How will this speed up or increase detection of cybercrime? Although the details are scarce in the original press release, IBM applies Watson to other areas of science as a kind of knowledge base. It guides its user toward of a potential solution by showing highly relevant articles from its corpus. If we apply the same idea to IT security, user would be a security analyst who is tasked with analyzing a specific potential incident. This work can definitely be made more efficient, however it doesn’t mean that Watson alone would be able to protect the organization. If this approach…
Author: Information Security Buzz Editorial Staff
A new list of the biggest business disasters of the last 12 months contains plenty of the unexpected, as well as some surprise entries that demonstrate that serious business disruptions can come from a wide range of sources. What do two burst pipes, three fires, three storms, one power cut and a bridge failure have in common? Give up? They’ve all threatened UK business in the last year with severe disruption, according to new research by business continuity experts IT Specialists (ITS). The company looked at incidents which caused significant issues for UK businesses ahead of the Business Continuity Institute’s Business…
For many moms and dads, getting used to online security this isn’t easy. One of the trickiest aspects is figuring out what to do with online safety as the years go by – what’s appropriate for toddlers, for example, isn’t exactly relevant for six-year-olds. So here is ESET Ireland’s advice on tackling cybersecurity for different ages. Age group: Under 5s This is one of the most important age groups. What happens during these formative years can have a huge impact on your kids for the rest of their lives. Moreover, with technology being introduced from such an early age – as…
A Russian-speaking Skimer group forces ATMs to assist them in stealing users money. Discovered in 2009, Skimer was the first malicious program to target ATMs. Seven years later, cybercriminals are reusing the malware: but both the crooks and the program have evolved, and this time they pose an even more advanced threat to banks and their customers around the globe. Imagine this situation: a bank discovers it has been attacked. But, strangely, no money has been stolen, and nothing seems to have been modified in the bank’s system. The criminals have just left. But could this be true? It was a…
70% of UK businesses faced a data breach in the past year; 11% dealt with more than 10 attacks Over half say human error is a major contributor to security risks CompTIA to launch CyberSecure: cybersecurity training for entire organisations to combat preventable data breaches 70 per cent of UK businesses have been subjected to at least one security breach over the past year, with some companies experiencing frequent attacks on their systems, new research has revealed. The findings come from CompTIA’s International Trends in Cybersecurity, which surveyed over 1,500 organisations of all sizes in 12 countries and 125 based in the…
Study Shows Legacy Decisions, Technology and Perceptions Are Impacting Innovation and Business Performance Brocade (NASDAQ: BRCD) launched the results of its latest global study ‘Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constraints’, which identifies that businesses are missing opportunities to unlock innovation more quickly and more effectively due to legacy technology and historical misperceptions about the role of IT departments. According to the report, more than 70% of IT teams felt that if they had more opportunity to be flexible in their approach to technology, benefits would include increased competitiveness (36%), more time to focus on innovation…
Each year in Monterey, California, the Pebble Beach Concours d’Elegance, the most prestigious classic car show in the world takes place. While most are beautiful and desirable as well as valuable in the right condition, it’s fair to say the cars of that era lack technology – when the owner of 2015 ‘Best of Show’ was asked which aspect of the car he appreciated the most he chose, of all things, the cigarette lighters. Contrast that gathering of classic cars with those produced in the modern era and we find an abundance of technology integrated into today’s vehicles. Much of…
New course and certification bundle to accelerate opportunities for advanced Linux learning among career technologists The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announced the availability of its new course, LFS211Advanced Linux System Administration and Networking. The course provides the knowledge and skills necessary to succeed as a senior Linux sysadmin, as well as to pass the Linux Foundation Certified Engineer (LFCE) exam, which comes bundled with the new course. The 2016 Open Source Jobs Report, produced by The Linux Foundation and Dice, finds that 51 percent of hiring managers say hiring certified professionals is a priority for them, and…
Of all information security threats, the ‘insider’ security threat usually isn’t the image that people’s minds go to first. Angry young men in darkened bedrooms, perhaps. Or offices full of reclusive geniuses, hacking away at the behest of their government, maybe. The costliest form of information security incident is none of these things. It is the incidents caused by regular, every day staff members, acting maliciously, accidentally or obliviously to the damage they could cause by their actions, or lack thereof. Causing or enabling the leak of information to people outside the organisation, or to others inside the organisation who…
Researchers have found some serious flaws in 7-Zip, an open source compression tool which is used in many products including antiviruses and security appliances. 7-Zip is known for its high compression ratio and ability to handle a large number of archive formats. The vulnerabilities in 7-Zip are caused by the lack of proper data input validation. Here to comment on this research is security expert from Tripwire. Craig Young, Cybersecurity Researcher for Tripwire: “It is important for users to exercise caution when extracting files from untrusted sources using 7-zip. Earlier this year I did my own research on 7-zip and…