article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

Cybereason’s researchers recently set up a honeypot environment with a network architecture that replicated that of “typical power substation” and waited. Only two days after the honeypot was launched, it was attacked by a black-market seller, who installed backdoors that would allow anyone to access it, even if admin passwords were changed.

article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

If your internal point-of-sale system goes down, you’re no longer able to complete in-store transactions until the server outage is fixed. Even failing to change a router’s default passwords is a misconfiguration, and a mistake like that allows a hacker to more easily access the router’s controls and change network settings.

Security 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

Policies typically will be written documents that detail the requirements that will be enforced, such as password complexity. Minimum User Access Controls Active Directory: The smallest organizations might only worry about device access, otherwise known as the login credentials (username/password).

Security 107
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

In this simple environment network security followed a simple protocol: Authenticate the user : using a computer login (username + password) Check the user’s permissions: using Active Directory or a similar Lightweight Directory Access Protocol (LDAP) Enable communication with authorized network resources (servers, printers, etc.)

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You had to figure out how to configure Kermit, get passwords to get on. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. In both areas, you know, we never had sales guys until last year, so that's going on from like, 2006 Until last year. Let's analyze stuff. That was really fun.

IT 40