- Nov 11, 2009
- 12,275
Just to clarify I originally was with talktalk but changed to BT keeping my talktalk e mail address so this will not affect me is that correct?
change your password
Just to clarify I originally was with talktalk but changed to BT keeping my talktalk e mail address so this will not affect me is that correct?
To be fair, I can relate many stories of ddos attacks emanating from the Far East and the Middle East that we catch and send to various " cleaning houses"
99% of attacks are not reported, only the ones that hit the big corporations.
There is anecdotal evidence that the young 10 year old in his bedroom ******* over his ability to bring apple down is just as capable of attacking systems that state sponsored banks of hackers trying to get into security systems. This is the new terrorism.
Be assured that the ability of these attacks to get bank details and drain your account is actually very small and it is more around flooding sites with bogus mails and huge self spawning data files that actually gum up the works and will cause a web site to " crash" as it can't process the data is has. The bank thing tends to be where they have your number and try to arrange loans on it. If the lenders are following their protocols, this would also be hit and miss and if it's fraudulent, then the banks tend to write off the debt anyway as malicious fraud.
The things we recommend is change your passwords every 30 days
Never use simple passwords....letmein...password1...brighton123...that sort of thing
Never ever give your passwords or pins to anyone who calls.
Make sure you set your computer to " clear cache"every night...including "passwords".
Apart from that, just be aware.
A bit I read only yesterday on how to do passwords better: http://www.washingtonpost.com/news/...al&utm_source=twitter.com&utm_campaign=buffer
In the US companies have to announce any breach of personal information within 24 hours or get big fines. We don't have that here... yet. In 2016/2017 the new EU Data Protection Directive, which will force companies to announce breaches within 24 hours, and if they're found negligent they'll be fined 2% of worldwide revenue. That's a game-changer in Europe, as all member states will be forced to comply. The business case for security will be much easier.
Assuming the UK is in Europe of course
It's all sound advice but in many cases, like this one - none of the above makes the slightest bit of difference. If the host system is compromised then your data is available to the miscreants. Then you just have to hope that they do use strong 1-way encryption on your password with them and that they protect card details in a PCI DSS compliant manner.
I'll wager that 20,000 of those at the match tomorrow have 'seagulls' as a password for something
I agree. We have just gone through the huge pain of making all out devices PCI DSS compliant, but even that was not enough for a far eastern based bank that we heard about which had gone through the PCI route, where someone working out of Saudi drove a horse and cart through their multiple firewall covered infrastructure and left a message on the banks CEO's desktop!
Fortunately it was not one of ours, but a competitor almost went to the wall by lawsuits being thrown around like confetti.
PCI-DSS is a good start but its is nothing more than that, it does not cover the security across companies it is focused on the credit card PANs as soon as a company can prove a system does not come into contact with credit card details then they don't need to worry about it. The weakest link is still through employees, how many people click on attachments without a concern? That could (and has been) enough to get access onto the corporate network and off you go searching for useful information, it's that simple.
We can improve ours and companies security with technology and should do but people habits must change as well. its more work but wherever possible never store credit card details on internet sites when given the option no matter how much easier it seems and do not store passwords when given the option.
As for the high street, a former colleague of mine went to a cashpoint on payday, and found her account had been wiped clean. It turned out that she had been shopping in TKMax a couple of months earlier who had had their rubbish stolen at the back of the store with debit/credit card transaction slips unshredded.
I'll wager that 20,000 of those at the match tomorrow have 'seagulls' as a password for something
Thats pretty impressive considering the Merchants copy of a credit or debit card transaction only show the last four digits of a customers card number....
Nsc went down for a bit about the same time this week - are we safe?It's all sound advice but in many cases, like this one - none of the above makes the slightest bit of difference. If the host system is compromised then your data is available to the miscreants. Then you just have to hope that they do use strong 1-way encryption on your password with them and that they protect card details in a PCI DSS compliant manner.
I can't speak for all of NSC but it won't put me off shopping online.
There have been numerous big breaches over the last few years but (from a layman's perspective) it seems like very damage is actually done as long as the impacted company has made a point of encrypting their data in the first place...if they don't...well, careless.
Tried to change e mail password and it said that Talktalk was unavailable
the alleged nutters who have my details, posted loads of email, bank and personal data as proof and ended with this
"We Have adapted To The Security measures Of The Web,, We Cannot Be Stopped. We Have Made Our Tracks Untraceable Through Onion Routing, Encrypted Chat Messages, Private Key Emails, Hacked Servers. We Will Teach our Children To Use The Web For Allah.. Your Hands Will Be Covered In Blood.. Judgement Day Is Soon
WE Are In The Soviet Russia And Near Place, Your Europe, WE control Asia, We Control AMERICA"
Wretched site is down again - no e-mail access this evening. I'm getting a timed out error message.
Anyone else having trouble?