The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

News & Features | Jan 10th, 2012

Finding the Cleanup Crew After a Messy Hack Attack

Elaine Rigoli

The New York Times says being hacked is like someone invading your home, and more than anything else, time is of the essence.

The goal is to determine quickly the "fingerprint" of the intrusion and its scope.

For example, how did the hacker break in, what did he take, when did he break in, and how can it be stopped?

In large-scale attacks, "the first thing a forensics team will do is try to get the hackers off the company’s network, which entails simultaneously plugging any security holes, removing any back doors into the company’s network that the intruders might have installed, and changing all the company’s passwords."

But that's a moot point if it's not entirely removed, and if even just one compromised password is not updated, hackers may still have access.

As the Times article says, in the world of computer security the most dangerous breaches are the quiet ones, or the ones in which hackers actually leave no trace.

 

Associated Topics:

Associated Topics:

Comments

Related Posts

Protecting Your Identity with the Internet of Things

Thought Leadership
Eva Velasquez | May 21st, 2015

The internet of things—or IOT, as it’s commonly known—was once the stuff of science fiction, a newfangled “wave of the future” concept only experienced at futuristic demonstrations like the World’s Fair. But now many of these devices are already in use in millions of households around the world. They’ve become an interesting yet somehow still unknown entity in the world of technology, and industry experts have stated these products will be the norm just a handful of years from now. Read More

Avira Offers PRIVATE WiFi’s VPN As Part of New Bundle

News & Features
Jared Howe | May 14th, 2015

Germany-based security company, Avira, just announced the release of a new bundled product which includes both their Antivirus Pro and PRIVATE WiFi.  This bundle protects users from both malware infection and data theft. Read More

How To: Safari Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

To edit the security settings for Safari:

  1. Go to Safari > Preferences.
  2. Click the AutoFill tab.
  3. On this tab, select what types of forms your browser fills in automatically.
    Note: In general, you should remove all the checkboxes

Read More

How To: Internet Explorer Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

Internet Explorer has security measures in place to help protect you as you browse the web.

Follow these steps to adjust these settings:

  1. Within Internet Explorer, go to Tools > Internet Options. The Internet Options window appears.
  2. Select the

Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.