Following the news that hundreds of millions of hacked account details from social networks MySpace and Tumblr have been advertised for sale online, IT security experts from MIRACL, AlienVault and ESET provide commentary and advice: Brian Spector, CEO at MIRACL: This incident provides us with another reminder of just how vulnerable passwords are to being hacked. The tendency for people to choose a password for life means that setting up a cursory account on a site like MySpace could threaten all the private information that they store and access on the Web each day. But the bigger problem here is that the…
Author: ISBuzz Team
A hacker broke into Katy Perry’s Twitter account today and sent out a number of tweets – some that included profanity and slurs before they were discovered and taken down. Tim Erlin, Director of IT Security and Risk Strategy at Tripwire commented below. Tim Erlin, Director of IT Security and Risk Strategy, Tripwire: While there’s plenty that Katy Perry could have done differently, there’s probably not much that she should have done differently. Celebrities, with millions of followers, are always going to be attractive targets for any attacker who wants an audience.Technology companies are constantly working on ways to improve data…
Apple has yet to patch a major vulnerability that they have known about since January 27 and was exposed at Hack in the Box last week. Using software exposed yesterday at Black Hat Asia, an attacker can swap out legitimate versions of apps, developed with the said certificate, in order to spy on users and gain elevated privileges on the device that expose contacts, messaging, photos, the microphone and more. There are more details to the story here: https://wp.me/p3AjUX-uNh. Here to comment on this news is security expert Kevin Bocek, Chief Security Strategist at Venafi. Kevin Bocek, Chief Security Strategist, Venafi: This attack…
New survey shows 74% of UK law firms planning to invest in new technology over next two years A new survey of UK law firms by managed IT services provider Redcentric tells a story of a sector on the brink of operational change with a surprising 74% planning to invest in new technologies to help address business challenges over the next two years. Underlining the urgency, almost half of these (36%) will make this investment before the end of 2016. The findings support the view that law firms are under increasing pressure to adopt new market realities and this involves…
Over the last decade we’ve seen a significant increase in mobile technology and it is now becoming the heart of customer experience; forcing retailers to figure out how the digital and physical relationships can work together. Retailers must now decide whether to equip their personnel with mobile devices, introduce more self-service kiosks or expand mobile technology even further; all in the aid of delivering a personalised approach and improving the in-store experience for shoppers. So how has mobility become so important and where it will need to go to meet the expectations of consumers? Rise in mobility It is considered…
Every day, across the UK around 1.5 million professionals work from home; more productive, happier in their role and measurably less stressed, perhaps. At the same time, however, they may be increasing the risk to your sensitive business data. Since the Government has recently given all employees the right to request flexible working, the number of home-workers, and the associated information risk, looks set to increase – just when the stricter EU General Data Protection Regulations (GDPR) are set to come into force. If employers get it wrong, it’s going to hurt, and the pain could be worse than ever.…
New Lieberman Software Poll Reveals Overwhelming Negative Attitude Toward Effectiveness of Passwords Passwords are a cornerstone method for securing access to data. However, a new survey published by cyber security vendor Lieberman Software Corporation revealed that over three-quarters (77%) of IT professionals believe passwords are failing IT security. The study, carried out at RSA Conference 2016, looked at the attitudes of nearly 200 cyber security professionals. It also found that 53% of those surveyed thought that modern hacking tools could easily break passwords within their organizations. “These results really tap into the mindset of the IT security industry,” said Philip…
Security procedures are vital in many areas of every day life. Across the globe, busy airports ensure crew and passengers alike go through thorough and strict security checks. This may be time-consuming and inconvenient but is absolutely necessary to ensure passenger safety and the consequences of skipping such processes have the potential to be extremely dangerous. Similarly, when you log on to your online banking account, you may have to enter one or more security codes and PIN numbers to be granted access, which can be frustrating when you’re in a hurry but it is monumentally important to prevent your…
Following the news of three more hospitals being hit by ransomware, Brian Spector, CEO of MIRACL comments: Brian Spector, CEO, MIRACL: “Public institutions like hospitals are a key target for hackers because they hold such a treasure trove of personal data. In the US, the potential bounty is even larger, due to the additional layer of financial transactions taking place. But that’s not to say that UK hospitals are safe. Hospital IT systems are notoriously fragmented and complex, with networks crossing wards, laboratories and offices. They are also among the most vital and important in any organization – because if…
Following the news of sexting increasing among under-16s, here to comment on this news is David Emm, principal security researcher at Kaspersky Lab. David Emm, principal security researcher at Kaspersky Lab The news of sexting increasing among under-16s highlights the need to educate younger generations, as part of sex education in schools, on the importance of keeping personal information private. The dangers of oversharing information aren’t always obvious, and young people mustn’t adopt a false sense of security when posting information online. With the rise in teenagers accessing new types of technology, such as dating apps, comes the need for…