hover animation preload hover animation preload hover animation preload
wordpress post entry title background
Ipswitch FT On-Demand Webinar: Business-class File Sharing
post entry title background

By ADuch -

Consumer-grade solutions such as Dropbox, webmail and USB drives are being rapidly adopted in the workplace but are they right for you?

View Ipswitch FT’s on-demand webinar to hear Michael Osterman and Ipswitch’s David Boone address these issues:

  • Typical Tools – What are the products employees are bringing with them to work?
  • What are the risks of relying on personal file sharing tools in the workplace?
  • How can I balance the need of the individual with the requirements of the organization?
  • Top 3 things to look for in an easy-to-use and governed business-class file sharing solution?

 

Don’t waste any more time. View Ipswitch FT’s on-demand webinar today!

View Business-class File Sharing Webinar

 

wordpress post entry title background
Ipswitch FT File Sharing Webinar
post entry title background

By ADuch -

What are the benefits, the risks, the consequences, and the alternatives to the proliferation of personal file transfer and file sharing tools?

Consumer-grade solutions such as Dropbox, webmail and USB drives are being rapidly adopted in the workplace.  The question is — are they right for you and your organization?

Next Wednesday, on April 25th, Ipswitch FT invites you to join industry experts Michael Osterman and Ipswitch’s David Boone in a 29-minute rapid-fire discussion where they will address:

  • Typical Tools – What are the products employees are bringing with them to work?
  • What are the risks of relying on personal file sharing tools in the workplace?
  • How can I balance the need of the individual with the requirements of the organization?
  • Top 3 things to look for in an easy-to-use and governed business-class file sharing solution?

 

If you manage an IT environment where these tools are pervasively used by employees to send company information, then you’re encouraged to participate in what should be a very opinionated discussion.  Bring your questions.  Challenge the experts.  Learn how to regain control.  And enjoy the conversation.  Register now.

P.S. – If you are unable to attend the live event, please register anyways and they’ll email you a link to the archived recording for playback on-demand, as your schedule permits.

 

 

wordpress post entry title background
6 Million Logins Leaked in China
post entry title background

By ADuch -

A Chinese hacker with the surname Zeng was recently arrested in Wenzhou, China for illegally hacking and leaking personal information belonging to over 6 million users of China Software Developer Network (CSDN). This particular case is being called one of the largest hacking cases in China’s internet history!

Zeng leaked the information he collected over the years on December 21, 2011. Some of the information exposed includes user names, passwords, and email addresses linked to social networks and financial service websites. Due to this incident, the Beijing police decided to discipline CSDN for poorly securing their database. According to CSDN, they are now properly protecting their servers and apologize for the incident.

Now even if you weren’t affected by this particular case, you should still change your passwords regularly to protect your personal information. This will only benefit you, especially if something did happen.

For more on this story, click here!

wordpress post entry title background
March Madness Meets Higher Education Data Breach
post entry title background

By ADuch -

It’s that time of year again, March Madness! While everyone is finishing up their NCAA brackets, TeamShatter has put together a more unique bracket – “A Higher Education Data Breach Madness Bracket.”

This particular bracket is quite simple. “For each U.S.-based institution of higher learning that reported a data breach in 2011, [Team Shatter] seeded (ranked) them based on number of records affected. From there, it was straight forward – the larger the breach, the further they went in the “tournament”, until an eventual champion was crowned.”

Based on their research, 48 institutions were affected by data breaches in 2011. Out of those 48, VCU ended up with the title with a whopping 176,567 records reportedly breached.

For more on this story and for more stats on TeamShatter’s 2010 and 2011 brackets, click here.

wordpress post entry title background
LulzSec Leader Turns Informant
post entry title background

By ADuch -

One of the most popular stories in the news today regards LulzSec leader Hector Xavier Monsegur a.k.a. “Sabu”. It was reported that Sabu was in fact nabbed by the FBI sometime in June 2011. He pled guilty to more than ten charges of hacking conspiracies and criminal activity. Since then, the “hacking king” has been working alongside the FBI and betraying his fellow LulzSec members by turning them in.

If you’re not familiar with what Sabu has done in the past, you should know that he was the mastermind behind many high-level attacks (FBI, CIA, Sony, FOX, etc.). He continued to make headline news, but fell off the grid for a couple of months. Now that he’s an informant, it all makes perfectly sense why we haven’t heard from him. He was too busy snitching out his former friends.

According to reports, he didn’t cooperate right away though. The FBI claims, “He didn’t go easy. It was because of his kids. He didn’t want to go away to prison and leave them. That’s how we got him.”

To read more about this story, click here.

wordpress post entry title background
Will your Internet be cut off on March 8th?
post entry title background

By ADuch -

We are all well aware that there are many infected computers in the United States. But is your computer one of them? And if so, who’s taking action other than yourself?

The answer is the FBI. In recent news, the FBI stated that they “may cut off Internet access to millions of people on March 8th to try to rid the country of a Trojan.” The Trojan, called DNSChanger Trojan, “changes an infected computer’s DNS settings to send users to fraudulent websites.” It has been lurking undetected in about half a million computers around the United States. Some of the computers come from half of all Fortune 500 companies AND 27 government agencies.

What makes things more complicated is that the Trojan prohibits users from visiting security websites that offer to fix the issue at hand. So in reality, the worm’s botnet is still at large and the FBI is looking for ways to conquer this issue.

Their solution is to set up temporary placement DNS servers to users with infected computers. In the end, this will hopefully get the worm off their systems. The FBI’s court order for this expires on March 8th. If they don’t receive an extension after March 8th, users who are still infected may be cut off from the Internet.

Please click here to learn more about this story.

http://gizmodo.com/5885716/the-fbi-might-cut-off-the-internet-for-millions-of-people-on-march-8th

wordpress post entry title background
Update on Anonymous Hack during FBI Call
post entry title background

By ADuch -

In the case of the hacked call, the FBI confirmed that the recent recording of their conversation with Scotland Yard was indeed authentic. An investigation is now taking place, but Anonymous does not seem to be worried. In response to this, the group continues to put things out to the public. This time around they posted an email that displayed all of the email addresses of the people who participated in the call.

Now what exactly happened? Investigators believe that someone on the secure email network sent out an email to his or her private email account. This email held the password and location number of the conference call and was ultimately hacked by Anonymous once it founds its way to the private email account.

If this is the case, security experts believe “that the weakest links in cyber security systems are the humans who use it.” According to VP of KNOS Project, “If there’s any blame to be placed for the compromise,” he says, “it has to be laid at the feet of those who configured the teleconferencing systems that answered the phone without screening the calls first.”

To read more about this story, please click here.

wordpress post entry title background
How to prepare yourself for Anonymous
post entry title background

By ADuch -

First things first, if you do not know who Anonymous is, please click here. This will link you to a slide show and you will learn 10 key facts about the group.

If you do know who Anonymous is then you should know that the group continues to make their mark. In recent news, Anonymous went on their own personal hacking spree. What exactly did they do? A number of things: the group took down DHS’ (The Department of Homeland Security) homepage, released an audio recording of a conference call between the FBI and foreign authorities, and then infiltrated the website of the attorneys representing Sergeant Frank Wuterich. Not only that, but they were able to do this all in 1 DAY!

So the question is, what exactly can you do and what exactly should you do to prepare for something like this? Lucky for us, InformationWeek.com has put together 10 strategies to fight off Anonymous DDos attacks.

  1.  Know you’re vulnerable
  2. DDos attacks are cheap to launch, tough to stop
  3. Plan ahead
  4. Secure potential bottlenecks
  5. Watch what’s happening on the network
  6. Look beyond large attacks
  7. Beware application-layer attacks
  8. Watch for blended attacks
  9. Make upstream friends
  10. Consider countermeasures

For a more in depth explanation on each strategy, please visit InformationWeek.com or click here.

wordpress post entry title background
Lessons Learned from Zappos Breach
post entry title background

By ADuch -

What can we take away from the recent Zappos breach? Lucky for us, InformationWeek listed 8 lessons that all businesses should learn from the Zappos situation.

Lesson 1: Advance planning mitigates breach fallout

Lesson 2: Create a response plan in advance

Lesson 3: Issue a clear, timely warning

Lesson 4: Secure stored credit card data

Lesson 5: Notify customers in multiple ways

Lesson 6: Think of non-U.S. customers

Lesson 7: Tap external sites if necessary

Lesson 8: Pick the right breach support channels

For more details on each rule, please visit InformationWeek or click here.

wordpress post entry title background
Zappos Attacked by Unkown Hacker(s)
post entry title background

By ADuch -

2011 was a record breaking year for data breaches. Will 2012 be the same? If companies do not tighten up their security, it may just be.

In recent news, another popular website fell victim to a cyber-attack.  Zappos.com, an online shoe and clothing retailer, was hacked by an unknown criminal who was able to tap into their internal network/systems through one of the company’s servers in Kentucky. So what exactly was stolen?

According to Zappos CEO Tony Hsieh, the unknown criminal genius was able to nab customer names, email addresses, billing and shipping addresses, the last four digits on their credit card number, and a “cryptographically scrambled” version of their website password. In response to this, Zappos immediately emailed its 24 million customers explaining the situation at hand. They also advised their customers to reset their current Zappos passwords and to change their passwords on any other website that uses the same email address.

At this moment, Zappos does not know when they were attacked. Nor do they know how long the attacker had access to their internal networks. What they do know is that they will be temporarily closing their phone lines and answering all questions through email.

Although this was not a heavy breach, the attack still hurts the company. It disrupts the company’s activity, performance, and it ultimately affects their customers.

For more on the attack on Zappos, click here.