Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Watchdog
    PCHF Bot
    • Apr 2016
    • 19187

    #1

    Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130

    Hackers gained “full and unfettered access” to a third-party holding restricted informationhttps://pixel.wp.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=386357&subd=sophosnews&ref=&fe ed=1

    Continue reading…
  • georgeks
    PCHF Member
    • May 2017
    • 335

    #2
    “…what most security experts, and regular readers of Naked Security, will recognize as basic security hygiene:
    [ol]
    [li]Use application allow lists so only run approved programs[/li]
    [li]Patch applications like Flash, web browsers, Microsoft Office, Java and PDF viewers[/li]
    [li]Patch operating systems[/li]
    [li]Restrict admin privileges based on user duties…”[/li][/ol]
    Please forgive me, but I refuse to accept that IT people employed by Security Firms -even “mum and dad-type business”- can be so naive or incompetent.
    The highest probability I assign to this being a staged event.

    When the 4 steps mentioned in the article are always presented as Gospel for average computer users, how can one believe that a “a small Australian company with contracting links to national security projects…” ignored them?

    Comment

    • DOUGIE
      PCHF Member
      • Jun 2017
      • 424

      #3
      Originally posted by georgeks
      When the 4 steps mentioned in the article are always presented as Gospel for average computer users, how can one believe that a “a small Australian company with contracting links to national security projects…” ignored them?
      My guess everything would be encrypted, so IMO Tripe.

      Comment

      • veeg
        PCHF Director
        • Jul 2016
        • 8982

        #4
        @georgeks
        You are probably correct and reading more in this article the other day,it was only the 3rd party commerical parts of it and not the restricted military part.

        Comment

        • georgeks
          PCHF Member
          • May 2017
          • 335

          #5
          I agree Ken but I had to make a point-maybe I’m just getting old and grumpy..

          IT security people keep on telling ordinary users to do certain “simple” things, just to “forget” doing them themselves.

          The other day at work I told a colleague that it was wrong to install an application on a network PC, and he still did it, as “I have it on my own system, George, and nothing happened”

          Comment

          Working...