Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Usman Rahim
Digital Security and Operations Managerfeature_status*/ ?>
The Media Trust

Comments Dotted : 4
September 20, 2019

Experts Comments On Magecart Attack On Hotel Websites Through The Supply Chain

The only way to protect users is to know who’s providing what code and what that code does to users.
Managing the digital supply chain is difficult because it requires the right tools and expertise. When third party code suppliers deliver code to users through browser and not through a tool that the website publisher/owner uses, the owner has little control of what happens and can't monitor when something's afoot. If a third party provides or supports the web application, iframes will fall victim to attack. The only way to protect users is to know who’s providing what code and what that code .....Read More
Managing the digital supply chain is difficult because it requires the right tools and expertise. When third party code suppliers deliver code to users through browser and not through a tool that the website publisher/owner uses, the owner has little control of what happens and can't monitor when something's afoot. If a third party provides or supports the web application, iframes will fall victim to attack. The only way to protect users is to know who’s providing what code and what that code does to users.  Read Less
Like(0)  (0)

Linkedin Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The only way to protect users is to know who’s providing what code and what that code does to users...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-magecart-attack-on-hotel-websites-through-the-supply-chain

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The only way to protect users is to know who’s providing what code and what that code does to users...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-magecart-attack-on-hotel-websites-through-the-supply-chain

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 02, 2019

Google Finds ‘Indiscriminate iPhone Attack Lasting Years’

The notion that only you can access your device is far from the truth.
The identification of these exploits targeting iOS devices prove that even products designed from the ground up to protect your privacy aren’t 100% secure. The notion that only you can access your device is far from the truth. Your device and the apps that run on it are supported by many third-parties who can potentially access your behavioral and personal information, from how many steps you’ve taken this morning to where you bought your coffee to which article you read on which online.....Read More
The identification of these exploits targeting iOS devices prove that even products designed from the ground up to protect your privacy aren’t 100% secure. The notion that only you can access your device is far from the truth. Your device and the apps that run on it are supported by many third-parties who can potentially access your behavioral and personal information, from how many steps you’ve taken this morning to where you bought your coffee to which article you read on which online publication. That’s just three of the many things you did this morning; it doesn’t include your location even with your GPS off, the credit card balance you paid off, and what pictures you IM’d to whom. This is today’s surveillance economy made possible by the digital ecosystem’s growing presence—with our unmindful consent--in our daily lives. And in this economy, the only way we can restore our privacy is for manufacturers, developers, online publishers, adtech/martech, data management providers, and everyone else in between, to work together on setting higher privacy and security standards that should include knowing who all their digital third parties are, what these third parties are doing and for what purpose, and uprooting these third parties from the digital ecosystem when they violate digital policies.  Read Less
Like(2)  (0)

Linkedin Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The notion that only you can access your device is far from the truth...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/google-finds-indiscriminate-iphone-attack-lasting-years

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The notion that only you can access your device is far from the truth...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/google-finds-indiscriminate-iphone-attack-lasting-years

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 22, 2019

PokerTracker.com Hacked To Inject Payment Card Stealing Script

Developers use CSPs to enforce a white list of resources that a client browser can load resources from and sites that can interact with their site.
The hacking of a popular site and software reveals the growing popularity of combining two attack methods: (1) compromising websites that use outdated versions of their content management platforms and (2) injecting credit card skimmers on to the page. Bad actors know too well the vulnerabilities of web content platforms. And, even when those platforms release new versions to address vulnerabilities, website operators often neglect making the needed updates. While the site has made.....Read More
The hacking of a popular site and software reveals the growing popularity of combining two attack methods: (1) compromising websites that use outdated versions of their content management platforms and (2) injecting credit card skimmers on to the page. Bad actors know too well the vulnerabilities of web content platforms. And, even when those platforms release new versions to address vulnerabilities, website operators often neglect making the needed updates. While the site has made improvements to the Content Security Policy (CSP), this move has its limits. Developers use CSPs to enforce a white list of resources that a client browser can load resources from and sites that can interact with their site. However, such a list does not take into account the unknown third-party scripts these resources and sites bring in and allow to run on the site. Operators should therefore monitor the site for all scripts that run, in order to ensure that only those that they have authorized are able to execute. Doing so will note only address security, but also privacy issues at a time when data privacy laws are being enacted across the country and around the world.  Read Less
Like(0)  (0)

Linkedin Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Developers use CSPs to enforce a white list of resources that a client browser can load resources from and sites that can interact with their site...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/pokertracker-com-hacked-to-inject-payment-card-stealing-script

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Developers use CSPs to enforce a white list of resources that a client browser can load resources from and sites that can interact with their site...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/pokertracker-com-hacked-to-inject-payment-card-stealing-script

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 12, 2019

Researchers Finding Election Systems Open To The Internet

Our digital elections system doesn’t have a single point of failure.
Our digital elections system doesn’t have a single point of failure—it has many - largely because the system appears to have been designed without prioritizing security and privacy. What’s most disturbing is that even as vendors claim the system isn’t connected to the internet, they provide documents that show otherwise. In addition, there’s the potential for configuration problems—an all too frequent error--USB drives infected with malware, brute force attacks to get around.....Read More
Our digital elections system doesn’t have a single point of failure—it has many - largely because the system appears to have been designed without prioritizing security and privacy. What’s most disturbing is that even as vendors claim the system isn’t connected to the internet, they provide documents that show otherwise. In addition, there’s the potential for configuration problems—an all too frequent error--USB drives infected with malware, brute force attacks to get around passwords, firewalls with unpatched software, outdated server software, no oversight of how well vendors install the system, configuration for transmitting election results not certified by Election Assistance Commission (EAC) although one wonders what good that would do if they don't have cybersecurity experts to alert them when something's afoot. Another significant problem is that state and local governments suffer from chronic budget cuts that prevent it from putting more stringent security measures in place and thoroughly vetting machines before putting them to use and in so doing, exposing these systems—not to mention voters--to sustained attacks from bad actors and nation-state adversaries.  Read Less
Like(6)  (0)

Linkedin Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Our digital elections system doesn’t have a single point of failure...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/researchers-finding-election-systems-open-to-the-internet

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Usman Rahim, Digital Security and Operations Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Our digital elections system doesn’t have a single point of failure...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/researchers-finding-election-systems-open-to-the-internet

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel