Attackers Target InfraGard, a FBI affiliate
In yet another security breach incident, attackers stole log in credentials of members of InfraGard, an affiliate of FBI.

Regular scrutiny of the websites and IT infrastructure is crucial to detecting threat vectors and initiating remedial action. Professionals qualified in computer science degree and IT security may help companies in proactive assessment of security scenario, making appropriate changes in the IT policy and strengthening the IT infrastructure.
Cyber-attackers are actively engaged in identifying and exploiting security loopholes. Frequent attacks and leakage of sensitive information not only compromises privacy of the affected individuals, but also make them vulnerable to various types of malicious attacks, identity theft and fraud. Leakage of sensitive military and defense information can also compromise the security of the target country. As such, it is important for security professionals to update themselves on latest developments through online university degree programs and IT security certifications, and make informed security decisions.
Employees continue to be one of the weakest links in the security chain. Attackers take advantage of negligence and lack of security awareness to launch social engineering attacks targeting employees, extract sensitive information and initiate further sophisticated attacks on company networks. Cyber-attackers also leverage the growing use of social media sites for business promotion purposes, professional networking to extract sensitive information and launch targeted attacks such as spear-phishing attacks. As such, it is important for employees to be aware of the latest security threats. Security awareness training programs can enable employees to understand and adopt best practices in online security such as password management, precautions while using social media sites, data security, and incident management practices. Employees may also take advantage of e-tutorials,online degree and e-learning programs to gain understanding of security fundamentals.
Security breach incidents have severe implications such as negative publicity, huge financial expenditure, leakage of business strategy and loss of productive business hours. As such, companies must place high emphasis on IT security. They must periodically review the security practices identify areas of concern. They must also make appropriate changes to security policies and practices in accordance with the latest threats. Proactive approach is crucial to strengthen the defenses of the Internet infrastructure, and avoid exploitation of security breach incidents.
Contact Press
EC-Council
Website: http://www.eccuni.us
Email: iclass@eccouncil.org
Tel: 505-341-3228
EC-Council University is based in Albuquerque, New Mexico and offers Master of Security Science (MSS) degree to students from various backgrounds such as graduates, IT Professionals, and military students amongst several others. The MSS is offered as a 100% online degree program and allows EC-Council University to reach students from not only the United States, but from all around the world.
EC-Council is a member-based organization that certifies individuals in cybersecurity and e-commerce skills. It is the owner and developer of 16 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT). Its certificate programs are offered in over 60 countries around the world.
EC-Council has trained over 80,000 individuals and certified more than 30,000 members, through more than 450 training partners globally. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. federal government via the Montgomery GI Bill, Department of Defense via DoD 8570.01-M, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates the global series of Hacker Halted security conferences.
###
Tag Words:
lulz sec, infragard, fbi, data breach, security breach, log in credentials, unveillance, botnet monitoring, botnet, sony pictures, information security
Categories: Internet