Selasa, 19 Februari 2013
Are You Gambling with Your Mission-Critical Security Assets?
You’ve probably met someone like Patrick—the password post-it 
scribbler. Whenever end-user Pat signs up for an online service, the 
registration process forces him to create a strong password with special
 characters. Frustrated with all of the complicated passwords that he 
has to track, Pat jots the password down on a post-it note, which he 
sticks to his computer screen—for anyone to find and use.
What would you think if Pat was managing your company’s data 
security—particularly, if your company must comply with data security 
regulations such as PCI DSS 2.0, SOX, HIPAA, GLBA, and the European Data
 Disclosure Act ?
But,
 you might protest, my IT security professionals have responded 
diligently to the mandates of these regulations, deploying vast numbers 
of encryption keys and certificates to secure a wide array of platforms,
 applications and services. Unfortunately, in these piecemeal 
deployments, effective management has fallen by the wayside. Keys and 
certificates are deployed across disparate systems, applications, and 
business solutions in a stove-piped fashion, accessible to multiple 
administrators without audit or access control.
Overburdened security professionals, like frustrated Pat, turn to 
whatever costly and error-prone management processes that they can 
cobble together, often relying on nothing more than spreadsheets that 
list deployed keys and certificates with their expiration dates—and 
little better than a password on a post-it note.
Are you gambling a successful audit on key management processes that 
fail to measure up? Manual processes leave you vulnerable, either 
because managers fail to implement best security practices or because 
they choose to maliciously exploit their knowledge—as 40 percent of IT 
professionals admit that they could. Lack of management solutions or 
clear policies have driven administrators to expose private key security
 and compliance vulnerabilities in several ways:
• Storing multiple keys in a keystore to which many managers have shared access
• Using the same passwords to protect multiple keystores
• Distributing keys widely in even more insecure ways such as USB drives, email, and FTP servers
• Failing to rotate keys periodically
Regulatory bodies recognize this vulnerability and have mandated 
policies to protect against it. PCI, for instance, in the recently 
released PCI DSS 2.0
 standards, has clarified that encrypted data remains within its 
auditing scope because encrypted data is only as secure as the key that 
decrypts it. Just as compliant organizations have implemented processes 
to secure sensitive data—complete with clearly-defined policies, 
regulated work flow, access controls, and audit trails—they must now 
implement processes to secure encryption keys.
You might be tempted to increase the IT staff to enhance manual 
management processes. However, manual management always leaves 
vulnerabilities either because managers fail to implement best security 
practices or because they can, if they choose, maliciously exploit their
 knowledge. Without automated access and workflow controls, a larger 
staff only exposes private keys to more people. A recent survey revealed
 that 40 percent of IT employees admit that they could hold their former
 employee hostage by withholding a key to which they still have access. 
With an IT staff turnover that is faster than certificate rotation in 
many companies, the risks increase.
Manual key management simply does not ensure that keys are securely 
generated, distributed, deployed, maintained, and rotated as 
regulations—and best security practices—require.
Hefty, potential fines for failing to comply with regulations are 
risk enough, but the risks of ignoring these vulnerabilities extend even
 further:
• Loss of service—If 
administrators fail to renew a certificate before it expires, the 
applications that rely on that service fail, often without any prior 
warning.
• Security breaches—After
 all, regulations are not designed to give you and your staff headaches;
 they’re designed to protect you and your customers from security 
breaches that expose your customers to identity theft and your company 
to a ruined reputation.
You need an enterprise-focused encryption management solution that 
cuts across your diverse systems, platforms and applications to manage 
the key and certificate lifecycle transparently but securely. The 
solution should leverage existing solutions and automate processes based
 on your security policies, including:
• Generation, distribution, and management of keys and certificates that comply with company security policies
• Configuration of the applications that use keys and certificates
• Monitoring and reporting on the status of each managed component with logging and audit trails
• Enforcement of workflow and access 
controls that segment management duties according to company policies 
and impose dual control for all sensitive keys
Too many IT and risk managers are surprised by security breaches, 
compromised keys or operational failures that occur from sheer neglect 
that result when you leave your valuable keys as exposed as a password 
on a post-it.—but they shouldn’t be and neither should you. You can take
 steps to protect your encryption assets, or you can let it be your CEO 
on the evening news.
If PCI Is Your Whole Security Program, You’re Not Doing Your Job Right
For most 
CISOs, the pain of an audit is part of the job, but it doesn’t have to 
be the nightmare that most of the IT community envisions. While 
attending the SOURCE Boston conference last week, your faithful SecurityWeek
 correspondent attended a rather frank discussion centered on the pain 
of a PCI assessment, and why the said pain is completely unwarranted. 
Here’s a recap of the talk.
Presented by Michelle Klinger, a Sr. Consultant with EMC, and Martin Fisher,
 the Director of Information Security for WellStar Health System, the 
talk looked at the PCI assessment process from the perspective of a 
former QSA and an active security manager.
The goal 
was to highlight some basic processes that business leaders can follow 
in order to get through the assessment with as little stress as 
possible, a task that seems harder than it actually is.
Making the best of the situation 
The talk started with a simple fact. Most of what those in the IT community think they know about PCI assessments is wrong.
“Like most
 stories there’s two sides to it. Most of the horror stories that I’ve 
personally experienced, eighty percent of the blame went on the CISO at 
the time, and with the way he tried to manipulate the situation.”
At the 
same time, when the experience is a positive one, this too can be placed
 at the feet of the executive that is leading it. No matter what, the 
general tone of the process is set before the assessment starts.
Before The Assessment 
One of the
 first things that a QSA will look to accomplish is the establishment of
 an initial rapport with the organization’s leadership and their teams. 
The idea is to discover what it is that the company is looking for. 
Obviously, Klinger explained, they want a compliant ROC (Report on 
Compliance), but what if there’s more? Organizations that are clear on 
what it is they hope to accomplish, such as using the ROC to push 
various security initiatives, will be helping themselves as well as the 
QSA in the long run.
The other 
side to this helpfulness is documentation. Assessments can sometimes 
require lots of documentation. Having the proper documents in place can 
mean the difference between a useless assessment, and one that actually 
gets stuff done, Klinger explained.
It isn’t 
as if the documents a QSA needs or how the validate the PCI process are a
 secret, it’s well documented. Yet this area sometimes causes problems, 
as organizations come to the table unprepared, which in turn leads to 
issues further on.
With that 
said, prior to the QSA arriving onsite, make sure that an agenda has 
been discussed previously and make sure that all the people need for the
 meeting are available and documents are in order to prevent time being 
wasted, Klinger added.  The documentation itself should have timestamps 
and dates whenever possible, especially if they are screenshots.
The documentation should be as close to real time as possible, as to show what is going on in the organization’s environment.
Even 
better, when the documentation is collected, present it to the QSA as a 
map. This will enable the organization to show the QSA that document X 
is looking to satisfy requirement Y. In the long run, the document map 
is a timesaver and will benefit both sides of the process.
“From a 
CISO perspective, if you don’t start this process well you’re going to 
be hosed,” Fisher said. “While as a CISO or a director, you might not be
 able to pick the QSA firm... you do have the ability to choose who the 
individual assessor is. This is a critical, key first step.”
CISOs 
should interview potential QSA candidates as if they were interviewing 
an employee. For example, Fisher added, use hypothetical questions and 
situations. “If their personality is one that will rub everybody on your
 team wrong, don’t use that person.”
Another thing for CISOs to consider is the truth.
“You need 
to be honest as a CISO. I’m not saying it’s like walking into a 
confession booth, ‘forgive me assessor for I have sinned,’ and just lay 
everything out. I’m not advocating that at all. But don’t lie. Because 
once you’ve lost your credibility with the QSA, their only recourse is 
to do a fishing expedition. It’s ugly and it’s painful, and you don’t 
want to be there,” Fisher explained.
“You also 
need to make sure that your team understands that lying to the QSA, is 
going to give them the opportunity to add value to other organizations –
 other than your own – very quickly. Don’t tolerate it from your staff.”
During the Assessment 
One of the
 things a QSA will look for is inconsistencies. This isn’t that they are
 searching for lies, but they are looking for communication breakdowns 
between policy makers and those with “boots on the ground.”
This is 
why making sure that the documentation is prepared, and the correct 
people with the relevant information are available from the start. It’s 
also why honesty is important. Communication breakdowns happen, and 
often no one is aware of them, so this provides an opportunity to 
correct them and better strengthen the organization.
“I can’t 
tell you how many times I’ve been stood up for meetings,” Klinger said. 
“The QSA, you have to understand, as well as the people being 
interviewed, want this to be done.”
Planning 
meetings with a QSA and then canceling them at the last moment or not 
showing up entirely wastes time, and time can translate into money. 
Cancelations are expected, but if a meeting has to be canceled, then 
there should be as much notice as possible and an alternative date and 
time proposed in order to reschedule.
It’s basic
 politeness in many cases, but it can go a long way towards keeping the 
assessment process smooth. The last thing an organization or its staff 
needs is a QSA hunting people down. Most times these meetings can be 
painful, which in some cases are why they’re avoided. But, Fisher added,
 the CISO should make it clear that the meetings are important and the 
pain from the meeting is nothing compared to the pain that could come 
from blowing them off or neglecting them.
Another
 thing for organizations to remember, particularly the CISO, is the 
importance of managerial support. CISOs need to be supportive of their 
teams during the process and encourage them to work with the QSA, not 
against them. Again, being honest and open will play a large role in 
this.
However, 
on the other side of support is influence. CISOs that try to strong arm 
the QSA, or improperly influence the process, will cause more harm than 
good. In short, this is a career-ending move in some business segments.
Never let 
the QSA to be in charge. They need scope and boundaries, and the CISO 
needs to enforce this. If the QSA doubts the CISO or his staff’s 
honestly, “you’re done,” Fisher explained.
“Their not
 going to believe anything you say. The assessment will take longer, and
 instead of giving you the benefit of the doubt on something that’s on 
the cusp – you’re toast.”
The bottom
 line is that given the fact that one cannot improperly influence the 
QSA or even appear as if they’re doing so, should there be a problem 
with the QSA, the CISO needs to address this with the QSA’s boss. 
However, if the QSA was interviewed previously, this shouldn’t be an 
issue.
After the Onsite Assessment 
Before the
 QSA leaves, get a meeting with them to offer an overview of the major 
items that they’ve identified. This helps management get an idea on the 
level of effort needed for remediation. It also helps with identifying 
potential discrepancies.
In 
addition, the organization needs to make sure that outstanding items are
 delivered in a timely fashion. Outstanding items happen. This is part 
of the process, but it’s something that must be addressed sooner rather 
than later. Also, make sure that the QSA sends a list of findings is 
delivered.
CISOs 
should just expect this, but make sure that it’s clear to the QSA that 
this is to be delivered ASAP. The QSA is relying on the organization to 
review the findings and discuss them. As remediation begins, keep the 
QSA in the loop and communicate with them periodically as changes are 
made.
“The biggest mistake that too many CISOs make is they don’t realize the ROC is negotiable,” Fisher said.
“Now I’m 
not saying that you can bend reality. I’m not saying that at all. But 
for example, in certain industries, certain words [have different 
meanings]... If in your conversation with the assessor, if they keep 
using a word that to them is a middle sized problem, but in your world 
it means the four horsemen are saddling up, explain to them the cultural
 context of that word...”
Doing so, 
will the ROC to represent language that the organization’s board of 
directors and senior leadership understands. It also enables the CISO to
 ensure that the ROC is accurate.
From 
there, the CISO needs to use the ROC and determine where the 
organization “needs to go from here,” Fisher adds. However, while it is 
vital that the CISO form a plan, they cannot use the list of remediation
 items as their plan.
“If you do
 that, you suck,” he said. “PCI is not your whole program. If PCI is 
your whole program, you’re not doing your job right.”
In the 
end, assessments can be heaven or hell. “You either get a Scotch that’s 
warm and peaty or you get a warm bottle of Zima,” Fisher humorously 
concluded.
The 
quality of beverage (and the assessment) and the level of pain, is 
completely in the hands of the organization. With a little effort and 
some focus, it’s entirely possible for CISOs and their teams to not only
 survive a PCI assessment, but also survive it with their sanity intact.
6 Steps to Acing Your Next Firewall Audit
Certainly we are no strangers to 
increased regulations, standards and internal policies, and the 
resulting audits that impact most organizations – often multiple times 
per year. 
While regulations and ensuing IT 
audits go beyond firewalls and firewall policies, these devices are 
often a good place to start when it comes to becoming "audit-ready" and 
gaining continuous visibility of what's going on in your network. 
Here are six steps to ensure you ace your next firewall audit: 
Step 1: Gathering Pertinent Information Before You Undergo an Audit 
Once 
you’ve gathered this information, it is imperative that you can 
aggregate and update this information in something better than a 
spreadsheet because you're most likely going to have multiple audits per
 year and spreadsheet compliance usually ends up badly. 
Step 2: Review Your Firewall Change Management Process 
Poor 
documentation of changes, including why the change is needed, who 
authorized the change, etc. and poor validation of the impact on the 
network are two of the most common issues when it comes to firewall 
change management. As time goes on, this challenge is exacerbated by 
staff turnover - that internal knowledgebase of why a change was made 
disappears and then you're left wondering what you should do – and poor 
documentation. Make sure you have regular reviews of the procedures for 
rule-base maintenance and that you can determine: 
• If there is a formal and controlled process in place to request, review, approve and implement firewall changes. 
• 
Whether or not all of the changes have been authorized. If you discover 
unauthorized rule changes, flag them for further investigation. 
• If 
real-time monitoring of changes to the firewall is enabled and access to
 rule change notifications is granted to authorized personnel. Taking 
these recommendations into account will get you off to a good start with
 solidifying your firewall change management processes and ensuring 
continuous compliance. 
Step 3: Audit Your Firewalls' Physical and OS Security 
Make 
sure you can define and enforce corporate baselines... and report 
against them so you know where you stand. By reporting against these 
baselines that you determine, you will always be "in the know" of your 
firewalls' configuration status and how they stack up to the policy. 
Ensure your firewalls and management servers are physically secured with
 controlled access and that the OS passes common hardening checklists. 
Step 4: Cleanup and Optimize Your Rule Base 
Over 
time, firewall policies have more and more rules added, removed and 
changed, and oftentimes with little documentation for the what, why, 
who, etc. This creates unnecessary overhead in the audit process and 
slows down firewall performance. Identify and remove unused rules and 
objects as well as covered rules, consolidate similar rules and tighten 
overly permissive rules (i.e. “ANY” in the source address). 
Step 5: Conduct a Risk Assessment and Remediate Issues 
When 
reviewing firewall rules and configurations, you want to be able to 
identify any potentially “risky” rules. What is “risky” can be different
 for each organization depending on the network and the level of 
acceptable risk, but there are many frameworks and standards you can 
leverage that provide a good reference point, in addition to your own 
definitions of course. Risky rules should be prioritized by severity.  
Once you've gone through your list of risk analysis questions, then it 
is time to document and assign an action plan for remediation of risks 
and compliance exceptions found in risk analysis. Once you've conducted 
remediation efforts, make sure you document those as well and verify 
that these efforts and any rule changes have been completed correctly. 
When it 
comes to your firewall configurations, building audit-readiness must be a
 business process that is maintained over time. "Manual" and "audits" 
just don’t mix. I've personally spoken to customers who prior to 
leveraging an automation tool spent 2-3 weeks to perform an audit of 
just ONE firewall, whereas with automation, that painstaking audit 
process was under a minute or as one customer told me "a push of a 
button". Additionally, proper documentation and a solid change process 
are instrumental pieces to ensuring audit-readiness at the drop of a 
hat. 
A final consideration is that while 
this article has focused on firewalls, there are different types of 
firewalls (traditional, next-generation, etc.) as well as secure web 
gateways, VPNs and other security devices typically found within an 
organization's network. Make sure that your audit process covers all of 
these devices as well. Good luck on your next audit.
Senin, 18 Februari 2013
zeus banking trojan targeting five
08.21
  
  No comments

Zeus continues to strike online bank accounts and users, and technology 
designed to thwart these Trojan attacks continually fails to keep 
up. Symantec recently came across a new Zeus file targeting five major banks in Japan.
The malware, which has caused serious problems to banking customers in 
Europe and the U.S, now having maximum concentration on Japanese banks. 
Target information was reveled by Symantec after decryption 
of configuration file from new sample. The attacker uses Blackhole 
exploit kit in order to install Zeus.

Zeus, a financially aimed malware, comes in many different forms and 
flavors. It can be tweaked to hijack personal PCs, or come in the form 
of a keylogger that tracks keystrokes as users enter them.
But once installation over, Zeus malware aims to steal online-banking 
credentials, and phishing schemes and drive-by downloads are most often 
the avenues hackers use to spread this increasingly sophisticated and 
evolving Trojan.
In this case, the functionality is the same as that of other Zeus 
variants. Once infected, Zeus monitors the Web browser visiting the 
targeted banks and injects HTML code that displays a message in Japanese
 that states in English: "In order to provide a better service to our
 customers, we are updating our personal internet banking system. Please
 re-enter the information that you provided when you first registered.".
Zeus gained notoriety in 2006 as being the tool of choice for criminals stealing online banking credentials. If your are one of the victim of Zeus, we recommend that you change your passwords for your online accounts and if you have used your credit card while Zeus Trojan was on your computer, contact the bank and let them know that you might be be victim of a phishing attack.
Zeus gained notoriety in 2006 as being the tool of choice for criminals stealing online banking credentials. If your are one of the victim of Zeus, we recommend that you change your passwords for your online accounts and if you have used your credit card while Zeus Trojan was on your computer, contact the bank and let them know that you might be be victim of a phishing attack.
Jumat, 15 Februari 2013
Ensure Your Network Is Secure
15.27
  
  No comments
Twenty-four hours a day, seven days a week, 365 days each year – it’s 
happening. Whether you are awake or asleep, in a meeting or on vacation,
 they are out there probing your network, looking for a way in. A way to
 exploit you; a way to steal your data, a place to store illegal 
content, a website they can deface, or any of a hundred other ways to 
mess with you for the simple joy of it all. And they can do this with 
relative ease, even in an automated fashion, with simple tools that are 
readily available to all.
I’m talking about network scanners. The bad guys use them all day every day to assess networks around the world because a network scanner is one of the easiest and most efficient ways to find the cracks in your armor. If you want to see your network the same way an attacker would, then you want to use a network scanner.
I’m talking about network scanners. The bad guys use them all day every day to assess networks around the world because a network scanner is one of the easiest and most efficient ways to find the cracks in your armor. If you want to see your network the same way an attacker would, then you want to use a network scanner.
Network scanners perform automated tests of systems over the network. 
They don’t require agents or any other software to be installed on the 
“target” machines. They assess a system based on what they can get from 
it over the network. It’s the same sort of reconnaissance that is 
performed against your network around the clock, and that is why you 
want to do it too. Here are five checks you should perform regularly 
using your network scanner.
1. Vulnerability assessments
Network scanners can use databases of known vulnerabilities to check for
 anything that might present a risk to your systems. Update that 
database regularly since new vulnerabilities are discovered all the 
time.
2. Port scans
A port scanner is a very fast way to determine what sort of systems are 
running on your network, and are probably the most common sort of recon 
you will see. Determine what should be accessible on your network from 
the Internet, validate that with a port scanner, and then use a 
combination of firewall rule cleanup and system hardening to shut down 
anything that doesn’t belong.
3. Default password access
There’s a reason there are tens of thousands of default password lists 
on the Internet-they make for a very easy way to get in. Don’t make it 
easy for an attacker. Make sure everything on your network has been 
configured with a strong password to prevent unauthorized access.
4. Running services
To compromise a service, it first has to be running. Every server has to
 run certain services, otherwise it’s just a space heater, but many run 
unneeded services either because they are on by default, or the admin 
who set it up didn’t know any better. Use your network scanner to find 
all running services, and then shut down the ones that are not needed.
5. Remote access
Speaking of default passwords, in about half of the security audits I 
have performed for customers, I have found remote access software that 
they didn’t know about, running on systems that made it very easy to get
 in. Use your network scanner to find all of the Telnet, SSH, RDP, 
GoToMyPC, LogMeIn, PCAnywhere and other applications that can provide 
remote access to a system, and shut down all the ones that shouldn’t be 
there. Finding all those “secret” ways in, and closing up the unapproved
 ones, will greatly reduce the risks to your network.
Using a network scanner, set up a regular schedule of scanning your 
systems for these five critical checks. Scan from the outside to see 
what the firewall cannot stop, and scan from the internal network so you
 understand just how much damage an inside threat can cause. Knowing 
your systems the way an attacker will, helps you to ensure everything is
 safe.
This guest post was provided by Casper Manes on behalf of GFI 
Software Ltd. Learn more about the importance of network scanning by 
downloading the free eBook: A first aid kit for SysAdmins. All product and company names herein may be trademarks of their respective owners.
The use of password in a technological
15.18
  
  No comments
Every day we read about an incredible 
number of successful attacks and data breaches that exploited leak of 
authentication mechanisms practically in every sector. Often also 
critical control system are exposed on line protected only by a weak 
password, in many cases the default one of factory settings, wrong 
behavior related to the human component and absence of input validation 
makes many applications vulnerable to external attacks.
Today I desire to focus the attention of a report published by the consulting firm's Deloitte titled “Technology, Media & Telecommunications Predictions 2013”
 that provide a series of technology predictions, including the outlook 
for subscription TV services and enterprise social networks. The 
document correctly express great concern of the improper use of 
passwords that will continue also in 2013 being causes of many problems,
 it must to be considered that  value of the information protected by 
passwords continues to grow attracting ill-intentioned.
The report focuses the need to reconsider password management processes 
in the light of technological contexts that we will before Duncan 
Stewart, Director of TMT Research, declared: "Passwords containing at
 least eight characters, one number, mixed-case letters and 
non-alphanumeric symbols were once believed to be robust,” “But these 
can be easily cracked with the emergence of advance hardware and 
software.”
“Moving to longer passwords or to truly random passwords is unlikely to work, since people just won't use them,” Stewart said.
“An eight character password chosen from all 94 characters available 
on a standard keyboard33 is one of 6.1 quadrillion34 
(6,095,689,385,410,816) possible combinations. It would take about a 
year for a relatively fast 2011 desktop computer to try every variation.
 Even gaining access to a credit card would not be worth the computing 
time. However, a number of factors, related to human behavior and 
changes in technology, have combined to render the ‘strong’ password 
vulnerable.”
Using a brute force attack for an 8‑character password with a dedicated 
password‑cracking machine employing readily available visualization 
software and high‑powered graphics processing units is possible to 
discover the password in only 5.5 hours. The cost of such machine is 
about $30,000 today but as explained in the reports hackers could 
obtained same computational capabilities from huge botnet.
Not only password length concerns the researchers, also the human factor
 could expose password management process to serious risks, for example 
humans never remind long and complex credentials, they tend to adopt 
password easy to remember and related to their life experience, in many 
cases the password is re-used and in the time across different services,
 from movie on line store to banking account. The average user has 26 
password‑protected accounts, but only five different passwords across 
those accounts. According a recent study of six million actual user 
generated passwords, the 10,000 most common passwords would have 
accessed 98.1 percent of all accounts, an information that gives us an 
idea of how much vulnerable the password management process.
“Once a hacker has a password, he or she can potentially have the keys to the cyber kingdom based on most consumers’ behavior.”
Deloitte Deloitte predicts that in 2013 more than 90% of user generated 
passwords, even those considered strong by IT departments, will be 
vulnerable to hacking with serious consequences, the company predict in 
fact billions of dollars of losses, declining confidence in Internet 
transactions and significant damage to the company reputations for the 
victims of attacks. 
The reports states:
“How do passwords get hacked? The problem is not that a hacker 
discovers a username, goes to a login page and attempts to guess the 
password. That wouldn’t work: most web sites freeze an account after a 
limited number of unsuccessful attempts, not nearly enough to guess even
 the weakest password. Most organizations keep usernames and passwords 
in a master file. That file is hashed: a piece of software encrypts both
 the username and password together. Nobody in the organization can see a
 password in its unencrypted form. When there is an attempt to log in, 
the web site hashes the login attempt in real time and determines if the
 hashed result matches the one stored in the database for that username.
 So far, so secure. However, master files are often stolen or leaked. A 
hashed file is not immediately useful to a hacker, but various kinds of 
software and hardware, discussed in this Prediction, can decrypt the 
master file and at least some of the usernames and passwords. Decrypted 
files are then sold, shared or exploited by hackers.”
As described another problem is related to use of passwords on various 
platforms, let’s consider that the average user takes 4-5 seconds to 
type a strong ten character password on a PC keyboard, time increases to
 7-10 seconds on a mobile devices with a keyboard and to 7-30 seconds on
 touchscreen devices. As consequence  a quarter of the people surveyed 
admitted to using less secure passwords on mobile devices to save time.
SplashData, which develops password management applications, reveals its Annual “25 Worst Passwords of the Year” enumerating the list of most common password chosen by users.
The three worst passwords haven’t changed respect previous year, they’re
 “password”, “123456” and “12345678” and new passwords have been 
introduced in the top list such as “welcome”, “jesus” and “ninja”.
Following the top ten list:
- password (unchanged)
 - 123456 (unchanged)
 - 12345678 (unchanged)
 - abc123 (up 1)
 - qwerty (down 1)
 - monkey (unchanged)
 - letmein (up 1)
 - dragon (up 2)
 - 111111 (up 3)
 - baseball (up 1)
 
Have you ever used one of the most popular passwords of 2012 for your own personal accounts? Change it. What could improve password management, SSO systems for represent a good
 solution to do it for example allowing in simplest way the use of long 
or random passwords respecting the elementary best practices for 
password management, of course also this system must be protected from 
hacking attacks.
The implementation of multifactor authentication processes token based 
(both software and hardware) represents the best compromise between 
costs and security, that is also the way that security IT security 
travels in the future.
 Minggu, 03 Februari 2013
SID Retail Pro
01.37
  
  8 comments
Mau sharing tentang aplikasi SID Retail nih. Tulisan dibawah ini saya copas dari beberapa sumber di dunia maya. Semoga bisa bermanfaat dan mohon maaf sebelumnya.  
SN 4690 : N605MCP-7WYND34-MFQ1V21-7328Z18
SN 4876 : 897FXJ5-97H296F-30O6G7S-05ZGRGT
SN 10816 : 9G7YZ93-9SJ784D-A30F56P-40HP3FL
SN 6277 : 497C8R1-W6J0L53-W39XU5B-57WU1X3
SN 7469 : U786F66-29UVS5H-6X42D9Q-8853GXO
Download SID Retail Pro :
https://mega.co.nz/#!V0ZlUYKY!Ie8M3lASF8pZQQD2JQkZgk5xSjxhd1v7F1PvnmezHwg
(14.4 MB)
Download Generate SN :
https://mega.co.nz/#!hx4yybCY!Yg-vFHk9sdj-zdW--x4La2IpXs85I15aqpIZ794IQSI
(608 KB)
SN 4690 : N605MCP-7WYND34-MFQ1V21-7328Z18
SN 4876 : 897FXJ5-97H296F-30O6G7S-05ZGRGT
SN 10816 : 9G7YZ93-9SJ784D-A30F56P-40HP3FL
SN 6277 : 497C8R1-W6J0L53-W39XU5B-57WU1X3
SN 7469 : U786F66-29UVS5H-6X42D9Q-8853GXO
Download SID Retail Pro :
https://mega.co.nz/#!V0ZlUYKY!Ie8M3lASF8pZQQD2JQkZgk5xSjxhd1v7F1PvnmezHwg
(14.4 MB)
Download Generate SN :
https://mega.co.nz/#!hx4yybCY!Yg-vFHk9sdj-zdW--x4La2IpXs85I15aqpIZ794IQSI
(608 KB)
Langganan:
Komentar (Atom)










