Should You Be Worried about Mobile Security?

Nearly every survey and article on information security during the last 12 months have one common baseline : “Organisations are concerned about Mobile Security”.

 

In a recent survey of 100 UK businesses with annual revenue of over $25 million, the 2013 AT&T Business Continuity Study found that 83 percent of executives are concerned about the use of mobile networks and devices and its impact on security threats.

 

Various surveys indicate that though Smartphones and Tablets are everywhere, the majority of users aren’t aware of the importance of mobile security, or how to best protect themselves.
Continue reading “Should You Be Worried about Mobile Security?”

Intrusion Deception – Counter offense is the best defense

Information Security mostly revolves around defense in depth. Hitherto, we have had ‘Intrusion Detection’ and ‘Intrusion Prevention’ tools and techniques. But the newest technique in securing information assets, ‘Intrusion Deception’, has turned the security concept upside down and relies on counter offensive ‘honey pot’ methodology to protect the information assets in an organization. Continue reading “Intrusion Deception – Counter offense is the best defense”

This Is Not a Test: Emergency Broadcast Systems Proved Hackable

https://www.youtube.com/watch?v=nc60XPCXrh8#action=share

Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.

The vulnerabilities included a private root SSH key that was distributed in publicly available firmware images that would have allowed an attacker with SSH access to a device to log in with root privileges and issue fake alerts or disable the system.

Tags: 

Original article here.

$45 Million Heist – Card Data Stolen – Banks to be Alert

45 Million USD was withdrawn using cloned pre-paid cards in 2 seperate but reportedly connected operations. Hackers first got into the systems of the card processors and extracted magnetic strip card data and PIN numbers. Cards were then cloned using the stolen data and dispatched to “cashers” around the world. Hackers also raised or removed balances and withdrawal limits associated with these cards. So, the “cashers” had in their possession essentially ‘unlimited cards’ which they could use to withdraw any amount of cash. At the designated time, “cashers” all over the world struck ATM machines and began to relentlessly withdraw cash from ATMs. The New York cell of “Cashers” alone was responsible for 2.8 Million USD. Incidentally, Mastercard pre-paid card data was stolen in both operations. It is reported in the media that, at some stage, Mastercard alerted the US Secret Service.
Continue reading “$45 Million Heist – Card Data Stolen – Banks to be Alert”

Is Mobile “insecurity” the “in” thing ?

On 22nd May, CTIA-The Wireless Association® released its consumer survey on users’ attitudes toward cybersecurity.

 

Commissioned by CTIA, the Harris Interactive survey shows that 85 percent of consumers know their mobile devices are very or somewhat vulnerable, 74 percent say keeping their devices secure is their responsibility, but many don’t take action.

 

However, consumers are more likely to be aware and protect themselves against a tangible threat, such as having a device stolen, than intangible threat such as malware or hacking. The consumers whose devices were lost or stolen were more likely to use PINs or passwords than those who didn’t have their devices lost or stolen (69 percent versus 47 percent), but no more likely to take any other proactive actions, such as remote locking, tracking and/or erasing apps (45 percent versus 41 percent).

 

Continue reading “Is Mobile “insecurity” the “in” thing ?”