The Treasury inspector of the Internal Revenue Service has already received more than 366,000 complaints regarding tax returns filed by identity thieves. More than 3,000 people have been victimized and $15.5 million has already been pilfered. Officials are pushing hard to find the various culprits, but confidence has waned. For a more detailed article on this subject, click here:: Fake IRS Agent Scam Targets Public, Even Feds, While Identity Theft Tax Fraud is Rampant
News
Syrian Electronic Army Attacks Web Hosts
The Syrian Electronic Army, a pro-hacker group rumored to be tied with Syrian President Bashar al-Assad, is back in the news for attacking five of the most prominent web hosting companies. Bluehost, Justhost, Hostmonster, Hostgator, and FastDomain were all hacked by SEA after SEA accused them of hosting terrorist web sites on their servers. For more on this story, click here:: 5 Biggest Hosting Companies Hacked by Syrian Electronic Army
Cisco IP Phones Have Eavesdroppers
Cisco IP Phones are popular for small businesses, but a newly discovered vulnerability could allow attackers to remotely eavesdrop on private conversations. While Cisco is aware of the issue, they are still working on a firmware patch to address this problem. In the meantime, administrators are advised to allow network access to only trusted users. For more on this issue, please click here:: Cisco IP Phones Vulnerable to Remote Eavesdropping
DevOps Security Tips
While DevOps makes lives easier for organizations, many aren’t keeping up with security and compliance monitoring tools. It is important for the DevOps team to have security measures within the data pipeline in order for data to be closely monitored automatically and safely. For more DevOps tips, click here:: 10 Practical Security Tips for DevOps
Does Hacking Back Really Help?
When your system has been hacked by attackers or a competitor, is the proper response to hack back? While legally inadvisable, many hurt egos try to confront their cyberattacks with one of their own, often leading to a mess on both sides. For a full article discussing the problems of hacking-back, click here:: Hacking Back: Two Wrongs Don’t Make a Right
- 1
- 2
- 3
- …
- 38
- Next Page »