Remember, remember the fifth of November…

Anonymous strikes again– the target being Telecom Italy this time. The hackers list the glaring number of Cross Scripting vulnerabilities (3,000!), an Apache Error and a Directory Listing fault. Sample Social Security numbers and credentials are given as examples. Anonymous insists that it will not disclose the approximately 30,000 stolen credentials, but instead encourages customers to ask for a review of their services instead. Anonymous was made famous for their assault on the Playstation Network after Sony claimed that it could not be breached.

Also, @Doxbin made his way into Symantec — dumping employee account information and generally making their employees question their faith. Hacktivists have also announced the Zero-Day exploit of Imageshack & Paypal on this day, along with numerous hacks ranging from to Saturday Night Live’s website as well.

Anonymous and the mentioned hacktivists stand as excellent examples of the most important pillar of IT Network Security: There is NO such thing as 100% Security. To solidify the point, take into account the class action lawsuit against Sony last year that was recently dismissed. Judge Anthony Battaglia, who presided over the case, noted that all PSN users signed a Sony Privacy Policy that included “clear admonitory language that Sony’s security was not ‘perfect,'” therefore “…no reasonable consumer could have been deceived.” While many consumers are crying foul, this example illustrates how bigger business are having to somehow include the verbiage stating a very sobering reality about network security.

Jack Dempsey once said “The best defense is a good offense”, and Secure The World seeks to show you real world applications of a theory such as this one. Without properly empowering yourself with the knowledge of what is out there and how to minimize both the risks and damage that a cyber attack can cause, you will not only compromise your valuable assets, but you will also be left without a contingency plan to get you back on your feet as fast as possible after such an event. While you cannot prevent every form of security breach, you can prepare yourself for the next steps required to close the breach and move forward. Stay tuned for more information.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s