Synergy USA llc Blog

How is it that so many services and websites commonly used have been hacked and the security compromised, meaning your details including passwords might be available on the black market?

 

1..A popular site like a hotel chain (Marriott case) has more potential attacks than a web site for a furniture next door.

2..It takes just an old and not updated Apache Server for a hacker to hack in. Imagine an organization having hundreds or thousands of individual servers of different versions running end of service software. It is just a matter of time.

3..Marketing Dept. wants a product to go public as fast as possible. (It’s not their fault, competitors are out there waiting for a chance to increase market share). So there is no plenty of time for testings.

4..As a developer myself I was never taught that a memory overflow could crash my application and give full credentials to the user. We were never instructed to be aware that someone might try to “cheat” our software and try to find a security hole.

5..Developing tools still do not have the methods to advice the developer about potential risks. We are still far from a secure environment.

6..When a company bribes a hacker $100K to keep silent and not exposing hackers data. Isn’t that a good incentive for a poor kid ?

Uber Paid Hackers $100,000 For Silence On Cyberattack That Exposed 57 Million People’s Data

7..I remember MySQL during earlier versions was shipped with empty root password. They were expecting the administrator to change it. They thought it was too obvious not to allow a system without a password or with the default one. You know the rest. There were thousands of online MySQL databases with empty root password. I hacked one myself by mistake :
Synergy USA Llc’s answer to Why do big organisations keep getting hacked and having their data leaked? What does it achieve?

latest posts

Automate Creation of Serial Numbers In An Existing PDF Template

We received a request from a client, to automate the creation of Serial Numbers inside a PDF file.The PDF was a A3+ format and was designed in such a way...

Are you moving away from VMware due to the new pricing method ? – Why not test Microsoft free Hyper-V as a VMware alternative

Since 2010, we've been using Hyper-V, starting from its 2008 version. Hyper-V essentially operates as a Windows Server Core, without a Graphics User Interface, and we deploy it as a...

Seven + 1 Effective Measures for Cybersecurity in Businesses

Cyberattacks are a big risk for all businesses, big and small. They can disrupt how things run and may cause a loss of money and customers. If a company's cybersecurity...

Unveiling Hidden Dangers: The Perils of UPnP and Protecting Your Digital Homestead – Apple Time Capsule

The Dangers of Default Settings: A Narrative on UPnP and Data Vulnerability During one of my routine client visits, I encountered a situation that underscored the criticality of cybersecurity in...

OTHER PRODUCTS

Tags:
,