Research from Kaspersky Lab unveils a nation of phone snoops, as Brits clamp down on their partners’ secrets With the office Christmas party on our doorstep, more of us will be tempted to send a flirty message to a colleague after a glass or two. However, the latest research from Kaspersky Lab warns our smartphones are more likely than ever to expose our secrets. According to its study of 2,000 UK adults,[1] 41 per cent admitted they know the PIN to their partner’s phone and 40 per cent said they would snoop through their partner’s phone if they suspected them…
Author: ISBuzz Team
Brand new, child-friendly ESET Parental Control for Android app is now available worldwide ESET®, a global pioneer in IT security for more than two decades, announces the global availability of its ESET Parental Control for Android app, which helps parents to protect their children when exploring the online world. Having a tool to manage what their children do with their tablets and smartphones is important for parents. A survey commissioned by ESET showed that 88% of parents are worried about what their children can access online. In that survey, 81% of parents said that they were troubled by the idea of their…
Iron Mountain and PwC study suggests that IT’s grip on data could be the biggest obstacle to other functions making the most of information The ability of senior executives to make effective business decisions could be severely constrained by a lack of access to the company’s most important information, according to a new report by storage and information management company, Iron Mountain (NYSE: IRM) and PwC. Just 46 per cent of senior managers in Europe and North America are permitted access to valuable company information, with results suggesting that the IT department’s control of data could represent the greatest barrier…
Raspberry Pi devices running on Raspbian may need to be patched to avoid a security issue that results in the device generating weak and predictable SSH keys. Raspbian is a free operating system based on Debian optimized for Raspberry Pi hardware. According to developer oittaa, the issue resides in the way Raspbian generates SSH keys. Patrick Hilt, CTO of MIRACL (previously known as CertiVox) explains the issue and what needs to be done. [su_note note_color=”#ffffcc” text_color=”#00000″]Patrick Hilt, CTO of MIRACL : “There are really two issues intermingled here : The first one is that Raspbian’s boot sequence is “inopportune”. This…
Nearly 5 million customers including those in the US, UK, France and China were affected in a data theft that occurred at electronic toy and educational material seller Vtech. The company has suspended 13 websites following the hacking of its Learning Lodge app database.While hacked database did not contain any credit card information, Vtech said it did store the “name, email address, encrypted password, secret question and answer for password retrieval, IP address, mailing address and download history” of customers. Security experts from Tripwire, Lieberman Software, ESET, AlienVault, Rapid7, VASCO Data Security, STEALTHbits, Playrific and Balabit have the following comments…
Research from Mailjet reveals over two thirds of us did not know that simply opening an email could expose a computer to cyber-attack New research released today from email provider, Mailjet, has revealed 7 in 10 if of us do not see emails as a threat to computer security, suggesting Brits are still misunderstanding the fundamentals of computer safety. The research found that over two thirds (69%) of us did not know simply opening an email could expose a computer to cyber-attack. What’s more, almost half of us (49%) admitted to opening an email at work that was personal or…
With everything from televisions to smart meters now connecting to the expanding Internet of Things, Mike King, Supervisor at WhiteHat Security’s Threat Research Centre, looks into the biggest conspiracy theories surrounding this technology movement. The Internet of Things (IoT) is becoming increasingly well known in a world that is becoming more connected. The IoT is no longer a fleeting idea, but a very real phenomenon. Recent figures from Gartner predict there will be 4.9 billion connected ‘things’ in use globally by the end of this year, with as many as 25 billion by 2020. Whilst it seems the majority are embracing the IoT,…
Data security ‘was & is & will be’ always pivot for any organization dealing with data. Now the question is which company does not deal with data. Simple answer to this question is ‘None’. Hence data security continues to be pivotal to success of any company irrespective of the industry, domain or sector. With hackathons becoming call of the season, world’s leading hackers are invited to break into the systems of the Fortune 100 companies who boast of extremely robust security systems. Hackers have hacked driverless Google cars by jamming the steering wheel & showcased the risk of demanding bounty…
Kaspersky Lab’s latest report – ‘Spam and Phishing in Q3 2015’ reveals the latest spam and phishing trends across the globe. The report shows that although the percentage of spam in email traffic has decreased since Q2, spam is using an increasing variety of tactics to deceive recipients and bypass email filters. The report shows that in Q3 of 2015, spam accounted for 54.2 per cent of email traffic, a 0.8 per cent drop from the previous quarter. The top three sources of spam are unveiled in the report as: the US (15.3 per cent), Vietnam (8.4 per cent) and China…
A second issue has been discovered in Dell computers leaving users’ personal information vulnerable, researchers backed by the US government said. Mark James, security specialist at IT security Firm ESET explains why Dell might have shipped a self-signed certificate with many computers. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark James, Security Specialist at IT Security Firm ESET : “Manufacturers these days ship so much extra software preinstalled on new systems that often the security of these products can be overlooked. Some of this software is from third party companies mixed in with their own and integrated tightly into the system in an attempt to…