Businesses are feeling tremendous pressure to ensure their organisation is data-driven in order to remain competitive. Yet C-Suite surveys show there is still quite a bit of confusion that remains about how to implement an effective data culture. According to a recent report by KPMG Capital, 96 percent of enterprise companies surveyed admitted they could do more with big data and make better use of analytics in their organisation. So why are the vast majority of large enterprises today struggling with how to turn data into insights, and insights into a competitive advantage? Most organisations today are struggling with how to…
Author: ISBuzz Team
ESET researchers discovered fake versions of Prisma, a popular photo transformation app on the Google Play Store. Among them were also dangerous Trojan Downloaders. Before the release of the Android version of Prisma, a popular photo transformation app, fake Prisma apps of different types, including several dangerous Trojan Downloaders flooded the Google Play Store. Before being removed at ESET’s notice, Prisma copycats reached over 1.5 million downloads. Prisma is a unique photo editor created by Prisma labs, Inc. After having achieved excellent ratings among users on iTunes where it was first released, Android users were eager for it. Before the official release…
Following the recent Ofcom news of the UK population taking a “digital detox”, David Emm, principal security researcher at Kaspersky Lab commented below. David Emm, Principal Security researcher at Kaspersky Lab: “ I was surprised to see Ofcom’s research showing just how many people are finding it necessary to undergo a ‘digital detox’. Research Kaspersky Lab recently conducted showed the importance of devices to today’s society – 29.4 per cent said their smartphone was at least as important to them as their parents – highlighting the almost emotional connection we have with them. However, having an emotional (rather than instrumental) relationship with a smartphone…
Arizona healthcare group Banner Health has said that hackers may have accessed records of 3.7 million of its customers. Hackers could have accessed information including names of customers, their social security numbers and date of birth. An Ohio-based healthcare group was also recently targeted by hackers, who stole sensitive patient data and proceeded to leak it via Twitter. Jonathan Sander, VP of Product Strategy at Lieberman Software commented below. Jonathan Sander, VP of Product Strategy at Lieberman Software: Why are healthcare organisations being attacked so often recently? “Healthcare data is attacked so often because of simple economics. In the black market for personal information, the records…
Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up to collaborate and take a look at the associated domain to ferret out additional details on the activity. The initial indications from the DCCC breach suggest FANCY BEAR pawprints based on the following: First, the registrant – fisterboks@email[.]com – behind the spoofed domain actblues[.]com has registered three other domains, all of which have been linked to FANCY BEAR by German Intelligence (BfV). Second, the timing is consistent with an adversary reacting to heightened focus after the DNC breach was announced. Third, the two…
Online payment security is a collaborative effort, especially when it comes to electronic payments. Each participant in the purchasing process – banks, buyers and businesses – should pull their weight in making payment information safe and secure. As the merchant, ignoring your role in security leaves your online store open to attack by hackers and thieves. The state of security The current conversation regarding payment information safety spans a wide range of industries – from financial institutions to security firms to payment processing companies. According to Payment Week, TD Bank conducted a poll at the 2016 NACHA Payments conference in…
Following news that the White House wants to encourage the use of drones across various government departments and has released new privacy best practices to support this, Matt Jones, Technical Research Manager at Esri UK commented below. Matt Jones, Technical Research Manager at Esri UK: “The news that the White House is looking to encourage the use of drones throughout various government departments is a major step in bringing geographical information systems (GIS) technology into the heart of government operations in the United States. With GIS, we are now able to do things we couldn’t have dreamt of three years ago. Through…
Following news that TP Link was slapped with a fine of $200k from America’s broadband regulator, the FCC , for breaking rules set on radio frequency, Cesare Garlati, chief security strategist for the prpl Foundation commented below: Cesare Garlati, Chief Security Strategist at Prpl Foundation: “I am not surprised to see one more vendor breaking the rules to gain an unfair advantage over its competitors. This reminds me the scandal over VW “defeat software” to cheat pollution emissions tests. What I find really disturbing is the fact that these “cheats” dangerously affect safety and reliability of critical infrastructure – radio communications…
Following the news that Iranian security researchers finding vulnerability in Telegram’s SMS authentication. Mark Loveless, Senior Security Researcher with Duo Labs commented below. Mark Loveless, Senior Security Researcher at Duo Labs: “Reports suggest that the Telegram accounts in Iran were compromised through what appears to be coordination between attackers and cellphone companies, and taking advantage of the fact that SMS is used to add new devices to existing Telegram accounts. While this implies cooperation by the cellphone companies, this cooperation is often not required. Attackers have been known to social engineer cellphone companies to get the same level of “coordination” or use other more…
Following the news that email and website hosting provider 123-Reg suffered what it has described as a “huge scale” DDoS attack, Dave Larson, Chief Operating Officer at Corero Network Security commented below. Dave Larson, Chief Operating Officer at Corero Network Security: “DDoS against hosting providers, or the tenants they serve are a daily occurrence. While most attacks in a hosting provider environment are typically lower in bandwidth and possibly more sophisticated in nature, a 30Gbps attack is not uncommon, and can be mitigated in real-time with automated DDoS protection solutions. Re-routing traffic to a scrubbing center or dropping or black-holing all …