dcsimg

Security Tips From 'Anatomy of a Hack'

Security company details risks mobile workers face from wireless intrusions.

WEBINAR:

You Can't Detect What You Can't See: Illuminating the Entire Kill Chain


On-Demand Webinar

As if there weren't enough problems with the recent onset of new virus and spyware attacks. Mobile workers face an additional set of problems all their own.

Fiberlink Communications has released a free on demand video at its Web site that details what it calls ongoing security risks and vulnerabilities that threaten mobile workers.

The "Anatomy of a Hack" video shows some of the techniques, skills and tools used by hackers to exploit vulnerabilities on mobile, notebook computers in order to gain access to corporate systems.

The Blue Bell, PA-based enterprise security firm said attackers are focusing on poorly protected applications, such as the Kazaa file sharing program, Windows Media Player, and even the Firefox browser, even though it's generally considered safer than Internet Explorer. Their intent, the firm said, is to grab information that can be used to gain access to corporate systems.

Although some of the video is spent touting its own its own Extend 360 security solution, the 36 minute Fiberlink video mainly details how an intruder can surreptitiously take over another user's notebook with just a little knowledge and certain software tools. Once in the system, passwords and access to other corporate data are an easy next step. The intruder can also shut down an anti-spyware's ability to detect a break in. An additional free best practices report, also at Fiberlink's Web site, details preventative steps organizations can take.

This article was first published on InternetNews.com. To read the full article, click here.






Comment and Contribute

 


(Maximum characters: 1200). You have characters left.

 

 

IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.