Blog Posts Tagged with "Passwords"

69dafe8b58066478aea48f3d0f384820

LinkedIn Hacked: Change Your Password

June 06, 2012 Added by:Headlines

Reports indicate that as many as 6.4 million passwords have been compromised. Though the passwords are in encrypted form, reports indicate that they are being cracked at a rapid rate, with somewhere near 300,000 passwords already revealed, putting those LinkedIn members' accounts at risk...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Recovering Remote Windows Passwords in Plain Text with WCE

June 05, 2012 Added by:Dan Dieterle

After obtaining a remote session using Backtrack’s Social Engineering Toolkit, I ran Bypassuac to get System level authority and at the Meterpreter prompt simply ran wce.rb. Mimikatz seems to do a better job at recovering passwords, but WCE is just as easy to use. Both offer other features and functions...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: RuggedCom Weak Cryptography for Passwords

May 30, 2012 Added by:Infosec Island Admin

A researcher identified a default backdoor user account with a weak password encryption vulnerability in the RuggedCom Rugged Operating System which could allow an attacker can use a simple publicly available script to generate the default password and gain administrative access to the unit...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

LinkedIn: Vulnerability in the Authentication Process

May 22, 2012 Added by:Pierluigi Paganini

This attack is possible due to an error in validating of the security token (CSRF token) that allows an unlimited number of requests using the same token for different users. The only mechanism against the attack is a CAPTCHA challenge-response test after dozens of attempts...

Comments  (1)

71d85bb5d111973cb65dfee3d2a7e6c9

Guessable Passwords: The Unpatchable Exploit

May 20, 2012 Added by:f8lerror

During penetration assessments the tester attempts to compromise systems. Many users take short cuts with passwords, this is because they feel they are not a target, not important, or their access doesn’t matter. Penetration testers know this and so do the attackers...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Twitter Hack! Five Ways to Avoid Being a Victim of Phishing

May 12, 2012 Added by:Brent Huston

Twitter is downplaying a security breach that exposed tens of thousands of user emails and passwords. The compromised Twitter accounts could have been the result of phishing attacks. Whenever you read about such breaches, it is always a good idea to change your password...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Five Concerns Surrounding Pinterest

May 10, 2012 Added by:Allan Pratt, MBA

At the current time, there are no privacy or security settings similar to Facebook or Google Plus, and boards cannot be made private, similar to customized Facebook lists or customized Google Plus circles. The bottom line is that anyone with Internet access can view your boards...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: WellinTech KingSCADA Insecure Password Encryption

May 10, 2012 Added by:Infosec Island Admin

Researchers Alexandr Polyakov and Alexey Sintsov from DSecRG identified an unsecure password encryption vulnerability in WellinTech KingSCADA application. When KingSCADA OPCServer and OPCClient are not on the same node, a remote attacker may obtain passwords to the system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Post Thousands of Twitter Account Logins

May 09, 2012 Added by:Headlines

Analysis of the data dump indicates that of the fifty-five thousand sets of account logins, around twenty-thousand were duplicates, and a large percentage were associated with accounts that were already suspended for violations of terms of service...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivists Claim Government and Military Systems Breach

May 03, 2012 Added by:Headlines

A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...

Comments  (0)

4c22630536d3dc5e345fe1ec0ddc062b

Password Policy: Sharing Passwords

May 02, 2012 Added by:benson dana

I once worked at a place where a senior manager collected the passwords of employees. There had been resistance to giving up this policy, and the excuse was that this unit's mission was unique and that this was necessary. How often does the internal auditor hear this excuse?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Recovering Windows Passwords Remotely in Plain Text

April 26, 2012 Added by:Dan Dieterle

There has been a lot of buzz across the web the last few months about a program called “Mimikatz”. It is an interesting program that allows you to recover Windows passwords from a system in clear text. The passwords for anyone who has logged into a machine can be displayed...

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Super Security Guy

April 25, 2012 Added by:Wayde York

While I was talking to the bank operator, I tried to login to my account and when I put in the username/password, I couldn’t get in. The bad guys had changed my login, or so I thought. Red lights were flashing and the bulk of my security expertise poured in to the rescue...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Nissan Confirms Cyber Attack and Network Breach

April 25, 2012 Added by:Headlines

"We have detected an intrusion into our company's global information systems network... we believe that our systems are secure and that no customer, employee or program data has been compromised. However, we believe that user IDs and hashed passwords were transmitted..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media Security 101

April 24, 2012 Added by:Joel Harding

EVERYTHING is compromised. Every web site, every data base, every place that touches the web – I assume this at all times. There is not one among us whose network has not been compromised. The security mantra in the past was “Risk Avoidance”. That is no longer the case...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »