Get a Pentest and security assessment of your IT network.

News

Four steps to take if your business depends on RSA SecurID tokens

Thieves stole the master key to RSA’s pseudo-random number generator and can manufacture phony ones to break into corporate networks, expert says. If it turns out SecurID has in fact been compromised, businesses need to have a fallback plan for what they will do, he says. “You have to ask yourself if you are a big enough shop that you could be a target,” John Pironti, president of IP Architects, a security consulting firm. He says stealing core security technology is a prime target of attackers because that can undermine security of vast amounts of data and transactions.”]

Source: https://www.csoonline.com/article/2127825/four-steps-to-take-if-your-business-depends-on-rsa-securid-tokens.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones