Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Viva La Geek.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. Smart Defrag
2. GS Auto Clicker
3. Macrium Reflect FREE Edition
4. Sergei Strelec's WinPE
5. MusicBee
6. Visual C++ Redistributable Runtimes AIO Repack
7. K-Lite Mega Codec Pack
8. ImgBurn
9. Unlocker
10. Format Factory
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » News » August 2016 » Personnel the Common Cause of Exploits

Personnel the Common Cause of Exploits


Posted by: Timothy Weaver on 08/23/2016 09:38 AM [ comments Comments ]


What are the top five exploits to break into your computer system? Not software vulnerabilities but employee vulnerabilities.

US cybersecurity firm Praetorian did a test with 100 penetrations and 450 real-world attacks which showed that stolen credentials are the easiest way into a system.

Here are the top five:

Weak domain user passwords (a root cause of compromise in 66 per cent of cases).
Broadcast name resolution poisoning (aka WPAD – 64 per cent).
Local administrator attacks (aka Pass the Hash – 61 per cent).
Cleartext passwords stored in memory (aka Mimikatz – 59 per cent).
Insufficient network access controls (52 per cent).

Hackers use social engineering to break into target computers. This is usually done with phishing emails. "Social engineering will always be successful to achieve initial access to an organization," Joshua Abraham, practice manager at Praetorian. "One percent of employees will always be susceptible to social engineering attacks."

"Organizations should put controls and processes in place to reduce the blast radius when an attack is successful. Therefore our research was focused on the attack vectors that are used after the initial access has been achieved. This can be used to focus defensive efforts based on the attacker's playbook," he explained.

Source: The Register




« Epic Games Hacked;808,000 Accounts Breached · Personnel the Common Cause of Exploits · Halle Berry Presents a Dramatic Interpretation of Britney Spears's "Oops, I Did It Again" »




Comments
comments powered by Disqus

MajorGeeks.Com » News » August 2016 » Personnel the Common Cause of Exploits

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition