The computers at Hollywood Presbyterian Medical Center were down for more than a week, as they were being held hostage for $3.6 million. Patients were transported to other hospitals because of the breach, and crucial systems for CT scans, lab work and pharmacy needs are offline. In healthcare, a breach can be a life or death situation. The news is an extension of the rising tide of ransomware, malware and other beyond the perimeter threats that organizations of all kinds are now facing. On that note, I’d like to offer a contributed article from Greg Mancusi-Ungaro, CMO of BrandProtect, about…
Author: ISBuzz Team
Researchers have found several ways to exploit vulnerabilities in wireless Keyboards and Mice and can take control of them 100 meters away using the portable peripherals from at least seven big vendors including Logitech, Microsoft, and Amazon. Security expets from Tripwire and Rapid7 have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “We’re often so focused on network-based attacks that we forget these peripheral devices provide input to our computers as well. That wireless keyboard is another potential vector for attack. This type of attack is unlikely to be used…
Technology adoption is bringing about massive change in major cities around the world from smart traffic lights to knowing exactly what time transportation will arrive and paying for public services with the touch of a credit card or personal device. The Smart London initiative embraces technology that improves the lives of residents, businesses and visitors by allowing them to experience the city in a more seamless and immersive way. With the capital’s population predicted to grow by over a million between 2011 and 2021, new technologies will undoubtedly play a big role in the way we see and experience London.…
The past year has been tumultuous in the world of IT security. Though IT security is always host to a changing landscape, it seems that last year, more than ever, hackers and other technology villains have been top news. From hacktivists to cloud leaks and buggy code, it seems each week there is a new headline about IT security. What are some of the security solutions we will see in the near future that may turn the headlines from grim to optimistic? What are some of the current, emerging IT threats enterprises are facing? Targeted cyber-attacks are in the headlines…
Thinking of migrating your On-premise Email to the IT cloud? you should know your risks! Research conducted by Gartner and published by multiple sources suggests that the number of Cloud based email users is on the rise—from 12% in 2013, to an anticipated 50% by 2022. While this shift to the IT Cloud brings many benefits, it also leaves the organization with a new set of security challenges. Many of these challenges relate to the lack of organizational understanding pertaining to the Shared Responsibility model prevalent in the IT Cloud. The model states that the vendor is responsible for creating…
Research exposes gap between reality and expectations, with CIOs admitting they do not proactively hunt for threats, yet expect to expose breaches in less than two months Carbon Black®, the leader in Next-Generation Endpoint Security (NGES), announced the findings of a new CIO survey into current approaches to breach detection and response. The survey found that 82% of CIOs are under increasing pressure from the business to prevent, detect and respond to security incidents faster. However, over a quarter (28%) are ‘not concerned’ that if they were breached it would take a long time to find out it had happened,…
Kaspersky Lab’s Anti-malware Research Team has detected one of the most dangerous Android banking Trojans to date. The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass the Google Play store’s security measures. [su_note note_color=”#ffffcc” text_color=”#00000″]Anti-malware Research Team at Kaspersky Lab: During the third quarter of 2015, Kaspersky Lab experts detected an unusual increase in the number of mobile banking attacks in Australia. It looked suspicious and very soon it was discovered that the main reason for this increase was a single banking Trojan: Acecard. The Acecard Trojan…
In light of the news regarding Linux Mint, Wim Remes, Manager EMEA at Rapid7 have the following commentary and tips on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Wim Remes, Manager EMEA Strategic Services at, Rapid7 : “It was reported that Linux Mint had their website compromised and the hackers managed to point links for their official “Cinnamon” edition to an alternative compromised version. The issue, as far as we can tell, does only extend to the ISO versions of the Mint distribution and not the repositories from which systems pull their updates. This means that everyone who installed Linux Mint from an ISO image downloaded through…
Following the news that Mastercard is bringing ‘selfie pay’ to the UK, allowing consumers to scan fingerprints or take selfies to complete an online purchase, Security experts from Intel Security and Yoti have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Raj Samani, CTO for Intel Security EMEA: “The news that MasterCard will bring facial recognition payment services to the UK is much welcome. In today’s technology driven world, it’s about time passwords caught up and evolved with it, because the reality is there have been many developments in the security industry that don’t rely on consumer memory to keep information…
In almost every instance of a reported cybersecurity breach the organization had a security system that detected and reported the breach. It was lost in the noise of thousands of other notifications that were false positives so it is easy to see why it might get missed. In many instances, the hackers could have been detected early if somebody was looking at the data to identify anomalous behavior and doing it every day for every alert. This may sound simple, but in reality, the work required is comparable to looking for a needle in a haystack every day—without knowing whether…