Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Michael Borohovski
Director of Software Engineeringfeature_status*/ ?>
Synopsys

Comments Dotted : 3
January 27, 2021

Expert Commentary: Phishing Attack Impersonates UK NHS To Obtain Sensitive Consumer Data

Covid-related vaccine scams have been making the rounds in countries around the globe.

Covid-related vaccine scams have been making the rounds in countries around the globe. And I suspect there will be more to come in the near future. When rolling out new initiatives where there is the potential for misinformation or confusion to spread, bad actors will certainly take advantage. Be vigilant. Do your own research about what the vaccine involves, legitimate sources to get the vaccine, what the process is, etc. That’s specifically why the abundance of crowdsourced informational

.....Read More

Covid-related vaccine scams have been making the rounds in countries around the globe. And I suspect there will be more to come in the near future. When rolling out new initiatives where there is the potential for misinformation or confusion to spread, bad actors will certainly take advantage. Be vigilant. Do your own research about what the vaccine involves, legitimate sources to get the vaccine, what the process is, etc. That’s specifically why the abundance of crowdsourced informational sites exist – we have found most of the official sites to be lacking in usability or clarity. But if something feels off, it probably is.

  Read Less
Like(3)  (0)

Linkedin Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Covid-related vaccine scams have been making the rounds in countries around the globe...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-commentary-phishing-attack-impersonates-uk-nhs-to-obtain-sensitive-consumer-data

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Covid-related vaccine scams have been making the rounds in countries around the globe...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-commentary-phishing-attack-impersonates-uk-nhs-to-obtain-sensitive-consumer-data

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 16, 2020

Experts Insight On Major US Twitter Accounts Hacked in Bitcoin Scam

We haven't seen data on this, and won't until a post-mortem is released by Twitter, but it's a possibility.
Given that numerous high-profile Twitter accounts were compromised as part of this attack -- accounts that would presumably be protected by multifactor authentication and strong passwords -- it is highly likely that the attackers were able to hack into the back end or service layer of the Twitter application. Indeed, some of the accounts (Tyler Winklevoss, for example) have confirmed they were using multi-factor authentication and got hacked anyway. If the hackers do have access to the backend.....Read More
Given that numerous high-profile Twitter accounts were compromised as part of this attack -- accounts that would presumably be protected by multifactor authentication and strong passwords -- it is highly likely that the attackers were able to hack into the back end or service layer of the Twitter application. Indeed, some of the accounts (Tyler Winklevoss, for example) have confirmed they were using multi-factor authentication and got hacked anyway. If the hackers do have access to the backend of Twitter, or direct database access, there is nothing potentially stopping them from pilfering data in addition to using this tweet-scam as a distraction, albeit a very profitable one. We haven't seen data on this, and won't until a post-mortem is released by Twitter, but it's a possibility.  Read Less
Like(0)  (0)

Linkedin Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We haven\'t seen data on this, and won\'t until a post-mortem is released by Twitter, but it\'s a possibility...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We haven\'t seen data on this, and won\'t until a post-mortem is released by Twitter, but it\'s a possibility...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
June 04, 2020

Experts On San Francisco Retirement Program Suffers Data Breach

The breach itself is also interesting from a technical perspective.
A breach like this is interesting, both because it leads to almost guaranteed identity theft (if the information actually was accessed and downloaded), since it’s a treasure trove of financial information, identifying information, and security questions. Security questions, in particular, typically uses information that people *feel* is non-public, even if it usually is; wife’s name, where you met, etc., are often accessible with a quick social media search. But for an attacker to have.....Read More
A breach like this is interesting, both because it leads to almost guaranteed identity theft (if the information actually was accessed and downloaded), since it’s a treasure trove of financial information, identifying information, and security questions. Security questions, in particular, typically uses information that people *feel* is non-public, even if it usually is; wife’s name, where you met, etc., are often accessible with a quick social media search. But for an attacker to have those at their fingertips, along with all of the other information, is incredibly dangerous from an identity theft perspective. Additionally, because beneficiary information was accessed, it is also likely to lead to targeted spear phishing attacks, where an attacker spoofs an email as if it were coming from one of those beneficiaries. The retired employees of San Francisco need to be extremely careful and verify, personally, through existing contact info they already had, that their beneficiaries actually sent an email, should the retirees receive one. The breach itself is also interesting from a technical perspective, as this was a bit of careless planning; one of the main considerations when building a testing or stage environment is to ensure it does not have access to any production systems or data. We do this because it prevents exactly this sort of breach. Staging and test environments, almost by definition, are much more prone to bugs and vulnerabilities than a production environment. In testing is where those issues are found, and where they are fixed, before it gets pushed out to something the world can see. Those testing environments *should* be separated from the production environments, and ideally inaccessible outside the corporate network, but it’s also important to ensure that a test environment uses mock data rather than production data. There are generators for most frameworks that will produce fake (or “mock”) data in order to fill up your database with real-looking information that is actually just computer-generated, and those are important to use; this breach is a perfect lesson as to why.  Read Less
Like(2)  (0)

Linkedin Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The breach itself is also interesting from a technical perspective...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-san-francisco-retirement-program-suffers-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Michael Borohovski, Director of Software Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The breach itself is also interesting from a technical perspective...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-san-francisco-retirement-program-suffers-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel