Observations on articles I read to keep current about technology. My interests are: Privacy, security, business, the computer industry, and geeky stuff that catches my eye.
I don't think I have an agenda beyond my own amusement.
Note that I lump all my comments into a single post. This is not a typical BLOG technique, It's just an indication that I'm lazy.
Wednesday, June 15, 2016
Interesting (if slightly misleading) headline. Should we be sharing this information with
foreign governments?Didn’t President
Obama tell Asian leaders that, “Yes Trump is crazy, but he is unlikely to be
elected?”
Two groups of hackers sponsored by the Russian government
broke into the computer systems of the Democratic National Committee and
accessed emails, chat logs, and a trove of detailed opposition research on
Donald Trump assembled by the party’s researchers.
The hackers were removed from the system over the weekend,
officials told The Washington Post, but not before they
were able to comb through staff members’ day-to-day communications and their
research on the presumptive Republican nominee.
One hacking group entered the system last year, and been
monitoring DNC communications since then, the Post’s Ellen Nakashima
reported. This April, the other group
gained access to the Trump files.
Verticalscope.com and all of
their domains were hacked in February of 2016. LeakedSource has obtained and added a copy of
this data to its ever-growing searchable repository of leaked data.
[…]
This data set contains nearly 45
million records from over 1100 websites and communities. Some of the larger domains include
Techsupportforum.com MobileCampsites.com Pbnation.com and Motorcycle.com. Each record
may contain an email address, a username, an IP address, one password and in
some cases a second password.We added this data set to LeakedSource on
April 27th 2016 but only analyzed it now.
Given the massive scale of this breach, it is also likely that
VerticalScope stored all of their data on interconnected or even the same servers
as there is no other way to explain a theft on such a large scale.ZDNET reporter Zack Whittaker contacted
VerticalScope on our behalf and they confirmed the breach in addition to our
verification from May.
[…]
Passwords were stored in various
encryption methods but less than 10% of the domains which account for a very
small amount of leaked records used difficult to break encryption (less than a
couple million). Most of the records
(over 40 million) were just MD5 with salting and this is insufficient.
For my Computer Security students.Remember this when it comes time to ask for a
bigger budget.
Cost of a data breach: $4M: Benefits of responding quickly:
Priceless.
The bad news is that data breaches are becoming ever more
common. The worse news is that the cost
they represent for companies is going through the roof.
Those are two conclusions from a study released Wednesday
by IBM Security and the Ponemon Institute, which found that the average cost of
a data breach has grown to $4 million. That's
a hefty jump compared with last
year's $3.79 million, and it represents an increase of almost 30 percent
since 2013.
I live in Centennial Colorado. (I'm not actually 100 years old., but I hope to be some day.) I'm an independant computer consultant, specializing in solving problems that traditional IT personnel tend to have difficulty with... That includes everything from inventorying hardware & software, to converting systems & data, to training end-users. I particularly enjoy taking on projects that IT has attempted several times before with no success. I also teach at two local Universities: everything from Introduction to Microcomputers through Business Continuity and Security Management. My background includes IT Audit, Computer Security, and a variety of unique IT projects.
No comments:
Post a Comment