Categories » Incident Response
The recent attack on Sony has publicly paraded one of the predominant problems in incident response. While the immediate issue in incident response is of course the remediation of compromised systems and bringing these systems and IT services back online, it … Continue reading
Security incidents on federal IT systems have increased more than 1,000 percent. Continue reading
NSA’s “Early warning” implants on N. Korean systems used in attribution, NY Times reports. Continue reading
TL;DR: Breach Notification refers to the notification that businesses, government agencies and other entities are required by law in most states to do when certain personally identifiable information is obtained, or believed to have been obtained by an unauthorized party. Breach Notification refers to the notification that businesses, government agencies and other entities are required […]
In an age when anyone can take credit for hacks, truth is a notable casualty. Continue reading
The firm says it was a “canary in the coalmine” after being hacked and was reacting to the situation as it unfolded. Continue reading
The attack marks only the second confirmed incident in which a wholly digital hack created physical destruction of equipment. The post A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever appeared first on WIRED. Continue reading
A week into the Sony hack, however, there is a lot of rampant speculation but few solid facts. Here’s a look at what we do and don’t know about what’s turning out to be the biggest hack of the year.
The post Sony Got Hacked Hard: What We Know and Don’t Know So Far appeared first on WIRED.
Entrepreneurs are addressing the need for tighter corporate security, but skewed valuations are making it more difficult to determine which companies are a safe bet. Continue reading
The breach exposed two things the movie industry loathes — the piracy of films and details about executive compensation — and sent a ripple of dread across Hollywood.
Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading
Jelle Martens Eight years ago, Polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware that infects the deepest level of a computer’s operating system—when she came up with a devious notion: What if, instead of putting spyware inside a victim’s computer, you put the victim’s computer inside the spyware? At the time, a technology known […]
The post How Splitting a Computer Into Multiple Realities Can Protect You From Hackers appeared first on WIRED.
From the department of face-palming opsec blunders. Continue reading
High tech firms have been offering bounties to security researchers to find holes and bugs in their software, but these reward programs haven’t drawn much interest from major banks. Continue reading
Refurbished BlackEnergy does Windows and Linux—even Cisco routers. Continue reading
Service uses Azure RemoteApp to run the browser in the cloud. Continue reading
30 September 2014- Gizmodo Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word