HELP: My website is vulnerable and Google mentioned it to all users! [su_note note_color=”#ffffcc” text_color=”#00000″]HTTPCS : What should I do to remove the message “This site may harm your computer!” from my web app? One of the biggest fear of any business man, marketing director or e-shopping company is to find this deterrent message on its web application… However it exists logical reasons to explain the presence of this warning, but also solutions to remove it more or less quickly. This alert appears when your site or your web application represent a danger for the Internet user. The reasons to…
Author: ISBuzz Team
Everyone from Rapid7’s CEO & President, Corey Thomas, to the company’s Global Security Strategist, Trey Ford, have weighed in, offering insights around what they think is ahead for 2016. Tod Beardsley, Security Research Manager at Rapid7 : “I believe, and fervently hope, that the security issues dogging the Internet of Things will reach a critical level of both awareness and accountability. Given the growing coverage in mainstream media outlets about the state of security with IoT, I expect to see vendors of IoT devices take on real responsibility for the security of their devices. We in the security industry all know…
As a Spanish national, I was a little bit surprised to see how the UK, and in particular London, came to a halt during the 2009 winter after a single night of snow. After all, mountainous regions of central Spain tend to get periods of heavy snow every winter and rarely schools, roads or airports need to be closed. But it doesn’t have to be freezing to cause problems as the last few weeks have demonstrated with some regions deluged by record-breaking persistent and heavy rainfall having devastating consequences. And its not over with weather reporters warning that there’s more…
Flexera Software report reveals that popular shopping apps, including Amazon, Disney Store and eBay can access iOS devices’ contacts, calendar, location and social networking apps Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, released a new enterprise Application Readiness report detailing potential risks to enterprises whose employees use popular Apple iOS apps (downloadable from the public App Store) to conduct holiday shopping on company-issued or “Bring Your Own Device” (BYOD) phones. The report found, among other things, that of the 26 popular Apple iOS shopping apps tested: 92 percent…
With 2016 right around the corner, there are few cybersecurity predictions. Richard Greene, CEO, Seculert on 2016 security trends : Prediction will emerge as the new holy grail of security. Up until 2014, the cybersecurity industry considered prevention to be their sole objective. Sophisticated enterprises then began to complement their prevention strategies with detection technologies to get the visibility on their infrastructure they lacked. In 2016, prevention will emerge as a new priority with machine learning becoming a key tool for organizations that want to anticipate where hackers will strike. The adversary is getting smarter. Common cyber criminals will no longer be…
PhishMe Warns of Fake Delivery Scams Currently Circulating PhishMe Inc., the leading provider of phishing threat management solutions, today warned UK consumers to be wary of fake delivery notifications arriving into email inboxes. Fuelled by Black Friday, Cyber Monday and Manic Monday, online spending in the UK has seen unprecedented highs and that’s what scammers are banking on. Consumers are expecting messages from retailers, and the delivery companies used to ship ordered goods, so guards are lowered making them susceptible to phishing messages laden with malware. With many shopping from office computers, businesses could also find themselves infected too. [su_note…
Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. Security vendors are challenged at the end of each calendar year to come up with predictions for the year ahead. With the wealth of information, we’ve collected from our products when combined with the insights that we’ve gathered from our customers, we can provide expert guidance on the trends unfolding in cyber security. This knowledge has come from analyzing the data collected by our products in installations around the world, as well as from working closely with over…
It is being reported that a security researcher looking into the breach of California University Housing Files, discovered Cyberattackers had opened a pathway into the networks running the United States power grid. Security experts from Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : The energy industry, including electrical utilities, requires substantial investment to tilt the playing field towards defense. At the moment, the attackers have the advantage. When it comes to critical infrastructure, the relationship between government and private industry can be difficult. With our current level of…
A database for sanriotown.com, the official online community for Hello Kitty and other Sanrio characters, has been discovered online by researcher Chris Vickery. The database houses 3.3 million accounts and has ties to a number of other Hello Kitty portals. Security experts from MIRACL, Tripwire, Lieberman Software and ESET, discuss the issue. [su_note note_color=”#ffffcc” text_color=”#00000″]Brian Spector, CEO of MIRACL : “If you think you may have been affected, change your passwords for this site, and if you reuse the same password on multiple sites including this affected one, change all of them immediately. Businesses should strive to use authentication technologies…
Calls for Instagram to add extra layer of security In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice. Public pressure has been a driving force for the trend, with hundreds of forum posts being posted to the most conspicuous absentee – Instagram’s – user boards and even the hashtag #SupportTwoFactorAuth being set up by consumer groups to help convince the social media behemoth to implement the technology. “Using…