Applications should be equipped with appropriate security to ward off threats to devices In the latest blow to Android’s security credentials, security researchers have found new strains of malware that cannot be removed, some of which are proving immune to factory resets. This Trojan Adware hides inside clones of popular apps like Facebook, Twitter, and Snapchat, well positioned to aggressively serve ads to the device. Legitimate apps have been taken apart and repackaged to include malware before they are distributed through third party app stores. Some of the apps are little more than shells for ads, but others will work…
Author: ISBuzz Team
Datacryptor 5000 Series protects an organisation’s most sensitive information with the most complete, high-speed security solution for data-in-motion Thales, leader in critical information systems and cybersecurity, announces the launch of the Datacryptor 5000 Series, a high-speed data in motion security platform that delivers high performance encryption at near zero latency. Its advanced security and efficiency features make it an extremely compelling security solution for both commercial and government customers. Datacryptor 5000 Series devices bring all the benefits of line-speed encryption to mixed backbone networks. Able to traverse Layer 2, IPv4 and IPv6 networks, the versatile Datacryptor 5000 is designed to…
Ninety Three Percent of Lost or Stolen Devices Contained Work-Related Data Amidst Lack of Even the Most Basic Security Policies Imation Corp. (NYSE:IMN), a global data storage and information security company, issued new research highlighting that 44 percent of organisations believe a member of their senior management has lost a mobile* device in the last year, whilst 39 percent say senior management had a device stolen. Vanson Bourne conducted the survey of 500 IT decision makers in the UK and Germany to uncover the risks of remote working and inquire into the security measures organisations have in place. The findings…
JPMorgan Chase & Co. and Dow Jones & Co. were among the targets of the biggest theft of customer data from U.S. financial institutions in history, prosecutors said in announcing charges against four men accused of running online schemes including stock manipulation and casino gambling that generated hundreds of millions of dollars. Security experts from Tripwire and Lieberman Software have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Philip Lieberman, President of Lieberman Software : “The take away from this story is one of corporate culture being more powerful than capital investment when it comes to cyber security. The CEO has the…
Some industry reaction to George Osborne’s GCHQ speech below from (ISC)² – the largest not-for-profit membership body for cyber and infosecurity workers worldwide below. The Chancellor referenced (ISC)²’s Global Workforce Study and the 1.5 million workforce shortage statistic in his speech so they’d be very well placed to offer further commentary on what was discussed. Dr Adrian Davis, Managing Director for EMEA said : “This is a welcome speech that raises the level of appreciation for cyber security requirements; puts the issues on an economic platform; and acknowledges its role in assuring prosperity as well as national security. However, while…
The latest bond movie, Spectre, has broken box office records here in the UK, since its premiere last week. And who can resist the cocktail of glamour, gadgets and fast cars. But whilst some of those are pure cinematic gloss, the risk of intelligence leaking and data getting into the wrong hands is a real problem, with potentially dangerous consequences. But, Bond or not, data protection and security are within our grasp. Writing on the walls You don’t need to be an MI5 agent to want to keep your data safe, or to want to share that data with HQ…
The paperless office isn’t a modern concept. In fact, an early prediction of the paperless office was made in a Business Week article which was published in 1975. Forty years on and close to one in three (31 per cent) business executives responded to recent research from the Association for Information and Image Management (AIIM) admitting their office is still ‘piled high’ with paper documents. The Association’s look at the paper in today’s workplace reveals that only 17 per cent of employees work in what could be described as a paper-free environment, thereby missing out on the advantages in productivity,…
Infoblox Inc. (NYSE:BLOX), the network control company, today announced that creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in third quarter of 2015 from the same period in 2014, as reported in the newest edition of the Infoblox DNS Threat Index, powered by IID, the source for clear cyberthreat intelligence. Exploit kits are a particularly alarming category of malware because they represent the automation of cybercrime. A small number of highly skilled hackers can create exploit kits, which are packages for delivering a malware payload, and then sell or rent these toolkits to ordinary criminals…
Whilst some are putting a case for Identity becoming “the New Money”, ongoing cyber-attacks will challenge our thinking on whether we can place enough reliance on traditional analogue and digital Identities. One of the interesting consequences of recent cyber-attack is our society’s over reliance on traditional “analogue” Identity data in the digital age we live in. In the past, Identity data such as “mother’s maiden name”, our residential addresses or birth dates have been used as security identifiers to authenticate ourselves to our banks / telecoms providers / and other service companies. These credentials are used to prove that we…
New Solution Designed to Protect Global Organizations From Rising Tide of Data Theft and Loss Due to Compromised, Malicious and Careless Users Imperva, Inc., (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, announced Imperva CounterBreach, a new multi-layered security solution that protects enterprise data from theft and loss due to compromised, malicious and careless users. CounterBreach uses machine learning to analyze how users access data in order to spotlight dangerous data access and use. CounterBreach complements machine learning with non-invasive deception technology to identify compromised end-point devices. By dynamically learning normal data access patterns…