Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities.
Authors: Gavin Watson, Andrew Mason, and Richard Ackroyd Pages: 390 Publisher: Syngress ISBN: 0124201245 Introduction We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets - regularly take advantage of this fact to gain a foothold into computer systems and networks.
In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max Planck Institute for Software Systems as well as Zheng Leong Chua and Prateek Saxena at the National University of Singapore to study cyber-attacks against the human-rights Non-Governmental Organization (NGO) representing the Uyghur ethnic minority group living in China and in exile: World Uyghur Congress (WUC).
Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today.
Itís not hard to see in scenarios such as these why people are considered to be the weakest link.