Temple University

Week 3 Reading and article

The key facts I got from the reading are that public information will always be available as the internet will always be instrumental in finding customers which in turn will always make you vulnerable or a candidate for an attack if you are not properly protected.  Ensuring that your configurations, patches and security are up to date or hardened will go a long way in making attackers choose another target. Simple queries or scans that are within the law can open a window into your environment which gives an attacker the bread crumbs necessary to begin their attack strategy.

In the News:

http://www.databreachtoday.com/hackers-exploit-stolen-firefox-bug-information-a-8525?rf=2015-09-08-edbt&mkt_tok=3RkMMJWWfF9wsRojuq3OZKXonjHpfsX66OgpUa6g38431UFwdcjKPmjr1YYIRct0aPyQAgobGp5I5FEIT7HYRrhpt6cOXA%3D%3D

Hackers exploit stolen Firefox bug information attacker.  Mozilla is warning that at least one year ago, an attacker infiltrated the repository that it uses to log bugs pertaining to its Firefox browser, began stealing information relating to unpatched vulnerabilities in Firefox and other Mozilla products, and actively targeted at least one unpatched flaw in Firefox for a period of at least three weeks. Officials at the free-software community say they have also alerted law enforcement to the theft, and say they have taken steps to improve their internal security practices, to help block such attacks in the future.

Leave a Reply

Your email address will not be published. Required fields are marked *