Items Tagged with "Passwords"


94ae16c30d35ee7345f3235dfb11113c

Social Media Security 101

April 24, 2012 Added by:Joel Harding

EVERYTHING is compromised. Every web site, every data base, every place that touches the web – I assume this at all times. There is not one among us whose network has not been compromised. The security mantra in the past was “Risk Avoidance”. That is no longer the case...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Disagreement on Password Vault Software Findings

April 12, 2012 Added by:Brent Huston

Recently, some researchers have been working on comparing password vault software products and have found some issues. However, many of the vendors are quickly moving to remediate the identified issues, many of which were simply improper use of proprietary cryptography schemes...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Six Good Reasons Not to Ask for Social Media Passwords

April 05, 2012 Added by:Rebecca Herold

There have been a barrage of stories recently about organizations asking applicants and employees for their Facebook, Twitter, LinkedIn and other social networking passwords. Compelled password disclosure is a very bad idea for organizations to do for many reasons...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

296634767383f056e82787fcb3b94864

Cyber Self Defense For Non-Geeks

March 28, 2012 Added by:Jeffrey Carr

These principles won’t be sufficient when you’re in high-risk locales and they won’t stop a targeted attack, but they will make it less likely that you’ll suffer a serious breach because of poor security habits or over-reliance on antivirus or firewall applications...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Pleads Guilty to Celebrity Computer Intrusions

March 27, 2012 Added by:Headlines

Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...

Comments  (0)

E973b16363b3de77b360563237df7e32

Seven Problems with Cell Phone Forensics

March 26, 2012 Added by:Bozidar Spirovski

Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...

Comments  (5)

68b48711426f3b082ab24e5746a66b36

Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Pentagon Networks Hacked 250,000 Per Year

March 21, 2012 Added by:Rafal Los

Unfortunately, I suspect that if this actually happened at the Pentagon a quarter million times a year, America would be in a much, much worse position than we are today. Our battle plans would be compromised, launch codes, schematics, and covert identities would be compromised...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Fake YouTube Site Targets Activists with Malware

March 17, 2012 Added by:Electronic Frontier Foundation

The fake YouTube page attacks users in two ways: it requires you to enter your YouTube login credentials in order to leave comments, and it installs malware disguised as an Adobe Flash Player update. To see if you have been infected, look for the following files...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security's Achilles Heel

March 16, 2012 Added by:Rafal Los

Have you ever wondered why enterprise security people are so downtrodden? Baffled by the impossible arrogance of penetration testers when they laugh at corporate security postures? The bottom line: people have always been and will always be the Achilles heel...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Do You Have A False Sense of Security for Mobile?

March 02, 2012 Added by:Robert Siciliano

With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

LM Hash Flaw: Windows Passwords Easy to Crack

March 01, 2012 Added by:Dan Dieterle

The thing is that the lower security hashes are not present on the SAM stored on the hard drive. When the security accounts are loaded into active RAM, Windows re-creates the LM hashes. The LM Hash can be pulled from active RAM using the Windows Credential Editor (WCE)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Waledac Spam Botnet Evolves into Password Sniffer

February 20, 2012 Added by:Headlines

Researchers form Palo Alto Networks have detected a new variation of the briefly defeated Waledac spamming botnet, but this version is able to sniff out login credentials for several email protocols as well as files with the .dat extension related to BitCoin and FTP...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »