Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people. Now imagine you had absolutely nothing to do with the accident because your car was taken over by hackers.
Anything under the umbrella of IT Security, Computer Security, IT Controls
Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people. Now imagine you had absolutely nothing to do with the accident because your car was taken over by hackers.
Do you hijack a car by getting in and threatening the driver with a gun? No. You just hack into the on-board computer systems.
Continue reading “Car Hijacking”
Nearly every survey and article on information security during the last 12 months have one common baseline : “Organisations are concerned about Mobile Security”.
In a recent survey of 100 UK businesses with annual revenue of over $25 million, the 2013 AT&T Business Continuity Study found that 83 percent of executives are concerned about the use of mobile networks and devices and its impact on security threats.
Various surveys indicate that though Smartphones and Tablets are everywhere, the majority of users aren’t aware of the importance of mobile security, or how to best protect themselves.
Continue reading “Should You Be Worried about Mobile Security?”
Information Security mostly revolves around defense in depth. Hitherto, we have had ‘Intrusion Detection’ and ‘Intrusion Prevention’ tools and techniques. But the newest technique in securing information assets, ‘Intrusion Deception’, has turned the security concept upside down and relies on counter offensive ‘honey pot’ methodology to protect the information assets in an organization. Continue reading “Intrusion Deception – Counter offense is the best defense”
BYOD is a phrase that is being bandied around in corporate cirles these days. BYOD stands for “Bring Your Own Device”. It refers to the fairly recent phenomenon of employees bringing their own smartphones or tablets to work and connecting to the corporate network with it.
Continue reading “Should You BYOD?”
Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.
The vulnerabilities included a private root SSH key that was distributed in publicly available firmware images that would have allowed an attacker with SSH access to a device to log in with root privileges and issue fake alerts or disable the system.
Original article here.
What is e-mail spoofing?
“Email spoofing” is a term used to describe fraudulent emails in which the sender’s address and other parts of the email header are altered to appear as though the email originated from a different source. Continue reading “Email Spoofing – Ways to minimise damage”
It will be a cliche to say that cyber crime has been on the rise in India. So, instead of re-hashing/ lamenting about it, we will look at a few ways in which businesses can protect themselves against cyber crime.
Continue reading “Top 4 Precautions Businesses should take against Cyber Crime – Phishing”
45 Million USD was withdrawn using cloned pre-paid cards in 2 seperate but reportedly connected operations. Hackers first got into the systems of the card processors and extracted magnetic strip card data and PIN numbers. Cards were then cloned using the stolen data and dispatched to “cashers” around the world. Hackers also raised or removed balances and withdrawal limits associated with these cards. So, the “cashers” had in their possession essentially ‘unlimited cards’ which they could use to withdraw any amount of cash. At the designated time, “cashers” all over the world struck ATM machines and began to relentlessly withdraw cash from ATMs. The New York cell of “Cashers” alone was responsible for 2.8 Million USD. Incidentally, Mastercard pre-paid card data was stolen in both operations. It is reported in the media that, at some stage, Mastercard alerted the US Secret Service.
Continue reading “$45 Million Heist – Card Data Stolen – Banks to be Alert”
On 22nd May, CTIA-The Wireless Association® released its consumer survey on users’ attitudes toward cybersecurity.
Commissioned by CTIA, the Harris Interactive survey shows that 85 percent of consumers know their mobile devices are very or somewhat vulnerable, 74 percent say keeping their devices secure is their responsibility, but many don’t take action.
However, consumers are more likely to be aware and protect themselves against a tangible threat, such as having a device stolen, than intangible threat such as malware or hacking. The consumers whose devices were lost or stolen were more likely to use PINs or passwords than those who didn’t have their devices lost or stolen (69 percent versus 47 percent), but no more likely to take any other proactive actions, such as remote locking, tracking and/or erasing apps (45 percent versus 41 percent).