Navigation Links
In Another Recent Display of Cyber Politics, SEA Hackers Take on The Washington Post and Others
Date:8/19/2013

New York, NY (PRWEB) August 19, 2013

Last week's reported site redirection hack attack on The Washington Post and others wasn’t the first time the Syrian Electronic Army (the SEA) tangled with major news outlets, back in April they hijacked Associated Press (AP) Twitter accounts, and for a few brief moments, sparked a panic which prompted a scary $136 billion stock market death spin based on faked AP Tweets that the White House had been bombed and President Obama had been injured. “The ripple effects of any type of successful cyber attack on a prominent and trusted organization can be mind boggling, but the social engineering possibilities of a successful redirection attack can lead organizations of any size to very dark places if the attackers have a more sinister objective in mind,” says Joe Caruso, CEO/CTO of Global Digital Forensics, a premiere cyber security solutions provider with years of experience in the trenches of the real-world cyber battlefield.

Right this way folks.

“By our very nature as human beings, we inherently trust our own experiences. There is no thought given to a light turning on when you flip the switch, just like there is no thought given when you turn the key in your car and the engine starts. Sheer repetition of those experiences condition us to expect those responses. The only time we really have to get our consciousness involved is if the expected response doesn’t materialize. The uh-oh moment comes when the light doesn’t come on, or the engine doesn’t start, only then do we go into problem solving mode. That’s what makes redirection attacks like the one on The Washington Post so potentially dangerous. People thought they were going to a trusted source they rely on all the time, but in reality, visiting certain stories sent them somewhere else, in this case a website created by the Syrian Electronic Army to make a political statement. Fortunately, the SEA’s endgame was a political statement and it was pretty easy for users to realize they had been blown way off course. But now imagine if it wasn’t just an informational site, and the attackers' objective was something far more nefarious. What if it was a bank or credit union site that hackers had gained access to and were able to redirect visitors? The attackers could make a duplicate looking site which would not set off any of those internal alarm bells, I mean how often does a typical user study the URL in the address line to make sure they are where they think they are, they used that same bookmark to get to the site they always did, and their expectation seemingly materialized. So no uh-oh moment, and no thinking about it. But now, when they are typing in their login information, they are essentially handing over control of their real account right to the bad guys. Put up a quick splash screen after they log in that the site is temporarily down, please try again later, and presto, a frustrated but still unsuspicious user goes on their merry way, not even knowing they just gave away the keys to their treasure vault. How many valid accounts credentials do you think they could pilfer if they did it for just an hour on one of the huge financial sites that get tons of traffic every day? Or how devastating could it be to a small business if their customers are getting sent to a hacker created shopping cart page to enter all their valid credit card information? It’s frightening to think about, not to mention a legal nightmare just waiting to happen.”

Cyber security basics cannot be overlooked.

“Building a realistic looking dummy website is not rocket science. We’ve done it to clients many times as part of our comprehensive penetration testing, specifically the social engineering component we’ve designed to mimic real-world phishing and spear phishing campaigns, as they are still the most relied on methods for attackers to get that first foot in the door. And we’ve never failed to get at least that one bite we need to gain access to the network, and virtually anything and everyone else connected to it. That’s why the basics are so important, system vulnerabilities, user awareness, training, cyber security policies and procedures, they all have to be regularly tested and maintained, because what worked two years ago, may not cut the mustard anymore. Our professional cyber threat assessments, designed to take into account the newest devices and industry trends, coupled with our penetration testing, where we take on the role of real world hackers to infiltrate, incapacitate or control networks and/or systems, have been meticulously developed to pinpoint weaknesses against today’s threats, with an industry eye on what’s coming down the pike. Not only will we identify threats and weaknesses, but we’ll help clients mitigate them with industry best-practices, we’ll help them develop and implement emergency cyber incident response plans and escalation matrixes, and we have veteran emergency incident responders strategically located across the country and the globe that are available 24/7 every day of the year to offer unrivaled response times in the event an attack or intrusion does manage to occur, because we know just how critical time is when it comes to identifying and stopping any successful data breach or intrusion. Client trust, business integrity, even regulatory compliance can all be affected if the attack is not quickly controlled. So it should be easy to see, regular cyber threat assessments, penetration testing, and a cyber emergency response plan are cyber security basics that simply cannot be overlooked.”

From proactive cyber security solutions, to reactive emergency response, Global Digital Forensics helps clients cover all the bases with customized solutions that fit a client’s particular needs, so don’t wait to significantly decrease the chances of a successful cyber attack, there are no more excuses, professional help is just one call away.

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.

Read the full story at http://www.prweb.com/releases/2013-cyber-attacks/SEA-hacks-WAPO/prweb11035904.htm.


'/>"/>
Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Another First for Independent Financial Concepts Group and the Insurance Industry
2. H&HN Takes Home Another ‘Magazine of the Year’ Award
3. Zac Brown Band Tickets Hollywood Bowl Tickets: Zac Brown Has Added Another Concert Date at the Hollywood Bowl on October 25th
4. The Memorial Garden at Cherry Hills Community Church Announces Wall of Remembrance as Another Option to Remember Loved Ones
5. LesserEvil Expands the Chia Crisps Line into Another Region of Whole Foods Market
6. Actors, Models & Talent for Christ Grad, Charles Michael Davis, Stars in Grey’s Anatomy, Another Stateside (post-production), and New TV Series The Originals
7. Botox - Another Medical Condition Treatable with the Wrinkle-Busting Drug
8. GNC Awards Another Prestigious Award to BPI Sports - 2012 Partner of the Year
9. Diet Pill Prescopodene Marks Another Month Atop Health Supplement Sales Lists
10. DSS Delivers Another Successful Forum for Higher Education CIOs
11. Yet Another Reason to Avoid Fatty Foods: Fatigue
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:4/29/2017)... ... April 29, 2017 , ... TransDark is a set ... one video to the next without having to set a single keyframe in ... to enhance your video production. , TransDark features dynamic transitions that momentarily splits the ...
(Date:4/28/2017)... (PRWEB) , ... April 28, 2017 , ... An April 24th article on ... stunning 180 pounds with the help of a weight loss surgery. The woman, declaring “I ... skin that have been left following her dramatic weight loss. Dr. Feiz & Associates notes ...
(Date:4/28/2017)... , ... April 28, 2017 , ... Beginning in 2017, ... their formulas. This begins with the popular ClearLungs Extra Strength formula. To ensure that ... the formula in the following ways:, , Removal of the ...
(Date:4/28/2017)... ... April 28, 2017 , ... Ushio America ... lamps offer an instant energy-saving solution for F32T8 fluorescent lamps on most instant-start ... ballasts. These 50,000 hour rated lamps utilize the existing electronic ballast, saving labor ...
(Date:4/28/2017)... ... April 28, 2017 , ... From ... College of Urgent Care Medicine will host industry leaders for the annual spring ... help those in the industry adapt to the issues currently affecting urgent care ...
Breaking Medicine News(10 mins):
(Date:4/20/2017)... 20, 2017  Cogentix Medical, Inc. (NASDAQ: CGNT), ... the Urology, Uro/Gyn and Gynecology markets with innovative ... has joined the Company as Senior Vice President, ... position, Mr. Keswani will report directly to ... "Our organization is delighted that Ash has joined ...
(Date:4/20/2017)... , April 20, 2017  RXi Pharmaceuticals Corporation ... therapeutics that address significant unmet medical needs, today ... the Company,s consumer product development program, based on ... Society for Investigative Dermatology (SID) 76 th ... and promote the sciences relevant to skin health ...
(Date:4/20/2017)... , April 20, 2017  AbbVie (NYSE: ... 99 percent (n=145/146) of chronic hepatitis C virus ... 5 or 6 and compensated cirrhosis (Child-Pugh A) ... (SVR 12 ) with its investigational, pan-genotypic regimen ... rates were seen following 12 weeks of G/P ...
Breaking Medicine Technology: