You may have seen news that Fisher Price has reported that it had a flaw in one of its smart toys that would allow the children’s data to be stolen. The problem has now been fixed but the flaws would have allowed criminals to steal names, birthdate and gender allow with other data. No data seems to have been stolen as Fisher Price reacted in time. Security experts from Veracode and Rapid7 have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark Stanislav, Manager, Global Services at Rapid7: “The amount of personal data that consumers willingly provide to vendors can put…
Author: ISBuzz Team
A study from Harvard’s Berkman Center for Internet and Society suggested that consumers should be more cautious of Internet of Things (IoT) devices and as these offer more opportunities for surveillance and focus less on encryption. Darin Welfare, EMEA VP, WinMagic have the following comments on it. Darin Welfare, EMEA VP, WinMagic : Today’s release of the Don’t Panic: Making Progress on the ‘Going Dark’ Debate highlights some interesting points on the state of encryption and dangers posed by the Internet of Things (IoT). However, it does have a fatal flaw in its failure to consider the impact these issues will…
Securing Smart Cities, a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities, has contributed to two studies of The European Union Agency for Network and Information Security on the cybersecurity of public transport in a smart city. The first study, entitled: “Cyber Security and Resilience of Intelligent Public Transport. Good Practices and Recommendations,” focuses on the protection of assets critical to Intelligent Public Transport (IPT) in the context of smart cities. The assets in the study contribute to the normal operation of local public transport networks including metro, buses, light rail and…
Jump in Year-End Web Application Attacks Foreshadowed by Decline in Reconnaissance Activity from Q2 – Q4, 2015 Solutionary, an NTT Group security company (NYSE: NTT) and the next-generation managed security services provider (MSSP), today announced the results of its Security Engineering Research Team (SERT) Quarterly Threat Report for Q4 2015. Solutionary SERT performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) in viruses and worms from Q3-Q4 – which often indicates successfully compromised enterprise networks – to the free fall (88 percent decrease) in…
As Data Protection Day, Security experts from Intel Security, Netskope, Micro Focus and Intralinks wanted to share the following industry insights into the importance of continued education / awareness building around cyber threats and data security. Raj Samani, CTO for Intel Security EMEA: “As a society, we continue to be in a state of conflict when it comes to data. On the one hand, we’re often outraged over regular news around data breaches, while on the other hand we think nothing about trading our identities for a chocolate bar or less, often volunteering intimate data such as medical or financial…
Following Oracle’s announcement regarding Java Plugins, Tod Beardsley, security engineering manager, Rapid7 have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tod Beardsley, Security Engineering Manager, at Rapid7 : “Companies are urged to take Oracle’s announcement seriously and start efforts to transition to Java Web Start (a plugin-free Java technology), or other alternative, sooner rather than later. Just like when Microsoft stopped support for Windows XP, we can’t expect that the end of support for Java plugins will instantly eradicate the applications that rely on it. While Java plugins have fallen out of favour on the general, public Internet, there are still plenty…
The new Facebook craze “Be Like Bill” could reportedly serve up malware or steal your personal info. Concerns have been raised that scammers could trick Facebook users into installing fake and malicious apps that claim they generate the popular “Be Like Bill” memes. Jonathan Sander, VP of product strategy at Lieberman Software have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Sander, VP of Product Strategy at Lieberman Software: “Anything you click on anywhere on the Internet can potentially be a delivery mechanism for malware. When you walk down a street of shops, you wouldn’t walk into one without at…
Israel’s Electricity Authority has been infected by malware that they are still trying to recover from. Tim Erlin, director of IT security and risk strategy for Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “This doesn’t appear to be a direct attack on Israel’s electric grid, like the one seen in Ukraine, but on the regulatory body called “The Electric Authority.” The difference is important as generation, transmission and distribution facilities are more likely to have direct impact on electricity supply than the authority that regulates them. It’s…
Following recent reports that data security is becoming a bigger challenge for IoT, NETSCOUT a service assurance and cybersecurity company, discussing the industry’s collective responsibility in addressing this growing problem – and how it’s starting to affect all aspects of modern society. Steinthor Bjarnason, Network Security Research Engineer at Arbor Networks, Security Division of NETSCOUT: “IoT devices have traditionally had limited security capabilities. This is partly because these devices were never designed to operate in unfriendly environments, but is also due to a lack of processing power within the devices themselves to implement proper security countermeasures. As more and more…
Smartphones have been the go-to devices for business communication since their conception, but it’s only more recently that they’ve become an essential tool for productivity in the workplace. The expanded capabilities, battery life and display resolutions have brought smartphones to a point where they’re a viable option for getting work done anywhere, whether you’re in the office, at home or on an airplane. However, this new reality has created a need for secure devices that protect business data and provide a secure data stream. Among the top tier of smartphones, there are a handful of models that stand out for…