Tag Archive for: Missing

JPMorgan Chase hack due to missing 2-factor authentication on one server

JPMorgan Chase was among five banks that were reported to have been hacked earlier this year, and details have emerged on how the hack took place.

When news first broke in August, it was believed that a zero-day Web server exploit was used to break into the bank’s network. Now, however, The New York Times is reporting that the entry point was much more mundane: a JPMorgan employee had their credentials stolen.

This shouldn’t have been a problem. JPMorgan uses two-factor authentication, meaning that a password alone isn’t sufficient to log in to a system. Unfortunately, for an unknown reason one of the bank’s servers didn’t have this enabled. It allowed logging in with username and password alone, and this weak point in the bank’s defenses was sufficient for hackers to break in and access more than 90 other servers on the bank’s network.

Read 2 remaining paragraphs | Comments


Ars Technica » Technology Lab

Cyberwar: What People Keep Missing About The Threat – Breaking Defense

Cyberwar: What People Keep Missing About The Threat
Breaking Defense
That brings us to Cybersecurity and Cyberwar, a new book out today (we got an advance copy) by Brookings scholars Peter Singer and Allan Friedman. Singer and Friedman have written a worthy and insightful book – although hardly a revolutionary one – on 
Cyber warfareFrontier Post

all 4 news articles »

cyber warfare – read more

Security Software Missing in Half of Android Devices – Midsize Insider


Midsize Insider

Security Software Missing in Half of Android Devices
Midsize Insider
While all device platforms require some sort of policy to be put into place, Android security is of particular concern. The open-source platform and third-party markets have made Android particularly susceptible to exploits. Popularity and

“android security” – read more

Mobile Security’s Missing Link – InformationWeek

Mobile Security's Missing Link
InformationWeek
When you think about mobile security, do you focus mainly on the devices employees use? Or maybe you worry most about controlling what data mobile users have access to? If so, you're not alone, judging by the popularity of mobile device management

“mobile security” – read more