Only a few short years ago ‘drones’ were thought to be a phenomenon dreamt up in the latest sci-fi film or the latest military surveillance tech. Who would have thought drones would soon be filling the UK’s skies. Consumers can now expect faster deliveries to their doorstep than ever before, following Amazon’s announcement to be the first public company to authorise trials of autonomous flying drones in the UK. An ingenious idea that will see parcels delivered around the world faster than you can make your lunch and is likely to transform the way we shop. But, is the innovation…
Author: Information Security Buzz Editorial Staff
The same hackers who turned out the lights at Ukrainian utilities last December have been running attacks against the same country’s banks over recent months according to ESET. Tim Erlin, Sr. Director, Product Management at Tripwire commented below. Tim Erlin, Sr. Director, Product Management at Tripwire: “While the analysis states that this malware campaign has targeted the Ukrainian financial sector, there’s little information provided about how that specific conclusion was drawn. The relationship between TeleBots and BlackEnergy isn’t entirely clear. There are some demonstrable connections in tools and techniques, but whether the attackers are the same people, part of a tool…
The world is still reverberating from the stunning victory of Republican candidate Donald Trump in the US Presidential election. Having started off as a joke figure and throughout the campaign been derided in the media for his performance, he claimed a remarkable victory earlier this month. His victory has left many media outlets rushing to interpret what impact a Trump presidency will have various policy areas, while panicked Democrats and campaign groups are already openly fearing the worst about US trade relations, diplomacy, and individual rights. In the bedlam, the issue of online privacy has been largely overlooked, but a…
Following the news that Yahoo! announced that one billion of its user accounts were hacked in 2013, IT security experts from SailPoint, VASCO Data Security, Prevalent, Inc., STEALTHbits Technologies, Inc. and Avast commented below. Kevin Cunningham, President and Founder at SailPoint: “What this latest breach disclosure by Yahoo! underscores is an interesting trend where hackers are breaching user accounts, not necessarily to infiltrate corporate networks and applications, but to grab highly sensitive data hiding in email and other unstructured file stores. Think about all of the highly sensitive files that could be lurking in these breached Yahoo email accounts: incredibly sensitive tax or financial…
Book Offers Tools and Techniques to Prevent Social Engineering-based Email Attacks SAN MATEO, Calif. Agari, a leading cybersecurity company, today announced the release of a new book by Agari Chief Scientist Markus Jakobsson and other cybersecurity thought leaders, Understanding Social Engineering Based Scams. The book describes the increased use of social engineering for email scams, and offers tools and techniques to identify these trends, as well as countermeasures to prevent these attacks. Examples of social engineering attacks, which are typically launched via email, include phishing, spear phishing and Business Email Compromise (BEC). Social engineering-based email attacks, which rely on human interaction and fraudulent behavior to trick…
During the presidential campaign, Donald Trump emphasised how crucial cybersecurity would be to his administration. With only weeks until Trump is inaugurated, it is time for him to deliver on his promise to defend the USA from malicious cyber-attacks. As a previous congressional committee member, Kirsten Bay, President and CEO of Cyber adAPT, believes that Trump’s four-part cyber security strategy isn’t nearly comprehensive enough to solve the challenges that sophisticated and motivated adversary present. Kirsten Bay, President & CEO at Cyber adapt commented below. Kirsten Bay, President & CEO at Cyber adapt: “Kirsten Bay is redefining what it means to be a fearless leader in…
A new strain of ransomware, dubbed “Popcorn Time”, is being reported with those infected being given the option to pay with a twist. Instead of paying to have their files decrypted, they are given the option to pass the malware onto others and if 2 or more people become infected and pay the ransom, the files of the original victim will be decrypted for free. Paul Calatayud, CTO at FireMon commented below. Paul Calatayud, CTO at FireMon: “This is a very, very clever business model being deployed to help fund a cyber attack campaign. First, it takes advantage of phishing techniques by…
“Password Papers” Report from Wandera Uncovers Severe Data Leaks from Mobile Sites SAN FRANCISCO, CA. Wandera, the leader in enterprise mobile security and data usage management, today announced the findings of a global analysis of nearly four billion requests across hundreds of thousands of corporate-liable devices for over 500 enterprises. The findings, available in the 2017 Mobile Leak Report, reveal more than 200 mobile websites and apps that were exposing sensitive consumer and enterprise information over the past year. These data leaks were identified on devices located in more than 20 countries, and the mobile websites and apps represented span…
Financial Losses and Human Lives through IoT attacks – While there is a lot of talk about IoT-level attacks, 2017 will bring the seriousness of these attacks to the forefront. Not only IoT will attacks result in major financial losses, there is at least a good likelihood of loss of life or injuries when you look at Connected Cars and Connected Medical Devices, resulting from cyberterrorism. While some of the leading-edge vendors in these spaces are working on securing their devices and apps, a vast majority has not taken it seriously enough. And, 2017 just might catch them by surprise. Let’s…
It’s that time of year again. The festive season is upon us and with it, online shopping will no doubt take another bite out of traditional bricks-and-mortar sales. With a colourful new president taking office shortly, 2017 promises to be an interesting year. But before we get to predictions, let’s take a look at the year that was. 2016: The year in review After a series of high-profile breaches in 2015 that involved criminal and state-sponsored attacks against the personal data of hundreds of millions of people, our prediction last year was that 2016 would bring the increased adoption of multi-factor…