2012’s RSA Conference kicks off February 27th. Executive Chairman, RSA, Security Division of EMC Arthur Coviello, Jr. will present a program focused on the fact that in the past 18 months, organizations throughout the world have been under attack by nation-states, “hacktivists,” and cyber criminals.
PBS NewsHour Senior Correspondent Jeffrey Brown will address “hacktivism”—the use of computers and computer networks to protest or promote a political agenda or ideology—which Brown will argue has reached a tipping point, requiring an adjustment in our approach toward enterprise security.
And Stuart McClure, Chief Technology Officer at McAfee, will discuss the rapid evolution of the threat environment, and how what was once considered theoretical has become reality.
No one is immune, whether you are a soccer mom, small business, major corporation, the federal government, or the president of Syria, whose email account (password: “12345”) was hacked by a collective known as Anonymous, who were able to access hundreds of private email messages. Anyone who attracts the attention of a criminal hacker is a target.
“Hacktivists” are activists who use computer hacking as a weapon against anyone they deem oppressive. There may be hundreds of thousands of hackers operating based on this justification for their hacking, with little to no oversight or guidelines beyond their individual impulses determining their next victim. In some cases, hackers are motivated simply by petty dislike or disagreement.
Protecting your networks starts with a few basics, including:
- Total, “all-access” protection, including antivirus, anti-phishing, and anti-spyware
- Full disk encryption
- Firewall security appliances
- WPA2 wireless security
- Up-to-date operating system and software critical security patches
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Stealing Secrets: Telling Lies Over the Phone
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon) I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. At the recent Defcon event, social engineers proved that it doesn’t take much more than asking to get
- P2P on Your PC Equals Identity Theft
Robert Siciliano Identity Theft Speaker Peer to peer file sharing is a great technology used to share data over peer networks. It’s also great software to get hacked. The House Committee on Oversight and Government Reform is responding to reports that peer to peer file sharing allows Internet users to access other P2P users’ most important files, including
- 7 Types of Hacker Motivations
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology
- Predators use Facebook to groom Kids
Lock this guy up for good. That’s a most fitting motto for Brandon McIntyre, 22, who pretended he was “Katie Thompson” on Facebook and threatened to kill a girl’s family if she refused to go on trips with him. This New Jersey nutcase made another ridiculous threat (ridiculous, because, how could he think that even young
- When FTC Sends a Warning, Data Theft Has Jumped the Shark
When Fonzie jumped the shark on his HOG, that spelt the end of Happy Days. The FTC sending a warning to 100 companies and agencies that their employees are leaking client and sensitive data on the web via Peer to Peer file sharing (P2P) is the single most pathetic and embarrassing communication to come across
Leave a Comment
You must be logged in to post a comment.