Following the news about Wendy’s breach 3x scope previously reported, Brad Bussie, Director of Product Management, STEALTHbits commented below. Brad Bussie, Director of Product Management at STEALTHbits: “Based on the information coming out of Wendy’s, a different and difficult strategy should be considered. What they have shown over the past six months is that the scope of the malware infection is still unknown. They have a moving malware target that has grown from 300 locations, to five percent of locations, and now 1000 locations. When a company can no longer trust its end point servers operating globally, drastic actions may…
Author: ISBuzz Team
The United Nation’s Office on Drugs and Crime (UNODC) has published its annual report and this year made particular note of the issues thrown up by the illicit trade of goods and drugs on the so-called dark web. IT Security Experts from AppRiver and Lieberman Software provided their viewpoints how the police can target dark web superstores. Troy Gill, Manager of Security Research at AppRiver: “The level or anonymity provided on the dark web allows providers and the consumers of these products and services to operate with a much greater confidence level than would otherwise be the case on the internet. Knowing the…
With a new report from Big Brother Watch revealing that police across the UK have experienced 2,315 breaches in the last five years – roughly 10 every week. Data security specialist Justine Cross from Watchful Software provides an insight on how forces need to work to improve their security. Justine Cross, Regional Director at Watchful Software: “The revelation that police forces across the UK are suffering almost continuous breaches of sensitive data shows that data security needs to be taken much more seriously. “Classifying all of the data on the police network and restricting file access to authorised users on the system would…
Cyberterrorism: just how real is the threat? When confronted with the idea of cyberterrorism, much of the population would shrug. How much would a large scale disruption of computer networks or a malware attack on a government actually affect the average person’s life or livelihood? Is cyberterrorism really an imminent threat? The issue lies with the terrorism part of the word. When compared to the al-Qaeda attack in Burkina Faso, the suicide bombings in Iraq, the Paris attacks, the Brussels bombings, the nightclub shooting in Orlando or any number of atrocities motivated by ideology the world over, cyberterrorism just doesn’t…
When we manage/administrate a Wordpress (WP) website publicly accessible to the Internet, two things are important to considerate/thinking about in these days: The first one is that he implement the security patch in the newer versions, so to keep your website far from known (public) vulnerabilities is mandatory to continuous update the Core of the Content Management Systems (CMS), the same works to themes and plugins. This subject comprehends the nineth topic of the OWASP Top 10 2013 – The Top Ten Most Critical Web Application Security Risks (A9 Using Components with Known Vulnerabilities)[1]. The second one is the constant…
Jeff Harris, VP, Solutions Marketing at Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering Botnet armies have got bigger, more active and more heavily armed than ever before. In the first quarter of 2016, attacks launched by bots reached a record high of 311 million – a 300% increase compared with the same period in 20151, and a 35% increase compared with the final quarter of 2015. Many botnets are used to launch distributed denial of service (DDoS) attacks, which are also getting substantially stronger and more frequent. …
With the news from the National Crime Agency (NCA) that UK law enforcement and businesses are losing the “cyber arms race” with online attackers, Anomali commented below. Jonathan Martin, EMEA Operations Director at Anomali: “Organisations must come to terms with the fact that cyber criminals are going to continue, and it’s the aggressor who decides the terms of engagement. But defence wins that game through a war of attrition, upping the costs and sophistication necessary to obtain the information by requiring the aggressor to squeeze through too many choke points. “Large military organisations would never dream of going into battle…
IT security industry calls for Internet Service Providers to take a larger role in protecting customers Over three quarters of IT security professionals (80%) believe that their organisation will be threatened with a DDoS ransom attack during the next 12 months, according to a new research report from Corero Network Security (LSE: CNS), a leading provider of First Line of Defence® security solutions against DDoS attacks. The research, which polled over 100 security professionals at the Infosecurity Europe conference in London, highlights the growing threat of cyber extortion attempts targeting UK businesses. Last month, (May 2016), the City of London Police warned of a new wave…
Avid Life Media (ALM), the parent company of hacked adultery website Ashley Madison, is facing a US Federal Trade Commission (FTC) probe over its use of automated software called ‘fembots’ on its websites, which impersonated real women to lure in male customers. Javvad Malik, Security Advocate at AlienVault commented below. Javvad Malik, Security Advocate at AlienVault: “Bots have been evolving over the last few years with some interesting use-cases emerging. For example, a bot lawyer at DoNotPay was created by student Joshua Browder and helps users contest parking tickets. However, the challenge with bots getting better is the role they can play by fooling…
According to a new report by Kaspersky, business travellers are more at risk of data theft. About 30% of senior business managers “have been hit by cybercrime while abroad”, according to a survey of 11,850 employed individuals who had travelled abroad for business and leisure in the past year. Jonathan Sander, VP of Product Strategy at Lieberman Software commented below. Jonathan Sander, VP of Product Strategy at Lieberman Software: “The Kaspersky report citing business travelers as being more of a target than others has an interesting twist to its thinking. Essentially, they seem to be more easily targeted because they use…