有个足球雷竞技app网络世界David Geer //m.amiribrahem.com en - us 2020年8月17日星期一12:13:59 -0700 2020年8月17日星期一12:13:59 -0700 https://idge.staticworld.net/nww/networkworld510x510.png 有个足球雷竞技app m.amiribrahem.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 有个足球雷竞技app m.amiribrahem.com 796 288 多因素认证(MFA)技术的进展 2017年4月27日星期四10:42:00 -0700 大卫·吉尔 大卫·吉尔

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.

Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.

MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.

To read this article in full, please click here

//m.amiribrahem.com/article/3192861/state-of-the-art-multifactor-authentication-mfa-technologies.html
保护有风险的网络端口 2017年4月24日星期一04:44:00 -0700 大卫·吉尔 大卫·吉尔

Data packets travel to and from numbered network ports associated with particular IP addresses and endpoints, using the TCP or UDP transport layer protocols. All ports are potentially at risk of attack. No port is natively secure.

“Each port and underlying service has its risks. The risk comes from the version of the service, whether someone has configured it correctly, and, if there are passwords for the service, whether these are strong? There are many more factors that determine whether a port or service is safe,” explains Kurt Muhl, lead security consultant at RedTeam Security. Other factors include whether the port is simply one that attackers have selected to slip their attacks and malware through and whether you leave the port open.

To read this article in full, please click here

//m.amiribrahem.com/article/3191513/securing-risky-network-ports.html
如何应对设备和软件的后门插入或离开供应商 2017年3月28日星期二04:47:00 -0700 大卫·吉尔 大卫·吉尔

当黑帽黑客插入恶意后门进入系统和软件后,供应商/制造商已出售这些进入市场。如果厂商无意或故意在产品中留下后门,那就另当别论了。< p class = " jumpTag " > < a href = " /文章/ 3185472 / how-to-respond-to-device-and-software-backdoors-inserted-or-left-by-vendors。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3185472/how-to-respond-to-device-and-software-backdoors-inserted-or-left-by-vendors.html IDG内幕
最有效的6种社会工程技术 2017年3月20日星期一05:43:00 -0700 大卫·吉尔 大卫·吉尔 >社会工程是攻击企业最脆弱的弱点,它的人的最强方法。黑客犯罪分子认识到了这个事实。根据《a href="https://www.proofpoint.com/sites/default/files/human Factor - report2016.pdf " target="_blank">Proofpoint 's 2016 Human Factor Report》,2015年,社会工程成为第一种攻击方法。< p class = " jumpTag " > < a href = " /文章/ 3182714/6-of-the-most-effective-social-engineering-techniques。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3182714/6-of-the-most-effective-social-engineering-techniques.html IDG内幕
勒索软件的目标范围更广,更严重 2017年3月7日星期二04:10 -0800 大卫·吉尔 大卫·吉尔

If you thought it was bad when the FBI reported last year that ransomware was on the rise, you should read the forecasts for this year. According to SonicWall’s most recent Annual Threat Report, “ransomware attacks grew 167 times since 2015, from 3.8 million in 2015 to 638 million in 2016.”

This year, TrendMicro sees a 25-percent growth in the number of new ransomware families available for use in breaches. Reports of the encroachment of ransomware on government, law enforcement, critical infrastructure, and health and safety are already climbing.

To read this article in full, please click here

//m.amiribrahem.com/article/3177708/ransomware-picks-off-broader-targets-with-greater-severity.html
如何使您的基础设施处于良好状态,以摆脱脚本攻击 2017年3月2日星期四05:40:00 -0800 大卫·吉尔 大卫·吉尔

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks.

The number of attack scripts is climbing as elite hackers continue to create these scripts and sell them to others, says Itzik Kotler, CTO and Co-Founder, SafeBreach. There doesn’t seem to be any stopping this trend.

CSO examines scriptable attacks and the part of the problem that you can control: getting your infrastructure in shape to shrug off these breaches.

To read this article in full, please click here

//m.amiribrahem.com/article/3176103/how-to-get-your-infrastructure-in-shape-to-shake-off-scriptable-attacks.html
如何保护你的数据,你的车,你的人,免受汽车网络威胁? 2017年1月27日星期五05:50:00 -0800 大卫·吉尔 大卫·吉尔 < p >现代汽车越来越多地连接到其他国家通过短距离无线技术,如wi - fi和蓝牙,连接如OBD-II和USB接口,远程无线通讯等4 g和即将到来的5 g网络和服务,如安吉星,失寻回系统,自动,只有一些名称。这个世界包括您的企业和想要撤销您的数据、您的企业舰队和您的人员的犯罪黑客和网络劫车者。< p class = " jumpTag " > < a href = " /文章/ 3162404 / how-to-protect-your-data-your-vehicles-and-your-people-against-automotive-cyber-threats。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3162404/how-to-protect-your-data-your-vehicles-and-your-people-against-automotive-cyber-threats.html IDG内幕
如何将企业从物联网安全噩梦中唤醒 2017年1月20日星期五05:14:00 -0800 大卫·吉尔 大卫·吉尔 Marketsandmarkets.com的数据显示,物联网安全市场估值到2021年将达到369.5亿美元。在网络安全混乱滋长的地方,安全市场的资金也在流动。< p class = " jumpTag " > < a href = " /文章/ 3159711 / how-to-wake-the-enterprise-from-iot-security-nightmares。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3159711/how-to-wake-the-enterprise-from-iot-security-nightmares.html IDG内幕
支持网络安全努力的免费安全工具 2016年12月22日星期四05:30:00 -0800 大卫·吉尔 大卫·吉尔

有更多的免费信息安全工具在那里,你可以用拳头的白板指针强调。虽然很多都是基于试用产品的诱惑,旨在吸引决策者购买这些免费赠品的高价溢价产品,但许多都是成熟的公用事业产品。一些重要的类别包括威胁情报工具、在开发阶段构建安全性的工具、渗透测试器和取证工具。< p class = " jumpTag " > < a href = " /文章/ 3153055 / free-security-tools-to-support-cyber-security-efforts。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3153055/free-security-tools-to-support-cyber-security-efforts.html IDG内幕
SWIFT还没有经历最后一次“银行抢劫” 2016年11月16日星期三07:46:00 -0800 大卫·吉尔 大卫·吉尔

A former CSO of the World Bank Treasury calls the SWIFT system outdated and open to malware attacks. Those vulnerabilities could lead to manipulation of financial transactions.

SWIFT is the interbank financial messaging system for sending international money transfer instructions. The Society for Worldwide Interbank Financial Telecommunications, which the industry refers to as the SWIFT co-op maintains this system.

CSO looks at the SWIFT co-op’s denial of the real issue, the cost of attacks, informed expert insights into these security flaws, how hackers are using and abusing these to their profit, and what the co-op should do to seal its messaging system to mitigate further falsifications.

To read this article in full, please click here

//m.amiribrahem.com/article/3142348/swift-has-not-seen-its-last-bank-robbery.html
解决IT安全部门、董事会和管理层之间的沟通问题 2016年11月2日星期三07:00:00 -0700 大卫·吉尔 大卫·吉尔 在一个意外的危机前的几个月,IT安全要求特定的工具,培训,和额外的员工,以保持企业数据安全,但没有证实在业务方面的需要可以理解。最高管理层否认了这些要求,并指出他们已经在安全技术上进行了投资。突然,黑客发动了大规模的网络攻击。< p class = " jumpTag " > < a href = " /文章/ 3137599 / fixing-the-communications-issues-between-it-security-and-the-board-and-c-suite。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3137599/fixing-the-communications-issues-between-it-security-and-the-board-and-c-suite.html IDG内幕
如何减轻雇佣受害者的黑客 2016年9月27日星期二04:29:00 -0700 大卫·吉尔 大卫·吉尔

Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.

High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.

Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.

To read this article in full, please click here

//m.amiribrahem.com/article/3124771/how-to-mitigate-hackers-who-farm-their-victims.html
新兴技术正在戳破安全漏洞 周一,2016年9月12日05:09:00 -0700 大卫·吉尔 大卫·吉尔

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security.

To secure the enterprise in environments of unwieldy change, the business needs to know how each new technology affects change management and the organization’s security defenses.

Organizations can then begin to evolve change management and security to close those gaps and avoid impacts on security.

Emerging technologies such as DevOps, IoT, automation/intelligent software, information technology service partnering, cloud computing and BYOD all straighten out the curves in the race to make changes that propel the enterprise forward.

To read this article in full, please click here

//m.amiribrahem.com/article/3118699/emerging-technologies-are-poking-holes-in-security.html
如何防止病毒模因在你的企业中传播恶意软件 2016年8月31日星期三04:37:00 -0700 大卫·吉尔 大卫·吉尔

Perhaps the worst news about Pokemon Go is how attackers are using it to spread malware. This is not the first time bad-guy hackers have leveraged the popularity of games to spread malicious software. Viral memes spread malware, too, via drive-by attacks as people visit malicious sites that draw them by hosting or linking to the internet-based cultural sensation.

Users assume that games and meme sites have integrity. This makes it easy for the hackers to push compromising software onto consumers’ phones and computers and into your organization. Cyber thugs also use man-in-the-middle attacks on game apps to take control of mobile devices and launch attacks on the enterprise.

To read this article in full, please click here

//m.amiribrahem.com/article/3114221/how-to-keep-viral-memes-from-spreading-malware-in-your-enterprise.html
现实生活中的例子可以测试你是否为网络攻击做好了准备 星期五,2016年8月26日05:21:00 -0700 大卫·吉尔 大卫·吉尔 < p >你准备好了吗?< p class = " jumpTag " > < a href = " /文章/ 3112755 / real-life-examples-test-whether-you-are-prepared-for-a-cyberattack。要阅读本文全文,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3112755/real-life-examples-test-whether-you-are-prepared-for-a-cyberattack.html IDG内幕