Cybersecurity & Espionage Articles
Original Post on Secuirty Asia
Visual hacking is a low-tech, visual method used to capture confidential information for unauthorized use. It includes capturing documents on desks or screens via vision or unapproved smart devices. To be really entertained, check out Johnny Long's No-Tech Hacking presentation here.
0 Comments
Original Post on Wired.com
Other vulnerabilities that are favorite attack vectors? The personal devices employees bring into the office on which they’ve allowed their kids to load Steam games, and which the workers then connect to the network. If you really want to make the NSA’s life hard: limit access privileges for important systems to those who really need them; segment networks and important data to make it harder for hackers to reach your jewels; patch systems and implement application whitelisting; remove hardcoded passwords and legacy protocols that transmit passwords in the clear. Original Post on 60 Minutes
Best Defense: Be cautious of attachments and links (even if you know the person who sent it to you). Original Post at The National Interest
The OPM hack is one of the most catastrophic data breaches in U.S. history with the potential to inflict incalculable damage to our national security. The unfortunate part was that it was predictable and possibly preventable. |
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |