Blog Posts Tagged with "hackers"

69dafe8b58066478aea48f3d0f384820

One in Ten Small Businesses Experienced a Data Hack

July 20, 2012 Added by:Headlines

"While the media is reporting a growing number of high profile data breaches, some small businesses may also be a popular target for hackers because their systems are usually easier to get into and the breach may not be found out for a good few weeks...”

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

On Failing Gracefully...

July 18, 2012 Added by:Neira Jones

You know the feeling: You think you have it all under control, you think you've engaged with the right people, you have buy in from those who matter, the right culture is in place, you're not struggling for investment and bang! You get hacked. Overwhelming sense of failure ensues. Where did it all go wrong?

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Government Strategies to Mitigate Growing Cyber Threats

July 16, 2012 Added by:Pierluigi Paganini

We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yahoo!'s No Encryption Trumps LinkedIn's Unsalted Hash

July 12, 2012 Added by:Headlines

Just a month after LinkedIn experienced a significant security breach and caught flack for not "salting their hash", the revelation that the Yahoo! credentials were not even stored in an encrypted format should have everyone concerned about how seriously companies are taking the security of their users...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Security Factions: Roosters and Owls

July 11, 2012 Added by:Infosec Island Admin

We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...

Comments  (1)

4777ea0d573c51027a097399006f228a

Updates: Rumors of Anonymous Hacking th3j35t3r's Accounts Overblown

July 11, 2012 Added by:ʞɔopuooq ʇuıɐs

About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Network Forensics: Tracking Hackers through Cyberspace

July 11, 2012 Added by:Ben Rothke

With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page twenty-five, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the business...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

On the Right to Bear Cyber Arms

July 10, 2012 Added by:J. Oquendo

An attacker is decimating my infrastructure. I have purchased and deployed every security technology I can think of. I have contacted law enforcement as a matter of relevance, but I know they will not be able to do much. I have given the service provider two fair warnings. I now fight fire with fire...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Honeypots Can Help Safeguard Your Information Systems

July 10, 2012 Added by:Brent Huston

Honeypots are simple technology intended to be compromised. There is little or no production traffic going to or from the device, so any time a connection is sent it is most likely a probe, scan, or an attack. Any time a connection is initiated from the honeypot, this most likely means it was compromised...

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

How Hacking Can Kill

July 09, 2012 Added by:Edward Jones

Wherever you are on the internet, there’s often a virus lurking around the digital corner. A hacker will always find a new way of getting your data - and turning it into money. And as we found-out last year, hacking has progressed from threatening our data security to potentially threatening our lives...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Drones Vulnerable to Hijacking, Raising Concerns for Security

July 02, 2012 Added by:Pierluigi Paganini

The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Enterprises Really Hacking the Hackers?

June 27, 2012 Added by:Rafal Los

Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Anonymous Zeitgeist?

June 27, 2012 Added by:Infosec Island Admin

If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Striking Back in Cyberspace: Sanctioned or Vigilantism?

June 26, 2012 Added by:Joel Harding

You can strike back. Hiring your own security team you can discover who broke into your system. Establishing a honeypot, replicating your system and putting in ghost files will this tie up your infiltrators and significantly waste their time, and you can find out more about their techniques and track where they are...

Comments  (1)

6648b1abd4a9b964566c3690613f20a6

Companies Go on the Offensive

June 26, 2012 Added by:Mark Baldwin

Being the victim of an attack is not fun and it is easy to understand why businesses would like to take a more active stance against the attackers. Unfortunately, businesses that go down this path are likely to run into technical and legal problems. Let’s examine some of the possible outcomes...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »