Blog Posts Tagged with "Attack"

B64e021126c832bb29ec9fa988155eaf

Drive Encryption Useless Against Some Online Attacks

January 11, 2011 Added by:Dan Dieterle

Drive encryption is recommended, and it works very well, but just how well will it protect you from online attacks? Truth be told, in some situations it may not help you at all. I wanted to see how well drive encryption would protect a Windows XP SP3 machine from a common online Java based attack...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Anonymous Hacks Into Fine Gael Website

January 10, 2011 Added by:Headlines

The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DDoS Wars: 4chan Downed Again By Another Attack

January 05, 2011 Added by:Headlines

The message boards of script-kiddie haven 4chan were hit by another distributed denial of service (DDoS) campaign, just one week after suffering significant downtime from a similar attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Applet Distributes Trojan via Downloader Injection

December 31, 2010 Added by:Headlines

More than two-thousand weblinks direct users to domains that can inject malicious code by way of a Java downloader applet. The code is contained in the HTML of the infected sites, and infects the visitor's computers with a hidden iFrame containing a JavaScript function...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DDoS Wars: 4chan Gets a Taste of Their Own Poison

December 29, 2010 Added by:Headlines

According to the 4CHAN STATUS webpage, the purpose of which is to "be used to communicate with the 4chan userbase should the main site be unreachable," the main 4chan site was offline for a period on Tuesday, and reports from NetCraft indicate that the attacks have continued into Wednesday...

Comments  (7)

065b7cfbbb03ac9d18cbf5ed0615b40a

Man in the Middle (MITM) Attacks Explained

December 23, 2010 Added by:Stefan Fouant

MITM attacks come in many forms and essentially allow an attacker to act as a proxy between the victim and any host the victim has established connections with. It is a form of active eavesdropping in which the attacker is controlling the conversation unbeknownst to the victim...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Possible via URL Shortener

December 22, 2010 Added by:Headlines

"My implementation of this attack is, at best, a hack job, but was merely meant to illustrate how easy it is to actually implement, how simple it is to launch a DDoS simply by getting people to follow a link, and how seriously our reliance on URL shorteners can affect security..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Backbone May Be Vulnerable To Attack

December 18, 2010 Added by:Headlines

In 2003, George Mason University PhD candidate Sean Gorman mapped critical fiber optic networks across the U.S. and illustrated that vulnerabilities in the communications infrastructure could easily be identified using data and records available to the general public...

Comments  (0)

6d117b57d55f63febe392e40a478011f

The Jester Hits WikiLeaks Site With XerXeS DoS Attack

November 29, 2010 Added by:Anthony M. Freed

Infamous hacker The Jester is claiming responsibility for a DoS attack that disabled WikiLeaks hours before the release of thousands of documents. The WikiLeaks Twitter account said, "We are currently under a mass distributed denial of service attack," for several hours on Sunday...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Hit By Denial of Service (DoS) Attack

November 28, 2010 Added by:Headlines

WikiLeaks, the secret-sharing website that has been plaguing the U.S. government with the release of thousands of classified documents, allegedly suffered a denial of service (DoS) attack that took it offline just hours before the scheduled release of more embarrassing records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS and DoD Say Threat of Cyber Attack is Imminent

November 22, 2010 Added by:Headlines

Secretary of Defense Robert M. Gates recently described the threat of cyber attack as huge when addressing The Wall Street Journal's CEO council. Gates also revealed plans for the the DHS to engage the NSA in more domestic cyber security operations. Here is a transcript of Gates' statements...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Pwns U of W Classroom Projectors

November 11, 2010 Added by:Headlines

The incident is characteristic of a long line of prestige attacks in which hackers perform some level of disruption in order to gain notoriety and satisfy their own egos, but the authorities and university administration are taking the incident seriously...

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Brute Force vs. Dictionary Attacks

August 03, 2010 Added by:Bryan Miller

There are tools that perform brute force, and there are tools that perform dictionary attacks. There are even some tools that allow the option. Moral of the story is to understand the difference when you’re writing tools and selling them to people who know the difference...

Comments  (0)

E973b16363b3de77b360563237df7e32

Man In The Middle Attack Explained

July 11, 2010 Added by:Bozidar Spirovski

First, a quick definition, a man in the middle (MitM) attack is an attack where the communication which is exchanged between two users is surreptitiously monitored and possibly modified by a third, unauthorized, party...

Comments  (0)

C7159a557369b66632c4b54bf746b69e

Sun Tzu quotes from The Art of War compared to Information Security

October 26, 2009 Added by:Sean Inman

I just finished up this great book The Art of War, by Sun Tzu.  There are many different versions the one I read was “The Art of War for Managers; 50 Strategic Rules”.  I wanted to share some quotes from Sun Tzu and how I think they tie to Information Security.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »