BryonT

December
31
0 likes
0 comments
0 shares

Hacker Tries to Sell Access to BBC on Christmas Day

The world’s largest and oldest broadcaster, the British Broadcasting Company (BBC), became the next victim of cyber attack as their servers were accessed by a Russian hacker on Christmas Day, according to recent articles published by both Reuters and The Hosting News (THN). The article by THN indicated that the hacker accessed the British broadcaster’s servers “through an ftp system which is typically used for transferring large data files.” According to the Reuters report, the “notorious” hacker, known by his online names, “HASH” and “RevOlver“, used the accessed files and information to “convince high-profile hackers that the site had been infiltrated, in which he then attempted to sell data from the site in a  campaign to other cyber criminals.” Hold Security LLC., a cyber-security…

Read More ›

December
30
0 likes
0 comments
0 shares

Insight: How to Detect and Prevent Attacks

In a recent article published by Security Week, Michael Callahan of Juniper Networks, runs through a number of  “alternative” methods for detecting and preventing “brute force attacks” on your networks and systems. As Callahan outlines, using “strong and different passwords for every site we visit” is the optimum choice and would be the norm in a “perfect world” – but we don’t always do right things. In the article, Callahan states, “There are just so many sites out there and coming up with umpteen different passwords isn’t always easy for people. Password reuse is rampant, even among people who should know better and creates a vulnerability that can be exploited.” As we have read about in recent reports, criminals will use any…

Read More ›

December
30
0 likes
0 comments
0 shares

NSA Paid to Gain Access to Devices, Computers

RSA Security, LLC. has been paid approximately $10 million by the U.S. National Security Agency (NSA) to “install bugs into the company’s encryption software so that the agency could spy on its customers“, according to a recent report published by The Hosting News. Another article,  published by CNet, stated that the Germany magazine, Der Spiegel has reported the NSA’s Office of Tailored Access Operations (TAO) of being used to “access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung” and used to deal with “hard targets” and “systems that are not easy to infiltrate“. A statement was released by the RSA, as quoted in The Hosting News article to say, “We have…

Read More ›

December
27
0 likes
0 comments
0 shares

Target Says PIN Data Safe After System Hacking

The retail company Target announced that customer personal identification number (PIN) information “had not been breached” after 40 million customer credit and debit card records were stolen recently, according to a story published by the New York Times. Target announced, in previous statements, that the attackers “made off with customers’ encrypted PIN information” but “the company stored the keys to decrypt its PIN data on separate systems from the ones that were hacked“, according to the article. Even though this incident primarily affected the retail marketplace, it also leaves multiple industries concerned about additional breaches in data storage, outdated security measures, network vulnerabilities and malicious attacks by hackers in their own environments. Molly Snyder, spokeswoman for Target, was quoted in the article to say, “We…

Read More ›

December
27
0 likes
0 comments
0 shares

Google Sees Rise in Info Removal Requests

A  “Transparency Report” released by Google shows an increase in the amount of requests from the federal government to “remove information from their services“, according to articles  published by both PingZine.com and the New York Times. The amount of removal requests has “greatly spiked in the last year“, according to the article. Google, Facebook, Microsoft, and other companies have combined their efforts, according to PingZine,  to “protect their user’s private information from spying government agencies“, as stated in their report. The federal government submitted 3,846 removal requests to Google between January to June 2013 – they complied with more than a third of them, according to the New York Times report. This is an increase of 68 percent over the second half of 2012 as stated…

Read More ›

December
26
0 likes
0 comments
0 shares

Security Firm Uses Hackers to Test Server Vulnerability

The San Francisco-based security company CloudPassage recently offered a $5,000 prize to any “hacker” who could successfully gain access to web-based servers – like those used by major companies today – configured with assorted operating systems, programs and applications, according to an article published by the San Francisco Chronicle. The article asked a question that the CloudPassage exercise wished to answer: “How long would it take to hack into an average  server – the kind a company might rent from the likes of Amazon Web Services?” According to the Chronicle’s report, CloudPassage configured “six servers, two running Microsoft operating systems and four running Linux-based operating systems” then proceeded to invite a number of individuals from numerous technological backgrounds to break past the security…

Read More ›

December
26
0 likes
0 comments
0 shares

Fed Group Posts Suggestions About Private Data Access

A group called the Review Group on Intelligence and Communications Technologies, established by the federal government after the National Security Agency’s (NSA) questionable foreign intelligence practices were recently made public, released a list of recommendations how to maintain and keep national security at top priority while gaining back trust in the government’s communications system, according to a recent report published by The Web Host Industry Review. The article indicated that this group investigated “the more broad issues around balancing liberty and security with privacy and civil liberties“. The President of the United States and his national security team will look at the review and consider its findings, but is not obligated to adopt their recommendations. It will take President Obama and his team…

Read More ›

December
20
0 likes
0 comments
0 shares

Money Laundering Link Puts Web Host at Risk

LeaseWeb, a Netherlands-based web hosting provider, has been warned by The Federation Against Copyright Theft (FACT) to disable the streaming video website TheShowDepot.com or be charged as an accomplice to money laundering offenses, according to a recent article published at The Web Host Industry Review website. The report indicates that the website’s IP address was blocked by the hosting company in November after take down procedures were followed and TheShowDepot was notified of the copyright complaint. Alex de Joode, LeaseWeb Senior Regulatory Counsel, was quoted in the article to say, “Under Dutch law, as long as we follow the before mentioned principles, there is NO criminal liability for hosts in the Netherlands. According to the eCommerce Directive the legislative regime in a third country (in…

Read More ›

December
20
0 likes
0 comments
0 shares

Analysts Say Unix Will Fade from Data Centers

Researchers at the analyst firm Gartner believe that the Unix operating system is “on a path to insignificance” and report that many of their clients have begun to plan a migrations, according to a recent article published by Network World. Analysts report that it may take two to five years for many of these organizations to make the change and others may still be running Unix in 10 years, according to the article. Experts say that if Unix is replaced, an alternative “operating system or other technology” must be identified as its replacement in the data center, according to the article.  Gartner analysts feel, according to the report, that it is this “insight into the future” where its clients are truly struggling. Those…

Read More ›

December
19
0 likes
0 comments
0 shares

Feds Quickly Expand Cloud Adoption Despite Concerns

A recent study conducted by Tripwire, a security and compliance solution provider, found that United States government agencies are quickly proceeding to expand their existing “adoption of cloud infrastructure” even though security concerns have been a constant obstacle, according to a recent article published by The Web Host Industry Review website. The article states that when comparing the current findings to those from one year ago, the study reveals that “four times more respondents are outsourcing at least a third of their IT infrastructure to cloud vendors.” Dimensional Research conducted a survey over a one week period in 2013 which measured the thoughts of “100 federal IT professionals from military, intelligence and civilian agencies”, according to the article. Approximately half…

Read More ›