Consumer trust in a business has never been so critical. Take, for example, the recent hack on Ashley Madison which saw customer data stolen from its 37 million users, leaving patrons details exposed and the businesses reputation in tatters. This news demonstrates the need for customers to feel confident that their financial and sensitive details are safe when parting with them over the phone and online. The bottom line is, if the public does not trust your brand, they aren’t going to give you their custom. Coupled by the fact that upcoming changes to the European General Data Protection Regulation…
Author: ISBuzz Team
Ahead of the expected iOS 9 announcement at Apple event and following news about a bug prompting iPhone owners to download the new operating system early, please see below comment from Nicko van Someren, CTO, Good Technology, addresses the inevitability of new bugs and undiscovered exploits in places where new code has been written to bring in fresh capabilities and features. [su_note note_color=”#ffffcc” text_color=”#00000″]Nicko van Someren, CTO, Good Technology : “While iOS 9 introduces new security capabilities and will very likely be more secure than its predecessors, any new operating system release brings new bugs and undiscovered exploits in the…
Federating Access through SAML or OpenID Connect is Not Enough—Go the Last Mile with a Federated Identity (Data) Service With the constant growth and evolution of applications, access devices, user populations (and their identity sources), companies and organizations are facing a permanent challenge when it comes to security and Identity and Access Management (IAM). Federation standards for Single Sign On (SSO) such as SAML 2.0 or OpenID Connect are shifting from a best practice to a business necessity. And those standards are seeing increased adoption since this approach is also becoming mainstream for access to cloud applications. But federation standards…
A fierce storm blows through your town in the wee hours of the morning. Upon waking up a few hours later, you discover there appears to be no damage. You make it to your office, and as soon as you walk through the door, your secretary looks at you with a terrified look. “Everything is gone! The power must have fried the computers!” And you realize that you’re in deep trouble. The Importance of Physical Documentation When it comes to any effective disaster recovery plan, physical documentation is always a key component. In 2012, more than 50 percent of businesses endured a disaster or unforeseen interruption. Of those…
Following the revelation that users of pornographic app ‘Adult Player’ are being subjected to ransomware attacks, security experts Raj Samani and John Smith identify why this crime is growing at such an alarming rate. [su_note note_color=”#ffffcc” text_color=”#00000″]Raj Samani, CTO EMEA, Intel Security : “Ransomware and crypto malware, such as that imposed by pornographic app ‘Adult Player’, is rising at an alarming rate. Intel Security’s most recent Threats Report uncovered that ransomware shot up 127% in the past year alone. We are increasingly seeing hackers blackmailing online users with their most private and sensitive information, or even photos. Thanks to the…
Almost every website and app relies on a username and password combination to authenticate users. And that system, which the Internet is built on, is crumbling. There are several factors that together are diminishing the effectiveness of passwords. First, computing power is increasing exponentially; the computing power needed to compromise a password through a brute-force attack is increasingly available to cyber criminals. As a result, users are recommended to use long, complex passwords that take longer to crack. But with passwords routinely stolen in large cyber attacks, like the Adobe breach that compromised 38 million passwords, experts recommend that you…
Match.com, is at risk from malware which could steal personal information, send spam emails and operate silently within their devices without their consent. Visitors to the site are at risk from malware which could steal personal information, send spam emails and operate silently within their devices without their consent. Website visitors are also at risk from CryptoWall ransomware – a sophisticated Trojan that will encrypt files on a user’s computer and hold them ransom, according to Malwarebytes. CryptoWall passes users to a site where users can pay for files on their computer to be decrypted. Users can be told to pay…
“Shifu Banking Trojan” by IBM security researchers, a dangerous new banking Trojan with a range of malicious capabilities has affected at least 14 banks in Japan and could be used to attack banks in other regions as well. Ken Westin, senior security analyst for tripwire commented on the new banking trojan is attacking 14 japanese banks. [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Senior Security Analyst for Tripwire : “Banking malware has become highly competitive and Shifu is a reflection of how in many ways malware development has become Darwinian, following the survival of the fittest. By borrowing best of breed features from…
Mobile apps increase enterprise attack surface and put sensitive corporate data at risk, according to analytics from Veracode’s cloud-based security platform Veracode, a leader in protecting enterprises from today’s pervasive web and mobile application threats, released analytics from its cloud-based platform showing that, based on its analysis of hundreds of thousands of scans of mobile apps installed in actual corporate environments, the average global enterprise has multiple gambling apps installed in its mobile environment. In fact, some environments were found to contain as many as 35 unique gambling apps. Many of these apps contain adware as well as critical vulnerabilities, such…
Security professionals profile who is most likely to lose sensitive data to help inform security strategies Mid-career professionals were also a higher risk Most workers more likely to cause accidental breach than malicious attack Finance and HR departments, and the people working in them, represent the biggest information security threat to business, according to global data security professionals. Nearly half, 48%, said finance departments posed a security threat to their organisation, and 42% said the same of HR (40% and 48% respectively for UK respondents). The research, by data loss prevention company Clearswift, gathered views from over 500 data security…