Items Tagged with "Passwords"


Nissan Confirms Cyber Attack and Network Breach

April 25, 2012 Added by:Headlines

"We have detected an intrusion into our company's global information systems network... we believe that our systems are secure and that no customer, employee or program data has been compromised. However, we believe that user IDs and hashed passwords were transmitted..."

Comments  (0)


Social Media Security 101

April 24, 2012 Added by:Joel Harding

EVERYTHING is compromised. Every web site, every data base, every place that touches the web – I assume this at all times. There is not one among us whose network has not been compromised. The security mantra in the past was “Risk Avoidance”. That is no longer the case...

Comments  (0)


Disagreement on Password Vault Software Findings

April 12, 2012 Added by:Brent Huston

Recently, some researchers have been working on comparing password vault software products and have found some issues. However, many of the vendors are quickly moving to remediate the identified issues, many of which were simply improper use of proprietary cryptography schemes...

Comments  (1)


Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)


Six Good Reasons Not to Ask for Social Media Passwords

April 05, 2012 Added by:Rebecca Herold

There have been a barrage of stories recently about organizations asking applicants and employees for their Facebook, Twitter, LinkedIn and other social networking passwords. Compelled password disclosure is a very bad idea for organizations to do for many reasons...

Comments  (0)


Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)


Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)


Cyber Self Defense For Non-Geeks

March 28, 2012 Added by:Jeffrey Carr

These principles won’t be sufficient when you’re in high-risk locales and they won’t stop a targeted attack, but they will make it less likely that you’ll suffer a serious breach because of poor security habits or over-reliance on antivirus or firewall applications...

Comments  (0)


Hacker Pleads Guilty to Celebrity Computer Intrusions

March 27, 2012 Added by:Headlines

Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...

Comments  (0)


Seven Problems with Cell Phone Forensics

March 26, 2012 Added by:Bozidar Spirovski

Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...

Comments  (5)


Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)


Pentagon Networks Hacked 250,000 Per Year

March 21, 2012 Added by:Rafal Los

Unfortunately, I suspect that if this actually happened at the Pentagon a quarter million times a year, America would be in a much, much worse position than we are today. Our battle plans would be compromised, launch codes, schematics, and covert identities would be compromised...

Comments  (0)


Fake YouTube Site Targets Activists with Malware

March 17, 2012 Added by:Electronic Frontier Foundation

The fake YouTube page attacks users in two ways: it requires you to enter your YouTube login credentials in order to leave comments, and it installs malware disguised as an Adobe Flash Player update. To see if you have been infected, look for the following files...

Comments  (1)


Enterprise Security's Achilles Heel

March 16, 2012 Added by:Rafal Los

Have you ever wondered why enterprise security people are so downtrodden? Baffled by the impossible arrogance of penetration testers when they laugh at corporate security postures? The bottom line: people have always been and will always be the Achilles heel...

Comments  (0)


Do You Have A False Sense of Security for Mobile?

March 02, 2012 Added by:Robert Siciliano

With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself...

Comments  (1)


LM Hash Flaw: Windows Passwords Easy to Crack

March 01, 2012 Added by:Dan Dieterle

The thing is that the lower security hashes are not present on the SAM stored on the hard drive. When the security accounts are loaded into active RAM, Windows re-creates the LM hashes. The LM Hash can be pulled from active RAM using the Windows Credential Editor (WCE)...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »