More than six months since The Register reported that Virgin Media had failed to move away from weak encryption software used on sensitive areas of its website – the ISP is yet to hit the upgrade button. Tim Erlin, director of security and product Management at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “It’s in everyone’s best interest, except for cybercriminals, to use the strongest encryption feasible when communicating with a website. The problem lies in the fact that ‘strongest’ is ephemeral, and what passes muster today…
Author: ISBuzz Team
YISPECTER malware is the first to attack non-jailbroken Apple iOS devices by abusing private apis. So far, the malware primarily affects iOS users in mainland China and Taiwan. It spreads via unusual means, including the hijacking of traffic from nationwide ISPs, an SNS worm on Windows, and an offline app installation and community promotion. Mark James, security specialist at IT Security Firm ESET have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark James, Security Expert at IT Security Provider ESET : How serious is it? “Any malware on mobile platforms is bad, the end user often falls into a “security…
Most people are familiar with the notion of an adblocker. It’s pretty much what it says on the label: a program that blocks ads from showing. They may not, however, be entirely familiar with how adblockers work or what the best kind of adblocker for their use might be. Likewise, people are starting to become aware of sites trying to block users from browsing with adblockers enabled – but the ways in which that works are also somewhat obscure. Adblocking at the browser-level is the variety which most people are familiar with: the user downloads a plugin for their browser,…
F-Secure’s new Cyber Security Stress Test helps businesses find and learn to fill gaps in their cyber security. F-Secure has released a new tool to help businesses learn more about their security posture for European Cyber Security Month. The new Cyber Security Stress Test is a quick online questionnaire that can help companies and employees learn more about the kinds of weaknesses that can expose them to costly data breaches and other risks. The Cyber Security Stress Test is a 20-question test that IT professionals can use to find gaps in their security strategies. A recent F-Secure survey shows that…
Just about every company has a network security engineer. And if a company doesn’t have one, it’s probably on the hunt; a quick search on LinkedIn will offer a long list of places seeking a guardian of all things network related. A network security engineer is a critical role; it safeguards servers and systems against those wanting to steal vital information. But a network security engineer typically has the tools and organizational backing to focus only on thwarting external threats, and fails to address the actual leading cause of security incidents and breaches: insider threats. Consider that a 2015 Verizon…
Crypto-Segmentation Solutions Can Protect Application Flows on Internal and External Networks, Block Top Data Breach Attack Vector Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications announced it is working with AirWatch®, the leader in enterprise mobility management (EMM), to deliver end-to-end security of enterprise applications on any device on any network in any location. Unlike siloed, perimeter-based security solutions, the Certes solution with AirWatch will address end-to-end security, isolation and segmentation of enterprise applications on all internal and external networks. The solutions will extend Certes’ innovative virtual application security technologies to support mobile devices managed…
GAO report focused on ongoing lack of security in government systems. Art Gilliland, who recently became CEO of Skyport Systems after serving as SVP of enterprise security at HP, and Doug Gourlay, corporate vice president at Skyport have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Art Gilliland, CEO of Skyport Systems : “The issues that the GAO has identified with regard to limiting access to and control over system wide computing resources are at the heart of the problem for all organizations, in government, enterprise and SMB,”. “Not know who is accessing what, or when and how they are using…
ISACA released findings from its Mobile Payment Security study which surveyed 900 cybersecurity experts and found that mobile data breaches will increase in the coming years, with 47% of respondents stating that mobile payments are not secure. Ben West Senior Product Manager – Mobile, Global eCom at Worldpay believes that while concern around mobile fraud is indeed valid, the scales haven’t tipped quite as dramatically as many think. [su_note note_color=”#ffffcc” text_color=”#00000″]Ben West, Senior Product Manager – Mobile, Global eCom at Worldpay : “While concerns around mobile payments are not without foundation the current state of affairs represents less of a…
Iron Mountain Study Unveils Internal Power Struggle to Leverage Data Archives for Business and Compliance Purposes A recent study shows that key departments within organisations, namely Legal, Compliance, IT and Lines of Business, have fundamental differences in how they manage, leverage and value these data archives. This is according to the results of the study, “Mining for Insight: Re-Discovering the Data Archive,” an IDC white paper, sponsored by Iron Mountain (NYSE: IRM). On one side, 70 per cent of IT and Lines of Business respondents stated they see data archives as a potential revenue driver. As a result, these groups…
Intego, the leading Mac security software company, has released an infographic on the topic of Creating a Culture of Cybersecurity at Work. It includes many concerning facts including : 70% of small firms that experience a major data loss go out of business within a year 2 out of 3 data breaches involve poor passwords 53% of organisations do not conduct daily backups [su_box title=”About Intego” style=”noise” box_color=”#336588″]Intego offers an award-winning line of products providing Mac security and enhancing Mac performance. Intego has been designing software to protect and optimise Apple products for over 17 years. No other company has…