Firewall DDoS Attack BlackNurse

Danish telecom operator TDC’s Security Operation Centre has recently discovered a new attack technique in the wild dubbed BlackNurse that allows a single laptop to DDoS a high-bandwidth enterprise firewall. Paul Calatayud, CTO at FireMon commented below. Paul Calatayud, CTO at FireMon:  “On certain types of firewalls, this attack requires that the firewall be misconfigured. Device configuration […]

What’s More Important Than Sex, Chocolate or Alcohol? Wi-Fi, According To A New iPass Report

Mobile professionals are addicted to Wi-Fi; connectivity impacts their hotel, airline and other travel choices  REDWOOD SHORES, California.  iPass Inc. (NASDAQ: IPAS), the leading provider of global mobile connectivity, today revealed the results of  The iPass Mobile Professional Report 2016. iPass surveyed more than 1,700 mobile professionals worldwide about their connectivity habits and preferences, highlighting the ever-increasing […]

400 Million Adult Friend Finder Accounts Breached

AdultFriendFinder data breach

Friend Finder Network Inc was hacked in October of 2016 for over 400 million accounts representing 20 years of customer data which makes it by far the largest breach we have ever seen — MySpace gets 2nd place at 360 million. This event also marks the second time Friend Finder has been breached in two years, […]

Facebook Buying “Back” Stolen Passwords From Dark Web

password

Facebook’s chief security officer Alex Stamos has disclosed at the Web Summit in Lisbon that Facebook uses the stolen passwords, purchased from hackers selling them on dark web marketplaces, to cross-reference them with encrypted passwords already in use on the site. He added that despite the process being “computationally heavy”, Facebook has been able to […]

The Theoretical World Of Known Knowns And The Tesco Heist

The interesting thing about Incident Response, and the Discipline of Digital Forensics is the need to attempt to backtrack on 1) How a security breach occurred? 2) What Actors were in play? And 3) Where any vulnerabilities or points of exposure present which supported the breach to play? – or more the point, do they […]