Telecoms regulator, Ofcom has said that six million homes could be suffering from slow broadband speeds as a result of putting up Christmas lights, placing Wi-Fi hubs close to microwaves, or near lamps or by installing baby alarms. Professor Will Stewart from the Institution of Engineering and Technology (IET) have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Professor Will Stewart from the Institution of Engineering and Technology : “It’s true that any form of domestic interference, including Christmas fairy lights and the growing number of other wireless devices we have in our homes, can slow down your Wi-Fi. But users…
Author: ISBuzz Team
Byron Rashed, Senior Director of Marketing, Advanced Threat Intelligence for InfoArmor explains the process of destroying hard drives, and recovering data, in light of reports that the recent San Bernardino, California, attackers did just that to cover their tracks. Byron Rashed, Senior Director of Marketing, Advanced Threat Intelligence for InfoArmor : “The erasure of data and the destruction of hard drives is not that difficult to do. Hard drives are routinely destroyed to protect highly sensitive data from getting into the wrong hands. Today, almost every device such as computers, mobile phones, tablets, etc. contain personal and financial data, and…
ESET Ireland’s latest survey reveals people believe the bullies and their parents should take responsibility for cyberbullying. Is it the education? The schools? The Gardaí? Online websites? Social media? The victims themselves? Who should bear the brunt of responsibility for cyberbullying? According to the last survey commissioned by ESET Ireland and carried out by Amárach Research on a thousand Irish (of which 591 were parents themselves), the majority of those surveyed said the fault is with the bullies and their parents. 35% of all Irish surveyed and 34% of parents only said the bullies themselves must be held responsible. 34%…
It seems like a lot of consumers don’t know when their mobile data has been accessed without their consent. 29 percent of the mobile users surveyed admitted they do not know when their personal information has been accessed without their consent. I don’t think we’d get similar responses if we asked mobile users to identify when their credit scores may have changed, or what their credit scores actually are. In all reality, most people don’t really take an active interest in monitoring their personal data. Given just how digitally dependent every single ‘thing’ or experience is today, it’s a sad…
The Association of Banks in Singapore is warning of a new malware disguises itself as a WhatsApp update to illegally access mobile banking apps. Craig Young, security researcher at Tripwire have following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Security Researcher at Tripwire : “This is essentially an advanced phishing attack using social engineering to convince users to enter sensitive data in an untrusted context. Android users within the UK and United States should remain largely unaffected by this especially if they do not allow app installation from outside of Google’s Play Store. Users who are most at risk are those…
Popular pub chain Wetherspoons has suffered a data breach. Cyber criminals have stolen sensitive data such as credit and debit card data from customers who bought vouchers from the JD Wetherspoon site. Security experts from Tripwire, ESET and Lieberman Software have the following comments on this breach. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Sander, VP of Product Strategy at Lieberman Software : Any ideas as to what may have lead to the breach? “Wetherspoons says the breach was on their old website, at least in part. Whenever you hear “old” in reference to technology, you should understand it to mean insecure and containing vulnerabilities…
Although 71% of respondents think that security should be equally, or even more important than business flexibility, users just find backdoors to do their job Balabit, a leading provider of contextual security technologies, today unveiled the results of its pan-European survey into the current state of IT security. The survey looked at how organizations balance IT security and business flexibility; whether they choose to be more secure by implementing additional controls that might hinder productivity or prefer to have flexible business operations. It also looked at how a promising business opportunity changes the game. Balabit asked 381 IT executives, CIO’s, CISO’s,…
Cyber Essentials should become de facto standard for doing business in the UK, says APMG Within a networked supply chain, every company is only as strong as its weakest link, and any entry point for cyber criminals – no matter how decentralised from the core security of the organisation, poses an intrinsic threat to the entire network. To address this, businesses should pay closer attention to the cyber security arrangements of their partners – and demand Cyber Essentials as a matter of course during the tendering process, says APMG International. Richard Pharro, CEO of accreditation and certification body, APMG, commented:…
In the past, the main drivers for data archiving centred on legal and compliance initiatives and business continuity, including eDiscovery, records retention, audits and disaster recovery. But as more companies are looking to take advantage of information in an effort to gain competitive advantage in their markets, data archiving has taken on a new role. However, there are major organisational disconnects related to archive accountability and lines of authority, particularly between IT and the legal and compliance departments that are holding enterprises back from maximising the full value of their archives. According to a recent IDC survey, the results of…
UK’s top seven school code breaking teams fight to become UK cyber champions Futuristic ‘Cyber City’ themed competitions will challenge contestants to infiltrate networks, stop criminals from causing damage to infrastructure, learn how to gather intelligence and find criminals Cyber-battles designed by leading industry employers including National Grid, BT, Airbus Group, Raytheon, GCHQ, the National Crime Agency, CompTIA, Birmingham City University, University of Warwick, The Antisocial Engineer Ltd and Jenny Radcliffe Training Seven teams of the UK’s best 13-18 year old code-breakers from schools across the country will today compete in an ‘I, Robot’ style cyber competition to become the…