Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Mark Sangster
Vice President and Industry Security Strategistfeature_status*/ ?>
eSentire

Comments Dotted : 3
March 11, 2021

Experts Reaction On Verkada Hack Affecting 150,000 Of Its Security Cameras

The Internet-of-things (IoT) is not limited to consumer-grade household devices.

The Verkada infiltration and resulting exposure of sensitive and embarrassing video from software firms, auto manufacturers, law enforcement and healthcare facilities brings home the risks associated with internet-connected devices. The Internet-of-things (IoT) is not limited to consumer-grade household devices, but mission critical surveillance systems, patient management, heavy machinery control, and so on. As companies adopt these technologies as a means of optimizing their operations, it's

.....Read More

The Verkada infiltration and resulting exposure of sensitive and embarrassing video from software firms, auto manufacturers, law enforcement and healthcare facilities brings home the risks associated with internet-connected devices. The Internet-of-things (IoT) is not limited to consumer-grade household devices, but mission critical surveillance systems, patient management, heavy machinery control, and so on. As companies adopt these technologies as a means of optimizing their operations, it's imperative that they understand the risk and take measures to mitigate them.

 

And vendors need to understand the obligations and particular risks of their clients. Vendors also need to assume they are a target of cybercrime as a means to an end, including infiltrating or damaging their intended targets. In an interconnected world, you are only as strong as the weakest link. Security is more than a promissory statement about intention, or boilerplate content on a website. Zoom learned that when the FTC came calling after marketing collateral outpaced its technical capabilities. This event might be more misdemeanour than felony. The stakes are too high for checkbox approaches to security. The SolarWinds attack demonstrated criminal behavior capable of infiltrating a vendor, infecting its source code, and covering their tracks. And even video surveillance files expose confidential information and manufacturing secrets that can be resold and undermine the value of a specific business, or damage the country's ability to compete on a global stage.

 

Industrial IoT requires the same care and attention as the traditional, unconnected counterparts. Safety standards and laboratory focus on physical risks like injury. Take for example an electrical appliance. Devices are classified by risk, and labels provide clear warnings to the user about safe operation. Where is the same standard for the cyber risks? We need to develop a system that classifies cyber risk and mandates specific controls and safety features to mitigate these risks. This includes access to source code and cloud services with super admin credentials. Security controls exist today to restrict access to critical systems, and provide time windows and task-based access that tracks access and reduces the risk of hyper-access infiltration and resulting breaches.

  Read Less
Like(0)  (0)

Linkedin Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The Internet-of-things (IoT) is not limited to consumer-grade household devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-verkada-hack-affecting-150000-of-its-security-cameras

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The Internet-of-things (IoT) is not limited to consumer-grade household devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-verkada-hack-affecting-150000-of-its-security-cameras

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
June 25, 2020

Ransomware Masking as COVID-19 Contact Tracing App – Experts Comments

This sort of campaign is extremely dangerous.
We’ve seen opportunistic criminal leveraging of natural disasters before, for example with 2012 Hurricane Sandy. During the storm, we saw a 30 percent drop in wen traffic in our New York and eastern seaboard customers, with an equivalent increase in malicious traffic. With tunnels flooded, criminals knew banks and financial institutions were crippled and ripe for attack. And more recently, we have seen thousands of attacks against the medical facilities we protect. These attacks leverage the.....Read More
We’ve seen opportunistic criminal leveraging of natural disasters before, for example with 2012 Hurricane Sandy. During the storm, we saw a 30 percent drop in wen traffic in our New York and eastern seaboard customers, with an equivalent increase in malicious traffic. With tunnels flooded, criminals knew banks and financial institutions were crippled and ripe for attack. And more recently, we have seen thousands of attacks against the medical facilities we protect. These attacks leverage the response to Covid-19 as means of increasing the likelihood of success. Cybercriminals are adept at using chaos and confusion as the smokescreen in which to move with stealth, speed, and impunity. In the case of Covid-19, there is no end to the amount of fraudulent and weaponized coronavirus apps, malicious documents, fake websites, and texts. The CryCrypto attack shows a level of surveillance on the part of criminal elements, attuned in real-time to government pandemic responses, and their agility when it comes to creating rapid malware campaigns. This sort of campaign is extremely dangerous. It masquerades as a legitimate app, distributed by a trusted source (in this case, the Canadian government). For this reason, many people could fall prey to this attack. It also drives home the fact that platform vendors play a role in securing their ecosystem with rigid app verification and validation. On a larger scale, it begs questions around the broader privacy and security issues of macro-population tracking, but should also spur people to consider how readily they are willing to surrender personal and potentially costly information on a daily basis. We all too easily surrender our privacy with the click of “I agree”, and then buy back our personal information in the form of products aligned to our searches, preferences, and social media brags. It’s a laissez fair approach on the side of the consumer. In this case, the blind click could be costly in terms of ransomware. As the stakes of cyber fraud increase, legislators and lawmakers must address the accepted view of “click” rights, when we all know that very few people actually read the terms and conditions. It’s time for government, vendors, and consumers to wake up the risks, and take measures to counter cyberattacks like CryCrypto. Cybercriminals employ many tricks to tempt users to install malware on their devices. An exceedingly popular technique is the use of phishing attacks where users/victims are tricked into executing malicious payloads to gain access and control of a victims' device. Once an attacker has control, there are a number of ways they will monetize this access. One of the more popular ways cybercriminals monetize this control is through the use of ransomware where victims' personal information is encrypted and held hostage until a ransom bounty is paid.  Read Less
Like(0)  (0)

Linkedin Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This sort of campaign is extremely dangerous...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ransomware-masking-as-covid-19-contact-tracing-app-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This sort of campaign is extremely dangerous...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ransomware-masking-as-covid-19-contact-tracing-app-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 05, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

Microtargeting of companies using industry-specific tools to rise in 2020
Throughout 2019, eSentire has observed numerous instances of mid-sized organizations being targeted using tools specific to their industry, and this approach will continue into 2020. Phishing emails related to common industry tools or masquerading as trusted sources will be a common attack vector for stealing credentials and sensitive information. For example, phishing lures unique to the legal industry will use avenues, including cloud services, from vendors such as Adobe, to access to stores.....Read More
Throughout 2019, eSentire has observed numerous instances of mid-sized organizations being targeted using tools specific to their industry, and this approach will continue into 2020. Phishing emails related to common industry tools or masquerading as trusted sources will be a common attack vector for stealing credentials and sensitive information. For example, phishing lures unique to the legal industry will use avenues, including cloud services, from vendors such as Adobe, to access to stores of sensitive information, and credit vendors, like American Express, to gain short-term access to personal and/or company credit accounts. Access to personal or organization emails can lead to the theft of sensitive information. It can also aid attackers in crafting more familiar and friendly-looking lures for spear (targeted) phishing. As this trend towards microtargeting continues, organizations need to ensure they have technical controls in place to detect these threats and also ensure they have a robust security education program in place for their employees.  Read Less
Like(5)  (0)

Linkedin Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Microtargeting of companies using industry-specific tools to rise in 2020..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Mark Sangster, Vice President and Industry Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Microtargeting of companies using industry-specific tools to rise in 2020..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel