Vulnerability (V) – A characteristic that exposes something to a weakness without a countermeasure to mitigate potential losses. A warehouse may have a vulnerability to fire, a data center may have a vulnerability to a physical threat like an earthquake or network may have a vulnerability around access because it lacks a firewall (or perhaps… Continue reading Vulnerability
Given enough adoption of secure policies and frameworks and a threat agent with adequate resources, access and motivation any control/countermeasure/safeguard can be overcome. This means that a sufficiently motivated and backed threat agent (nee “hacker”) can defeat any one (and in multiple cases, any) security controls put in place. Key takeaway: If you want… Continue reading APT – Advanced, Persistent Threat
What do you make of accusations such as are quoted in this article on alleged Iranian hacking of infrastructure systems? http://thehackernews.com/2013/05/iranian-hackers-targeting-us-oil-gas.html
Holder Signed Off on Warrant Identifying Fox News Reporter as Criminal Conspirator | Threat Level | Wired.com http://feedly.com/k/ZjaOfp I think the question isn’t about obtaining the info in *some* cases as much as what review/controls are applied when that federal power is exercised. Thoughts?
Bad news! New Android malware forwards incoming messages to hacker – The Hacker News feedly.com/k/18mEGYM