Remember that whole “PC Gaming is not dead” ad campaign Razer launched leading up to PAX back in August? The company kept us guessing about just what the hell they were talking about for a couple of days, then pulled back the curtain and revealed… the Razer Blade gaming laptop. Unfortunately, some sticky-fingered gamer couldn’t wait the month or two to pick up the notebook for himself; Razer reports that a thief has stolen two Razer Blade R&D prototypes from the company’s San Francisco lab.
According to a report in the St. Petersburg Times, seven men broke into iGov Technologies during a weekend when no one was around and made off with 3,000 Panasonic Toughbook laptops and other electronics. iGov is a military contractor for the Special Operations Command, a unified unit of elite fighting forces trained in unconventional warfare, among other things.
The thieves gained entry through the roof and had unfettered access for nine hours, during which time they loaded thousands of electronic equipment into two semitrailer trucks. What exactly was on the laptops remains a mystery.
iGov, which is headquartered in McLean, Va., was awarded a $450 million contract by the Department of Defense to supply mobile technology services to special operations troops around the globe. The good news here is that the FBI and Miami-Dade Police Department were able to recover 1,911 stolen items from a warehouse in Miami.
It is a disgrace that humans haven’t still got the hang of setting passwords. It seems as though that most internet users have inextricably tethered themselves to a promise of not setting strong-enough passwords, which may force hackers to reconsider their choice of profession for its grueling nature. As you devour more of this story, you will begin to envy hackers for having it stroll-in-the-park easy.
A new study has revealed – rather reiterated - that internet users nonchalantly continue to set unimaginative, fatuous passwords. The study appraised 28,000 passwords that were recently stolen from a U.S website.
Sixteen percent of the users had set their first name as their password. Around fourteen percent chose easiest to recall key combinations, including “1234” and “12345678”. Other users, who apparently don’t rate their mathematical ability highly, chose to steer clear of numbers and settled for passwords such as “AZERTY” and “QWERTY”.
Five percent of the passwords were found to be inspired by popular things and celebrities, including names of movies, TV shows and actors. The strongest password in this category was found to be “Ironman” as it sounds impenetrable.
Three percent of the people reckon passwords are another medium of expression. How else would you explain passwords like “Iloveyou” and “Ihateyou?”
In the end, it might be easier keeping a problematic IT administrator on board than to let him go. Top level execs take note - according to a new survey, which pinged 300 IT administrators still with a job, a staggering 88 percent admitted they would steal company secrets if they were laid off.
The information IT professionals not-yet-scorned said they'd take include the CEO's passwords, the customer database, R&D plans, financial reports, M&A plans, and the company's list of privileged passwords. And when it comes to that last one, administrators don't even need to be laid off in order to start poking around. More than a third of those surveyed claimed to have used privileged passwords to snoop on the network, look up salaries, and peek at other personnel details assumed to be private.
"Our advice is secure the most privileged data, and routinely change and manage them, so that if an employee's contract is terminated, whether sacked or made redundant, they can't maliciously play havoc inside the network or vindictively steal data for competitive or financial gain," said Udi Mokady, chief executive of security firm Cyber-Ark.