Sunday, June 23, 2024

Security Tips From ‘Anatomy of a Hack’

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

As if there weren’t enough problems with the recent onset of new virus and spyware attacks. Mobile workers face an additional set of problems all their own.

Fiberlink Communications has released a free on demand video at its Web site that details what it calls ongoing security risks and vulnerabilities that threaten mobile workers.

The “Anatomy of a Hack” video shows some of the techniques, skills and tools used by hackers to exploit vulnerabilities on mobile, notebook computers in order to gain access to corporate systems.

The Blue Bell, PA-based enterprise security firm said attackers are focusing on poorly protected applications, such as the Kazaa file sharing program, Windows Media Player, and even the Firefox browser, even though it’s generally considered safer than Internet Explorer. Their intent, the firm said, is to grab information that can be used to gain access to corporate systems.

Although some of the video is spent touting its own its own Extend 360 security solution, the 36 minute Fiberlink video mainly details how an intruder can surreptitiously take over another user’s notebook with just a little knowledge and certain software tools. Once in the system, passwords and access to other corporate data are an easy next step. The intruder can also shut down an anti-spyware’s ability to detect a break in. An additional free best practices report, also at Fiberlink’s Web site, details preventative steps organizations can take.

This article was first published on To read the full article, click here.

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles