Blog Posts Tagged with "Attack"


Drive Encryption Useless Against Some Online Attacks

January 11, 2011 Added by:Dan Dieterle

Drive encryption is recommended, and it works very well, but just how well will it protect you from online attacks? Truth be told, in some situations it may not help you at all. I wanted to see how well drive encryption would protect a Windows XP SP3 machine from a common online Java based attack...

Comments  (5)


Anonymous Hacks Into Fine Gael Website

January 10, 2011 Added by:Headlines

The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...

Comments  (0)


DDoS Wars: 4chan Downed Again By Another Attack

January 05, 2011 Added by:Headlines

The message boards of script-kiddie haven 4chan were hit by another distributed denial of service (DDoS) campaign, just one week after suffering significant downtime from a similar attack...

Comments  (0)


Java Applet Distributes Trojan via Downloader Injection

December 31, 2010 Added by:Headlines

More than two-thousand weblinks direct users to domains that can inject malicious code by way of a Java downloader applet. The code is contained in the HTML of the infected sites, and infects the visitor's computers with a hidden iFrame containing a JavaScript function...

Comments  (1)


DDoS Wars: 4chan Gets a Taste of Their Own Poison

December 29, 2010 Added by:Headlines

According to the 4CHAN STATUS webpage, the purpose of which is to "be used to communicate with the 4chan userbase should the main site be unreachable," the main 4chan site was offline for a period on Tuesday, and reports from NetCraft indicate that the attacks have continued into Wednesday...

Comments  (7)


Man in the Middle (MITM) Attacks Explained

December 23, 2010 Added by:Stefan Fouant

MITM attacks come in many forms and essentially allow an attacker to act as a proxy between the victim and any host the victim has established connections with. It is a form of active eavesdropping in which the attacker is controlling the conversation unbeknownst to the victim...

Comments  (0)


DDoS Attacks Possible via URL Shortener

December 22, 2010 Added by:Headlines

"My implementation of this attack is, at best, a hack job, but was merely meant to illustrate how easy it is to actually implement, how simple it is to launch a DDoS simply by getting people to follow a link, and how seriously our reliance on URL shorteners can affect security..."

Comments  (0)


Internet Backbone May Be Vulnerable To Attack

December 18, 2010 Added by:Headlines

In 2003, George Mason University PhD candidate Sean Gorman mapped critical fiber optic networks across the U.S. and illustrated that vulnerabilities in the communications infrastructure could easily be identified using data and records available to the general public...

Comments  (0)


The Jester Hits WikiLeaks Site With XerXeS DoS Attack

November 29, 2010 Added by:Anthony M. Freed

Infamous hacker The Jester is claiming responsibility for a DoS attack that disabled WikiLeaks hours before the release of thousands of documents. The WikiLeaks Twitter account said, "We are currently under a mass distributed denial of service attack," for several hours on Sunday...

Comments  (3)


WikiLeaks Hit By Denial of Service (DoS) Attack

November 28, 2010 Added by:Headlines

WikiLeaks, the secret-sharing website that has been plaguing the U.S. government with the release of thousands of classified documents, allegedly suffered a denial of service (DoS) attack that took it offline just hours before the scheduled release of more embarrassing records...

Comments  (0)


DHS and DoD Say Threat of Cyber Attack is Imminent

November 22, 2010 Added by:Headlines

Secretary of Defense Robert M. Gates recently described the threat of cyber attack as huge when addressing The Wall Street Journal's CEO council. Gates also revealed plans for the the DHS to engage the NSA in more domestic cyber security operations. Here is a transcript of Gates' statements...

Comments  (0)


Hacker Pwns U of W Classroom Projectors

November 11, 2010 Added by:Headlines

The incident is characteristic of a long line of prestige attacks in which hackers perform some level of disruption in order to gain notoriety and satisfy their own egos, but the authorities and university administration are taking the incident seriously...

Comments  (0)


Brute Force vs. Dictionary Attacks

August 03, 2010 Added by:Bryan Miller

There are tools that perform brute force, and there are tools that perform dictionary attacks. There are even some tools that allow the option. Moral of the story is to understand the difference when you’re writing tools and selling them to people who know the difference...

Comments  (0)


Man In The Middle Attack Explained

July 11, 2010 Added by:Bozidar Spirovski

First, a quick definition, a man in the middle (MitM) attack is an attack where the communication which is exchanged between two users is surreptitiously monitored and possibly modified by a third, unauthorized, party...

Comments  (0)


Sun Tzu quotes from The Art of War compared to Information Security

October 26, 2009 Added by:Sean Inman

I just finished up this great book The Art of War, by Sun Tzu.  There are many different versions the one I read was “The Art of War for Managers; 50 Strategic Rules”.  I wanted to share some quotes from Sun Tzu and how I think they tie to Information Security.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »