Phil Muncaster T administrators were blessed with a relatively light patch load this month after whatÂ’s been a busy summer, although five of the 12 Microsoft bulletins issued have publicly…
Tag: threat
Five Ways to Help Limit the Damage of DDoS Attacks
By Chris Holden, Information Security Consultant, for Cysec-Rco: Distributed Denial of Service Attacks are becoming more common place, and the risk becomes higher as more and more Internet connected devices…
Inside threats enable vast majority of cybercrimes
By Stuart Poole-Robb No less an authority than colorful cybersecurity pioneer John McAfee firmly believes that the now infamous hack of the US-based Ashley Madison sex-cheating website was an inside…
Hackers Eschew Malware to Keep Attacks Hidden
Phil Muncaster Over half of the targeted threats investigated by Dell SecureWorks over the past year have been carried out not with backdoor malware but compromised credentials and the victim…
Credentials stored in Ashley Madison's source code might have helped attackers
Credentials stored in Ashley Madison’s source code might have helped attackers The company’s developers were careless with sensitive credentials and secret keys, a security consultant found. By Lucian Constantin If…