Trend Micro’s Head in the Clouds study surveyed more than 13,000 remote workers across 27 countries to find out more about the habits of distributed workforces during the pandemic. The main results are: 39% of workers use personal devices to access corporate data. More than one third (36%) of remote workers surveyed do not have basic password protection on all personal devices. More than half (52%) of global remote workers have IoT devices connected to their home network. 10% using lesser-known brands
Author: ISBuzz Team
Telecommunications company Telstra has launched a pilot programme to block phishing texts spoofing Services Australia, according to ZDNet. Phishing messages purporting to be from myGov and Centrelink will be rejected by Telstra before they hit the phones of the telco’s customers. The company worked with the Australian Cyber Security Centre (ACSC) and Services Australia on the layer 3 blocking effort, and the programme has now completed its proof-of-concept stage, forecasting to be fully rolled out across its network by the end of the year. Telstra CEO Andy Penn said involving the ACSC allowed for information sharing between government and industry, and…
Researcher Bob Diachenko reports gaming hardware giant, Razer Inc. recently experienced an incident exposing customer emails, phones, shipping and billing addresses and more online. Cybersecurity expert reacted below.
Staples has informed some customers that data relating to their orders has been accessed without permission, but dubbed the data as ‘Non-sensitive” according to researcher Troy Hunt. Cybersecurity experts reacted below.
It has been reported that the Department of Veterans Affairs notified veterans Monday morning of a data breach that resulted in the exposure of 46,000 veterans’ personal information. This breach took place when an unauthorized users tries to access an application within the Financial Service Center (FSC) to steal payment. The techniques used by the attacker are “Social engineering” and “exploiting authentication protocol” in order to gain access to the system. Cybersecurity experts reacted on this news below.
Cloud is not an emerging trend anymore. It is a mature business model for IT organizations to stay competitive in today’s challenging digital landscape. Cloud is not only redefining the IT landscape but also how security measures are developed and deployed. The migration to the cloud has forced organizations to rethink security and privacy from scratch. Approaches to robust security in the cloud are quite different from those in an on-premise IT environment. As a result, your current security expertise may not be entirely relevant to your new, cloud-based environment. So, before moving mission-critical assets to the cloud, organizations don’t…
As reported by ZDNet, an Elasticsearch server left exposed online without a password has leaked the personal details of hundreds of thousands of users who signed up for online dating sites.
The BBC reported today about a woman whose business was cloned on Instagram and she had to spend a lot of time “fighting to save her company’s reputation”. Full story is here: https://www.bbc.co.uk/news/technology-54026002
A Which? investigation has exposed hundreds of security vulnerabilities on the websites of major airlines, tour operators and hotel chains with most risk identified for Marriott, British Airways and easyJet. More information here: https://www.which.co.uk/news/2020/09/marriott-british-airways-and-easyjet-fail-on-data-security-with-hundreds-of-security-risks-exposed-by-which/
It is reported that the Fourth District Court of Louisiana has been hit by ransomware and responsible hacking group Conti has claimed the attack and published the proof on the dark web. The court’s website remains offline. Below, a cybersecurity expert provides an insight into this ransomware attack.