With an expected 20.8 billion connected things to be in existence by 2020[1] these devices are producing data at an astonishing rate here in the UK. The Internet of Things (IoT) is having an increasing impact upon our ever-evolving lives. However, what many take for granted is the fact that algorithms are at the heart of the devices generating this data. Algorithms are essential to the running of everyday products, from the brakes in your car to trades on the stock exchange, creating our economy’s secret weapon of success and mass destruction in equal measure if risks aren’t mitigated for. Behind the…
Author: ISBuzz Team
In response to the news that security researchers have spotted the Ammyy Admin site being used in drive-by-downloader attacks to install the Lurk trojan and other malware, Travis Smith security researcher at Tripwire commented below. Travis Smith, Security Researcher at Tripwire: “Human nature is to let your guard down when you feel safe. As users begin to interact with new sites, their trust begins to build over time when there are no negative consequences. Attackers can exploit this trust relationship using drive-by-downloads. By either compromising the website or leveraging malvertising, attackers can redirect users to a malicious website which will leverage a wide…
Following the latest national crime statistics in England and Wales, David Emm, principal security researcher at Kaspersky Lab commented below. Key findings from the report include: 51% of fraud incidents were cyber related from October 2015 to March 2016 28% of these were “non investment fraud” (online shopping or computer service calls) 2 million computer misuse incidents – 68% cyber virus related 32% were from unauthorised access to personal information (including hacking) David Emm, Principal Security Researcher at Kaspersky Lab: “For the first time the ONS national crime statistics include official estimates of fraud and computer misuse – revealing that 51% of…
The Office for National Statistics has released its crime data for England and Wales which shows that 6 million fraud and cyber crimes are committed every year, this is equal to 1 in 10 people affected. Cyber Security expert Ryan Rubin, Managing Director at global advisory firm Protiviti commented below. He has some interesting views on the increasing number of cyber fraud events and how companies are responding to this Risk. Ryan Rubin, Managing Director at IT Security & Privacy: “By including virus incidents into these numbers, they may skew the cyber crime results targeting individuals. We need to dig deeper into these incidents before…
52% of data breaches are caused by human errors Comprehensive training course from leading IT industry association bolsters cybersecurity awareness London, UK. CompTIA, the world’s leading non-profit association for the technology industry, has launched a new self-paced online training programme to help UK organisations educate their staff in the fundamentals of cybersecurity in the workplace. CompTIA CyberSecure™ gives employees practical cybersecurity awareness tips and helps them realise that their everyday actions are the crucial first step in protecting their organisation against data breaches and other threats. The cost of data breaches continues to soar, with the average UK breach costing upwards…
London, UK. Tripwire, Inc., a leading global provider of endpoint protection and response, security and compliance solutions, today announced the results of a survey of over 400 information security professionals who attended Infosecurity Europe 2016. The conference took place June 7-9, 2016, at the Olympia Conference Centre in London. According to Tripwire’s survey, nearly half of security professionals believe the current U.S. presidential campaign will not have a lasting impact on global cyber security. When asked if they were concerned that the U.S. presidential election would have a negative impact on global cyber security, fifty-four percent of the respondents said, “no.” “There…
FireMon survey shows 65% of security professionals surveyed think they would get grounded by Mum for untidy firewall rules LONDON, UK. A survey of 300 IT security professionals carried out by security management vendor FireMon at last month’s Infosecurity Europe has concluded that 65% believe that they would be grounded in some capacity for the messy state of their firewall rules. Of those, over half, or one-third of the total surveyed, said that if their firewall rules were a teenager’s bedroom, Mum would be so angry, she would ground them for life; and just 35% were confident Mum wouldn’t be…
Just a year has passed since Securing Smart Cities – a not-for-profit global initiative that aims to raise awareness and solve the existing and future cybersecurity problems of smart cities – was launched. Since that time, the initiative’s supporting community has increased three-fold: from ten cybersecurity experts from all over the world to more than 30. In addition, the number of supporting organisations has grown from four to fifteen. During the past year Securing Smart Cities supporters and contributors have been successful in increasing awareness of the potential cybersecurity problems in smart cities. The initiative has published several documents that…
PwC’s Retail Banking 2020 report identified the top priorities for banks as they head into the next decade. Fourth on the list – after customer centricity, distribution optimisation and business model simplification – is ‘information advantage’. The collection, use, analysis and protection of customer and transactional data for competitive benefit is a challenging goal in itself; it is further complicated by the powerful forces currently reshaping the financial services landscape. These changes include new technological capabilities, evolving customer expectations, ever-stricter regulatory requirements and the disruptive impact of new competition in the form of software-based financial technology firms. To navigate the change and meet…
ThreatConnect reassesses what could happen next in light of recent public statements by Guccifer 2.0. We described the current state of the Guccifer 2.0 purported disclosures as leaking documents of minimal intelligence value for possible political points in the U.S. and reinforcing Kremlin themes to a Russian audience about the failings of democracy and the West. Here, we outline a couple of different trajectories for the Guccifer 2.0 persona and identify some of the indicators that would help us determine which path we’re on. Steady state: The primary purpose of the DNC breach was espionage, and Guccifer 2.0 is a propaganda…