IT security breaches are increasingly becoming big headlines- think Sony Pictures, Wikileaks and Apple iCloud. With millions of consumers vulnerable as major corporations come under attack, Wiley are publishing a new selection of practical security titles to help professionals improve their organisation’s security, understand more about ‘phishing’ or scammers, learn how to secure mobile apps and develop strategies to thwart network attacks and exploitation. The Mobile Application Hacker’s Handbook By Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse ISBN: 9781118958506, April 2015, Paperback, £42.50 This book shows readers the mobile application security issues associated with apps on Android, Blackberry…
Author: ISBuzz Team
In response to the news that Symantec has discovered a new crypto ransomware, which is affecting Australian computers and is styled around the infamous TV show Breaking Bad, Comments from Kevin Epstein, VP of Advanced Security and Governance at Proofpoint: “While the new TV-show branding of the malware by the attackers shows their confidence in being able to operate with impunity against systems protected by legacy signature-based defenses, it’s concerning that the group reporting is just now ‘discovering’ ransomware, given the malware’s extensive coverage in major media outlets and Proofpoint’s blog over the last year. Proofpoint customers don’t need to concern…
Security & Customer Data Management Informatica Corporation, the world’s number one independent provider of data integration software, is showcasing key innovations in the Informatica Intelligent Data Platform (IDP) to integrate, prepare, master and secure data. In the new computing age of engagement, the world of data expands beyond transaction data in database applications and in cloud services to include interaction data in social media, in mobile apps and in the Internet of Things (IoT). Speaking to 2,500 attendees at the sold out 16th annual Informatica World conference in Las Vegas, chairman and chief executive officer, Sohaib Abbasi, outlined the product innovation strategy to…
CoroNet’s Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat CoroNet, a cyber security software company, today formally announced the launch of its breakthrough new product that squarely addresses the fastest growing cyber threat worldwide. This growing security threat seeks to hijack or “commjack” the communication channel between any device and the WiFi network or cellular tower to which it is connected. CoroNet is the only software-based provider that detects and evades commjacking on any wireless network, in real-time, making any device resilient to eavesdropping, data interception and device manipulation. Commjacking gives…
Intercede’s MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail Cybersecurity expert Intercede today announced that it is teaming up with Citrix, a leader in mobile workspaces, to offer Intercede’s Citrix Ready® MyID technology to XenMobile customers. The MyID platform and XenMobile provide the credentials required to enable the secure signing and encryption of corporate email messages delivered by Citrix WorxMail. This allows customers to utilise the strongest level of security on mobile devices, which was traditionally only possible on a desktop PC with the use of a physical smart card. Maintaining robust security…
Opportunities to develop business partnerships and investments in the field of Cyber Security and Security Systems The German-British Civil Security Industry Conference will be taking place on Monday, 8th June in London. Bringing together British and German security experts with representatives from industry associations, companies, and political institutions, the conference will include a day of presentations, discussions and networking. Event details When: 8 June 2015 Time: 9:00 – 16:30 Venue: Blick Rothenberg LLP, 16 Great Queen Street, London, WC2B 5AH Please find the Conference Webpage HERE or download the Conference Programme HERE. Attendance is free of charge and delegates are…
Statement from Kevin Bocek, Vice President, Security Strategy & Threat Intelligence at Venafi IoActive’s researchers have identified some new flaws in Lenovo’s system update service that can be used by hackers to create fake certificates for executable files. Please see statement from Kevin Bocek at Venafi below on this breaking news. “The system of trust that runs the Internet is very fragile. Failing to validate a certificate properly gives bad guys the powerful weapons they need to circumvent security controls. Lenovo joins many others in not being prepared to secure the trust that’s established by keys and certificates. Lenovo like Fandango,…
42% of small and micro businesses in the UK report having experienced cybercrime, new research from AAT (Association of Accounting Technicians) reveals. However, the research also reveals that many of them are not taking the precautions they should to protect themselves. Of the 42% of small and micro business owners (businesses with between 0 and 49 employees) who responded to a survey from AAT saying their business had suffered cybercrime, 23% had suffered virus infection to their business computers and 22% had been victims of phishing – where sensitive information such as passwords are stolen by someone pretending to be…
MindLink Enterprise Chat for Lync is Verified as Citrix Ready MindLink Software today announced that its MindLink Enterprise Chat solution for Microsoft Lync™ has joined the Citrix Ready® Program. The Citrix Ready program helps customers identify third-party solutions that are recommended to enhance Citrix mobility solutions to deliver mobile workspaces. MindLink completed a rigorous verification process to ensure compatibility with XenMobile, providing confidence in joint solution compatibility. The Citrix Ready program makes it easy for customers to identify complementary products and solutions that can enhance Citrix environments. Customers can be confident that MindLink has successfully passed a series of tests…
As the Internet of Things rapidly becomes mainstream, I often wonder whether or not security is a primary concern for the product designers and developers. Time to market is a priority, and “quick and dirty” development leads to technical debt and vulnerabilities in the code. In addition, design of a successful product is top of mind. While this is certainly an important consideration, I worry that no one is looking out for consumers when it comes to security. Gartner predict that there will be more than 26 billion IoT devices by 2020. This niggling concern led me to research the…