Researchers have discovered that a malicious app is mirroring the #1 app in the iTunes store claiming to be Pokemon Go but may actually contain a malicious remote access tool called DroidJack. In a phased release, Pokemon Go is being made available to players across the world. However many gamers want early access and have bypassed country locks to get to the new app. However, they may be propositioned by a fake Android app that once downloaded actually takes full control of the victim’s phone. Tim Erlin, Senior Director of IT Security and Risk Strategy for Tripwire commented below. Tim…
Author: ISBuzz Team
Following the news that a new consultation into self-driving technologies has been launched by the government, Gordon Morrison, Director of Government Relations at Intel Security commented below. Gordon Morrison, Director of Government Relations at Intel Security: “The consultation into self-driving technologies is another important step in the government’s pursuit of cutting-edge technologies that will not only support our economy, but also position the UK as a global leader in transport technology. “However, it is crucial that in its pursuit of innovation, the government doesn’t neglect the security essentials which will guarantee not only the success of these new technologies, but also…
Debut of the prplHypervisor™ to occur at the IoT Evolution Expo in Las Vegas LONDON, UK. The prpl Foundation today announced the upcoming debut of the prplHypervisor™ at the IoT Evolution Expo in Las Vegas. The prplHypervisor™ is an industry-first light-weight open source hypervisor specifically designed to provide security through separation for the billions of embedded connected devices that power the Internet of Things. A principle set out in the Security Guidance for Embedded Computing published by prpl in early 2016, security through separation is key to fixing the fatal security flaws plaguing the IoT. “From theft of personal information and financial data to remote takeover…
prpl Foundation adds four new members: ADB, Baikal, SoftAtHome, and Intrinsic-ID prpl Foundation, the open-source, community-driven, collaborative, non-profit foundation supporting the next gen connected devices industry, has today announced the addition of four new members that will help steer the future of the Internet of Things (IoT). The companies joining consist of ADB, the Swiss connected solutions specialist; Russian semiconductor firm Baikal Electronics; SoftAtHome, the French embedded software for the digital home company; and Intrinsic-ID, a specialist in Physical Unclonable Functions (PUF) for securing connected devices, who will also be helping with the advancement of a prpl PUF project. “This is a really exciting…
The easily accessible, highly valuable nature of healthcare records is seeing people’s most personal data becoming increasingly accessible to cybercriminals. No other single record bank contains as much Personally Identifiable Information (PII) as that held by healthcare organisations, which makes this data invaluable to hackers. Nowhere else are hackers able to get their hands on information that allows them to form such a thorough profile of their potential victims. Healthcare records not only offer up a patient’s name, address and social security details, but also often include their financial and insurance information – which ultimately can enable attackers to commit…
For many organisations, cross-platform mobility will be their biggest investment in 2016. It is considered to be revolutionising how businesses manage processes and remain efficient in very competitive environments. However, with the increased use of modern technology, businesses have failed to manage their work processes in the most effective manner. As a result, essential business information has become scattered across many systems and devices. Therefore, this article will discuss the main reasons why inefficient process is rife within modern business and offer advice on implementing mobility to improve productivity and efficiency. The source of inefficient process In the past, process was relatively…
Professional social networking site LinkedIn has proven to be a valuable business tool, bringing together professionals from all over the world. But few corporations grasp the security risks that the use of LinkedIn represents. The main problem is not with the LinkedIn website’s own digital security but with a widespread corporate ignorance of the way the organised criminal gangs (OCGs) who make billions, sometimes tens of billions of dollars, from cyber crime work. The hackers are now using well-known brands names such as Standard Chartered Bank on LinkedIn to attract senior executives to divulge information that they can use. It’s…
Following the NCA report that came out saying hackers are winning the cyber arms race, IT security experts from AppRiver and Verizon commented below. Troy Gill, Manager of Security Research, AppRiver: “There are two main reasons why companies don’t report data breaches: they’re either ignorant of the breach or fearful it will cost them customers, drastically reducing their profits. Adding the threat of a fine or lawsuit in the case that a data breach is unreported, or at least not reported in a timely manner, certainly makes “doing the right thing” less expensive. “Companies have proven that they can’t be entrusted to…
Based on past Olympics and other large events, security researchers are predicting that the Olympics in Rio will present hackers with a prime opportunity to fleece athletes and visitors alike. For large events, hackers set up fake websites with everything from travel to tickets. Tim Erlin, Senior Director of IT Security and Risk Strategy for Tripwire commented below. Tim Erlin, Senior Director of IT Security and Risk Strategy at Tripwire: “Anytime there’s a major event that grabs people’s attention, attackers take advantage of it. There’s a measurable increase in the propensity to click when the subject is of strong interest.…
When business-sensitive data is hacked or leaked the consequences can be disastrous for an organisation. ERP (enterprise resource planning) systems can be particularly attractive targets for hackers because to a cybercriminal they look like honeypots of valuable data. Whether that data is customer credit card details, business financial data or intellectual property, if cybercriminals obtain it they can sell it on the underground economy. Other risks include hacktivism where groups will post sensitive customer data publicly to highlight security flaws, which can significantly impact a company’s reputation, or cyber-espionage whereby competitors obtain access to valuable intellectual property. We believe industrial…