Skip to main content

Home/ CSIA 459/ Group items tagged Fake

Rss Feed Group items tagged

Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
glenn_g

Thinking Putty defeats Fingerprint Scanners! - 1 views

  •  
    Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
  •  
    Glen, This did a little to damage fingerprint biometric technologies when it was first discussed in the public. I read the original article I think, when Matsumoto was using original gelatin to fake the scanners. There was also a documentary, or short news clip I had seen awhile back in which he demonstrated it. Newer technologies are starting to combine (multi-factor) authentication in order to gain access now, such as fingerprint and iris. This should help curb things like this, as well as stop the backdoor of username and password. phil
1 - 3 of 3
Showing 20 items per page