BreachExchange mailing list archives

Why It Pays to Submit to Hackers


From: security curmudgeon <jericho () attrition org>
Date: Fri, 10 Aug 2012 16:20:21 -0500 (CDT)


http://www.wired.com/business/2012/08/hackers-walk-all-over-you/

Why It Pays to Submit to Hackers
By Ryan Tate
08.10.12 2:17 PM

Every big online security breach seems to end in a big lecture. Use strong 
passwords, users are told. Make fresh logins for every website. Back up 
your data. Encrypt all your stuff.

That familiar chorus began again after our own Mat Honan suffered a hack 
attack in which three different internet accounts were seized and three 
computing devices wiped of their data. .Turn On Gmail.s 2-Step 
Verification Now,. wrote James Fallows on The Atlantic.s website, adding 
to similar security lectures from The New York Times, Lifehacker, 
TechCrunch, a Google engineer, etc.

If that advice sounds familiar, it should. Just this past June, after 6 
million LinkedIn passwords were exposed to hackers, Fallows wrote about 
.the one step you must take today. . improving your login security . 
adding to similar security lectures from The New York Times, Lifehacker, 
TechCrunch, a Google engineer, etc.

[..]
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


Current thread: