Featured Slideshow
Malware funnels smartcard PINs to remote servers
Thursday, November 15, 2012
Posted by l33tdawg
Viruses & Malware
2 comment(s)
A researcher has developed malware capable of remotely stealing two factor PINs generated by USB smartcards.The malware was unique in that it used a driver to access the USB port and ship PINs stolen... read more
For Sale: Cheap access to corporate computers
Thursday, November 15, 2012
Posted by l33tdawg
Security
0 comment(s)
Cybercriminals are openly selling illegal access to the computer networks of many of the world's biggest companies.For only a few pounds or dollars, fraudsters and scammers can get the login in... read more
Obama signs security cyber-operations guidelines
Thursday, November 15, 2012
Posted by l33tdawg
GOV, Industry News, Security, US
0 comment(s)
President Barack Obama has signed a classified directive laying out new guidelines for cyber-operations that national security planners can use to protect U.S. computer networks from attack, a senior... read more
Malware identified as latest OS X trojan targeting Tibetan activists
Thursday, November 15, 2012
Posted by l33tdawg
Apple, Tibet, Viruses & Malware
0 comment(s)
A new variant of Mac malware Imuler has been identified targeting Tibetan activists. The discovery was made by Bellevue, Wash.-based Apple platform security vendor Intego Inc.According to a blog post... read more
Dropbox hits 100 million users
Thursday, November 15, 2012
Posted by l33tdawg
Dropbox, Industry News
0 comment(s)
Dropbox has announced that it has reached 100 million users, an impressive number to be sure. For comparison's sake, here's Wikipedia's list of virtual communities with more than 100 million... read more
You are here
Home › Exposed Terminal Services Remains High Frequency Threat
Exposed Terminal Services Remains High Frequency Threat
Submitted by l33tdawg on Fri, 2012-09-07 01:34
Tweet
Credit: Wikipedia
Quickly reviewing the HITME data gathered from our global deployment of HoneyPoint continues to show that exposed Terminal Services (RDP) on port 3389 remains a high frequency threat.
In terms of general contact with the attack surface of an exposed Terminal Server connection, direct probes and attacker interaction is seen on an average approximately two times per hour.
Given that metric, an organization who is using exposed Terminal Services for remote access or management/support, may be experiencing upwards of 48 attacks per day against their exposed remote access tool. In many cases, when we conduct penetration testing of organizations using Terminal Services in this manner, remote compromise of that service is found to lead to high levels of access to the organization’s data, if not complete control of their systems.
- Log in or register to post comments
- 1442 reads
You May Also Like
Microsoft to patch 19 vulnerabilities on Tuesday
Thu, 2012-11-08 23:44
Vupen claims to have found zero day Windows 8 exploit
Thu, 2012-11-01 23:03
Microsoft's picture-password ad: Intriguing or confusing?
Mon, 2012-10-29 04:55