SephStorm wrote: » I really cant see why government is so resistant to deal with issues that are going to make them look bad in the future.
SephStorm wrote: » The first article was clear that the "attack" was done by a security researcher, not a malicious hacker, so IDK where people are getting that from, or the risk of ID theft. That being said, I wish someone had asked a basic question in all those congressional hearings. "Have you had independent security researchers do penetration tests to validate the security of the website?" I really cant see why government is so resistant to deal with issues that are going to make them look bad in the future.
networker050184 wrote: » Ok guys, we aren't going to discuss politics here. Talk about the tech side of this or nothing at all.
security breach at a Web portal for the U.S. Department of Homeland Security has exposed private documents and some financial information belonging to at least 114 organizations that bid on a contract at the agency last year. dhsletter“This letter is to inform you that your company’s bank account information may have been improperly accessed because of this incident,” reads a letter sent to affected organizations earlier this month by DHS privacy officer Christopher Lee. “The incident appears to have occurred sometime over the prior four months.”
phoeneous wrote: » So does anyone know what the vulnerability of the site is? Just curious.
--chris-- wrote: » I'm new to this, but its my understanding there is a rather small pool of attacks that can be utilized via browsers at this point in time. Of course, assuming the site is using up to date coding/software...right? An injection or scripting attack most likely (I think).
lsud00d wrote: » This is accurate--injections, xss, xsrf, all that jazz...there's not a single vulnerability Here's a good reference to view the attacks identified by OWASPhttps://www.owasp.org/index.php/Category:Attack