Secunia, a leading provider of IT security solutions for vulnerability management, today published its latest batch of country reports for a total of 15 countries, including the US. The data in the US report shows that unpatched, vulnerable PDF readers are a big security issue for private PC users; that 14% of PC users in the US (up from 12.9% last quarter) have an unpatched operating system, and that Oracle Java yet again tops the list of applications exposing PCs to security risks. The country report documents the state of security among PC users in the USA, based on data…
Author: ISBuzz Team
News Highlights: HID Global and Botosoft built and delivered system to help West African Examinations Council (WAEC) register and authenticate Nigerian students Mobile Student ID system helps WAEC combat identity fraud and preserve the value of an education in Nigeria Handheld mobile readers eliminate identity fraud, verify student attendance and manage rules in real-time. HID Global®, a worldwide leader in secure identity solutions, today announced it has successfully launched a mobile student ID system in collaboration with Botosoft, the leading provider of technologies in Africa, to help the West African Examinations Council (WAEC) combat student identity fraud in Nigeria. Every year, beginning…
Tripwire survey examines views of information security professionals at annual IT security conferences Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, announced the results of a survey of 250 attendees at RSA Conference USA 2015 and BSidesSF 2015 in San Francisco, California. In spite of pervasive vulnerability to devastating cyber attacks across a broad range of industries, information security experts attending two of the industry’s leading conferences believe that C-level technology executives would and should be held responsible for data breaches, according to the survey. When asked, “Who would be held responsible in the wake of…
Experts from Lancope, STEALTHbits Technologies and Tripwire commented late on news of a security breach in which researchers discovered an interesting phishing campaign originating from CareerBuilder. Taking advantage of the notification system the job portal uses, an attacker uploaded malicious attachments instead of résumés, which in turn forced CareerBuilder to act as a delivery vehicle for phishing emails. Details are HERE TK Keanini, CTO, Lancope (www.lancope.com): “This shows how attacks are becoming less direct and more advanced. Attackers prey on the deterministic behaviors of systems where they can predict future action. Before clicking on any attachment, users everywhere need to understand…
We live in a world where everyone expects instant, always-on access to information where if you haven’t already got ‘an app for that’, you can download one within minutes. Alongside every development team are user interface and graphic designers as well as user experience experts. Product Management and Product Marketing think as much about ease-of-use as they do about features. Convenience sells. But unfortunately, when it comes to security, convenience can also come at a price. Take, for example, Apple Touch ID. Unlocking your iOS device just by placing your finger on the home button is highly likely to make…
The arguments in favour of online voting are very clear and the evidence suggests that making the process of voting easier would increase participation. On the other side of the debate, security and specifically identity assurance are always raised as cautionary points, and there are always questions around the inclusivity of online systems. If we can be confident about banking online, surely we can vote online securely? The trick is that the relationship between a citizen and a government is fundamentally different to that of a citizen and a bank. With a bank or any service provider the agreement is…
To become a security analyst, you need specialized classes that aren’t often taken as an entry-level staffer. These classes will prepare you for high-paying jobs with firms that need strong security personnel. Ethical Hacking You’ll be delving into the world of ethical hacking. What is ethical hacking? Most people know what hacking is, or at least they think they understand it. Hacking is the process of identifying potential threats to a company’s security infrastructure and then trying to exploit it, but with permission from the company. An ethical hacker tries to bypass system security and find weak points that someone…
New study shows parents are concerned about their children seeing illicit content online and that they want to limit social media usage A new survey from ESET has revealed that parents are feeling increasingly concerned about the inappropriate content their children are seeing on the internet, with 40 percent admitting they worried about kids visiting terrorist sites and 60 percent worried about pornography sites and 47 percent worried about their children visiting gambling sites. The survey studied the attitudes of 441 UK parents and also revealed 79 percent of parents would choose to block their child from using social media…
Cambridge Quantum Computing (“CQCL”) announces the development of t|ket> a unique quantum computing operating system. t|ket> was created by CQCL, and facilitated by a proprietary custom designed high speed super computer also built by CQCL, in order to simulate a quantum processor. A quantum computer takes advantage of quantum interference. Consequently creating an immense advantage in computational speed over conventional computers by being capable of carrying out massive parallel computations simultaneously. It has significant applications for the global economy, including financial markets, insurance, intelligence, cyber-security, internet, medicinal and pharmaceutical research, defence, energy, database management, logistics and communications. The company stated, “CQCL is at…
Managed, Secure Drives Help Protect Customers against USB-Related Attacks Imation Corp. (NYSE: IMN), a global data storage and information security company, announced ongoing support for the latest McAfee® ePolicy Orchestrator® (ePO) software version 5.1 from Intel Security with the release of its client and server software, IronKey eUSB for McAfee ePO. Organisations of all sizes can look to ePolicy Orchestrator software to make risk and compliance management simpler and more successful by helping them keep up with the latest security measures. By securing the desktop with ePolicy Orchestrator software, IT administrators can manage and control what devices are used. IronKey…