General Discussion Undecided where to post - do it here. |
Reply to Thread New Thread |
![]() |
#1 |
|
http://www.nytimes.com/2011/05/28/bu...hack.html?_r=1
Doesn`t sound to bad, does it? http://www.cringely.com/2011/05/inse...-more-secrets/ Late on Sunday all remote access to the internal corporate network was disabled. All workers were told was that it would be down for at least a week. Folks who regularly telecommute were asked to come into nearby offices to work. Then earlier today (Wednesday) came word that everybody with RSA SecureID tokens would be getting new tokens over the next several weeks. Also, everybody on the network (over 100,000 people) would be asked to reset their passwords, which means admin files have probably been compromised. |
![]() |
![]() |
#2 |
|
|
![]() |
![]() |
#3 |
|
|
![]() |
![]() |
#5 |
|
un-SecurID... ouch RSA had the option to fully disclose the extent of their breach, but instead they chose to keep the vast majority of their customers in the dark. Now, if they don't pony up the information fast they'll have a mass exodus of their customers to other two-factor solutions. As for saying the password change meant a compromise of Lockheed's admin files, that's not necessarily true. It's a standard security operating procedure in most enterprise to force password changes @ the next login; some even go so far as automatically resetting all of the passwords and requiring employees to contact their support services to get them changed. Odds that it was a Chinese sponsored attack? |
![]() |
![]() |
#6 |
|
http://www.reuters.com/article/2011/...74S09220110529
"As a result of the swift and deliberate actions taken to protect the network and increase IT security, our systems remain secure," Jennifer Whitlow, a Lockheed spokeswoman, said in an e-mailed statement. "No customer, program or employee personal data has been compromised." |
![]() |
Reply to Thread New Thread |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|