Will 2016 be the year that businesses finally stop being their own worst enemies when it comes to data security? In 2015, incident after incident demonstrated that management and IT staff are largely oblivious to bad employee practices, such as the use of unsanctioned, consumer-grade file sharing apps. And, if they are aware of the behaviors, they’re often unaware of the associated risks. A Ponemon Institute report found that more than 60 percent of C-level executives – including IT leaders – confessed to accidentally forwarding documents to people not authorized to see them and the same number acknowledged failing to delete…
Author: ISBuzz Team
Breakthrough ANIC-40Ku Delivers Unprecedented Scalability, Real-Time Actionable Flow Classification, Fast Lookup Table & More Accolade, the technology leader in high performance FPGA based packet capture and application acceleration adapters/NICs, today introduced the ANIC-40Ku, the market’s most advanced, quad 10GbE application acceleration network adapter/NIC. The ANIC-40Ku leverages Xilinx’s State of Art Ultrascale technology to offer the most scalable application acceleration feature sets within the market’s most cost-optimized FPGA platform all delivered within the lowest possible power budget. The ANIC-40Ku enables OEM customers to focus on software innovation that maximizes product differentiation and accelerates time-to-market in network monitoring and security solutions. Key…
As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face in the next 12 months. While some of these trends started in 2015 and are expected to continue, others will bring newchallenges for security professionals. More POS device breaches. In 2016, we can expect more headlines about credit card information being stolen in bulk. The ongoing problems with lax security configuration, weak passwords and third party access vulnerabilities will be compounded by the rollout of EMV card terminals. Despite the increased security promised by EMV standards, hackers will find plenty…
Ransom32 has been discovered which seems to be the first cross-OS ransomware that uses JavaSript to infect users and is coded on top of the NW.js platform. Tim Erlin, director of IT and risk strategy for Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “Whatever feature or capability makes a language or platform great for developers will also be leveraged by cyber criminals. The self-contained runtime environment and cross-platform nature of NW.js allows a developer to ship code that’s easy to get running on as many systems as…
Cyberattacks against energy companies in Ukraine in December 2015 are connected to attacks on media and targeted cyber espionage against Ukrainian government agencies. Analyzing the KillDisk malware used in the attacks, ESET researchers found out that the new variant of this malware contained some additional functionality for sabotaging industrial systems. On December 23 2015, around 700 thousand people in the Ivano-Frankivsk region in Ukraine, half of the homes there, were left without electricity for several hours. ESET researchers discovered that the power outage – the Ukrainian media outlet TSN was first to report it – was not an isolated incident.…
Owing to ever increasing level of competitive intensity, technology has emerged as one of the major driving forces for large corporates and new-age startups, and has been a key enabler for majority of the sectors. Innovations in technology are shaping the global economic landscape and act as a catalyst for knowledge creation, diffusion, and economic development. The rapid advancements in technology has redefined the companies operate and conduct business across sectors. In this digital era, technology has become valuable and is likely to be imitated by the potential infringers, thus reducing the inventor’s incentive to engage in such activities. Besides…
Security is one of the top concerns of those in the telecommunications industry. Think about it: telecoms work with individuals, businesses, and even government organizations, which puts them at every level of society. They transport data great and small, and store valuable information increasingly in the cloud. As a result, telco companies can be of great interest to cyber attackers. Yet the greatest security risks aren’t always malicious in nature, so it’s important to be aware of what these risks are in order to avoid them. Here are five of the top telco security concerns to think about. Uninformed employees…
Researchers at Raytheon|Websense have offered advice to end users and businesses on the HTPPS Bicycle Attack, which raises questions over the resilience of passwords. Discovered by Guido Vranken, the HTTPS Bicycle attack can result in the length of personal and secret data, such as passwords and GPS co-ordinates, being exposed from a packet capture of a user’s HTTPS traffic. The attack puts the spotlight on the topics of encryption, authentication, privacy and specifically password security in 2016. [su_note note_color=”#ffffcc” text_color=”#00000″]Carl Leonard, Principal Security Analyst at Raytheon|Websense : “The HTTPS Bicycle Attack could potentially result in the divulgence of a new wave of personal and secret…
Following the announcement from the Dutch government that strong encryption is essential for the security of the country, encryption expert Dr Nithin Thomas said why creating back doors or weakening technology must be avoided. Dr Nithin Thomas, Co-Founder and CEO of SQR Systems : “The decisive announcement from the Netherlands to maintain strong encryption and avoid implementing back-door access sets a powerful example that other world governments should follow. “Dutch security and justice minister Ard van der Steur is correct in asserting that strong encryption is vital to the privacy and security of the entire country. Creating back doors in…
New research highlights attitudes to personal security on the Internet in the lead-up to online tax return self-assessment deadline at end of January As ten million people prepare to complete their tax returns online in January, British citizens are being bombarded with scams. Forty per cent have received phishing emails which appeared to be from HMRC, and identity fraud is rife – with many people still unaware of the potential risks involved, according to new research from digital authentication provider, MIRACL. The research, which surveyed the attitudes of 1,000 UK consumers about their personal security online, revealed that a fifth…