In light of the recent brute force attack and the subsequent ‘bonanza’ that has compromised over 20 million accounts, Jonathan Sander, VP of product strategy at Lieberman Software have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Sander, VP of Product Strategy at Lieberman Software: “When you use phrases like “brute force” and “simple attacks” it may seem that the bad guys are pretty dumb. Many of them are. They pick up the tools they find and point them in the right directions. Their only original thought is to attack someplace new. However, the reason they are successful is because…
Author: ISBuzz Team
2016 Security Pressures Report Delves into the Pressures IT Security Professionals Face from Data Breaches to the Boardroom Trustwave® released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions. In addition to providing year-over-year comparisons of 2014 and 2015, the third-annual report adds previously unmeasured insight related to cybersecurity pressures including new data and regional viewpoints. In addition to respondents from the United States, Canada and the…
The dating app Happn has been found to be violating its own privacy terms, following a review by the Norwegian Consumer Council. Pat Clawson, CEO of the Blancco Technology Group have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Pat Clawson, CEO of the Blancco Technology Group : The terms sate that when a user deletes their account all of the user data gets deleted too. However, a technical analysis has shown Happn does not delete all cookies when the app is uninstalled, meaning users cannot permanently remove the app or exercise their right to be forgotten. He believes this raises…
First ever publicly-known Brazilian Portuguese-speaking campaign targeting financial institutions as well as telecommunications, manufacturing, energy and media companies [su_note note_color=”#ffffcc” text_color=”#00000″]Global Research and Analysis Team at Kaspersky Lab: Kaspersky Lab’s Global Research and Analysis Team has announced the discovery of the Poseidon Group, an advanced threat actor active in global cyber-espionage operations since at least 2005. What makes the Poseidon Group stand out is that it’s a commercial entity, whose attacks involve custom malware digitally signed with rogue certificates deployed to steal sensitive data from victims to coerce them into a business relationship. In addition, the malware is designed to…
Chris Underhill Head of IT and Security at UK-based cyber security firm, Cyber Security Partners have the following comments on the Avast SafeZone flaw. [su_note note_color=”#ffffcc” text_color=”#00000″]Chris Underhill, Head of IT and Security at UK-based Cyber Security Firm, Cyber Security Partners: How could such a flaw have happened in a “secure” browser from an IT security company? This type of vulnerability is due to rapid release cycles and inadequate security testing. Quite frankly, an IT security company like Avast should not have fallen victim to a hole in the Chromium security chain. This type of issue should have been easily…
During the Autumn Statement back in November Chancellor George Osborne placed significant importance upon the investment in the use of technology within the justice system, including the digitalisation of courtrooms and the moving of paper-based systems online. Whilst the plans for digitalising the justice system has been in the pipeline for several years, we are now beginning to see these come into force and are witnessing the knock on effect for law firms. In recent years, the digital landscape has had a revolutionary impact not only in terms of the way employees can now work, but also where they can…
More and more people find online adverts to be annoying, invasive, dangerous, insulting and/or distracting and have decided to install an ad blocker. In fact, the number of people using ad blockers is skyrocketing. According to PageFair’s 2015 Ad Blocking Report, there are now 198 million active ad blocker users around the world, with a growth rate of 41% in the last 12 months. Publishers and marketers are visibly feeling the pain and fighting back against ad blockers. A recent high profile example of this conflict was Yahoo Mail’s reported attempt to prevent ad blocker users from accessing their email. Advertising technology,…
A hacker plans to dump the apparent names, job titles, email addresses and phone numbers of over 20,000 FBI employees, 9,000 Department of Homeland Security (DHS) employees, and 200GB of files according to Motherboard. Pro-Palestinian comments on the hack, along with DHS employee info, were posted on Twitter according to Motherboard. Zoltán Györkő, CEO, Balabit have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Zoltán Györkő, CEO, Balabit : “The data breach of detailed contact information on 20,000 FBI and approximately 10,000+ DHS staff is another example that the use of insider using social engineering tactics is now much easier for…
Kaspersky Lab’s Global Research and Analysis Team has published extensive research on the Adwind RAT, a cross-platform, multifunctional malware program also known as AlienSpy, Frutas, Unrecom, Sockrat, JSocket and jRat, which is distributed through a single Malware-as-a-Service Platform. According to the results of the investigation, conducted between 2013 and 2016, different versions of the Adwind malware have been used in attacks against at least 443,000 private users, commercial and non-commercial organisations around the world. The platform and the malware are still active. At the end of 2015, Kaspersky Lab researchers became aware of an unusual malware program that had been…
Kaspersky Lab identifies new tricks and copycats of the infamous financial cyber-heist A year after Kaspersky Lab warned that cybercriminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed the return of Carbanak as Carbanak 2.0 and uncovered two more groups working in the same style: Metel and GCMAN. They attack financial organisations using covert APT-style reconnaissance and customised malware along with legitimate software and new, innovative schemes to cash out. The Metel cybercriminal group has lots of tricks in its playbook but is particularly interesting because of…