Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - The Few, The Proud, The Geeks.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » August 2016 » Personnel the Common Cause of Exploits

Personnel the Common Cause of Exploits


Posted by: Timothy Weaver on 08/23/2016 09:38 AM [ comments Comments ]


What are the top five exploits to break into your computer system? Not software vulnerabilities but employee vulnerabilities.

US cybersecurity firm Praetorian did a test with 100 penetrations and 450 real-world attacks which showed that stolen credentials are the easiest way into a system.

Here are the top five:

Weak domain user passwords (a root cause of compromise in 66 per cent of cases).
Broadcast name resolution poisoning (aka WPAD – 64 per cent).
Local administrator attacks (aka Pass the Hash – 61 per cent).
Cleartext passwords stored in memory (aka Mimikatz – 59 per cent).
Insufficient network access controls (52 per cent).

Hackers use social engineering to break into target computers. This is usually done with phishing emails. "Social engineering will always be successful to achieve initial access to an organization," Joshua Abraham, practice manager at Praetorian. "One percent of employees will always be susceptible to social engineering attacks."

"Organizations should put controls and processes in place to reduce the blast radius when an attack is successful. Therefore our research was focused on the attack vectors that are used after the initial access has been achieved. This can be used to focus defensive efforts based on the attacker's playbook," he explained.

Source: The Register




« Epic Games Hacked;808,000 Accounts Breached · Personnel the Common Cause of Exploits · Halle Berry Presents a Dramatic Interpretation of Britney Spears's "Oops, I Did It Again" »




Comments
comments powered by Disqus

MajorGeeks.Com » News » August 2016 » Personnel the Common Cause of Exploits

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition