Blog Posts Tagged with "WikiLeaks"

1f2f664e68a603b3c54890fbbcd37857

Password Security Issues

December 15, 2010 Added by:Mark Gardner

This is useful information for the Security professional, and can be used in our daily work. Particularly enforcing password security, at home or at work, we all want simplicity in our passwords to make them easy to remember. As I saw written the other day, "Password" is not a Password...

Comments  (0)

B71b97ceae7b5837b59813ee06a34bed

WikiLeaks: Case Study for Cyberwar?

December 14, 2010 Added by:David Dennis

One of the problems of trying to understand cyberwar is that we don't really know what it looks like or how it behaves. Mostly, this is due to the fact that the participants/victims don't report it. If anything is reported, it is heavily skewed or filtered for political purposes...

Comments  (4)

850c7a8a30fa40cf01a9db756b49155a

If Woody Had Gone to the Police...

December 14, 2010 Added by:J. Oquendo

The entire situation could have been avoided by implementing defense in depth. Had the United States military implemented something as simple as Data Loss Protection (DLP) combined with an SIEM, those cables might not have made it to WikiLeaks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Senators Propose Security Bill in Response to DDoS Attacks

December 12, 2010 Added by:Headlines

Senator Tom Carpenter has proposed legislation in reaction to the denial of service attacks that have been targeting websites in the wake of the WikiLeaks disclosures. The bill will seek to centralize command and control operations within the White House, and further public and private cooperation...

Comments  (0)

B426b30042abbc15e363cb679bbc937d

Anonymous Turns Payback Towards The Jester

December 11, 2010 Added by:Daniel Kennedy

The first reason is obviously the Jester’s attacks on WikiLeaks, the second more direct reason may be attacks on the Internet Relay Chat servers that Anonymous is using to coordinate attacks. They believe the Twitter account “AnonymousDown” is the same person who is behind th3j35t3r...

Comments  (6)

69dafe8b58066478aea48f3d0f384820

Operation Payback Spokesman Leaves Name in PR Meta Data

December 11, 2010 Added by:Headlines

The rogue hacker group Anonymous, which has been making headlines for their repeated DDoS attacks dubbed Operation Payback, issued a press release. The most interesting piece of information int the release, though, was the name of the text's author, which was present in the PDF's meta data...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Moneybookers Now Targeted by DDoS Attacks

December 10, 2010 Added by:Headlines

Moneybookers, the online payment company who ended their business relationship with WikiLeaks in August, is now the subject of distributed denial of service attacks by WikiLeaks sympathizers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NASA Selling PCs Without Erasing Classified Data

December 09, 2010 Added by:Headlines

An audit of used hardware being sold by NASA found that the majority of the hard drives had not been wiped clean of sensitive data. Pallets of PCs were were found in a recycling center with NASA IP addresses on the processor cases, presenting a serious security problem according to the report...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Payback Launches DDoS Attack on Amazon

December 09, 2010 Added by:Headlines

According to a Tweet alleged to be from Operation Payback, the pro-WikiLeaks group has launched a distributed denial of service attack (DDoS) on Amazon.com in retaliation for Amazon canceling hosting services for WikiLeaks last week...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Denial of Service Wars Continue to Escalate

December 08, 2010 Added by:Headlines

Of note is the attack against website of Senator Joe Lieberman, who may have helped oust WikiLeaks from the protection Amazon servers offered, and the political action committee website of Sarah Palin after she issued statements that WikiLeaks' Julian Assange should be hunted like a terrorist. ..

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

WikiLeaks and the Principle of Least Privilege

December 08, 2010 Added by:Alexander Rothacker

Clearly, there were not enough security controls in place that would have prevented the internal thief from accessing this data, and he shouldn’t have had access to this data to begin with. And if he was allowed access to it, there should have been activity monitoring in place...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Payback and 4chan Hit MasterCard - Twitter Is Next

December 08, 2010 Added by:Headlines

The hacker social network 4chan and Operation Payback are engaged in a flurry of DDoS in retaliation for any actions they deem intended to limit WikiLeaks operations. MasterCard is being targeted today, and a message on the 4chan forums indicates that the next target is Twitter...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Brags That Sixty Percent of Network is Secured

December 07, 2010 Added by:Headlines

These revelations beg the question as to why the DoD, which has the single largest defense budget in the world, is so far behind on even the most basic security best practices. One has to wonder about the likelihood of other serious data security lapses that have not been so well publicized...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bank Site Hit With DDoS Attack for Freezing WikiLinks Account

December 07, 2010 Added by:Headlines

Operation Payback, the rogue hacker network fighting stricter copyright laws, has launched a distributed denial of service attack (DDoS) against the Swiss bank PostFinance. The attacks are in retaliation for the bank having frozen the main defense fund account for WikiLeaks' Julian Assange...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Compliance, Security and WikiLeaks

December 06, 2010 Added by:Danny Lieberman

While compliance drives companies into taking action, do compliance activities actually result in implementing and sustaining strong data security management and technology countermeasures? We will see that the answer is generally no...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Hackers Lift Microsoft Windows Source Code

December 06, 2010 Added by:Headlines

A diplomatic memo from June of 2009 reveals that the Chinese security firm TOPSEC had access to the source code for Microsoft Windows and allowed the Chinese government to provided it to hackers in order to develop targeted attacks to exploit weaknesses in the operating system...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »