A researcher who specializes in the security of commercial airplanes was barred from a United Airlines flight after he tweeted a joke about hacking a key communications system of the plane. Although the Tweet was made in jest, it does highlight concerns over security of airline navigation and communications systems. Tripwire’s Director of IT Security and Risk Strategy, Tim Erlin, provided the following comments: “One of the most obvious cyber security challenges in the aviation industry is the increasing sophistication of attacks, and the participation of so called ‘nation-state actors’. It’s hard to get an accurate picture of how many…
Author: ISBuzz Team
We might already be aware that WikiLeaks has now made it possible to search through all of the documents that were leaked in the Sony Pictures hack last year by creating a searchable online archive of 30,287 documents and 173,132 emails. Security expert Graham Cluley quickly picked up on the poor password practices that many employees were engaged in, highlighting that over 1,100 of the 30,287 Sony Pictures documents in the WikiLeaks haul contain the word “password” in an article here. Graham has also pointed to further evidence of malpractice such as the use of very easy-to-guess admin passwords for systems…
Survey shows heightened preparedness and adoption of hybrid technologies Neustar, Inc. (NYSE: NSR), a trusted, neutral provider of real-time information services and analytics, announced findings from its 2015 United States Denial of Service (DDoS) Attacks & Impact Report. The findings highlight an increase in the number and size of DDoS attacks, their costly and devastating effects on brand perception, and a heightened state of preparedness for U.S. businesses. Key findings of the survey: 91 percent say DDoS attacks are a bigger or same threat as last year 85 percent of companies are attacked multiple times 32 percent of companies would…
Brits spend £815 million* to ‘social media proof’ their wardrobe with men spending MORE than women. Research has revealed the influence of social media on our personal style and shopping habits. The research, which polled 2,000 men and women from ages 18 to over 60 highlights the cultural and behavioural shift caused by the democratisation of fashion through social media. In the twenty-teens* people’s shopping behaviours have changed as we strive to be social media-ready 24/7. Whilst the ultimate fashion faux pas used to be turning up to a party in the same outfit as someone else, today it’s all…
Intel Security’s latest report uncovers why UK corporations struggle to detect and defend against targeted online attacks News Highlights: 25% of UK IT professionals took over two weeks to discover their enterprise was suffering an advanced cyber threat in 2014 39% admitted that a threat, once discovered took between two and twelve weeks to remove and remediate Across the globe, businesses on average dealt with 78 security incidents last year 26% involved targeted and bespoke attacks A new report, Tackling Attack Detection and Incident Response, from Enterprise Strategy Group (ESG), commissioned by Intel Security, reveals slow responses to cyber-attacks from UK…
ESET Ireland has detected increased online activity targeting Irish email addresses with phishing scams, using the names of Irish tax and Customs, Bank of Ireland and DHL. In the recent weeks cybersecurity experts at ESET Ireland have been tracking several persistent phishing scams. The first appears to come from Irish Tax and Customs and claims the receiver is entitled to a €351.23 tax refund. A link is attached that takes the victim to a faked Revenue website, which asks for a credit/debit card details where they are to receive the refund. The second claims to come from the Bank of…
MyTAM allows Ledger to protect Android wallets and transactions from malware present elsewhere on the device Cybersecurity expert Intercede announced Bitcoin security solutions provider Ledger has signed up to use MyTAM to protect its apps running on Android. By securing the wallets with the secure Trusted Execution Environment (TEE) already present on many leading devices, the app, along with data and transactions made by it, is protected against threats that may be present on the handset. The TEE, developed by Trustonic, is a cryptographically locked, secure operating environment built into leading Android devices at the point of manufacture. By protecting Bitcoin…
3 in 5 respondents feel cloud technology has made their job more difficult than it was two years ago A new survey announced , commissioned by Tufin®, the leader in Security Policy Orchestration, conducted by Enterprise Strategy Group (ESG), revealed that US enterprises are struggling to keep up with network security operations at a time when data breaches and cyberattacks are occurring at an alarming rate. According to the survey of IT and information security professionals, the majority (57%) of respondents feel that network security operations is more difficult today than two years ago, a result of the increase of…
Just over a year ago, the Heartbleed bug snagged headlines and stirred up fear across cyberspace. Present since 2011 and known to hackers well before it was publicly identified last year, Heartbleed allowed attackers to access server memory and snatch encryption/decryption keys. Close on Heartbleed’s heels was Bash/Shellshock, a vulnerability in the wild for 25 years, and nipping in close behind was Poodle (Padding Oracle On Downgraded Legacy Encryption), a vulnerability with a bite to match its bark. In total, tens of millions of records were put at risk, with 4.5 million patient records compromised via a single incident in…
APRIL QUESTION TO OUR EXPERT PANEL MEMBERS: If you have to choose three essential security practices that an organization must adopt to avoid IT security breaches, what will you choose and why? RESPONSES Professor John Walker | @SBLTD In this current cyber-storm of successful security breaches, the three practices I would include are: Deploy the capability to leverage Cyber Threat Intelligence to monitor for any noise which may infer or suggest the corporate brand is focus of adverse interest by hacker or criminal communities. Enable an enterprise wide CSIRT Framework to underpin the management of Incident Response across the organisation. Provision…