The Hamburg Commissioner for Data Protection and Freedom for Information is ordering Facebook to halt the unlawful collection and storage of data belonging to 35 million German WhatsApp users. The Commissioner has also ordered that Facebook delete any data that they have already collected from WhatsApp. Richard Stiennon, Chief Strategy Officer at Blancco Technology Group commented below. Richard Stiennon, Chief Strategy Officer at Blancco Technology Group: “The Hamburg Commissioner for Data Protection and Freedom for Information is completely justified in ordering Facebook to halt their data collecting and storing activities, seeing as, in Germany, transferral of data has to be agreed under…
Author: ISBuzz Team
Researchers at InfoArmor published the new findings this morning, based on extensive analysis of collected threat intelligence from various dark web sources conducted to clarify the motivation and attribution of the key threat actors. The data theft of the Yahoo customer database may be the key in several targeted attacks against US Government personnel, which resulted after the breach of account information on affected high-level officials in the intelligence community, which occurred in October 2015. Jonathan Sander, Vice President of Product Strategy at Lieberman Software: “The fact that the suspects in the Yahoo breach are both nation states and criminals shows the rising…
Following the news about US presidential election debate, where Hilary Clinton and Donald Trump discussed their perspectives and approaches to cybersecurity, Richard Stiennon, Chief Strategy Officer at Blancco Technology Group commented below. Richard Stiennon, Chief Strategy Officer at Blancco Technology Group: “At face value, it’s somewhat of a positive sign that Clinton and Trump are at least aware there are serious issues with ’the cyber’ (in Trump’s words). But based on their answers, it appears as though they aren’t personally conversant with the issues and the technologies that are required to reduce data/cyber security risks and threats. In particular, I noticed neither candidate made…
Following the news that hackers used IoT devices to conduct the largest DDoS attack in history on the French hosting company OVH, Sean Newman, Director at Corero Network Security commented below. Sean Newman, Director at Corero Network Security: “With traditional security infrastructure, it’s hard for individual organisations to effectively protect themselves against such extreme attacks – by the time an attack has reached their network, the volume of traffic far outweighs their capacity and almost immediately they experience issues with network availability. However, relief from these types of attack can be obtained with proper mitigation techniques, which can be offered by Service…
We’re reaching a stage where a lost or stolen phone can intuitively shut down all its apps because it knows it’s not the owner tapping away on its screen, and when banks are actively testing these types of systems as alternatives to passwords and PINs. Therefore when it comes to security, one can safely assume that behavioural authentication, already on the rise, will be the next great frontier in device authentication. Take Project Abacus for example. Born from the desire to find a way to make authentication systems device-driven, rather than human driven. First introduced to developers last year, Google…
New study shows gamers would rather compromise their own safety than miss out playing their favourite game Whether it’s Pokémon Go, Grand Theft Auto or World of Warcraft, online games are addictive. And a new piece of research from internet security firm ESET has revealed just how hooked some gamers have become. The study revealed that one in ten gamers admit they have played a game continuously for between 12 – 24 hours, while six percent of gamer-extremists confessed to playing continuously for over 24 hours at one time, essentially spending two whole waking days in fantasy worlds. The study looked at…
Following the news that hackers have stolen apparent internal documents from a Californian investment bank and published them online, likely in an effort to extort money from the victim company. Javvad Malik, Security Advocate at AlienVault commented below. Javvad Malik, Security Advocate at AlienVault: “The challenge is that even if companies pay the ransom, there is no guarantee that the data won’t still be leaked publicly or traded privately. Once the genie is out of the bottle there is no going back. So I’d not recommend paying the ransom under these circumstances. Companies need to know what data they have,…
Kaspersky Lab has investigated how cybercriminals could exploit new ATM authentication technologies planned by banks. While many financial organisations consider biometric-based solutions to be one of the most promising additions to current authentication methods, if not a complete replacement for them, cybercriminals see biometrics as a new opportunity to steal sensitive information. Robert Capps, VP of business development at NuData Security commented below. Robert Capps, VP of Business Development at NuData Security: “We couldn’t agree more with Kaspersky Lab’s comments around the importance of protecting your physical biometric data from theft and misuse. Although the security world is desperate for new and improved authentication…
Musicians and reality TV stars top the list in McAfee’s 10th annual Most Dangerous Celebrities study Popstar Ellie Goulding is named the UK’s Most Dangerous Celebrity to search for online according to McAfee study Geordie Shore stars Charlotte Crosby and Holly Hagan feature in top five list of riskiest celebrities 44% of Brits say they would click on a site before checking it was safe whilst over a third (36%) do not know what malware is Singer and songwriter Ellie Goulding replaces Kelly Brook as McAfee’s most dangerous celebrity to search for online in the UK. Now in its tenth year,…
New Survey from IP EXPO Europe Shows 70% of ITDMs believe UK Government should do more to attract young people to technology professions LONDON. New research commissioned by IP EXPO Europe, Europe’s number one enterprise IT event, today reveals that 23% of UK IT decision makers (ITDMs) identified STEM and the need for young IT talent as one of the main technology issues for enterprises in 2017. Over half (55%) of respondents currently believe the lack of young talent at their organisation is an issue; a rising concern with 26% stating they are more worried about not having enough young talent in the workforce now…