dslreports logo
 
    All Forums Hot Topics Gallery
spc
Search similar:


uniqs
399

aefstoggaflm
Open Source Fan
Premium Member
join:2002-03-04
Bethlehem, PA
Linksys E4200
ARRIS SB6141

2 recommendations

aefstoggaflm

Premium Member

Interesting Security presentation

The movie Catch me if you Can is based on a real life character. This video is a talk given by him about his life and also security, he now works for the FBI. It is a very interesting talk and I encourage you to listen to the entire thing, its about an hour long.

»www.youtube.com/watch?v= ··· ydMDi3rI


Someone remembers sitting in an Internet Security presentation and hearing a story. A company hired a hacking company to try and get into their systems. They tried for a couple of days with no success. In a last attempt to get in, the hacking company called the IT department and told them they had to re-boot a server and what was the password for the re-boot. The IT department gave them the password and they proceeded to hack into the entire enterprise. It just goes to show you that you can have the most sophisticated hardware and software but stupid people will defeat you every time.

Kilroy
MVM
join:2002-11-21
Saint Paul, MN

3 recommendations

Kilroy

MVM

said by aefstoggaflm:

In a last attempt to get in, the hacking company called the IT department and told them they had to re-boot a server and what was the password for the re-boot. The IT department gave them the password and they proceeded to hack into the entire enterprise.

That's what happens when you save money on IT staff. If someone doesn't have a password to log into a server to reboot it, they shouldn't be rebooting it.
Shady Bimmer
Premium Member
join:2001-12-03

3 recommendations

Shady Bimmer to aefstoggaflm

Premium Member

to aefstoggaflm
This is the foundation behind Kevin Mitnick's publications, presentations, and his incarceration.

People are the weakest link, and have been since the beginning of computers. Kevin Mitnick was found guilty in the late '80s of gaining and using unauthorized access he obtained many years prior. To this day his company finds social engineering to be one of the largest risks, typically being more problematic than any technical weaknesses he finds.