Ashley Madison Breach Should Spark Security Conversation - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Ashley Madison Breach Should Spark Security Conversation
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
PedroGonzales
50%
50%
PedroGonzales,
User Rank: Ninja
8/29/2015 | 11:43:57 AM
Re: where is the surprise?
@Impactnow.  That is a good point. One shouldn't be surprise is this things happen.  Breaches will happen; it will be a matter of time.  The worst part is that people in our government and in security positions are jeopardize our national security by using their work email for such activities.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/28/2015 | 10:54:38 PM
Re: where is the surprise?
@impactnow: Of course, that's the problem with trust and security.  There are activities that we don't mind our friends and family knowing about but that still involves information we don't want people knowing, such as our credit card numbers.

It's also worth pointing out that at least one industry pundit, John McAfee, has theorized that the AM "hack" was completely a one-person insider job.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/28/2015 | 10:50:32 PM
Re: Pending Review
@kstaron: That's a good point, especially because there are so many government and military positions from which a person can get fired simply for indiscretions and other activitiy that could serve to embarrass, for fear of being susceptible to extortion.  (Case in point: General Petraeus and the Broadwell affair.)
larryloeb
0%
100%
larryloeb,
User Rank: Author
8/28/2015 | 3:53:51 PM
Re: where is the surprise?
I'll juat assume the Impact Team is not to be found in a corner of your office......

 

Yes, that is a joke.
impactnow
100%
0%
impactnow,
User Rank: Author
8/28/2015 | 2:51:27 PM
Re: where is the surprise?
I guess what surprised me most about the Ashley Madison breach is not that it happened, is that people were surprised that it did happen . We all live in a world where data breaches are commonplace I think I get three letters a month and several emails regarding breaches companies I do business with or have done business with have suffered. If someone chooses to engage in activity on the Internet that they don't want everyone to know about there being very nave . Our Internet lives are public and will always be . Unfortunately we can all expect to be hacked at some point and if you don't want your friends,family and employers seeing what's doing online I suggest you do not engage in this activity online .
larryloeb
0%
100%
larryloeb,
User Rank: Author
8/27/2015 | 12:21:35 PM
Re: Pending Review
Well, if they are that dumb in the first place, why would they even think that far ahead?
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/27/2015 | 12:20:28 PM
Re: Pending Review
It seems far more a parental controls enfocer than an adblocker.

In fact, I dont see it blocking any ads at all, just sites.
kstaron
50%
50%
kstaron,
User Rank: Ninja
8/27/2015 | 12:20:04 PM
Re: Pending Review
My first thought when I saw how many .mil and .gov listed in the AM breach was wow, we sure do have a whole lot of dumb people working for the government. Who uses an easily traceble email for activities that could get you fired (not to mention found out rather quickly)? The sheer number of them is startling. Ad if they are dumb enough to use their government email, what are they let slipping between the sheets? how easy would they be to comprimise without even knowing it?
jastroff
50%
50%
jastroff,
User Rank: Ninja
8/27/2015 | 9:41:25 AM
Re: Pending Review
netnanny.com has been around forever as an example of a web site blocker. give it a try
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/25/2015 | 9:01:29 AM
Re: Pending Review
FWIW, Biran Krebs outlines one of the extorion attempts made against AM users.

The url is : http://krebsonsecurity.com/2015/08/extortionists-target-ashley-madison-users/
Page 1 / 2   >   >>


2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll