It has been reported that a vulnerability in iPhones means that a hacker can wirelessly hijack your iPhone if they are within Bluetooth range. Australian security researcher and consultant Mark Dowd revealed that iOS 9 includes a patch for this security vulnerability, which he warned Apple about just over a month ago. Tim Erlin, director of security and product management at Tripwire commented on hacking iphone within the bluetooth range. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “Vulnerabilities like this one should remind users of the importance of keeping your systems current with security updates.…
Author: ISBuzz Team
As electronics and related code become more integrated into modern vehicles, we are reaching a point where they will require similar protection as smartphone, tablets and traditional computers. There is a real worry about hackers controlling vehicles in different scenarios such as having fun with the songs being played, downloading rogue apps, disabling the vehicles ignition, to overriding braking systems. Similar to the early days of the Internet, security has not received a great deal of attention to date from car manufacturers. Researchers have demonstrated in controlled experiments that vehicles can be controlled via the telematics systems at great distances…
The average budget required to recover from a security breach is $551,000 USD for enterprises, and $38,000 for small and medium businesses according to a new report by Kaspersky Lab. Based on a worldwide survey of 5,500 companies conducted in cooperation with B2B International, the survey concluded the most expensive types of security breach are employee fraud, cyber-espionage, network intrusion and the failure of third party suppliers. Nine out of ten companies that took part in the survey reported at least one security incident, but not all were serious and/or lead to the loss of sensitive data. Results show most…
You may have seen news today that the Apple App Store in China has been infected with malware. John Smith, principal solutions architect at Veracode commented on the hackers infiltrated the vaunted Apple ecosystem by injecting malicious software into popular Chinese mobile apps. [su_note note_color=”#ffffcc” text_color=”#00000″]John Smith, Principal Solutions Architect at Veracode : “In recent years it has seemed that the problem of Mobile Malware was bigger for Android than for iOS. The more rigorous testing regime required before an iOS app can be published has always been considered to be the reason for this difference, but in this case…
Russian has reported a “very powerful” hack on the nation’s government, including a hit on the Kremlin’s defense systems that slowed operations for a time. Tim Erlin, director of security and product management at Tripwire commented on the attack targeted the election commission in Russia. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “We’re seeing an increase in the use of attack attribution as a political gambit. The discussion, though brief, of China’s cyber-attacks on the US in last night’s Republican presidential debate is certainly one aspect of this new frontier for information security, but…
Halocore enables SAP customers to identify sensitive data exports with context-aware classification, track and analyze all download activity from SAP applications, and prevent potential data loss. SECUDE, an innovative data security provider specializing in security for SAP software, announced the newest release of its flagship data-centric security solution, Halocore, with additional capabilities designed to enhance the solution’s core functionality. Halocore helps enterprises running SAP strengthen the security of data extracted from SAP applications, thereby protecting intellectual property and other sensitive information while preventing potential data loss or malicious theft, ensuring adherence to compliance regulations. “Many enterprises that run their businesses on SAP deploy multiple measures to…
ESET discovers a new trojan that lets the attacker see the cards of the victim online poker player. ESET researchers have discovered Odlanor, a trojan, which is used by its malware operator to cheat in online poker by peeking at the cards of infected opponents. It specifically targets two of the largest online poker sites : PokerStars and Full Tilt Poker. Like a typical computer trojan, users usually get infected with Odlanor unknowingly when downloading some other, useful application. This malware masquerades as benign installers for various general purpose programs, such as Daemon Tools or mTorrent. In other cases, it…
Latest feature assures you know exactly where your data is, complying with strictest European standards. Zettabox, the European cloud storage and team-sharing platform, launches the first tool to allow companies to choose in which European locations they want to place their cloud data. This update helps all Zettabox customers to meet the new European data privacy laws that are likely to require, among other things, that all companies know where their customers’ personal data is stored. Zettabox is the only pan-European platform to allow customers to choose one of 10 data centres in eight European cities for data storage. This…
Apple is releasing iOS 9 all over the world , London will be receiving the update at 6pm. But is iOS 9 an improvement on the current operating system in terms of security, or are you better off without it? Mark James, Security Specialist at IT Security Firm ESET commented on the ios9 that will it be secured for users? [su_note note_color=”#ffffcc” text_color=”#00000″]Mark James, Security Specialist at IT Security Firm ESET : “With $182 Billion dollars in revenue and number 5 (number 1 for technology) on the fortune 500 list for 2015, I honestly believe Apple when they state they…
TechWeek Europe has reported an advertising attack which ran for almost three weeks on major websites such as eBay UK, The Drudge Report and TalkTalk, and advertising networks including DoubleClick’s EMEA network. The campaign used the Angler Exploit Kit to carry out fraud schemes or install ransomware on the victim’s system. Devin Redmond, vice president & general manager at Proofpoint commented on the advertising attack that hits visitors. [su_note note_color=”#ffffcc” text_color=”#00000″]Devin Redmond, Vice President & General Manager at Proofpoint : “We see the bad guys taking it up a notch with social media. What’s occurring now is that in addition…