Entries by fdesir

Why Twitter’s two-factor authentication isn’t going to stop media organisations from being hacked

A posting from Naked Security on Why Twitter’s two-factor authentication isn’t going to stop media organisations from being hacked: Twitter has announced the availability of two factor authentication (2FA) for its service, meaning that users can opt-in to something stronger than just a username and password to protect their accounts. In a blog post, Twitter explains how the […]

Controlling The Risks Of Vulnerable Application Libraries

A posting from Dark Reading in there Application Security section: During the past decade, developers have increasingly leaned on third-party components, such as open-source libraries, to dramatically lighten the load during coding. These components can help reduce time spent adding basic or universal features and functions so that developers can focus their work on the innovative […]

New Focus On Risk, Threat Intelligence Breathes New Life Into GRC Strategies

A posting Dark Reading in the Risk Management  section: A growing need for security discipline and the availability of better threat data are changing the old, monolithic Governance, Risk and Compliance concept into a near-term enterprise risk management project, experts say. GRC, a methodology for building global IT policies, priorities and practices around key risk and […]

Guantanamo Wi-Fi shuttered after Anonymous hacking threat

A posting from CNet News in there Security and Privacy section: After the hacking collective Anonymous launched a Twitter campaign pledging to go after the Guantanamo Bay Naval Base in Cuba, the U.S. military barred all Wi-Fi access on the base, according to the Associated Press. All social media, including Facebook and Twitter, also has been banned. […]

Some US utilities say they’re under constant cyberattack

An interesting article in NBC News in there Technology Section:  Several power utilities say they face a barrage of cyberattacks on their critical systems, a report by two Democratic lawmakers found, echoing warnings from the Obama administration that foreign hackers were trying to bring down the U.S. power grid. Rep. Henry Waxman, D-Calif., released the report, […]

Google Aurora Hack Was Chinese Counterespionage Operation

A posting from Informationweek Security : A high-profile information security attack against Google in late 2009 — part of what was later dubbed Operation Aurora — was a counterespionage operation being run by the Chinese government. Former government officials with knowledge of the breach said attackers successfully accessed a database that flagged Gmail accounts marked for court-ordered wiretaps. […]

DDoS-for-hire service is legal and even lets FBI peek in, says a guy with an attorney

A posting from Naked Security about DDoS-for-hire service is legal:  Paying a site to DDoS other sites is perfectly legal, the proprietor behind one such outfit told security journalist Brian Krebs. Besides which, he says, his service, called RageBooter, even features a nifty backdoor that lets the FBI monitor customer activity. The conversation took place recently between Krebs […]

Black Hat 2013 Showcases Home Security, Bootkits, Cellular OPSEC Failures

A posting from Dark Reading on Black Hat:  Major information security event Black Hat has announced three more featured talks — just the start of an avalanche of new briefings being announced on the Black Hat USA website. We’re highlighting three of them here — focusing on diverse subjects spanning home security system hacking, bootkit threats across multiple OSes, and […]

Large Attacks Hide More Subtle Threats In DDoS Data

An interesting article from Dark Reading in there Security Monitoring section : The massive avalanche of data in March that crashed down on Spamhaus, the maintainer of a number of spam blacklists, made headlines as the largest distributed denial-of-service (DDoS) attack witnessed to date. Along with the ongoing campaign against financial institutions by a group of attackers calling […]