Recent Articles
-
RSA SecurID Breach: Is it a Brand Breaker?
Just a few days following the announcement by EMC security subsidiary RSA that its most popular authentication token product was the target of a very focused security breach, the obvious question on many minds is how much brand damage the incident will inflict on RSA and its partners. The short answer from many security pundits…
-
Hackers Will Use Those Database Weaknesses Elsewhere In The Infrastructure
Hackers Will Use Those Database Weaknesses Elsewhere In The Infrastructure The first foray into your email database may be just the tip of the iceberg for hackers’ future attacks. They could potentially use access into a less sensitive database as a toe-hold to gain access into other more important databases. Youre Probably Breaking Privacy Policy…
-
RSA SecurID Breach Has Partners Seeking Answers
RSA channel partners are seeking more information and counseling their clients on risk mitigation following the publication on March 17 of an open letter from Art Coviello, CEO of RSA, an EMC company, that outlined a breach that compromised its highly popular authentication token SecurID product. Used by a wide range of organizations such as…
-
Cyber Criminals Nab RSA SecureID Information in Breach
EMC’s RSA Security acknowledged it had been hit by an "extremely sophisticated" attack and that information related to the SecurID two-factor authentication products have been stolen. Partners: We Need More Answers on RSA Breach Intruders succeeded in breaching RSA networks "recently" as part of an Advanced Persistent Threat attack, Art Coviello, executive chairman of RSA…
-
Searches for Japan Earthquake News Targeted by Cyber Criminals
Within hours of the devastating earthquake and tsunami in Japan, cyber-criminals had poisoned search results based on the disaster with malicious links. Users searching on "most recent earthquake in Japan" may encounter some malicious links to fake anti-virus software, Trend Micro researchers said March 11. Malware writers used black-hat search engine manipulation techniques to push…