Website Files Ransomed – Not Just Personal Files

This image explains (from PCWorld Article)  The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if your computer was already Pwned (taken over somehow by criminal hackers) and then the criminal sold your computer access to the Ransomware criminal. That is … Read more

NTP Attack Can Cause Encryption and DNS Problems

Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg wrote a paper (out of Boston University) http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf “Attacking the Networking Time Protocol”   Apparently if your servers and clients (which all have NTP) have their time changed can affect various processes. To Attack …     Change time by … TLS Certs     … Read more

DDOS Amplification Attack Study Shows Effectiveness

http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp based scans to test the Internet. This table means that there are hundreds of thousands potential computers(network devices) on the Internet that can be used … Read more

Bank Hacked In Minutes – Executives Don’t Know Nothin

In less than a minute a Hacker found out that the bank was giving out too much information. http://sijmen.ruwhof.net/weblog/584-how-i-could-hack-internet-bank-accounts-of-danish-largest-bank-in-a-few-minutes As the hacker studied the website information, it was evident that it will not take long to hack the website. Which means access to customer server information, so that means PII (Personal Identifiable Information), banking information … Read more

We are Hacked – Firewall Useless – Now What?

Why did we get hacked?  Is a common refrain after a breach. Thousands of businesses got hacked last year (and this year) as in my previous post: http://oversitesentry.com/analyzing-data-breaches-can-we-tolerate-status-quo/ We believe in our technologies, in automation in firewalls There are many aspects of potential weakness – and all weaknesses will be taken advantage of. The only way … Read more