Tag: Information Security Buzz

Conquering Compliance With Backup And Recovery

“According to the recently-published DLA Piper GDPR Data Breach Survey 2020, more than 160,000 data breach notifications have been reported across Europe since the General Data Protection Regulation (GDPR) came into force in May 2018. The survey also found that data…

Expert On Report: Zyxel 0day Affects Its Firewall Products

In response to the Krebs on Security report indicating that Zyxel 0day affects firewall products, experts offer perspective. The ISBuzz Post: This Post Expert On Report: Zyxel 0day Affects Its Firewall Products appeared first on Information Security Buzz.   Advertise on IT…

FCA Admits Revealing Customers’ Details

As reported by BBC News, the Financial Conduct Authority (FCA) has admitted that it inadvertently published online the personal data of people who made complaints against it. The UK’s City watchdog said the names of the complainants, along with some addresses…

Mexico’s Economy Ministry Hit By Cyber Attack

As reported by Reuters, Mexico’s economy ministry detected a cyber attack on some of its servers on Sunday but did not consider sensitive information to have been compromised, and beefed up safety measures, it said in a statement. It was the…

Ordnance Survey Hack – Expert Reaction

In light of the news that a hacker stole the personal data of 1,000 employees of the Ordnance Survey, cybersecurity experts, offered the following comments: Scoop: A hacker stole the personal data of 1,000 employees of the Ordnance Survey, the…

Racoon Malware Steals Data From 60 Apps – Expert Comments

According to researchers, Racoon Malware can extract sensitive data from about 60 applications and is distributed under the MaaS (malware-as-a-service) model for $75/week or $200/month. The ISBuzz Post: This Post Racoon Malware Steals Data From 60 Apps – Expert Comments appeared…

470,000 WhatsApp Group Invites Available Through Google

A simple Google search could reveal as many as 470,000 WhatsApp group invite links, according to reports. Once an individual finds an invitation, they can join the group and potentially find out members’ phone numbers. It is especially troubling that…

Can Bargain Hunting Put Your Company At Risk?

We’re all guilty of it. Finder.com estimates that Americans spend nearly two hours a day shopping online while at work, presumably using work machines. Whether scoping out springtime sales or putting that tax refund to use, this habit effectively makes…

Expert Analysis On ISS World Suffers From Cyber Attack

According to reports, ICC World, a major facilities company which provides cleaning, catering, security and other services globally has recently suffered from a ransomware attack. It’s said that many of its employees have been unable to access emails while the…

MGM Data Exposure – Expert Commentary From Jumio

It was  announced today that MCM experienced a data exposure, leaking over 10.6 million customer’s personal data on a hacking forum this week. The repercussions of this breach are beyond the initial exposure, according to Jumio CEO Robert Prigge. The ISBuzz Post:…

Expert Opinion: Amazon Ring Two-factor Authentication

Amazon has announced that it has made two-factor authentication mandatory for its Ring doorbell. The ISBuzz Post: This Post Expert Opinion: Amazon Ring Two-factor Authentication appeared first on Information Security Buzz.   Advertise on IT Security News. Read the complete…

Expert On Amazon Ring Makes 2FA Mandatory

Amazon Ring have announced in a blog post that they will make two-factor authentication mandatory. Users will receive a one-time, six-digit code every time they attempt to log in, either via email or text. Users will also be able to opt out…

The State Of Vulnerabilities In 2019

Web application vulnerabilities are often caused by application design flaws and misconfigured web servers. They can be particularly easy targets for hackers who look to take advantage of system security flaws.  With more web application security solutions now readily available…

WHO Warns Of Coronavirus Phishing Attacks – Expert Comments

Cybersecurity and privacy advocates commented today on the new warning from the World Health Organization (WHO) of ongoing Coronavirus-themed phishing attacks that impersonate the organization with the end goal of stealing information and delivering malware. The ISBuzz Post: This Post WHO Warns…

The Future Of 5G May Be Bright, But Is It Secure?

5G is here to replace not just legacy cellular standards, but a multitude of other wireless and wired communication standards and therefore its scope will cover personal use, business operations, transportation and smart city infrastructure. This, together with its support…

Expert Analysis Of WordPress GDPR Cookie Consent Plugin

The WordPress GDPR Cookie consent plugin used by 700,000 websites was found to have critical vulnerabilities that could have allowed cybercriminals to delete, change content and inject a malicious code.   The ISBuzz Post: This Post Expert Analysis Of WordPress GDPR Cookie…

Multiple Experts On Puerto Rico $2.6M Phishing Scam

The ISBuzz Post: This Post Multiple Experts On Puerto Rico $2.6M Phishing Scam appeared first on Information Security Buzz.   Advertise on IT Security News. Read the complete article: Multiple Experts On Puerto Rico $2.6M Phishing Scam

Hysolate Comments On Protecting Endpoints Against Ransomware

Ransomware cost organizations globally more than $6.3Billion in 2019 and it is ramping up for 2020 according to an Emisoft report. The ISBuzz Post: This Post Hysolate Comments On Protecting Endpoints Against Ransomware appeared first on Information Security Buzz.   Advertise on…

Coronavirus Emotet – Expert Analysis

Cyber criminals are spreading the highly dangerous off-the-shelf Emotet, a phishing Trojan-turned-botnet, by exploiting widespread fears of infection by the novel coronavirus, according to ComputerWeekly. Disguised as an email from a provider of disability welfare services, the Emotet coronavirus campaign has…

Global Tension Points To A Future Of Destructive Malware

Geopolitical tension has a long-tail effect in cyberspace. In the aftermath of major political or military incidents, beneath the public posturing, nation state cyber actors are already under orders to conduct campaigns aimed at countering the incident, spreading disinformation or…

Expert on Report: Mismanaged Key & Digital Certificates

It was recently reported that the majority of organisations (73%) continue to experience unplanned downtime and outages due to mismanaged digital certificates. More than half of respondents (55%) have experienced more than 4 certificate-related outages in the past 24 months…

Security Experts Analysis Of FBI Crime Report

In its new FBI Internet Crime Report, the FBI said it received 467,361 internet and cyber-crime complaints in 2019, and that almost half of the reported losses — an estimated $1.77 billion — came from reports of BEC (Business Email Compromise),…

1 In 10 Use Stalkerware To Track Partners And Exes

Around a tenth of Americans use stalkerware to track partners and exes, according to CNET. Men are more than twice as likely than women to use the apps, according to the poll, which NortonLifeLock conducted in partnership with the Harris Poll.…

Expert Reaction On Google Nest To Require 2FA

Within a few months, Google Nest users will be required to use two-factor authentication (2FA) to access their devices. Google has promised that the new process will integrate seamlessly into the Nest user experience. The ISBuzz Post: This Post Expert…

Expert Reaction On Estee Lauder Data Exposure

440 million records from the Estee Lauder company were exposed online according to security Researcher Jeremiah Fowler at Security Discovery who found the door wide open on an Internet Facing database. Wonder @ # of #schooldistricts or #highered could field…

All You Need Is Love (And Security Controls)!

Love is purportedly in the air again, but is it being harnessed and channelled in the right direction?  This Valentine’s Day, are you doing all you can to lavish protective TLC on your apps? Do you have the right strategies…

Dell SupportAssist Bug Exposes Business, Home PCs To Attacks

Dell published a security update to patch a SupportAssist Client software flaw which enables potential local attackers to execute arbitrary code with Administrator privileges on vulnerable computers. According to Dell’s website, the SupportAssist software is “preinstalled on most of all new Dell devices running…

GTP Remains A Security Threat As Operators Transition To 5G

GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam seamlessly between networks of different generations. The protocol was developed in tandem with General Packet Radio Service (GPRS), the packet-oriented…