security article – EDY SUSANTO
Security Article

Anggota Lizard Squad Beserta 56 Hacker Lain di Tangkap di Inggris

Tindakan keras yang dipimpin oleh NCA (Badan Kejahatan Nasional) Britania dalam seminggu terakhir telah menangkap sekitar 56 penjahat cyber. NCA menduga bahwa hacker ditangkap terlibat beberapa kegiatan hacking yang sangat serius seperti DoD, Yahoo, PlayStation dan Xbox . Ini adalah rangkaian penangkapan  terbesar oleh lembaga yang terkait dengan keamanan cyber di Inggris. Laporan juga muncul

Security Article

The Onion explains how its Twitter account was hacked

IDG News Service – Hackers who commandeered The Onion’s Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher’s technology team. The Syrian Electronic Army (SEA), a group supporting embattled Syrian President Bashar al-Assad, has also compromised prominent Twitter accounts, including those of the Associated Press, The Guardian,

Security Article

Windows Server 2012

Cloud computing in general, and private clouds in particular, have emerged as a response to the high cost and lack of agility of traditional approaches to IT. The  needs of IT users and the rate of technological change have increased signifi cantly. At the same time, the need to improve IT effi ciency and reduce

Security Article

Updating Hash Security: NIST and SHA-3

The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the best possible replacement for the cureent SHAs (Secure Hash Algorithms) — SHA-1 and SHA-2. Cryptographers are submitting new mathematical algorithms in order to develop a more secure and robust substitute that will strengthen the hash functions that are used

My Share Security Article

Anonymous claims to expose bank executive details

Hacktivist group Anonymous said it has posted the sensitive details of 4,000 bank executives on a government website. On Sunday night, an Anonymous Twitter account called “OpLastResort”tweeted about the leaked information, which was posted on the website of the Alabama Criminal Justice Information Center (ACJIC), a clearinghouse of criminal records and statistics for the state. The ACJIC page

Ilustrasi Hack - Google
Security Article

How to Avoid a Hacktivist Attack

Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report [PDF file]. The report attributed fully 58 percent of all data stolen, more than 100 million records, to hacktivists. “The most significant change we saw in 2011 was the rise of ‘hacktivism’ against