par Lansec | Oct 11, 2019 | Sécurité
he goal is to predict incidents in advance by tracing them back to the actual hijackers. The internet uses routing tables to determine how and where data is sent and received. Without accurate and reliable tables, the internet would be like a highway system with no...
par Lansec | Oct 9, 2019 | Sécurité
Organizations spend a lot of time, money, and energy protecting themselves from hackers and cybercriminals. Much of that effort goes toward securing their networks, data, and other assets. But all that security can go only so far if your employees aren’t...
par Lansec | Sep 30, 2019 | Sécurité
The industry wide use of Remote Desktop Protocol makes it a tempting target for hackers Microsoft’s Remote Desktop Protocol (RDP) is a popular and ubiquitous means of accessing, controlling, and managing remote computers, both for individuals and organizations....
par Lansec | Sep 19, 2019 | Sécurité
The average breach causes an average of $149,000 in damages, yet most small-to-medium-sized businesses thought cyberattacks would cost them under $10,000 Small and medium-sized businesses are severely underestimating the financial burden associated with a cyberattack,...
par Lansec | Sep 11, 2019 | Sécurité
Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint For all of the attention paid to software vulnerabilities—there are dozens, if not hundreds, published...
par Lansec | Sep 10, 2019 | Sécurité
Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords. Passwords are not yet past, but that glorious future land where we...
par Lansec | Août 28, 2019 | Sécurité
The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high, according to Risk Based Security. A mid-year report on vulnerabilities found so far in 2019 from Risk Based Security should make...
par Lansec | Août 27, 2019 | Sécurité
Reassembly of fragmented packets can potentially be exploited against cloud-hosted virtual machine services. Play Sound A vulnerability in QEMU—a popular open-source hardware virtualization package—allows malicious actors to perform a « virtual machine escape, » in...
par Lansec | Août 19, 2019 | Sécurité
A coordinated ransomware attack hit 23 local Texas governments encrypts files and adds a .JSE extension at the end. Here’s how to prevent an attack. On Friday, 23 local Texas government offices were hit with a coordinated ransomware attack, our sister site ZDNet...
par Lansec | Août 16, 2019 | Sécurité
Email takeover and lateral phishing attacks are a growing threat to enterprises. Businesses beware: Hackers are increasingly using email account takeover attacks to leverage legitimate accounts and send phishing emails to employees, clients, and other partners,...
Commentaires récents