LANDESK ended up having to report the breach to current and former employees. According to them, personal details could have been stolen. This attack had been in progress for 17 months! During this time, they uncovered remotely hosted agents accessing server builds and other areas of Landesk’s proprietary software.This means…there’s a very strong chance that in the past 17 months these hackers have added backdoors to LANDESK’s global architecture, possibly giving them access to 1000s of computers.<\/li>\n<\/ul>\nThe big question is, how did these hackers break through LANDESK’s endpoint? There are many ways, starting with social engineering all the way through metamorphic viruses, possibly detouring to a Man-in-the-Middle\/Browser attack, too.<\/p>\n
The big point we need to make here is this: ANY fully booted Windows PC endpoint is highly vulnerable to compromise, regardless of the security software being used to protect it. The ONLY way to do secure endpoint transactions on the web is to bypass the PC OS and use technology like BankVault = one-time use virtual machines that retain no history.<\/p>\n","protected":false},"excerpt":{"rendered":"
Brian Krebs, whom we believe to be the Bob Woodward of cyber security and bank account hacking reporting, broke a pretty amazing story yesterday about how hard it is for companies to effectively secure (and keep secure) their network endpoints. It’s a tale of a big breach at a sophisticated firm that SPECIALIZES in remote […]<\/p>\n","protected":false},"author":2,"featured_media":2886,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[202,62,146,203,204],"class_list":["post-2326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","tag-endpoint-security","tag-krebs","tag-krebs-on-security","tag-man-in-the-browser","tag-man-in-the-middle"],"yoast_head":"\n
Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility - BankVault<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility - BankVault","description":"A major security company was hacked through social engineering. This demonstrates how hard it is for any company to secure its endpoint.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility - BankVault","og_description":"A major security company was hacked through social engineering. This demonstrates how hard it is for any company to secure its endpoint.","og_url":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-11-25T18:06:34+00:00","author":"BankVault","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"BankVault","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/"},"author":{"name":"BankVault","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/76e0aa85d5ac5405b47c0760eb9ab639"},"headline":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility","datePublished":"2015-11-25T18:06:34+00:00","dateModified":"2015-11-25T18:06:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/"},"wordCount":370,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"image":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#primaryimage"},"thumbnailUrl":"","keywords":["endpoint security","Krebs","krebs on security","man-in-the-browser","man-in-the-middle"],"articleSection":["IT security news"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/","url":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/","name":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#primaryimage"},"image":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#primaryimage"},"thumbnailUrl":"","datePublished":"2015-11-25T18:06:34+00:00","dateModified":"2015-11-25T18:06:34+00:00","description":"A major security company was hacked through social engineering. This demonstrates how hard it is for any company to secure its endpoint.","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/76e0aa85d5ac5405b47c0760eb9ab639","name":"BankVault","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"BankVault"},"url":"https:\/\/www.bankvault.com\/author\/bankvault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/2326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=2326"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/2326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=2326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=2326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=2326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}