PhishMe 2015 Enterprise Phishing Susceptibility Report Shows Which Type of Attack Emails Have Highest Penetration Rates, Provides Guidance on How to Reduce Risk PhishMe® Inc., the pioneer in human-phishing defence solutions, today released the 2015 Enterprise Phishing Susceptibility report. Data was gathered from 8 million phishing simulation emails sent to 3.5 million enterprise employees to provide analytics showing how susceptible enterprise employees are to falling victim to phishing attacks — the most common cyberattack vector in use today. Additionally, the report demonstrates how effective training can condition employees over time to spot, report and help defend their organisations against phishing.…
Author: ISBuzz Team
A strain of malware has been discovered that turns infected machines into anonymous proxy hosts. Lamar Bailey, leader of Tripwire’s vulnerability and exposures research team have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Lamar Bailey, Vulnerability and Exposures Team Leader at Tripwire : “Proxys and VPNs have become very popular. Many of the users are at work or on the public Internet and use the technologies to bypass content filtering or keep their traffic private. “Because of this trend, we are seeing an increase of inexpensive or free services, and many of these services monitor the traffic for credentials or install malware…
Proofpoint researchers recently analyzed a wide variety of apps available on iOS and Android app stores and quantified the extent of the risk they pose to their users, as well as their personal and company data. One of the key findings from the study is that clearly, one cannot ‘judge a book by its cover’: from card games to flashlights to holy books, some apps steal data, some track users’ location and message contacts while others make unauthorized calls. Key findings from the study are detailed below: Proofpoint researchers recently analyzed 38,000 gambling, flashlight and holy book mobile applications and found…
Ping Identity UK research reveals how IT decision makers face significant barriers to rolling out digital transformation projects, and getting rid of passwords for good Identity security company, Ping Identity UK, commissioned third party research with survey consultancy, Censuswide, surveying IT decision makers across UK, France and Germany to ascertain their attitudes to the ‘barriers to business security’. This research reveals how European IT decision makers face significant barriers in implementing new identity security technologies, and subsequently in undertaking digital transformation projects. Prioritising digital transformation and specifically putting new identity security software in place was considered either a top priority…
British weather has always been unpredictable during winter, but no one foresaw the additional burden on Scottish commuters and businesses affected by the recent Forth Road Bridge closure. For the 100,000+ daily commuters who travel into Edinburgh for work, their 30-minute trip over the bridge into the Scottish capital now takes even longer than usual, despite the Scottish government and bus and coach services putting on extra modes of transport to help ease congestion. Many of Edinburgh’s companies have been adversely affected by this structural failure, and are suffering unplanned business downtime. Others, however, are already back at work thanks…
Cyber criminals frequently move their infrastructure. Domains stay online for a few days or hours, which makes it challenging for defenders to leverage security tools that rely on blacklists and other known-bad indicators. Damballa’s Threat Discovery Center has been monitoring Pony for eight months, and has captured all instances. We’re releasing statistics that show the evolution, strategy and tactics of how criminals keep their infrastructure on the move. The multi-stage Pony infection chain is as follows: Since we began tracking Pony, the criminals have used 281 domains and more than 120 IPs hosted on over 100 different ISPs. A review of domains…
“Drone usage has boomed in the past few years and the number of people applying for licenses and registering drones has increased. This is mostly down to the versatility of drones and the wide range of uses they have. Drones can be used to give fantastic aerial shots when shooting films and taking pictures but can also be used for more nefarious activities such as spying and carrying out surveillance on a target. However, some countries have not seen drones in a positive light. Recently, South Africa and several ski resorts across the world, have actually completely banned the use…
Nearly half (44 per cent) of Internet users admit to having shared their passwords with somebody or leaving them visible for people to see, according to the findings of Kaspersky Lab’s recent consumer surveys*. This demonstrates a lack of cyber-savviness, making it easier for cybercriminals to unlock and gain access into the online lives of consumers. Despite this, when asked about the importance of passwords, respondents were more likely to think strong passwords were necessary for the online services they valued most highly. The studies found that according to consumers, the websites most in need of strong passwords were online…
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the results of its Cyber Security Job Trends Survey for 2016. Of the 435 senior-level technology professionals who completed the survey, 68 percent affirmed that there is a global shortage of skilled cyber security professionals. Only 13 percent of companies said there was an abundance of cyber security talent in their local areas. “Companies and the public at large should be concerned with these data, which call attention to the…
It may come as a surprise, but the cloud is still considered a new technology for many organizations. In fact, only 14 percent of IT budgets will be spent on the cloud in 2016. As with introducing anything different to an organization, there are concerns and hesitations that come along with it – especially when it comes to the vulnerability of a company’s data in the cloud. According to a report from Vanson Bourne, 76 percent of those surveyed said security was the main concern when using cloud-based services. Almost half of respondents admitted that they are “very or extremely…