According to a study, only one percent of data breaches are caused by hackers! On first position of data breaches causes: negligent team members! Source: Data News.
Tag: Security
NVidia GPU Used to Crack WPA(2) Keys
I found this article which speaks about a Russian firm which developed a tool to use NVidia GPU (up to four) to decrypt WPA or WPA2 encryption systems (bruteforce method). Here is the product: ElcomSoft Distributed Password Recovery. Conclusion? Wi-Fi protections are not sufficient enough to ensure confidentiality! Always use
Unresolvable Captcha!
I read a story (in French – translated here) about a French ISP which uses an online form protected by an unresolvable Captcha! Funny but frustrating if you really need to contact them! Check out the form and feel free to test it: http://faq.1and1.fr/contact/1.php.
One Day in the Life of the SANS Internet Storm Center
Yesterday, I attended a very interesting session about the SANS “Internet Storm Center” (ISC). This event was organized by the Belgian ISSA Chapter in Brussels. As I’m a daily ISC users for a long time, it was very interesting to have a “back stage” overview of this organization. The Internet
Cyber Security Awareness Month
“October is Cyber Security Awareness Month and this year the SANS Internet Storm Center is going to offer daily tips on each of the six steps of incident handling areas according to the following schedule: Preparation: October 1-4 Identification: October 5-11 Containment: October 12-18 Eradication: October 19-25 Recovery: October 26-31
Workstation (Un)locking Using Bluetooth
When you use a workstation (PC, laptop or thin client), it’s important to lock it when you are away for a while or funny things may happen. Usually, the screen is automatically locked after a configurable inactivity period. To unlock it you need to type a password or, on some
Intrusive Browser Alert Advertisement
Some advertisers spammers have great ideas to send unsolicited messages to a targeted audience. Their goal is to convince the end-user to click on an advertisement. A new method seemed to appear on the web recently: They simulate a browser security warning! Often, users doesn’t even read the warning message
DiY Network Sniffer
From time to time, network administrators have to use a sniffer to capture flows of packets . In a switched environment, packets are sent from a source to a destination and only the destination host can “see” the packet. To be able to receive all the packets sent into a
Secunia Opens Exploits e-Shop
Secunia announced in its blog a new service: “One Stop Exploit Shop” To resume, they will propose exploits and security breaches PoC to security professional trough their website against some $$$. As stated in the announce, after approval by Secunia (at least!), vendors and companies will have access to the
iPod Auto-Erase Feature
The new firmware 2.1 is available for the iPod and introduced a new feature: You can configure your device to automatically erase all its data after ten unsuccessful password attempts! No idea if the same feature will be present in the iPhone version (which should be available today). Nice feature