Recent Articles
-
Northrop Grumman, L-3 Communications Hit in Cyber-Attack via RSA SecurID Tokens
Another defense contractor appears to have been hit by a cyber-attack, and a leaked memo indicates the executives believe attackers used information stolen from RSA Security earlier this year. If true, RSA’s SecurID technology may be irrevocably compromised. Attackers hit major defense contractor L-3 Communications Holdings by spoofing passcodes from a cloned RSA SecurID token,…
-
Insider Attacks and Human Error Is Your Database Safe
Insider Attacks and Human Error Is Your Database Safe 56 percent of the non-financial services respondents believe that human error represents the greatest challenge or risk to database security. No Title 24 percent of non-financial services firms state that abuse of privileges is the greatest threat. No Title 77 percent of financial firms are mostly…
-
Lockheed Martin Nixes Remote Access After Network Intrusion
Lockheed Martin has been battling a “major disruption” to its computer systems after its IT security team detected a network intrusion earlier this week, Reuters reported. The disruption began May 22 when the company detected an intrusion to the network, according to the May 26 Reuters story, which cited technology blogger Robert Cringley. Cringley claimed…
-
Spammers Start Their Own URL-Shortening Services
Spammers have upped the game of fooling end users by establishing their own fake URL-shortening services, according to a new report from Symantec. The dangers of clicking on unknown shortened URLs are higher now according to Symantec’s May 2011 MessageLabs Intelligence Report. The report found that spammers have set up their own fake URL-shortening services…
-
Businesses Not Keeping Up with New Security Threats: Report
Nearly three-quarters (73 percent) of corporate network devices analyzed by Dimension Data during 2010 were carrying at least one known security vulnerability. This is almost double the 38 percent recorded in 2009. Dimension Data also found that a single higher-risk vulnerability, PSIRT 109444, which was identified by Cisco in September 2009, was discovered in a…
-
Consumerization of IT a Double Edged Sword
Consumerization of IT a Double Edged Sword 70 percent of IT respondents are concerned about personal mobile devices such as iPads, iPhones, and Android devices connecting to the corporate network. No Title 84 percent of respondents say their corporate network is protected from devices that are unpatched or poorly managed. No Title One-third of respondents…