I recently came across this article on the “Top hacker disasters of 2011”, written by David Aitel of Immunity Inc. David has put together a brilliant article that lists some of the high profile attacks and five lessons to be learned. One key point that you should...
SplashData published their annual list of the 25 Worst Passwords on the Internet. Here is the list that all IT directors should block as acceptable logon password to websites, networks, computers, etc. Not taking precautions could result in another sort of list such...
UCLA recently agreed to pay a penalty of $865,000 for a series of HIPPA violations and now they are forced to reveal that the theft of an external hard drive from a former employee’s home has created the fears of yet another security breach. Plus, UCLA is...
Criminal Hackers Using Social Media Profiles to Crack Passwords I recently read this article by Tom Godfrey in the Toronto Sun titled Linkedin to Identify Theft. The article talks about how social media sites are used by identity thieves. It also highlights how...
“The first layer of network security is to know ‘who is knocking on the door’.” – Dovell Bonnett All the recent cyber-attacks confirm the importance of strong identity verification. To satisfy Homeland Security Presidential Directive (HSPD-12), the National...
Recently, at least 48 firms were successfully attacked when the “Poison Ivy” virus was planted on their Windows PCs. The attacks started probably in July and continued until mid-September of this year. The cause of the infection was by means of emails sent to...