile Security Processes Could Be Applied t... Lukas Ho on 12-19-2014
Update 3: Hackers May Leak Norton Antivirus ... Prabhas Raju on 12-19-2014