A group of Russian hackers have reportedly infiltrated the servers of Dow Jones & Co. Inc., owner of the Wall Street Journal and several other news publications, and stole information to trade on before it became public, according to four people familiar with the matter. The breach is described as far more serious than a lower-grade intrusion disclosed a week ago by Dow Jones, a unit of Rupert Murdoch’s News Corp. Ken Westin, senior security analyst at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Security Analyst for Tripwire : “Over the past few years there has been…
Author: ISBuzz Team
Thycotic’s Nathan Wenzler had a following comment on the Yahoo Account Key announced this week. He was surprised this security flaw was not pointed out. [su_note note_color=”#ffffcc” text_color=”#00000″]Nathan Wenzler, Executive Director of Security, Thycotic : Yahoo Account Key might make life easier for consumers, but it also leaves them open to an entirely new type of attack. Hackers have access to millions of emails accounts from 2015’s data breaches alone. With Yahoo Account Key, hackers can just try logging into every Yahoo address they find, and wait. Eventually, some users will accidentally hit “yes” on their phones, and just like that, they’re in.…
Iron Mountain and PwC launch new Information Value Index to help companies benchmark their own performance Just four per cent of businesses are able to extract the full value from the information they hold, with over a third (36 per cent) lacking the tools and skills they need to do so, according to new research from storage and information management company, Iron Mountain (IRM) and PwC. As a result, 43 per cent of the European and North American companies surveyed obtain little tangible benefit from their information, and 23 per cent derive no benefit whatsoever. The study questioned 1,800 senior…
Government grade encryption technology ensures users’ email, voice and video calls, instant messaging will be totally private Criptyque, the secure communications provider, announced the launch of Pryvate™, the first all-encompassing and fully encrypted communications platform for mobile devices. Pryvate secures communication services across email, voice calls, conference calls, video calls and instant messenger to protect consumers and businesses from cybercriminals, intruders, corporate espionage, hackers and more. The Pryvate application provides triple-layered security powered by top-of-the-line 4096-bit encryption, with AES 256-bit key management and DH key exchange. It offers truly seamless independent, network agnostic security combined with high quality of service at…
As cloud computing becomes a more widespread phenomenon, Aussies are still confused about what the term actually means. The tech company surveyed 1000 Aussies, 1000 Brits and 1000 Americans on their knowledge of cloud computing. While 1 in 10 from the UK and America said stormy weather could have an impact on cloud computing, the figure doubled for Australians – with 22% saying they were sure it would have an effect. A further 1 in 5 (20%) said they didn’t know. Jared Hirst, CEO of Servers Australia said: “A few years ago cloud computing was a relatively new term to…
Focus on integrated, open security systems with cloud-first technology empowers organisations to resolve more threats, faster, with fewer resources News Highlights : Corporate strategy concentrates on control points at the cloud and the endpoint to address the expanding attack surface, imperative of time, and acute resource constraints that plague organisations today New: McAfee Endpoint Security 10.X establishes an agile endpoint services platform designed to reduce the complexity of endpoint security environments, improve performance and visibility into advanced threats, and speed detection and remediation New: McAfee Active Response, endpoint threat detection and response solution, helps improve threat detection and enables incident…
New international research reveals less than 25% of MNOs have deployed next-generation firewalls necessary to identify and charge unauthorized traffic Latest market research by analyst house mobilesquared and sponsored by tyntec, finds that 75% of mobile network operators (MNOs) do not have the measures in place to control and monetize Application-to-Person (A2P) SMS traffic that traverses their network. Although the majority of surveyed MNOs indicated their year-on-year A2P SMS growth grew between 6% to 36%, less than 25% of MNOs have actually deployed or updated an SMS firewall since 2012. Firewalls that were installed before 2012 are unable to provide…
US prosecutors are extraditing a Kosovo man now under arrest in Malaysia whom they believe is responsible for assembling an ISIS “kill list” of more than 1,000 military personnel and U.S. government employees. Prosecutors believe Ardit Ferizi hacked into a U.S. retailer, stole sensitive personal information about 1,000+ federal employees and U.S. military staff, and gave the data to a British national believed to be leading an ISIS social media “kill list” campaign. Security experts from Securonix, Tripwire, Lastline and STEALTHbits have the following comments on retail hack was used to build a terrorist campaign against US government employees (U.S.…
Mobile networks around the world have been penetrated by criminals and governments via bugs in the code that keeps them running. The security holes have been found in a technology known as Signalling System 7 (SS7), which helps to interconnect mobile networks across the globe. Security experts from Veracode and SQR systems have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Chris Wysopal, CISO and CTO at Veracode : “The SS7 vulnerabilities are just another example of software-based systems that weren’t built for the rich interconnectivity and threats of the modern mobile infrastructure. Development teams need to go into projects with…
Few days back it was reported that two popular gaming sites, Star Trek Online and Neverwinter Online, were struck by DDoS attacks twice in one day. DDoS expert Igal Zeifman, senior digital strategist for the Incapsula product line at Imperva have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Igal Zeifman, Senior Digital Strategist for the Incapsula Product Line at Imperva : “Some in the industry have stated that these sorts of attacks are commonly used by Internet trolls and rabble rousers to attract attention such as the likes of Lizard Squad, DerpTrolling, and LulzSec. In fact, gaming servers and networks are targeted…