<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacker Insight Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/hacker-insight/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/hacker-insight/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 24 Sep 2020 16:58:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Hacker Insight Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/hacker-insight/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A Hacker Profile &#8211; Who Are They?</title>
		<link>https://fosterinstitute.com/a-hacker-profile-who-are-they/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 16:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3316</guid>

					<description><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: They may be married and have a family Introverted with a close group of friends Often learned to program at a young age College educated, often in electronics, IT, or physics No social media [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: <span id="more-3316"></span></p>
<ul>
<li>They may be married and have a family</li>
<li>Introverted with a close group of friends</li>
<li>Often learned to program at a young age</li>
<li>College educated, often in electronics, IT, or physics</li>
<li>No social media accounts &#8211; to avoid drawing attention</li>
<li>Believe that soft drugs, such as marijuana, help them work</li>
</ul>
<p>Notice that the Secret Service doesn&#8217;t specify a gender.</p>
<p>Please forward this to your friends, so they know their adversaries a little bit better.</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</title>
		<link>https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 20:16:24 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Agent Tesla]]></category>
		<category><![CDATA[Breaking Passwords]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Disgruntled Employee Security]]></category>
		<category><![CDATA[GoToMyPC]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LogMeIn]]></category>
		<category><![CDATA[Stealing Keystroks]]></category>
		<category><![CDATA[Tesla Hackers]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2678</guid>

					<description><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.<span id="more-2893"></span>First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam video of two men stealing a Model S in real life on YouTube. The thieves had to use Google to find out how to unplug the car. To see the short video, search: Tesla Model S Being Stolen Antony Kennedy or click <a href="https://www.youtube.com/watch?v=odG2GX4_cUQ&amp;feature=youtu.be" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>Now, what affects you directly whether you own a Tesla or not. Many IT Professionals, consultants, and outsourced IT firms access your network remotely using tools designed to help them help your users solve technical issues. Example programs include GoToMyPC, TeamViewer, LogMeIn, VNC, and Splashtop. Some outsourced companies use a product called Agent Tesla to support their customers. If you visit the website agent tesla dot com, you will see that the product has additional features including stealing keystrokes, breaking passwords, and spreading itself like a virus through a network. It appears that some bad actors have been using this tool to infect computers at companies without the company&#8217;s permission. And the tech support representatives at Agent Tesla were more than willing to assist the bad actors.</p>
<p>A key takeaway is that user-friendly tools can permit non-technical people to hack your network without needing any technical know-how.</p>
<p>What if a disgruntled or unscrupulous worker in your company installs GoToMyPC, LogMeIn, or similar easy-to-use software on computers in your private offices? They could overhear private conversations without anyone knowing. One of our clients experienced millions of dollars of embezzlement because a trusted worker used one of those programs on the computer that was in the conference room. The embezzler was not technically savvy at all, and he heard enough confidential information to embezzle millions and wreak all kinds of havoc. He did not need to use the additional user-friendly features that Agent Tesla provides including password cracking and automatic infection of other computers, but he could have.</p>
<p>Visit with your IT professionals. What are you, as an organization, doing to protect yourself from someone intentionally utilizing a readily available program, such as Agent Tesla, to infect your network, spy on your workers, steal information, and break your passwords?</p>
<p>The CEO, Owner, President, and other chief executives suffer the most when an attack devastates an organization. Most of them wish they&#8217;d have taken more of an active role in security. Learn from their mistakes, before it is too late.</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Convention Starts Later This Week</title>
		<link>https://fosterinstitute.com/hacker-convention-starts-later-this-week/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Jul 2017 13:00:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DEF CON]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[Big Hacker Convention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacker Convention]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hackers in Vegas]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2523</guid>

					<description><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home – lest you end up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.<span id="more-2523"></span></p>
<p>If you will be in Vegas, leave your laptop and phone at home – lest you end up on the infamous wall of shame for being hacked. The website is defcon dot org</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Hack Your Phone Without Having Your Phone</title>
		<link>https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Nov 2016 15:52:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Hack]]></category>
		<category><![CDATA[Cloud Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Phone Hack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2393</guid>

					<description><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine all of this information and more, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from  your phone can be as simple as gaining access to that data in the cloud. Additionally, <span id="more-2393"></span>some of the apps on your phone can mine all of this information and more, even the amount of electricity left in your battery.</p>
<p>Gaining access to your account can provide everything from photos stored in your phone, to the passwords of Wi-Fi access points to which you&#8217;ve connected to in the past. That is very concerning.</p>
<p>When attackers know your browsing history, your email messages, your past search terms and the links you&#8217;ve clicked, they can use that information to perform very effective attacks tailored to trick you and the members in your company. With knowledge of your passwords, they can wreak all kinds of havoc.</p>
<p>Go get an idea of the kind of data that is stored in the cloud and is potentially accessible to attackers who use the right tools, see google dot com /policies/privacy/</p>
<p>Additionally, there are tools available, such as cloud explorer, that make it easy for even non-technical attackers to conveniently gain access to the sensitive information stored in your phone. </p>
<p>Please forward this to whomever is concerned about their mobile device&#8217;s security.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Avoid These 3 Really Good Hacker Tricks</title>
		<link>https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 May 2016 09:45:29 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hacker tricks]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2320</guid>

					<description><![CDATA[<p>Attackers prey on people trusting others. Watch out for these three common tricks. 1. Refuse to permit tech support to access your computer to help you. If this is your known service provider, then maybe you will decide to trust them. However, nobody else. Last week, I connected a new well known web-cam that is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/">Avoid These 3 Really Good Hacker Tricks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers prey on people trusting others. Watch out for these three common tricks.<span id="more-2320"></span></p>
<p>1. Refuse to permit tech support to access your computer to help you.</p>
<p>If this is your known service provider, then maybe you will decide to trust them. However, nobody else.</p>
<p>Last week, I connected a new well known web-cam that is highly rated. It didn&#8217;t work properly, so I called tech support. Their opening line, &#8220;I will send you a link to click, that will permit me access into your computer so that I can fix the problem.&#8221; I gently told him there was no way he was ever getting remote access. He was shocked, and had to go ask his manager what to do next&#8230;</p>
<p>2. Believe your anti-virus. </p>
<p>The camera company&#8217;s tech support rep, now with the manager with him, told me to download a special driver and run it on my computer. When I started to download the driver onto a &#8220;test&#8221; computer, my anti-virus program identified the driver as a virus. So I refused to install the driver. Without missing a beat, he said, &#8220;That&#8217;s ok, you can trust anything from us &#8211; it is safe.&#8221;</p>
<p>I wonder how many of their customers have been duped. Even if the tech support had no intention of infecting their customers&#8217; computers, how can they be sure that their software isn&#8217;t already compromised without their knowledge? Never let convenience override your choice to do something reckless.</p>
<p>3. Never answer online quizzes.</p>
<p>I love my wife. One day, she was so excited to tell me what her rock band would have been called in High School. She took a quiz on Facebook that told her. I asked what her rock band would have been called. The band name generated by her filling out the online quiz including the street she grew up on, followed by her favorite pet&#8217;s name, and the name of the high school she attended. Like I said earlier, I love her so much. But please don&#8217;t ever fill out any online quizzes again &#8211; ever. You can be duped into giving away too much information. Attackers can combine the answers with other information they discovered elsewhere on the web, and it makes it lots easier for them to assume someone&#8217;s identity.</p>
<p>Please forward this to everyone you care about&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/">Avoid These 3 Really Good Hacker Tricks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How To Know if a Password Attack Succeeded</title>
		<link>https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 13:00:05 +0000</pubDate>
				<category><![CDATA[Account Lockout Policy]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[automated attacks]]></category>
		<category><![CDATA[business passwords]]></category>
		<category><![CDATA[company attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Failed Logon]]></category>
		<category><![CDATA[failed logon attempts]]></category>
		<category><![CDATA[Guessing Passwords]]></category>
		<category><![CDATA[Guessing Usernames]]></category>
		<category><![CDATA[hacker attempts]]></category>
		<category><![CDATA[Hacker Success]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Lockout policy]]></category>
		<category><![CDATA[logon fails]]></category>
		<category><![CDATA[monitoring logons]]></category>
		<category><![CDATA[password attack]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[Password lockout]]></category>
		<category><![CDATA[password tries]]></category>
		<category><![CDATA[PW Tries]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[username tries]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2283</guid>

					<description><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack… As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…<span id="more-2283"></span></p>
<p>As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to those computers.</p>
<p>The most concerning part, since your network is already under attack, is that one or more of the attempts might have been successful.</p>
<p>Those thousands of unsuccessful login attempts on a computer are, in a way, reassuring because the attacker was having difficulty finding a combination that worked.</p>
<p>The reason that some computers have fewer attack attempts can be because an attacker successfully gained access after a smaller number of guesses.</p>
<p>This is often the case since the attacks are automated so an attacker will not usually get tired of trying. Once one of the tries is successful, then that&#8217;s when the attacker stops guessing usernames and passwords. At that point, they already have access.</p>
<p>Have your internal, or outsourced, IT Pro examine failed logon attempts and see if the usernames seem random like the list published last week. If the usernames are similar to those on that list, then that&#8217;s an indication that an attacker was attempting to gain access. If there are a small number of attempts, then that attacker may have gained access to the computer. </p>
<p>Now that’s concerning.</p>
<p>Please forward this to your friends and associates so that they can be more aware of how to protect the security of their organization.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>This Hacker Tells All</title>
		<link>https://fosterinstitute.com/this-hacker-tells-all/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 08 Dec 2015 17:30:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[cnn]]></category>
		<category><![CDATA[cnn hacker]]></category>
		<category><![CDATA[cnn money]]></category>
		<category><![CDATA[credit card hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hacker insight]]></category>
		<category><![CDATA[hacker point of view]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2232</guid>

					<description><![CDATA[<p>CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this hacker&#8217;s point of view on attacking tens of thousands of companies&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/this-hacker-tells-all/">This Hacker Tells All</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CNN Money just published an insightful interview with a hacker. You may find it interesting. </p>
<p>Read the interview by entering this search phrase into Google:</p>
<p>My hack stole your credit card site:money.cnn.com</p>
<p>Forward this to your friends who want to discover this hacker&#8217;s point of view on attacking tens of thousands of companies&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/this-hacker-tells-all/">This Hacker Tells All</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
