Cybercriminals Phishing for Email Accounts using SMS

Advertisements

A Gift for the Hackers – Netherlands


(via OrT)

See also: http://www.canvas.be/programmas/panorama/server11668bf33:136e8606961:-6fa4 (in Dutch)

Update 1 (22/01/2013):
This is a reaction from Ricoh. It’s good to see that they take this seriously.
Other companies should follow their example!

Dutch version:
http://www.ricoh.nl/over-ricoh/nieuws/2012/beveiliging-van-printapparatuur.aspx

English translation:

Holding statement

While most businesses are advanced in the security of their IT networks, computers and physical security, they have not given their document workflows the same attention.

It is important to ensure that a business’s document management assets are managed as an integral part of an organisations overall information management and security strategy.  

By optimising their document processes they can dramatically reduce security risks, and also improve knowledge sharing, customer response times, environmental footprints and business agility.

Ricoh has been raising awareness of the importance of effective document security strategies through its own communications and partnerships.  We also welcome the investigation by the “Reporter” to further enhance awareness of security risks for technology users.

Preventative measures are likely to cost less than potential costs or fines for compliance breaches and leaks that may damage the reputation of their brand. A global analyst firm estimates these can be at least 10 times the cost of investing in preventative measures.

Ricoh provides a fully managed document process service, which can include security optimisation and advises users about security, particularly at the time of delivery and installation. Specific advice relates to replacing default passwords with self-chosen combinations.  In addition we advise clients to check their servers. If an organisation decides to enable internet connection (it will never happen automatically) and equipment is protected but the server is open, the printing device is also accessible.

Where a business chooses to manage its own process, we have ensured our devices include a comprehensive range of security features, are certified by the Common Criteria (ISO/IEC 15408) and are compliant with IEEE2600, the international standard for security functions.

For more detailed information, please contact us for further detailed information.

 

‘Control-Alt-Hack’ tabletop card game

Control-Alt-Hack™ is a tabletop card game about white hat hacking, based on game mechanics by gaming powerhouse Steve Jackson Games (Munchkin and GURPS).

You and your fellow players work for Hackers, Inc.: a small, elite computer security company of ethical (a.k.a., white hat) hackers who perform security audits and provide consultation services. Their motto? “You Pay Us to Hack You.”

Your job is centered around Missions – tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed. Use your Social Engineering and Network Ninja skills to break the Pacific Northwest’s power grid, or apply a bit of Hardware Hacking and Software Wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking!

Find out more on www.controlalthack.com