

Thomas Richards
Principal Consultant /*=$expert->feature_status*/ ?>
Synopsys
Comments Dotted :
6
September 15, 2020
organisations should conduct regular social engineering assessments against their staff to raise awareness
Social engineering is a very common attack strategy which threat actors use to gain access to applications or systems within a corporate network. At Synopsys, based on our security assessment services, we have found that at least one person will always fall for our social engineering attempts. To prevent a successful attack, there are several compensating controls an organisation can put in place. To start, any sensitive applications should have access restricted to the internal corporate.....Read More

July 30, 2020
Once an account is compromised, the attackers could use that account to facilitate additional compromise.
With the ability to send messages to users, the chances of social engineering within the application are high. There is both a mobile and web interface which gives attackers the possibility to script sending messages to various users with the aim of compromising user profiles. Setting up fake accounts with attractive photos has been used before in phishing attacks and could certainly be used again. Once an account is compromised, the attackers could use that account to facilitate additional.....Read More

July 24, 2020
Google and Facebook appear to have strong account password policies and protections
"From the information that has been released thus far, we know that Instacart allows users to use three possible methods of authentication: an Instacart account, Google, and Facebook. While Google and Facebook appear to have strong account password policies and protections, Instacart’s password policy only requires 6 characters. This is below the industry standard and is considered a weak password policy. I don’t believe phishing is a likely attack vector in this case, as it would take much .....Read More

January 23, 2020
Based on the article, the voting software will require only the name and date-of-birth of the voter to allow them to vote.
Mobile voting is an appealing option to engage more voters by removing the time and physical space requirements of going to a polling place to vote. However, mobile voting presents additional security concerns that should be taken into account before rolling out a program. Based on the article, the voting software will require only the name and date-of-birth of the voter to allow them to vote. These two pieces of information can easily be obtained through various methods, but the most appealing .....Read More

January 01, 2020
Regarding the human controls, employee security awareness training should be mandatory for all employees.
Phishing and email-based attacks present a twofold problem for companies to solve; the first is technical controls and the second is human education. Companies should invest in a spam and email filtering service to prevent known or suspicious emails from reaching recipients. Additional controls include end point protection software and configuring the corporate email client to present a banner on any external emails. The banner can be used to warn recipients that it is an external email and to .....Read More

July 31, 2019
The proliferation of the internet and connected devices have removed that barrier.
Legacy systems that were developed without stringent security requirements are turning into a hunting ground for vulnerabilities. While these systems were at one time difficult to obtain or test, the proliferation of the internet and connected devices have removed that barrier. Specialized systems are becoming more exposed and this will inevitably lead to new vulnerabilities being discovered and published.
