Items Tagged with "Attacks"


0a8cae998f9c51e3b3c0ccbaddf521aa

Source Code is the New Hacker Currency

May 01, 2011 Added by:Rafal Los

The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...

Comments  (4)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber Conflict in Dutch National Risk Assessment of 2010

April 28, 2011 Added by:Don Eijndhoven

The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending Web Apps Against Overwhelming Odds

April 24, 2011 Added by:Rafal Los

We can all agree that there are enough *exploitable security defects* in software that virtually every organization on the planet can (and will) be broken into given enough time - so where does that leave us? More importantly, what does that have to do with cloud computing?

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Web Application Security: Minimizing the Risk of Attacks

April 19, 2011 Added by:Sasha Nunke

Vulnerabilities in web applications are now the largest source of enterprise security attacks. Web application vulnerabilities accounted for over 55% of all vulnerabilities disclosed in 2010, according to an IBM X-Force study. That may be the tip of the iceberg...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Malware Increases 400% Since Rustock Takedown

April 13, 2011 Added by:Headlines

The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Analysis Shows Firewalls Fail to Deliver as Promised

April 12, 2011 Added by:Headlines

Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Incident Response: Practice Makes Perfect

April 09, 2011 Added by:Brent Huston

Perhaps you will be lucky and never experience a bad information security incident. But if you do, you will be very glad indeed if you have a well practiced information security incident response program in place...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SMBRelay Attacks on Corporate Users

April 07, 2011 Added by:Alexander Polyakov

An attack on a network is a progressive action. We escalate our rights step-by-step to a domain administrator. Even casual un-privileged users can give us access to some shared resources. But how do we get these user rights? We can enforce users to authenticate on controlled a machine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Are Second Biggest Threat to Airline Security

April 01, 2011 Added by:Headlines

"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Espionage Operations Escalate

March 31, 2011 Added by:Headlines

"Today, we see constant attempts by cyber means to steal the nation's secrets, as well as information vital to the effective operation of critical national industries and infrastructure, not to mention commercial intelligence and criminal fraud..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

NASA Systems Are Still Too Vulnerable to Attack

March 31, 2011 Added by:Dan Dieterle

Serious security gaps were found at NASA during a recent audit. The fact that a government run entity has been attacked, and then apparently ignored a plan to remedy the situation, speaks volumes about our nation's ability - or maybe better said desire - to thwart hacking attempts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attack Utilizes Vanity Searches to Target Executives

March 29, 2011 Added by:Headlines

Boodaei calls the attack "VIGNS" - short for "Vanity Infection from Google News Searches" - and the purpose is to create the circumstance where the targeted victim will enable the attacker to circumvent security measures and infect the executive's computer with malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attacks on Federal Networks Increased Forty Percent

March 24, 2011 Added by:Headlines

"DHS anticipates that malicious cyber activity will continue to become more common, more sophisticated and more targeted — and range from unsophisticated hackers to very technically competent intruders using state-of-the-art techniques," said DHS spokesman Chris Ortman...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyber Warfare Decomposition... Fail

March 23, 2011 Added by:J. Oquendo

Administrators and engineers can and should take an altogether different approach to security. We may never be able to stop random attackers from knocking on our door, we can however stop answering the door. This is another failure from security management right on down to the engineering level...

Comments  (2)

E4b33dbe234685965beb3e9f2a0ad456

Increase in SSH Brute Force Username Guessing

March 23, 2011 Added by:Ted LeRoy

The crackers are using automated tools that scan for valid ssh logins using a username list. The sites and names that come up can be processed again, checking for weak passwords or brute force vulnerabilities. The tools and method are not new, but the number of attacks seems much higher lately...

Comments  (15)

Page « < 29 - 30 - 31 - 32 - 33 > »