GOVERNMENT COMMITMENT TO PROTECT CHILDREN FROM ONLINE PORNOGRAPHY Public consultation launched to require age verification for pornographic content online. Under new proposals, companies profiting from online pornography will have a legal obligation to ensure those accessing material are over 18. Proposals will deliver on our manifesto commitment to introduce age verification to “all sites containing pornographic material”. The government has confirmed today that all pornographic websites will require some form of age verification in the future, preventing vulnerable children from accessing potentially damaging material. A public consultation has been launched today outlining the government’s preferred approach, which puts responsibility squarely on the shoulders of companies who create and…
Author: ISBuzz Team
The Secure Chorus Group was announced today to support and promote interoperable, secure communications for enterprise and government. Secure Chorus is an independent, not-for-profit group with founding members including Armour Communications, BT, CESG, Cryptify, Cyber Y, Finmeccanica, Samsung, SQR Systems and Vodafone. Further members will be announced soon. Secure Chorus will promote the development and uptake of secure communication technologies for enterprise and government through open standards and ecosystem development. The group will concentrate on building an ecosystem which will allow scalable secure communications that will work cross-platform, cross-vendor and cross-network. Through open standards and cooperation, the group intends to…
Owing to the fact that cloud computing offers you superb flexibility and scalability, impenetrable security against cyber criminals, greater collaboration among employees, and a number of cost-saving benefits, there are few reasons why you shouldn’t upgrade to virtual solutions like 100TB Cloud Servers. However, this doesn’t mean to say that cloud services and the devices you access them on will be optimised from the get-go. You may need to make a few changes and tweaks before you can fully utilise the power and potential that cloud computing can afford. So, with this in mind, here is how to get the…
The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits Balabit, a leading provider of contextual security technologies, today announced its recent CSI Report. 494 IT security practitioners participated in the research that highlights the Top 10 Most Popular Hacking Methods which aims to help organisations to understand which methods or vulnerabilities attackers are using the most – or taking advantage of – when they want to get…
Researchers have discovered that hackers have evolved the Black Energy Malware to infiltrate other sectors. It was first seen when hackers used BlackEnergy to take down the Ukrainian Power grid affecking more than 1 million Ukrainians. Now Trend Micro is reporting that the malware have also been found along with KillDisk in a Ukrainian mining operation and railway system. Tim Erlin, director of IT security and risk strategy at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “Industrial control systems aren’t limited to the energy sector, so it…
Following this weekend’s news that a teenager has been arrested on suspicion of gaining access to CIA Director John Brennan’s email address, David Emm, principal security researcher at Kaspersky Lab have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]David Emm, Principal Security Researcher at Kaspersky Lab: The recent news that a 16-year-old is suspected of infiltrating CIA Director John Brennan’s email address is another staunch reminder that it’s frighteningly easy for teenagers to gain access to sensitive information and even find their way into the dark corners of the internet today. A recent Kaspersky Lab consumer survey found that 12…
Hackers are mixing in fake Netflix files with downloaders to grab banking information. They have also combined some phishing attacks. Craig Young, computer security researcher for cyber security company Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Cybersecurity Researcher at Tripwire : “The malvertising industry is booming and its perpetrators will use any trick they can think of to extend their reach into your computer. These insidious advertisements often look very convincing even for experienced computer users, but can lead to dire consequences when clicked. In this case, users need to remember that if something sounds too…
The prpl Foundation, an open-source, community-driven, collaborative, non-profit foundation supporting the next gen connected devices industry, has announced availability of a new document entitled Security Guidance for Critical Areas of Embedded Computing that lays out its revolutionary vision for a secure Internet of Things. It describes a fresh hardware-led approach that is easy to implement, scalable and interoperable. The prpl Foundation’s guidance aims to improve security for devices in a rapidly expanding connected world where failure to do so can result in significant harm to individuals, businesses and to nations. “The Internet of Things is connecting our world in ways not anticipated…
No company is immune to the risk of cyber attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but these solutions face an unexpected adversary: SSL encryption. While SSL encryption improves privacy and integrity, it also creates a blind spot in corporate defences. Today, roughly half of all Internet traffic is encrypted, and this figure is expected to reach 67 per cent by 2016. Attacks hiding in SSL traffic are on the rise. Since Edward Snowden’s revelation in 2013, SSL encryption has become all the rage for both application owners and hackers.…
Corporate espionage rates were constantly growing, during last few years. Number of corporate secret cases in US courts was doubled around three times, since the eighties, and it is projected to double one more time until 2017. With that in mind it sounds almost amazing how Coca Cola is successfully keeping their formula, which is also the most valued corporate secret in the world. This formula is not protected with patents, unlike the name Coca Cola and a nickname ‘Coke’, which are both registered trade-marks. Successful trade secret protection is another important business segment entrepreneurs need to master. Trade secrets…