Blog Posts Tagged with "hackers"
July 20, 2012 Added by:Headlines
"While the media is reporting a growing number of high profile data breaches, some small businesses may also be a popular target for hackers because their systems are usually easier to get into and the breach may not be found out for a good few weeks...”
July 18, 2012 Added by:Neira Jones
You know the feeling: You think you have it all under control, you think you've engaged with the right people, you have buy in from those who matter, the right culture is in place, you're not struggling for investment and bang! You get hacked. Overwhelming sense of failure ensues. Where did it all go wrong?
July 17, 2012 Added by:Ali-Reza Anghaie
The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...
July 16, 2012 Added by:Pierluigi Paganini
We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?
July 12, 2012 Added by:Headlines
Just a month after LinkedIn experienced a significant security breach and caught flack for not "salting their hash", the revelation that the Yahoo! credentials were not even stored in an encrypted format should have everyone concerned about how seriously companies are taking the security of their users...
July 11, 2012 Added by:Infosec Island Admin
We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...
July 11, 2012 Added by:ʞɔopuooq ʇuıɐs
About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...
July 11, 2012 Added by:Ben Rothke
With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page twenty-five, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the business...
July 10, 2012 Added by:J. Oquendo
An attacker is decimating my infrastructure. I have purchased and deployed every security technology I can think of. I have contacted law enforcement as a matter of relevance, but I know they will not be able to do much. I have given the service provider two fair warnings. I now fight fire with fire...
July 10, 2012 Added by:Brent Huston
Honeypots are simple technology intended to be compromised. There is little or no production traffic going to or from the device, so any time a connection is sent it is most likely a probe, scan, or an attack. Any time a connection is initiated from the honeypot, this most likely means it was compromised...
July 09, 2012 Added by:Edward Jones
Wherever you are on the internet, there’s often a virus lurking around the digital corner. A hacker will always find a new way of getting your data - and turning it into money. And as we found-out last year, hacking has progressed from threatening our data security to potentially threatening our lives...
July 02, 2012 Added by:Pierluigi Paganini
The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...
June 27, 2012 Added by:Rafal Los
Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...
June 27, 2012 Added by:Infosec Island Admin
If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...
June 26, 2012 Added by:Joel Harding
You can strike back. Hiring your own security team you can discover who broke into your system. Establishing a honeypot, replicating your system and putting in ghost files will this tie up your infiltrators and significantly waste their time, and you can find out more about their techniques and track where they are...
June 26, 2012 Added by:Mark Baldwin
Being the victim of an attack is not fun and it is easy to understand why businesses would like to take a more active stance against the attackers. Unfortunately, businesses that go down this path are likely to run into technical and legal problems. Let’s examine some of the possible outcomes...
Interoperability: A Much Needed Cloud Comput... Samantha Elizabethus on 09-23-2014
3 Things To Consider When Revisiting Your Ba... james russa on 09-22-2014
Security and Today’s Managed Service Provi... james russa on 09-22-2014