A gang of Shakespeare-quoting criminal computer nerds stole millions from British banks online. Cyberpolice carried out a global operation to stop the heist. Can they catch those responsible? Act I: DISCOVERY Gal Frishman scours the Internet looking for things most people try to avoid — malicious bits of software sent out to spy or steal. On Aug 25, 2011, sitting at his desk in Tel Aviv, he found something he’d never seen before. It was a banking Trojan, designed to sneak into a computer and drain your bank account. This one had peculiar survival instinct. It could hide or play…
Author: ISBuzz Team
A vulnerability has been discovered with the Swift Keyboard on Samsung phones.The keyboard comes pre-installed and cannot be disabled or uninstalled. The Vulnerability allows a remote attacker to control a user’s network traffic and Can execute code as a privileged system user on the end user’s phone. Craig Young, Cybersecurity Researcher at Tripwire says attackers can load Malware on all the phones with this vulnerability. Lane Thames, Security Research and Software Development Engineer at Tripwire says unfortunately there is no patch available at this time. Craig Young, Cybersecurity Researcher with Tripwire: “In my eyes however the crux of the biscuit here is…
With the government locking down all federal agency systems until mid-July in what’s being dubbed an emergency “sprint” to get all systems to better meet secure compliancy. Richard Parris, CEO of Intercede commented on Govt Cybersecurity Compliancy: “The mandated 30-day sprint by The White House has confirmed that the data breaches of various government agencies have become the rule rather than the exception. Despite years of talk and billions of dollars invested in upgrading the nation’s cybersecurity infrastructure, federal agencies are as prone to cyberattacks now as ever before. According to a recent SCA conference speech by Trevor Rudolph, 52%…
Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security Safe-T announced today the release of Safe-T Box 6.0, featuring the Secure Cloud Access Broker which secures, governs and monitors data in the cloud to prevent leakage, ensure compliance with industry regulations and enable organizations to offer cloud services to their customers. With the addition of the Secure Cloud Access Broker, Safe-T Box provides a unified Secure Data Exchange Broker solution with one easy to use interface called Smart Transfer which consolidates secure email, file transfers, mobile communications, and cloud data protection all in a single…
Centrify accelerates its commitment to offering federally accredited solutions for government customers Centrify Corporation, the leader in securing identities from cyberthreats, today announced that Centrify is currently in the second stage of compliance with the Federal Risk and Authorization Management Program, or FedRAMP. Centrify is now listed as “In Process” on the FedRAMP website and expects to receive its full FedRAMP compliant designation by the end of the year. FedRAMP compliance is a significant achievement because it enables Centrify to provide identity management solutions to the federal market, while also helping federal agencies comply with security and compliance requirements such as…
Tripwire, Inc., the global provider of advanced threat, security and compliance solutions, today announced the results of a study sponsored by Tripwire on cyber literacy challenges faced by organisations. The study, which was carried out in May 2015, evaluated the attitudes of executives as they relate to cybersecurity risk decision-making and communication between IT security professionals, executive teams and boards. Study respondents included 101 C-level executives and directors as well as 176 IT professionals from both private and public U.K. organisations. Despite the increasing number of successful cyberattacks against U.K. organisations, the study revealed that 54 percent of C-level executives…
In every domain, you reach a point where in order to manage a system, you need the appropriate amount of telemetry. Without telemetry, actions and calibrations happen too slowly and the system becomes too sluggish to adapt to the dynamic environment in which it hopes to thrive. This is what is happening in all of IT infrastructure these days, especially when it comes to security processes. Enterprises are having to re-architect their security infrastructure to retrofit it with more precise and timely telemetry. I’d like to explore this transformation and how the IT security industry is not alone in this…
Comment from Jason Goode, managing director EMEA Ping Identity on why passwords are simply no longer fit for purpose and how authentication that centres on user identity, is the way forward. Jason Goode, managing director EMEA, Ping Identity Yet again, we are increasingly seeing how passwords are simply no longer fit for purpose in the age of the mass hack. The safest place to store a password is in our heads, but this simply isn’t practical when we have to juggle multiple passwords for multiple websites. It is no wonder that many suffer from password amnesia. The future for secure…
LastPass, the online password manager, has now revealed that it has become victim of a cyberattack in which user data was compromised and it has urged all users to change their master password. LastPass account email addresses, password reminders, hashed user passwords and cryptographic salts were all stolen in the cyber attack. You can find more on this news here. Geoff Webb, vice president, solution strategy at NetIQ, the security portfolio of Micro Focus: “While the breach at LastPass will probably not cause significant problems for their users (provided they change their master password as advised) it does underline the broader…
While the opportunities for embracing IoT are incredibly exciting, it is essential that manufacturers ask the right questions from the beginning when identifying and executing an IoT strategy says Mark Lee, CCO of Intamac, an IoT enabler and innovator with over a decade of experience in this sector. Mark continues: “IoT is a relatively new sector where best practices around things like security are constantly evolving and certainly not widely adopted across the industry. This means manufacturers have to be extremely careful when developing their IoT strategy and selecting an IoT technology partner. Asking important questions about security, reliability and…