Hacks are going to happen -- the key is lessening the blow

The latest trend in cybercrime appears to be trying to crack into the websites belonging to companies that are in the business of stopping cybercrime.

Two weekends ago, a Romanian hacker going by the handle Unu first blogged about using a SQL injection attack to gain access to Kaspersky Lab's U.S. support website. Then, he chronicled a successful infiltration of F-Secure and BitDefender.

In none of the cases was any sensitive data exposed. It's difficult to say whether that is because the hacker stopped short of doing this because he merely was trying to demonstrate the insecurity of these sites -- or because he simply was not sophisticated enough.

Either way, his point was well taken. Because of the amount of code used to build today's flashy and information-filled websites, pages are going to be insecure. And while Kaspersky, for good reason, expressed shame and disappointment over the hack, situations like this are going to happen.

After all, if a determined hacker wants to find a way in, chances are, he will.

I was speaking recently to the owner of a security consulting firm who said he was absolutely sure that, sooner than later, hackers were going to compromise his site. Just to prove they could do it. He could run the latest and greatest to stop them, but an attack was inevitable.

So how does he sleep at night, knowing the phone might ring at 3 a.m. (sorry, Hillary), telling him that his site was illegally accessed?

By doing the most important thing one can do: Mitigating the threat by limiting the amount of sensitive data that resides in database servers serving public-facing websites.

This should be a best practice that not only applies to SQL databases but across enterprise networks. If you don't need it, don't keep it.

The worst-case scenario, my source told me, was that the thieves would get some email addresses.

Sounds a lot better to me than names, Socials and credit card numbers.
close

Next Article in The News Team Blog

Advertisement

How to Prevent Insider Threats!

POLL

More in The News Team Blog

The power and danger of using the cyber "T" word

Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?

Here are eight cyber crooks who got less prison time than Andrew Auernheimer

Here are eight cyber crooks who got less ...

The security researcher and self-proclaimed internet troll earned 41 months behind bars Monday for his role in using a script to retrieve data on roughly 120,000 Apple iPad users from ...

The White House thinks Julian Assange and Jeremy Hammond are no different ...

Whistleblowing organizations like WikiLeaks and accused hacktivists like Hammond are not foreign spies lusting to plunder intellectual property from U.S. corporations and government agencies in order to profit and gain a competitive advantage.