In the UK and across the English speaking world, credit card payments remain prominent, totalling £14.6 billion in May 2015 alone. Despite new innovative payment methods on the horizon, the popularity of credit cards as an online payment method shows no signs of diminishing and renewed efforts to fight fraud are not making much of a dent. For those operating across international online borders, getting to grips with and fighting card fraud can be even more difficult. For example, in Germany, credit card usage for online payments and “card not present” transactions is low, with invoice and SEPA direct debit…
Author: ISBuzz Team
Leading gateways allowed more than 40 percent of attempted malicious communication to succeed Seculert, a leader in attack detection and analytics, released its “Secure Web Gateway Performance Report,” identifying critical security gaps in companies’ gateway solutions in 2015. Seculert examined a subset of its 1.5 million user base that included more than 1 million client devices that had generated over 200 billion total communications from Fortune 1000 companies in North America. During the first 10 months of 2015, Seculert observed the performance of web gateway solutions from Barracuda, BlueCoat, Fortigate, Ironport, McAfee, Palo Alto Networks, Websense and Zscaler. Seculert’s research…
Can you guess the most pressing IT security issue faced by companies in Europe? If you were to put your money on malware infection, you’d be right. According to a series of surveys conducted by ESET at various EMEA security events throughout 2015, 58% of businesses have experienced this kind of incident in the last year. Their real world experience corresponds with the theoretical concerns the same respondents express, as malware infection was their most frequently mentioned worry (53%). This was followed by other forms of cyberattacks, such as social engineering, scams, fraud or phishing (48%) and vulnerabilities in software…
In response to the news that two hospitals, one in Germany and one in Hollywood have come under attack from ransomware, Kevin Epstein, VP of Advanced Security & Governance at Proofpoint explains what caused the attacks. [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Epstein, VP of Threat Operations at Proofpoint : “As will be detailed further in Proofpoint’s upcoming report, The Human Factor, cybercriminals are increasingly choosing human exploitation over technical exploits. Personal weaknesses are being leveraged in an unprecedented way-and at a scale never seen before. The recent publicized compromises are most likely the only a fraction of the multi-million-message malicious email campaign…
Security experts from VASCO Data Security, Balabit, and STEALTHbits Technologies have the following comments on DoJ Court action against Apple. [su_note note_color=”#ffffcc” text_color=”#00000″]John Gunn, VP of Communications, VASCO Data Security: The DOJ is accusing Apple of exploiting the issue of backdoors as a Marketing Strategy while they simultaneously promote the idea that every surveille action is necessary to stop the next terrorist attack. The history of mass surveillance programs doesn’t support this and consumers endorse Apple’s decision to not build-in a known security vulnerability.[/su_note] [su_note note_color=”#ffffcc” text_color=”#00000″]Csaba Krasznay, PhD, Product Manager, Balabit: “Just a few weeks ago US and EU…
You may have seen the recent news that HSBC has launched voice recognition to protect its customers. Security experts from Soitron UK and Ping Identity have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Martin Hummel, Voice Biometrics Consultant, Soitron UK: “Voice biometric security has been with us for a few years now, and while experts claim that it’s the future of security, the reality is that the uptake has been relatively slow to date. However, it has the potential to replace the password or PIN-based identity verification, which we all acknowledge is antiquated and has many failings from both the…
Iron Mountain and AIIM publish report on next generation information management professionals Records and information managers, the traditional guardians of corporate records, face pressure to reinvent themselves as analytical, security-conscious content professionals with an ability to think creatively and manage change, according to a new study by Iron Mountain and global information industry association, AIIM. By 2020, employers expect their records and information managers to be competent in risk management – with security and data privacy skills a priority for 50 per cent; content and information management across a wide range of formats and platforms (47 per cent), and data…
Cyber security has been a key topic at this week’s DeveloperWeek conference in San Francisco. However, according to Tripwire cyber security and software development experts, many software development organizations haven’t fully integrated security into their development process. To aid software development organizations, Tripwire compiled the top three mistakes made during secure software development. According to Bob Loihl, senior software engineer and secure software development expert for Tripwire, most development teams make the following key errors when they try to incorporate security into their development process: Bolting security on at the end of a project. Have a security plan from the…
Why is Identity and Access Management (IAM) important as a business security framework? These days, companies are securing more users who are accessing more applications from more places through more devices than ever before, and all this diversity is putting increasing pressure on identity and access management (IAM) systems. At the same time, security has never been more paramount—or difficult to ensure, given today’s outdated and overly complex legacy identity systems. Add to that the fact that consumers expect rapid authentication and easy access to all of their accounts and information. Today’s identity infrastructures face the traditional challenge of multiple…
ESET®, the pioneer of proactive protection, released its white paper “The Rise of Android Ransomware” [BO1]. The report tracks the developing trend of this especially insidious malware. Whether via encryption capabilities (as discovered by ESET in 2014 with Simplocker), with PIN locking capabilities (as LockerPin discovered by ESET in 2015) or simply lockscreen ability, this type of malware increasingly endangers Android users and continues in keeping our researchers busy. This ESET research paper, published ahead of the Mobile World Congress in Barcelona, addresses this topic. ESET will be located in Hall 5, Booth B05. The largest expo for the mobile industry…