Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Three Reasons The Security Industry Is Protecting The...
Experts On Google Voice Outage
Preparing For Tomorrow – Why Weathering The Initial...
The Cybersecurity Disconnect: Remote Working Highlights The Need...
Expert Reaction On GCHQ To Use AI In...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Christoph Hebeisen
Director, Security Intelligence Researchfeature_status*/ ?>
Lookout

Comments Dotted : 7
December 02, 2020

Experts Reaction On Ipsos Mori Internet Survey Could Be A Privacy Risk For UK Consumers

This app could expose both the user and possibly their employer to significant legal risk.
The Ipsos Iris Blue app permits the operator to access all network communications of the device it is running on including content protected SSL/TLS encryption (with the exception of traffic used by apps using correctly implemented certificate pinning). In addition, the app can access all content displayed on the device screen. A user might decide for themselves that they are willing to grant a third party this level of insight though it is doubtful that many would if they fully understood all.....Read More
The Ipsos Iris Blue app permits the operator to access all network communications of the device it is running on including content protected SSL/TLS encryption (with the exception of traffic used by apps using correctly implemented certificate pinning). In addition, the app can access all content displayed on the device screen. A user might decide for themselves that they are willing to grant a third party this level of insight though it is doubtful that many would if they fully understood all the privacy implications. However, if a personal device running this app were used for work it could easily expose confidential documents and data to the operator, who has no commitment to the employer of the device's user. As a result, this app could expose both the user and possibly their employer to significant legal risk.  Read Less
Like(0)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This app could expose both the user and possibly their employer to significant legal risk...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-ipsos-mori-internet-survey-could-be-a-privacy-risk-for-uk-consumers

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This app could expose both the user and possibly their employer to significant legal risk...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-ipsos-mori-internet-survey-could-be-a-privacy-risk-for-uk-consumers

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 18, 2020

Experts On US Military Found Buying Personal Data From Muslim Pro App

The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective.
The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective. While location data is necessary to determine local prayer times and directions, transmitting and storing that data in a cloud service - let alone the sale to third parties - is not necessary to provide the service and something users of the app will not reasonably expect.
Like(0)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-us-military-found-buying-personal-data-from-muslim-pro-app

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-us-military-found-buying-personal-data-from-muslim-pro-app

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 21, 2020

Hackers Took Over Telegram Accounts In Israel Through SS7 Attacks To Defeat 2FA

Routing calls to third-party carriers is an important feature to enable roaming of mobile devices.
SMS's susceptibility to attacks is well understood and it should therefore not be considered a secure method for two-factor authentication. This is especially the case when dealing with sophisticated or well-funded attackers that may infiltrate or control carrier networks. Routing calls to third-party carriers is an important feature to enable roaming of mobile devices. However, since no secure verification takes place between the device and its home carrier to verify that it has signed on to .....Read More
SMS's susceptibility to attacks is well understood and it should therefore not be considered a secure method for two-factor authentication. This is especially the case when dealing with sophisticated or well-funded attackers that may infiltrate or control carrier networks. Routing calls to third-party carriers is an important feature to enable roaming of mobile devices. However, since no secure verification takes place between the device and its home carrier to verify that it has signed on to a roaming partner's network, roaming partners (or an attacker with access to their network) can re-route calls and text messages, broadening the attack surface for text messages far beyond the home carrier. This incident is an example of how this weakness can be abused for targeted attacks by a sophisticated actor.  Read Less
Like(4)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Routing calls to third-party carriers is an important feature to enable roaming of mobile devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/hackers-took-over-telegram-accounts-in-israel-through-ss7-attacks-to-defeat-2fa

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Routing calls to third-party carriers is an important feature to enable roaming of mobile devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/hackers-took-over-telegram-accounts-in-israel-through-ss7-attacks-to-defeat-2fa

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 29, 2020

Experts On Catalonian politicians had Phones Hacked in WhatsApp Attack

The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known.
The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known, including in western democracies. In light of widespread election meddling and spying on political parties and movements all over the world it is clear that protecting information and communication infrastructure including mobile devices is quickly becoming critical to any organisation with a need for confidentiality.
Like(1)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-catalonian-politicians-had-phones-hacked-in-whatsapp-attack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-catalonian-politicians-had-phones-hacked-in-whatsapp-attack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 09, 2020

Experts Reaction On Fake TikTok links Injected With Malware

The removal of the TikTok app from both Google Play and the Apple App Store in India has created a similar situation.
When legitimate, popular channels to acquire a popular app are blocked for whatever reason, it presents an opportunity for malicious actors to lure victims by promising a way around the restriction. We have seen similar attempts to entice users to install malware in connection with the distribution of Fortnite for Android outside of Google Play as well as the geographically staggered release of PokemonGo. The removal of the TikTok app from both Google Play and the Apple App Store in India has.....Read More
When legitimate, popular channels to acquire a popular app are blocked for whatever reason, it presents an opportunity for malicious actors to lure victims by promising a way around the restriction. We have seen similar attempts to entice users to install malware in connection with the distribution of Fortnite for Android outside of Google Play as well as the geographically staggered release of PokemonGo. The removal of the TikTok app from both Google Play and the Apple App Store in India has created a similar situation. Users should limit their risk by only installing apps from the official app stores and using mobile security as an added layer of protection.  Read Less
Like(2)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The removal of the TikTok app from both Google Play and the Apple App Store in India has created a similar situation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-fake-tiktok-links-injected-with-malware

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The removal of the TikTok app from both Google Play and the Apple App Store in India has created a similar situation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-fake-tiktok-links-injected-with-malware

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
May 28, 2020

Security Vulnerabilities In Android Devices Differ Drastically By Region – Security Intelligence Expert Reaction

Users should ensure they always apply the most recent updates to their devices.
Android devices usually arrive preloaded with a number of apps (and sometimes other customisations) added by the manufacturer and, often, the carrier too. Like all apps, these can suffer from vulnerabilities and thereby expose the user to security and privacy risks. What makes these apps special is that the user may not be able to remove them, and, in some cases, they have additional privileges not available to user-installed apps. While geographic customisation may be necessary in some.....Read More
Android devices usually arrive preloaded with a number of apps (and sometimes other customisations) added by the manufacturer and, often, the carrier too. Like all apps, these can suffer from vulnerabilities and thereby expose the user to security and privacy risks. What makes these apps special is that the user may not be able to remove them, and, in some cases, they have additional privileges not available to user-installed apps. While geographic customisation may be necessary in some cases, such as providing access to an app store in regions where Google Play is not available, manufacturers have a responsibility to protect their users by employing sound security practices in developing apps, providing timely updates when vulnerabilities are found, and carefully vetting (and, where possible, minimising) third-party apps shipped with their devices. Users should ensure they always apply the most recent updates to their devices to ensure they’re protected from known, patched vulnerabilities.  Read Less
Like(0)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Users should ensure they always apply the most recent updates to their devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-vulnerabilities-in-android-devices-differ-drastically-by-region-security-intelligence-expert-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Users should ensure they always apply the most recent updates to their devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-vulnerabilities-in-android-devices-differ-drastically-by-region-security-intelligence-expert-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 23, 2020

Experts Comments On iPhone’s Could Be Vulnerable To Email Software Hack

Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties.
As we have seen in the past, sophisticated attacks on high value - or high profile - targets aim to leverage exploit chains starting with a one-click or zero-click attack to increase their chances of success. Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties. The rising prevalence of such attacks indicates that attackers are becoming increasingly aware that mobile devices are the most valuable targets for surveillance and spying......Read More
As we have seen in the past, sophisticated attacks on high value - or high profile - targets aim to leverage exploit chains starting with a one-click or zero-click attack to increase their chances of success. Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties. The rising prevalence of such attacks indicates that attackers are becoming increasingly aware that mobile devices are the most valuable targets for surveillance and spying. Not only do these devices offer access to user documents, communications, and cloud accounts, they can also act as a live surveillance tool by virtue of their sensors, such as the microphone, camera, and GPS device. This incident demonstrates how even the most well-maintained, fully upgraded mobile operating systems can be susceptible to attacks and compromise. Third-party security solutions can detect and defend against the impact of device compromise, malicious apps, and phishing attacks against mobile devices.  Read Less
Like(0)  (0)

Linkedin Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-iphones-could-be-vulnerable-to-email-software-hack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Christoph Hebeisen, Director, Security Intelligence Research, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-iphones-could-be-vulnerable-to-email-software-hack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Password hygiene should be part of employee training and cyber awareness training. "

Expert Reaction On Solarwinds Blames Intern For Weak Passwords

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Currently Golang produce’s a much lower detection rate against security software. "

Expert Reaction On Go Is Becoming The Language Of Choice For Criminals To Design Malware

Chris Hickman, Chief Security Officer, Keyfactor

"A certificate expiration on its own is not necessarily a security response incident. "

Experts On Google Voice Outage

Adam Enterkin, SVP, EMEA, BlackBerry

"Even the best cybersecurity teams have had major challenges this last year. "

Expert Reaction On GCHQ To Use AI In Cyberwarfare

Jamie Akhtar, CEO and Co-founder, CyberSmart

"Universities are home to some of the world’s most cutting-edge research. "

Comment: Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Jake Moore, Cybersecurity Specialist, ESET

"Honourable criminal hacking is still illegal and comes with some of the same intentions of standard unethical hacking. "

Expert Reaction On Private Data Leaked From Far-right Platform Gab

Dan Panesar, Director UK & Ireland, Securonix Inc.

"Even unsophisticated attacks can cripple digital engagement efforts. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Sam Curry, Chief Security Officer, Cybereason

"Oxford's researchers have likely spent months working on, they will see a big payday. "

Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Adam Palmer, Chief Cybersecurity Strategist , Tenable

"The attack against the Npower app is just the most recent example of cybercriminals. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

John Vestberg, President and CEO, Clavister

"In the new era of remote working, security needs to span on premise and the cloud. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Martin Jartelius, CSO , Outpost24

"Password managers are helpful but two-factor authentication should ideally be something most sites offer today. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

James McQuiggan, Security Awareness Advocate, KnowBe4

"Organizations want to implement a robust security culture to inform users of the importance of unique passwords. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Brad Ree, CTO, ioXt Alliance

"The Clubhouse data breach has once again brought mobile app security vulnerabilities into the spotlight. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel