Third ‘JPMorgan hacker’ arrested as he arrived at JFK
Trio ‘used stolen data to scoop hundreds of millions of dollars’
Naked Security – Sophos
Trio ‘used stolen data to scoop hundreds of millions of dollars’
Naked Security – Sophos
MORE CHARGES IN JPMORGAN HACK: Federal prosecutors announced expanded criminal charges against three men tied to the 2014 hack of JPMorgan Chase. The hack “resulted in the loss of more than 80 million customers’ names and e-mail addresses — what …
mac hacker – read more
JPMorgan Chase was among five banks that were reported to have been hacked earlier this year, and details have emerged on how the hack took place.
When news first broke in August, it was believed that a zero-day Web server exploit was used to break into the bank’s network. Now, however, The New York Times is reporting that the entry point was much more mundane: a JPMorgan employee had their credentials stolen.
This shouldn’t have been a problem. JPMorgan uses two-factor authentication, meaning that a password alone isn’t sufficient to log in to a system. Unfortunately, for an unknown reason one of the bank’s servers didn’t have this enabled. It allowed logging in with username and password alone, and this weak point in the bank’s defenses was sufficient for hackers to break in and access more than 90 other servers on the bank’s network.
Read 2 remaining paragraphs | Comments
Security Stocks Rise On Big JPMorgan Cyberattack
Investor’s Business Daily Computer security stocks Palo Alto Networks and CyberArk Software rose in the wake of JPMorgan Chase disclosing late Thursday that a much bigger cyberattack took place on its websites than first indicated. Palo Alto Networks (NYSE:PANW) stock was up … |