article thumbnail

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005. Google has begun contacting system administrators whose organizations would have been affected by the glitch to encourage them to change their passwords.

Passwords 247
article thumbnail

Meet the Administrators of the RSOCKS Proxy Botnet

Krebs on Security

Stanx said he was a longtime member of several major forums, including the Russian hacker forum Antichat (since 2005), and the Russian crime forum Exploit (since April 2013). In an early post to Antichat in January 2005, Stanx disclosed that he is from Omsk , a large city in the Siberian region of Russia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security advisories are falling short. Here's why, with Dustin Childs: Lock and Code S03E25

Malwarebytes

That time-sink proved to be a real obstacle for systems administrators because, back in the late 90s, patches weren't scheduled. What they came up with in 2005 was the Common Vulnerability Scoring System, or CVSS.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

That same IP was used to register the nickname “ Deem3n®, ” a prolific poster on Antichat between 2005 and 2009 who served as a moderator on the forum. md , and that they were a systems administrator for sscompany[.]net. That same Google Analytics code is also now present on the homepages of wiremo[.]co

Malware 195
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Firewall 218
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The software giant’s intent was to make it more convenient and efficient for system administrators to perform Windows upkeep. RDC emerged as a go-to productivity tool, and similar controls swiftly emerged for Macs, IoS, Android and other operating systems in wide use.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Once a penetration tester, Paul Asadoorian has been the founder and CEO of Security Weekly and host of a weekly show since 2005. Denial-of-Suez attack. Jack Daniel | @jack_daniel. Paul Asadoorian | @securityweekly.