<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
            Home>News Center>World
                   
           

          Hackers steal data through phone networks
          (Agencies)
          Updated: 2005-01-24 16:47

          Computer hackers have taken to stealing data the easy way -- by eavesdropping on phone and e-mail conversations to find the keys to seemingly impregnable networks, security experts say.

          The danger of attacks with insider information was illustrated earlier this month with the arrest of a California man accused of breaking into mobile phone network T-Mobile USA Inc.'s database and reading e-mails and files of the U.S. Secret Service, and by the exploits of a hacker who breached a hospital's database and changed mammogram results.

          The nature of threats to network security has changed as sophisticated hackers learned to tap into sensitive information flowing through telecommunications' servers, especially those that provide wireless and Internet access.

          "Telecom providers are probably one of the main targets for malicious attackers because they control communications for everybody," said Ralph Echemendia, head of Intense School, which trains executives in network security risks.

          CANDY FROM A BABY

          Hackers may con their way into a phone network by posing as phone company tech employees to get passwords into the network. Then they could essentially tap phones or search for personal data like text files or even camera phone photos.

          "(Hackers) will sit there and listen in, waiting to get valuable information," Echemendia said. "Once they have a foothold on one system they go through the same process to find other hosts."

          Security experts at Intrusic Inc. captured 4,466 passwords and 103 master passwords allowing global access to corporate databases while monitoring one Internet service provider for a 24-hour period, Intrusic President Jonathan Bingham said.

          "It's like stealing candy from a baby," Bingham said. "The malicious attacker will assume the identity of a person whose password they have stolen through this passive sniffing and they end up entering this organization as a legitimate user."

          Once inside, it takes the hacker seconds to set up back doors that allow access to the database at any time to do more spying, data theft or worse.

          BEST PRACTICES

          Most hackers, however, are after information -- passwords, social security numbers and birth dates -- that they can sell or use to penetrate bank and credit card accounts, Forrester Research Inc analyst Laura Koetzle said.

          "Telecoms and cable companies are pretty high on the list simply because of their huge customer bases," Koetzle said. "If they can crack T-Mobile's database they can get user names and passwords for (millions of) subscribers at all once."

          In a statement, T-Mobile, a Deutsche Telekom AG unit, said it "quickly put in safeguards to prevent further access and began an investigation" after a hacker broke into its internal computer systems in 2003 and accessed data on 400 customers.

          As more companies shift business functions to the Internet and allow workers to access secure systems from off-site, it becomes tougher to guard against insider attacks and easier for hackers to breach the system, said Stan Quintana, director of managed security services at AT&T Corp .

          "All these types of environments are requiring a higher level of security ... of data in transit," he said.

          The key to cutting down on damage from inevitable insider attacks is to constantly monitor data flow and train employees to guard passwords and access to computers, he said.

          He added that among the "best practices" AT&T advocates is that its customers periodically hack into their own networks.



           
            Today's Top News     Top World News
           

          FM: 8 freed hostages now in embassy, coming home soon

           

             
           

          Bank officials flee after US$120m go missing

           

             
           

          Iran says US attack would be a strategic error

           

             
           

          Mayor sets out Olympic pledge for 2005

           

             
           

          China and India launch first strategic dialogue

           

             
           

          1.2 mln applicants crowd into exam rooms

           

             
            Qaeda ally declares all-out war on Iraqi election
             
            Suicide car bomb targets Allawi office in Baghdad
             
            Vietnam reports two more bird flu infections
             
            Majority of Japanese want troops out of Iraq
             
            Strong quake shakes Indonesia's Sulawesi
             
            US envoy acknowledges Iraq election woes
             
           
            Go to Another Section  
           
           
            Story Tools  
             
            News Talk  
            Are the Republicans exploiting the memory of 9/11?  
          Advertisement
                   
          主站蜘蛛池模板: 一二三四中文字幕日韩乱码| 国产伦一区二区三区久久| 黄页网站在线观看免费视频| 国产精品人成视频免费播放| 饥渴丰满少妇大力进入| 一色桃子中出欲求不满人妻| 又爽又黄又无遮掩的免费视频| 久久亚洲av成人无码软件| 丁香亚洲综合五月天婷婷| 亚洲国产欧美在线观看片| 免费国产一区二区不卡| 欧美牲交a欧美牲交aⅴ一| 国产免费毛不卡片| av无码一区二区大桥久未| 久久精品国产中文字幕| 国产999久久高清免费观看| 久久伊人精品影院一本到综合| 女被男啪到哭的视频网站 | 亚洲欧美人成人综合在线播放| 国产精品中文av专线| 国产99视频精品免费视频76| 亚洲熟妇中文字幕日产无码 | 欧美成人精品三级网站| 久久精品中文字幕99| 国产精品日日摸夜夜添夜夜添无码| 欧美激情黑人极品hd| 久久综合久中文字幕青草| 亚洲女同一区二区三久久精品 | 久久高潮少妇视频免费| 国产AV大陆精品一区二区三区| 在线日韩日本国产亚洲| 亚洲欧美日韩中文字幕在线不卡| 国产宅男宅女精品A片在线观看| 自拍偷自拍亚洲精品播放 | 国产成人国产在线观看| 亚洲av成人一区在线| 好男人在线视频观看高清视频| 99在线国产| 日本不卡三区| 国产偷国产偷亚洲高清午夜 | 久久婷婷五月综合97色直播|