A few days ago I watched a live hacking demo at the University of Sussex in which a company showed how easy it was to access a large number of credit card numbers on a supposedly secure ebusiness site. The demo took 15 minutes and involved an arsenal of tools easily available on the internet. As the independent security consultants I-Sec made Swiss cheese of the website's firewall, many of the delegates' jaws dropped - mine included.. . .
A few days ago I watched a live hacking demo at the University of Sussex in which a company showed how easy it was to access a large number of credit card numbers on a supposedly secure ebusiness site. The demo took 15 minutes and involved an arsenal of tools easily available on the internet. As the independent security consultants I-Sec made Swiss cheese of the website's firewall, many of the delegates' jaws dropped - mine included.

Here are the questions to ask yourself: what would you do if your site was targeted with some of the weapons above? What backup do you have? Are you up to date on the tools used to compromise ebusiness security? And are any of your staff using these tools?

The link for this article located at vnunet is no longer available.