You may have seen news this morning that Instagram has announced the roll out of two-factor authentication technology. Hans Zandbelt, senior technical architect, Ping Identity have the following comments on it. Hans Zandbelt, Senior Technical Architect, Ping Identity: As hackers become ever more sophisticated in their methods, high profile brands and organisations must take tangible steps to protect customer data. Moving away from age old passwords is a significant component of this and we welcome the news that Instagram is rolling out the latest in two-factor authentication technology. A two-factor authentication process typically requires customers to authenticate using their phone – something…
Author: ISBuzz Team
Imagine a world where your body was part of your connected home security solution and you could automatically scan your surroundings for cyber-threats. Or where your body could sense other, more human threats in the vicinity, based on an intelligent, computational analysis of behavioural and emotional markers that your conscious mind might miss. Would you feel stronger and safer? The human computer At a time when many people are focused on the implications of making machines more ‘human’; smarter, more adaptive and able to read and respond to emotions, it is worth thinking about the journey that is taking place…
The deep access granted to banking Trojan MazarBOT for Android shows exactly why app development and maintenance fall far short of the sophisticated threats they are posed with. That’s according to Jan Vidar Krey, Head of Development at Norwegian app security firm Promon, who found the most alarming part of the malware was not its ability to penetrate and compromise an Android device, but that the existence of this strain was not protected against since it was first identified on the Dark Web several months ago. “Android’s recent history has been marked by its inability to withstand malware attacks so…
IT audit leaders and functions are at the forefront of providing confidence over the technological change revolution occurring across all industries, which is continuing to gather steam. Cybersecurity issues, digitisation, the global proliferation of mobile devices and the rapidly maturing Internet of Things are succeeding in connecting more people but bring with them a horde of related business and technology risks. IT auditors have the unenviable task of helping organisations to steer their business through this period of intense technical change, while also helping to oversee the IT risks that could cripple the enterprise. Mark Peters, Managing Director in Protiviti’s…
The busiest season of the year for many businesses is without a doubt, the festive period. Retailers and couriers across the UK have just endured another record breaking year for sales, both in-store and online. With this in mind, organisations across the nation would have had to frantically prepare not only their stock and festive deals, but also employ a handful of temporary seasonal workers to help day-to-day staff with the rapid influx of consumers flocking to buy the year’s must have item. Not only would HR have had the nightmare task in the leading months of interviewing and hiring…
A US Federal judge is ordering Apple to open the encryption on iPhones belonging to the San Bernadino shooters, disabling the lock and enabling the FBI to access “relevant… critical data.”Philip Lieberman, president and CEO of Lieberman Software have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Philip Lieberman, President of Lieberman Software : “It is well known that both the phone carriers and manufacturer of locked cell phones maintain their own set of keys within their publicly declared walled gardens to the devices they sell. This barrier to competition and their ability to select winners and losers in their app…
Hollywood Presbyterian Medical Center in Southern California had its systems hacked and held for ransom causing the hospital to declare an internal emergency last Friday and has to transport patients to other facilities. The computers are essential for documentation of patient care, transmittal of lab work, sharing of X-rays and CT scans. The FBI and the LAPD have been called in to investigate. Tim Erlin, director of IT security and risk strategy at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “We’re talking about cyber safety, not just cyber…
As reported by the BBC, a major computer security vulnerability has been discovered – with experts cautiously warning it could potentially affect hundreds of thousands of devices, apps and services. It is now up to manufacturers, and the community behind the Linux operating system, to issue the patch to affected software and devices as soon as possible. Security experts from Lieberman Software, ESET, Veracode, and Duo Security have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Paul Farringdon, Senior Solution Architect, Veracode: “It is highly concerning that potentially millions of connected consumer devices have been left vulnerable to attack through this glibc bug. Since the birth…
The BBC has reported an attempt to spread a powerful form of Android malware via text messages. Mazar can gain administrator rights on phones, allowing it to wipe handsets, make calls or read texts. However, it will not install on phones where the language is set to Russian. Security experts from ESET and Proofpoint have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Ryan Kalember, SVP of Cybersecurity Strategy at Proofpoint: “It’s certainly not uncommon for malware, including mobile malware, to be selective about the user populations it infects. Without more forensic detail, attribution is difficult, but this certainly points to…
Following the recent data breach of individual student records at the University of Greenwich please see commentary from SailPoint, Iron Mountain and BMC Software have the following comments on how institutions can protect their sensitive data from leaking. [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Cunningham, President and Founder of Identity Access Management Company SailPoint: “Being exposed as unprepared and ill-equipped to minimise the damage associated with a breach is a fear of any organisation. Universities today house vastly more sensitive data, and so everyone from the executive level down needs to ensure there is a collaborative effort from internal staff to protect that sensitive information and ultimately, the health and longevity of the organisation. “In…