The Latest in IT Security

Posts Tagged ‘brute’

In the wake of recent account compromises, including Associated Press and the rampant breaches orchestrated by the "Syrian Electronic Army", Twitter have recently released 2FA (2 Factor Authentication), which is a most welcome addition to bolster users' security. It is not, however, the be-all and end-all: users are still responsible for choosing strong, hard-to-guess passwords. […]

Read more ...

Seen in the wild last July 2012, PE_MUSTAN.A spreads around less secured networks and is known to target systems with weak passwords. Its roots can be traced from WORM_MORTO.SM that proliferated a year before. While this tactic of brute forcing its way around the network is not new anymore, PE_MUSTAN’s presence proves that supposed secured […]

Read more ...


Categories

WEDNESDAY, FEBRUARY 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments