Source: ZDNet UK
More people are using PDAs for keeping business data, increasing the security problems faced by corporates, according to the second annual PDA Usage Survey
Billions of pounds continue to be wasted each year on corporate security that is easily bypassed because so many employees leave unprotected passwords and corporate information on their personal digital assistants (PDAs), according to a recent survey.
Internet Security Systems Inc. last week unveiled its first Catastrophic Risk Index, a compilation of the 31 most serious current vulnerabilities and attacks. The index is designed to give administrators a constantly updated quick-reference list of the issues that should be their top priorities in protecting networks. Not surprisingly, all but two of the vulnerabilities on the list are some form of buffer overflow.
A rough count shows 500 defacements to have occurred and been confirmed on the 6th of July (several hundred others were not confirmed). The Sunday average is 581 defacements for the past 4 weeks (June 8th 496, 15th 625, 22nd 913, 29th 291). Judging by this along with the fact it was so widely reported most of those with the motive to compromise website must have simply chose not to participate it could be assumed that ‘Defacers Challenge’ had only a negligible, if any effect on the number of defacements that would have occurred anyway on a normal Sunday.
Source: The Whir
Ethical hacking, also known as internal security auditing, is an effective method to determine security vulnerabilities within IT architectures.
It is usually described as a controlled simulation of an attack against network resources in order to achieve a predetermined goal. That goal might be to find specific information on a server, determine if an outsider could disrupt operations for a significant period of time, or to modify Web content.