Surprisingly, most of the world’s routers and switches are controlled and configured via the old and insecure Telnet protocol. The problem with Telnet is that it flies unencrypted across a computer network. And that makes it simple for even an inexperienced hacker to steal passwords and control network devices. Once they take control, a hacker […]
Tag Archives: Authentication
An Example of Denial of Service Imagine there is a concert with a very popular artist and band. The tickets have sold out. The weather is expected to be good that evening, and people are anxiously waiting for the concert to start. So they show up at the gates waiting to get in. But they […]
Access controls are a collection of mechanisms that work together to create a security architecture to protect the assets of the information system. The purpose of Access Control Systems are Confidentiality; information is not disclosed to unauthorized individuals or processes, which protects against hackers, unprotected communications, unauthorized users. Integrity; information retains its original level of […]
Posters on Craigslist the week before Christmas are trying to advertise against a kitchen wall. Craigslist now requires email and phone verifications, but makes them impossible to get. Craigslist started requiring phone authentication for the service a while ago, in an effort to stop sex ads and scammers. Now their system will automatically “flag” ads […]
The Linkedin Breach Recently, Linkedin was the victim of a breach of over 6 million passwords. Breaching such a large number of passwords could allow the hacker to access all resources to which those six million users normally have access. The SHA-1 algorithm was used to encrypt the passwords, but those passwords were stored with […]