1. Network infiltration is the basis for many high-profile attacks, and it involves exploiting weaknesses in software, systems, hardware or staff to gain privileged access to servers and workstations. There are many ways to hack your network and cyber-security experts will tell you that it’s not a matter of if you get hacked – but when. Once the attacker has gained entry to a trusted device on your network, then he’s spoilt for choice: […]
Penetration testing is a way for you to simulate the methods that an attacker might use to circumvent security controls and gain access to an organization’s systems. Penetration testing is more than running scanners and automated tools and then writing a report. And you won’t become an expert penetration tester overnight; it takes years of practice and real-world experience to become proficient. Currently, there is a shift in the way people regard and define penetration […]
IBM is urging customers to destroy flash drives it shipped to storage system customers because they contain malware. The company warned in an advisory Tuesday that an unspecified number of USB flash drives shipped with the initialization tool for Storwize systems contain malicious code. IBM instructed customers who received the V3500, V3700 and V5000 Gen 1 systems to destroy the drive to prevent the code from replicating. “When the initialization tool is launched from the […]
The sophisticated phishing scam spread across the web on Wednesday afternoon, tricking people into giving up access to their Google accounts. Some people, like Reddit user JakeSteam, said the scam is so sophisticated it’s virtually undetectable. After offering some obvious advice — don’t click on the link — Google tweeted it had wrestled the situation under control. Phishing, of course, is nothing new and Google users get targeted often. In 2014, a similar scam targeted […]