As the vision of smart cities increasingly becomes reality, so too does the issue of security surrounding them. What can be done to ensure the security practices put in place are up to the job? No longer is the smart city concept a far-off, futuristic idea, it is a very real initiative that governments all over the world are embracing. However, as the internet of things (IoT) continues to spur the growth of smart cities, it also elevates the need to address the security concerns that come with them. When the initial wave of IoT implementations began rolling out a…
Author: ISBuzz Team
I wake to the sound of my smartphone, which has assessed the correct time for me to start my day by monitoring my circadian rhythm. I then jump in my smart shower, which already knows the water temperature I like, and can also sense when I’m washing my hair, to ensure the correct water pressure comes out. Once out of the shower, I put on my smartwatch which instantly starts to count each beat my heart makes. I walk downstairs to my kitchen feeling perfectly warm because my smart thermostat has memorised the room temperature I feel most comfortable with. Finally, I pick up a freshly brewed coffee from…
Data Protection Day marks its 10th anniversary this year and it is as relevant as ever with new regulations and cyber security set to be hot topics this year. 2015 saw cyber security in the headlines with large-scale data breaches at TalkTalk and Ashley Madison to name but a few. With this in mind, there is plenty for organisations of all shapes and sizes to consider when it comes to protecting data and below is a collection of ideas on how they can do this. Wieland Alge, VP & GM EMEA, Barracuda Networks: “One of the key themes for Data…
Following news that DDoS attacks are set to rise in 2016, please find comment below from David Emm, Principle Security Researcher at Kaspersky Lab. [su_note note_color=”#ffffcc” text_color=”#00000″]David Emm, Principal Security Researcher at Kaspersky Lab: The new report from Arbor Networks, showing DDoS attacks are growing and becoming more sophisticated, highlights the need for businesses to guard against such attacks, or risk financial loss, severe reputational damage, and possibly the loss of valuable customers. DDoS attacks are nothing new; they’ve been a threat for many years and are one of the most popular weapons in a cybercriminals’ arsenal. However, we’ve noticed…
Ransomware is nothing new, having been around for about three decades – essentially since the point in the 1980s when people began to own their own personal computers. However, due to the emergence of Cryptolocker Trojan and its clones back in September 2014, ransomware is fast becoming a household name and established online risk. Historically, ransomware has been easy to bypass as it would typically lock the screen of the computer while demanding a ransom. A user needed only to circumvent the malware’s foothold in order to restore the computer to its normal working order. Often this was as easy…
Mischievous Twitter users are passing around a link, often disguised with URL shorteners, to “crashsafari.com,” a website created in 2015 that immediately crashes iPhones and iPads. Crashsafari appears to run javascript code that overloads the victim’s address bar with an infinite series of numbers. Craig Young, security researcher at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Cybersecurity Researcher at Tripwire : “The crashsafari.com site runs a script within the browser that repeatedly adds entries to the browser’s history listing. It is unclear at this point what in the device’s design is allowing this to happen, but…
Krebs on Security is reporting that US chain of fast food burger restaurants, Wendy’s, is investigating claims of a possible credit card breach at some locations. The acknowledgment comes in response to questions from KrebsOnSecurity about banking industry sources who discovered a pattern of fraud on cards that were all recently used at various Wendy’s locations. Security experts from VASCO Data Security, Lastline, Tripwire, STEALTHbits Technologies and InfoArmor have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Travis Smith, Senior Security Research Engineer at Tripwire : “Cyber criminals continue to feast on point of sale devices. The primary function of these…
As opposed to small business and enterprise settings that pioneered cloud computing implementations and drew the industry forward, the regulated industries have been slow to adopt the innovation up until a couple of years ago. The specificities of the public platform and the associated client-vendor relations were primary concerns for the decision-makers in healthcare, finance and legal organizations, which resulted in a hampered migration to the cloud. Over the past few years, however, cloud-based systems have seen a rise in the regulated industries and brought the necessary IT innovation to these settings. In relation to this trend, recent research suggests…
The healthcare company revealed that it cannot locate six hard-drive disks containing personal information on patients who have had lab services there from 2009-2015. Unthinkable! Security experts from Intralinks have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Daren Glenister, Field CTO of Intralinks: “Significant data breaches such as this Centene Corp breach are an almost weekly occurrence (or more, if you consider how many breaches go undetected), and clearly there are still many lessons to be learned when it comes to storing and sharing personally identifiable information. Security experts frequently stress the importance of encrypting data when storing it on portable devices,…
Everyone knows somebody that has been hit by some type of digital scam. These days’ hackers have it down to a fine, digital art. So much so that they are able to trick you into giving your bank account details without you knowing, and in some cases there will be no chance in gaining compensation if you have been hacked. Below is a summary of some of the biggest online scams to be aware of, and tips on how to protect yourself online from hackers. Travel Scams If you are directed off site to make a transaction payment, always verify…