Tag: Information Security Buzz

Google Docs Phishing Scam – Expert Insight

As reported by Scamicide, there is a new phishing scam riding on the back of Google Docs attachments. A phishing email is sent to unsuspecting victims that urges you to click on a Google Docs link. Clicking on the link will…

Experts On Adoption Of Facial Recognition

From online education to voting to dating apps, online companies are starting to institute physical biometrics to identify individuals through facial recognition.   The ISBuzz Post: This Post Experts On Adoption Of Facial Recognition appeared first on Information Security Buzz.…

The Importance Of Educating Staff On Cybersecurity

Cybersecurity should be a priority for all businesses and there is no excuse for failing to take the matter seriously in 2020. Staff must be adequately equipped to deal with threats; businesses must understand the importance of adhering to data…

On Google Sending Videos To Wrong Users

Google has reached out to users to apologize after a “technical issue” saw videos uploaded to another user’s archives. In an email, the search engine giant said the issue affected the Google “download your data” service — called Google Takeout — for…

YouTube Deepfake Ban – Expert Commentary

The Google-owned video service’s move comes amid growing concern about so-called “deepfake” videos altered by using artificial intelligence. https://t.co/uUnpnYkWok — NewsClick (@newsclickin) February 4, 2020 The ISBuzz Post: This Post YouTube Deepfake Ban – Expert Commentary appeared first on Information…

New Ransomware Ekans – Expert Analysis

A new type of ransomware, Ekans, has been developed and has been created to specifically target Windows systems used within industrial control systems. Below security expert provides an analysis of this new ransomware. Researchers detail EKANS ransomware, which is targeting industrial…

New Ransomeware Ekans – Expert Analysis

A new type of ransomware, Ekans, has been developed and has been created to specifically target Windows systems used within industrial control systems. Below security expert provides an analysis of this new ransomware. Researchers detail EKANS ransomware, which is targeting industrial…

AppSec Lessons Learned In 2019

People are abuzz right now with trend predictions for 2020. It’s like putting the cart before the horse. Before we start making assumptions about what we think will happen this year, we need to take stock with what we know…

Security Is A Process, Not A One-Time Project

There is no question that digitalisation has brought newfound opportunity to businesses; however, as we are all painfully aware, it has also made them more vulnerable to security risks. Perhaps unsurprisingly, it’s the human factor which is increasingly the weakest…

(ISC)2 Security Congress 2020 Opens Call For Speakers

(ISC)² Opens Call for Expert Cybersecurity Speakers for 2020 Security Congress Annual conference brings together experts from around the world to tackle the most pressing issues in cybersecurity (ISC)² – the world’s largest nonprofit membership association of certified cybersecurity professionals –…

Being Prepared For Iranian Cyber Attacks

With problems in Iran, American businesses need to have a heightened sense of awareness around potential cyberattacks.  What can businesses do and what should they be aware of? The first thing people/companies need to be doing is training their staff…

Dundee And Angus College Cyber Attack

According to The Courier, Dundee and Angus College has remained closed today after a recent cyber attack, which occurred late last week. The College computer systems were shut down, and students have been asked to reset their passwords before attempting to…

Cleaners Used To Hack Businesses

Criminal gangs are planting “sleepers” in cleaning companies so that they can physically access IT infrastructure, the lead officer of the Yorkshire and Humber Regional Cyber Crime Unit told a recent SINET security event. He said that he was seeing…

NEC Defense Contracts Info Potentially Compromised In Breach

The Japanese NEC electronics giant was the target of a cyberattack that resulted in unauthorized access to its internal network on Thursday according to information leaked to Japanese newspapers by sources close to the matter. The electronics and information technology giant is a…

Experts Insight On Vulnerabilities Found In Microsoft Azure Services

Two vulnerabilities found in Microsoft Azure services could have allowed cybercriminals to take over cloud services according to a new report from Checkpoint. The ISBuzz Post: This Post Experts Insight On Vulnerabilities Found In Microsoft Azure Services appeared first on Information Security Buzz.…

Social Captain Instagram Account Exposed And Experts Reactions

Social Captain, the social media boosting service, which bills itself as a service to increase user’s Instagram followers, has exposed thousands of Instagram account passwords after storing them in unencrypted plain text. Social Media Startup Social Captain Exposed Thousands of Instagram Account Passwords Stored in Plaintext,…

Comment: WordPress Plugin Bug Exposes 200K+ Sites

A high severity cross-site request forgery (CSRF) bug allows attackers to take over WordPress sites running an unpatched version of the Code Snippets plugin because of missing referer checks on the import menu. According to the active installations count on…

Experts On Snake Ransomware

Following the news that a new piece of file-encrypting ransomware, which some are linking to Iran, has been targeting processes and files associated with industrial control systems (ICS), please see below for a comment from experts. The ISBuzz Post: This Post Experts…

LabCorp Exposes Thousands Of Medical Documents – Commentary

A vulnerability in LabCorp’s website that hosts the company’s internal customer relationship management system, exposed thousands (at least 10,000) of medical documents that contained names, dates of birth, Social Security numbers of patients, lab test results and diagnostic data. While…

Five Cyber Security Resolutions For 2020

New Year’s resolutions are notoriously hard to keep. In fact, according to this YouGov poll, most Brits failed to keep all the resolutions they made for 2019. It may be hard to believe but we’re now firmly into 2020. In…

Government Plans New Laws For Smart Gadgets

According to BBC News, the UK government is developing laws that would require manufacturers to ensure their smart gadgets cannot be hacked and exploited via the internet. This is in the face of concerns that many internet-enabled devices lack basic security…

With 5G And IoT, It’s A New Day With New Risks

Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of Things (IoT) has already become commonplace in our lives, thanks to all the connected devices and smart technologies we own,…

What Experts Say On New UK IoT Legislation

All Internet of Things and consumer smart devices will need to adhere to specific security requirements, under new government proposals. The aim of the legislation is to help protect UK citizen and businesses from the threats posed by cyber criminals increasingly targeting Internet…

Response Comment: Google Docs Down

A spike in fraudulent transactions has forced the Google Security team to suspend all publishing and uploading of paid Chrome extensions to the Chrome Web store. Paid extensions on the Chrome Web Store are being suspended due to an increase in fraudulent transactionshttps://t.co/nIrWLwXnYH — Android…

Severe Vulnerabilities Discovered In GE Medical Devices

It has been reported that the US Cybersecurity and Infrastructure Agency (CISA) today issued an advisory for six high-severity security vulnerabilities in patient monitoring devices. These flaws could allow an attacker to make changes at the software level of a device and in…

U.S. Govt Agency Hit With New CARROTBALL Malware Dropper

A new malware called CARROTBALL, used as a second-stage payload in targeted attacks, was distributed in phishing email attachments delivered to a U.S. government agency and non-US foreign nationals professionally affiliated with current activities in North Korea. CARROTBALL came in…

NETGEAR TLS Certs Exposure – Expert Source

NETGEAR recently issued a security advisory about a Transport Layer Security (TLS) certificate private key disclosure vulnerability on several of its routers. And this is apparently not the first time the company left TLS certificates and private keys exposed in their wireless…

TrickBot Steals AD Credentials – Expert Comments

Active Directory expert Gerrit Lansing, field CTO at STEALTHbits Technologies, addressed this week’s discovery of a new module for the TrickBot trojan that targets the Active Directory database stored on compromised Windows domain controllers. The ISBuzz Post: This Post TrickBot Steals AD…

Cybersecurity Experts Weigh In On Jan. 28 Data Privacy Day

This coming Tuesday, January 28, marks International Data Privacy Day.  Powered by the National Cyber Security Alliance, Data Privacy Day “encourages consumers to own their privacy and businesses to improve their data privacy practices.” The ISBuzz Post: This Post Cybersecurity Experts…

BitPyLock Ransomware Now Threatens To Publish Stolen Data

As reported by Bleeping Computer, a new ransomware called BitPyLock has quickly gone from targeting individual workstations to trying to compromise networks and stealing files before encrypting devices. BitPyLock was first discovered by MalwareHunterTeam on January 9th, 2020 and has since seen a…

Comments On The Hanna Anderson Magecart Attack

Hanna Anderson, a company that offers children’s clothes online, has been the target of a Magecart attack wherein their customers’ credit card information was stolen as they were making purchases. The attack was discovered after the credit cards were found for sale…

CEO Comments On FBI Warnings On Election Infrastructure

In a change of policy, state elections officials will be notified by the FBI of possible cyber threats to election infrastructure.  Homeland Security has also provided election officials with best practices for securing election systems. The ISBuzz Post: This Post CEO Comments On…

Return Of Emotet In New 2020 Campaign – Expert On Research

Researchers at cybersecurity firm Proofpoint have observed that the prolific botnet Emotet has returned to the email threat landscape after a hiatus at the end of 2019. The Trojan-turned-botnet is being distributed by threat group TA542, using attachments and malicious links containing…