Remove when-accounts-are-hacked-victims-must-share-the-blame
article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

It's just another day on the internet when the news is full of headlines about accounts being hacked. This is when hackers try usernames and password combos leaked in data breaches at other companies, hoping that some users might have reused usernames and passwords across services. Stop victim blaming.

Passwords 238
article thumbnail

State auditor’s office clashes with file transfer service provider after breach

SC Magazine

The incident and its aftermath serve as an example of the discord and miscommunications that can transpire between a third-party software provider and its users when something goes wrong. Previous communications lacked sufficient detail, according to the SAO’s account. The Washington State Capitol Building in Olympia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cloud Data Breaches in 2018 Lessons Learned

Spinone

When thinking about data breach, it is akin to someone stealing tangible physical items from a store without paying for them or having permission to do so. As the world we live in has become much more digital in nature, information and data volumes are increasing exponentially. No one is excluded from this threat.

article thumbnail

Sunburst backdoor – code overlaps with Kazuar

SecureList

In a previous blog, we dissected the method used by Sunburst to communicate with its C2 server and the protocol by which victims are upgraded for further exploitation. A number of unusual, shared features between Sunburst and Kazuar include the victim UID generation algorithm, the sleeping algorithm and the extensive usage of the FNV-1a hash.

Malware 61
article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why. The rest of the world, including the victims of the attack, must often engage in some degree of speculation to explain the events and devise ways to protect themselves accordingly. Introduction.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

IIain Paterson and Justin Macorin join The Hacker Mind podcast to share insights from their SecTor 2021 talk on hacking behavioral biometrics. Vamosi: How do we know who’s on the other end of a connection, who it is that is logging into a computer or an account online? That's biometrics. Yeah, I’m a bona fide cynic.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Is hacking a crime? Bryan McAninch (Aph3x) talks about his organization, Hacking Is Not A Crime , and the ethical line it draws on various hacking activities. I used to hack the phone company quite a bit. The 33 year old from suffer faced charges from US prosecutors as hacking into computers at various American agencies.

Hacking 52