Businesses now chose to rely more heavily on digital devices that can be taken anywhere and used at any time. This means that businesses are now more frequently choosing to use portable storage devices too. Every mobile phone, tablet and computer has its own storage space which employees chose to use for reasons of convenience and efficiency. Often these devices might also be used in conjunction with more a traditional storage device such as a USB stick or CD; such devices are used for storage purposes only. These devices are often preferred by employees as they are simple to use…
Author: ISBuzz Team
LockerPIN sets or changes the device’s PIN lock, unbeknownst to the user as it locks the screen and demands a $500 ransom. Researchers from ESET, a global leader in IT security for more than two decades, have discovered in the wild the first Android PIN-setting ransomware. “Based on ESET’s LiveGrid® statistics, the majority of the infected Android devices are in the USA with a complete percentage share of over 75%,” says ESET’s Detection Engineer Lukáš Štefanko. “This is part of a trend where Android malware writers are shifting from mostly targeting Russian and Ukrainian users to Americans where they can arguably…
Investigating several domains registered using the email address drake.lampado777@gmail[.]com. IBM Security X-Force spotted the information-stealing malware named Corebot. The Corebot’s author included the ability to add plugins to the malware in order to incorporate more features. The features are usually a specific function the malware will perform or turned the bot in, such as being a socks proxy or adding the possibility for the malware to spread via USB drives, grab certificates, or even perform DDOS. The sample analyzed by IBM Security X-Force communicates with two domains registered to drake.lampado777@gmail[.]com that are down at this time : We found a…
The evidence from 2015 is clear: traditional signature-based end-point protection is ineffective against the modern attack, which is persistent and targets zero-day vulnerabilities. Here are some factoids for consideration: Today organizations are facing threats that are more complicated and move too quickly for traditional information security tools to address. Attackers that seek only to disrupt business have targeted organizations with multi-layered attacks, which have come to be known as advanced persistent threats (APTs). The common thread that exists in these types of campaigns is the use of customized malicious code to gather and facilitate the exfiltration of your data to…
Establishes Automotive Security Review Board;Unveils Automotive Cybersecurity Best Practices To help mitigate cybersecurity risks associated with connected automobiles while encouraging technological progression and innovation, Intel Corporation today announced the establishment of the Automotive Security Review Board (ASRB). The board will encompass top security industry talent across the globe with particular areas of expertise in cyber-physical systems. The ASRB researchers will perform ongoing security tests and audits intended to codify best practices and design recommendations for advanced cybersecurity solutions and products to benefit the automobile industry and drivers. Intel also published the first version of its automotive cybersecurity best practices white…
Framework will enable more accurate data loss prevention; facilitate better integration with on-premises systems Netskope, the leading cloud access security broker, announced a new reference architecture for data loss prevention (DLP) in the cloud, a framework designed to help organisations more accurately find sensitive content in the cloud and integrate more efficiently with on-premises DLP solutions. Through the Cloud DLP Reference Architecture, Netskope aims to spark a collaborative approach with industry-leading cloud app, data classification, on-premises DLP, incident response and identity management providers on how existing DLP should be done when data finds its way to the cloud. Enterprise assets…
The Los Angeles Times is reporting that a data breach at eight California State campuses exposed the personal information of nearly 80,000 students enrolled in an online sexual violence prevention course. Cyber security experts at Tripwire have verified with the hired vendor We End Violence that the passwords stored in these systems were not encrypted and provided the following comments. [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Senior Security Analyst for Tripwire : “This illustrates the need for organizations to question and verify security practices of their vendors, particularly when their systems will be housing personal information. In addition, ensuring that vendors regularly…
Security experts from VASCO, Spikes Security and STEALTHbits commented on the latest hack of health insurer excellus that may have exposed 10M personal records. [su_note note_color=”#ffffcc” text_color=”#00000″]John Gunn, VP of Communications, VASCO Data Security International : “It is simple economics – hackers are attacking targets with highest value assets; retailers for payment cards, banks for funds, and healthcare organizations for social security numbers. Healthcare organizations are lagging behind and unless they greatly increase their investment in the people and security solutions necessary to protect their assets, they will remain the target of choice for criminals.”[/su_note] [su_note note_color=”#ffffcc” text_color=”#00000″]Franklyn Jones, CMO,…
The study of real-word events helps illustrates the different types of cyberattack and how to deflect them In series of case studies published, global information security consultancy, MWR InfoSecurity, has revealed the characteristics of ten different cyber attack. Each paper, produced with the support of the UK’s Centre for the Protection of National Infrastructure, aims to help organisations understand how these attacks are conducted. Describing real-world events, they also help show the potential impact of attacks and the failures that lead to compromise. The papers include: Application Layer Attack Brute Force Attack DDoS Attack Network Protocol Attack Known Vulnerability Exploitation Zero…
Providers have to go extra mile to demonstrate cloud credentials Security has traditionally been the deciding factor for a lot of organisations when it comes to selecting a cloud service provider, but as cloud services have matured, so have the demands of the user. Research from the Cloud Industry Forum (CIF) has shown that cloud adoption is at the highest level to date, reporting that 84 per cent UK businesses have formally adopted at least one type of cloud service. In light of this, Peter Groucutt, managing director of Databarracks, states that attitudes towards cloud services are changing and users…