The ModPOS malware has pilfered “multiple millions” of debit and credit cards from the unnamed but large retail companies incurring millions of dollars in damages. The attackers have operated in a low-key, ultra professional manner since late 2013 and has only come to light after weeks of painstaking reverse-engineering efforts by malware experts. They have kept mum, too. Cybercrime forums are entirely devoid of references to the malware. “This is POS [point-of-sale] malware on steroids,” iSight Partners senior director Steve Ward says. “We have been examining POS malware forever, for at least the last eight years and we have never…
Author: ISBuzz Team
Intel Security Predictions Provide Two Valuable Sets of Insights for Organisations Developing Near-Term IT Security Plans and Long-Range Security Strategie Intel® Security released its McAfee Labs Threats Predictions Report, which predicts key developments on the cyber threat landscape in 2016, and provides unique insights into the expected nature of that landscape through 2020, as well as the IT security industry’s likely response. Reflecting the informed opinions of 33 of Intel Security’s thought leaders, the report examines current trends in cybercrime and makes predictions about what the future may hold for organisations working to keep pace with business and technology opportunities,…
Following George Osborne’s announcement of a significant escalation in the UK’s cyber security investment, it seems timely to analyse why private sector companies are still so vulnerable to cyber threats. According to the CEO of Skarbek Associates, it’s because they continue to see cyber-security as a technology issue and not as a holistic program that demands a response from the entire organisation. Paul Heugh, CEO of Skarbek Associates said : “It is pleasing to see the government prioritising investment in cyber-security, but that enthusiasm for betterment in this space doesn’t appear to have been sustained in the private sector. The…
Kevin Bocek, a security expert from Venafi, commented on the news about George Osborne’s planned speech on cybersecurity spending. He has summarised the problem as he sees it below. Kevin Bocek, a Security Expert from Venafi said : “It’s good to see the government increasing funding and making cybersecurity a top priority. In reality there is there is a clear and present danger that terrorists will hijack parts of the internet, and even more worryingly use the internet to take control of physical assets ranging from cars to planes to power plants and even the slew of devices that are now starting to…
Vormetric survey finds that UK adults are most concerned with financial account information being stolen during a cyber attack The majority worry about bank accounts and credit card numbers, and fail to understand the level of protection offered by encryption Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud environments, has announced in conjunction with Wakefield Research the results of a survey into the types of information British adults are most concerned about losing in the event of a data breach. According to the survey of more than 1,000 UK adults, two thirds (66 percent)…
Most experienced system administrators have inherited an IT infrastructure at least once and have been unsatisfied with the work of a predecessor. The complete revision of the entire infrastructure is a painful and costly process, but may be inevitable to reclaim control, minimise the risk of system downtime, check and update internal workflows or even get rid of processes that might increase the risks of security violations. Even experienced professionals can fall into bad habits that affect performance and put the IT infrastructure at risk. So, it’s important to acknowledge these bad habits to avoid them. Failing to keep and…
The Register has reported that hackers have been able to use a fake site Electronic Frontier Foundation website (electronicfrontierfoundation.org) to infect computers with malware. Investigation revealed that the fake resource was registered on Shavandu Kirlin (Shawanda Kirlin) in Bali, Indonesia. Representatives of the organization believe that the name is fictional. Brian Spector, CEO of CertiVox have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Brian Spector, CEO of Certivox : “Fake domains are very common, one of the main methods of delivering malware payloads. It is compounded by the fact that digital certificates can be awarded to these domains without rigorous…
In the latest news that the US Attorney General has filed charges against three men in in the US’s largest ever hacking/cybercrime case. It’s amazing that even JP Morgan, one of the world’s most well-funded and protected financial organizations, among many others, could have fallen prey to such a disastrous hack, but there’s a simple reason for it, according to Art Gilliland, the CEO of Skyport Systems and former SVP and GM of enterprise security for HP. Art Gilliland, CEO, Skyport Systems said : “No matter what size your organization is or how much budget you have, it’s just too tough…
Intelligence agencies have stepped pressure for encryption backdoors and weaker encryption in the wake of the Paris bombing. Various reports allege the attackers used encrypted communications, or Playstation 4 notes, to plan their assault. Meanwhile, there are reports that the Iraqi and Turkish intelligence agencies had warned of the attack in advance, and that at least one of the alleged bombers was a known terrorist, having previously been jailed for terrorist activities by the French. Security experts from Tripwire explain whether or not weakening encryption or providing back doors for intelligence agencies is a good idea and why planning of…
Cybrary Outpacing Unicorn Startups in Registered User Growth Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go. “Two of the most notable issues facing the cyber security industry today are the widening gap for skilled professionals and the lack of cyber security education opportunities – both of which are worst in developing countries and other places where Internet access is unreliable…