Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
Computing
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
Lesson from Toyota Hack: Threats Can Be Internal, Too

Lesson from Toyota Hack: Threats Can Be Internal, Too
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

"People do, of course, leave jobs all the time and most of them would never dream of logging back in to their old place of work," said security researcher Graham Cluley. "But it only takes one bad apple to wreak havoc. So make sure your defenses are in place, and that only authorized users can access your sensitive systems."
 



Toyota is accusing a former IT worker of interrupting Web apps and security systems. The automaker filed a lawsuit in the U.S. District Court in Lexington, Ky.

Toyota is alleging that Ibrahimshah Shahulhameed purposely crashed its computer systems at Toyotasupplier.com and stole sensitive corporate information and trade secrets. Toyota claims this occurred after he was fired.

"If this information were disseminated to competitors or otherwise made public, it would be highly damaging to Toyota and its suppliers, causing immediate and irreparable damage," said the complaint, which was filed on Aug. 24, a day after Shahulhameed was terminated. "The worker had no authority to access or use Toyota's property or trade secrets and it is undisputed that he did access it and altered computer programs and codes."

According to the Associated Press, U.S. District Judge Karen Caldwell ordered Shahulhameed not to leave the United States during the investigation of the alleged computing hack. She also ordered him to hand over any information he stole from Toyota Motor Engineering & Manufacturing's computer system.

What's the Bigger Threat?

We asked Graham Cluley, a senior security analyst at Sophos, if he sees internal employees as the biggest threat to IT security or if outside hackers are the larger problem.

"There's a lot of focus on external hackers because they're easier for the media to talk about and also -- arguably -- easier to prevent," Cluley told us. "But the internal threat is considerable, and this invisible enemy is something which shouldn't be overlooked just because it's 'hard' to deal with."

How Did it Happen?

In Toyota's case, Cluley said what isn't currently clear is whether Toyota is claiming that Shahulhameed accessed its computer systems by exploiting a vulnerability or whether it had simply not reset staff passwords that he may have had access to in his position as an IT contractor with the firm.

Nevertheless, he said it's a timely reminder to all businesses to remember the importance of reviewing who has access to systems, and to underline that changing passwords and resetting access rights is essential when a member of staff leaves the company.

"People do, of course, leave jobs all the time and most of them would never dream of logging back in to their old place of work," Cluley said. "But it only takes one bad apple to wreak havoc. So make sure your defenses are in place, and that only authorized users can access your sensitive systems."

What's Ahead?

There are many predictions in the IT security world about what to expect in the days ahead. We asked Cluley if he expects to see even more hacking in the fourth quarter.

"It's never easy to make predictions about the future of cybercrime -- but there's nothing to suggest that things are going to get better in the next three months," Cluley said. "Attacks and hacks will continue to hit organizations, making it as important as ever to properly protect your firm's data and resources."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Computing
1.   UPS Stores Hit by Data Breach
2.   Acer Desktop Box Rides Chrome Wave
3.   VMware Buys CloudVolumes' V-Apps
4.   Feds OK IBM-Lenovo x86 Server Deal
5.   Target Data Breach Cost: $148 Million


advertisement
China Puts Microsoft Under the Lens
Official anti-monopoly probe launched.
Average Rating:
Feds OK IBM-Lenovo x86 Server Deal
Makes Lenovo a player for data centers.
Average Rating:
Acer Desktop Box Rides Chrome Wave
Chromebox targets schools, small biz.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.