Secure communication
3.4K views | +2 today
Follow
 
Scooped by Apptimate
onto Secure communication
Scoop.it!

Decentralized Systems Whitepaper - Apptimate

Decentralized Systems Whitepaper - Apptimate | Secure communication | Scoop.it
Secure distributed and decentralized systems made simple with point-2-point encrypted communication
Apptimate's insight:

A new whitepaper from Apptimate.


The IT and communication landscape is changing rapidly. The traditional private network infrastructure is broken up by technologies like mobility, clouds, and Internet of Things (IoT). These are not just new computers that should be connected to servers; they have the capability to communicate directly between each other.


The future of communication is a hybrid of client-server systems, Big Data analytics, internet de-centralized API connected systems and direct p2p communication. The challenge is making this simple to build and maintain, but most important; making it secure.

more...
No comment yet.
Secure communication
Your new post is loading...
Your new post is loading...
Scooped by Apptimate
Scoop.it!

7 common cyber security myths debunked

7 common cyber security myths debunked | Secure communication | Scoop.it
With cyber security such a big talking point, we tend to see a lot of information floating around – some of which is not in the least bit true.
Apptimate's insight:

Everyone is at cyber security risk, and it's mainly about the people, not the tech.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How To Maximise Data Protection In Today’s Threat Landscape

How To Maximise Data Protection In Today’s Threat Landscape | Secure communication | Scoop.it
Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their data is protected against new threats
Apptimate's insight:

It's time to change focus from securing the perimeter to securing the data.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

4 Ways to Protect Against the Very Real Threat of Ransomware

4 Ways to Protect Against the Very Real Threat of Ransomware | Secure communication | Scoop.it
Ransomware is a hacking plague that knows no limits. Here's how to protect yourself and your business.
Apptimate's insight:

Most importantly; keep a regular off-line backup.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Popular messaging apps present real enterprise threat

Popular messaging apps present real enterprise threat | Secure communication | Scoop.it
CIOs and other IT professionals need to strategically manage the use of today's popular consumer messaging apps in the enterprise. While that process can be a challenge, it's possible to protect your business without blocking all rogue IT.
Apptimate's insight:

ShadowIT is a huge security risk. But it is also a symptom caused by too much lockdown and outdated tools and methods. Users are required to fulfill their job assignments and IT must support that to full extent. Otherwise the security strategy is flawed, since it leads to less control instead of better control.

 

Give the users the tools they need and like, or they will solve their own problems the best way they can, disregarding the problems they cause for IT security.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Rethinking physical biometrics: what you don’t know can hurt you

Rethinking physical biometrics: what you don’t know can hurt you | Secure communication | Scoop.it
Behavioral biometrics has emerged as a reliable alternative for secure online user authentication.
Apptimate's insight:

A fingerprint is more like a permanent user ID than a a secret password. But combined with other biometric technologies, like behavior, it will provide stronger authentication, but with an easier usage, than the password based security of today.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Phishing apps posing as popular payment services infiltrate Google Play

Phishing apps posing as popular payment services infiltrate Google Play | Secure communication | Scoop.it
Researchers from security firm PhishLabs found 11 phishing applications hosted on Google Play this year, targeting users of popular online payment services.
Apptimate's insight:

Beware of fake apps that use a brand name but that are not published by that company.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic

Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic | Secure communication | Scoop.it
RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.
Apptimate's insight:

Digital extortion is such a simple way to make some big bucks with very little risk of getting caught. You don't even have to meet your victim in an alley and threaten them with a lead pipe. You can do it all from the convenience of your desk. Street mugging going white collar criminality.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Computervirus in AKW Gundremmingen entdeckt - Deutschland | STERN.de

Computervirus in AKW Gundremmingen entdeckt - Deutschland | STERN.de | Secure communication | Scoop.it
Gundremmingen - Im bayerischen Atomkraftwerk Gundremmingen ist ein Computervirus entdeckt worden. Die Schadsoftware sei bei der Vorbereitung der
Apptimate's insight:

German nuclear power plant had a virus. Interesting things you can find when you dismantle things...

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Hackers don't just want your credit cards, now they want the pattern of your life | ZDNet

Hackers don't just want your credit cards, now they want the pattern of your life | ZDNet | Secure communication | Scoop.it
"gives any kind of fraudster very precise information on you which really helps them really target the people they want".
Apptimate's insight:

The more you know, the simpler it is to steal identities and commit fraud, or use that identity to dig even deeper, into your family member accounts or your employers system.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Just the Facts: ISIS Encryption — Medium

Just the Facts: ISIS Encryption — Medium | Secure communication | Scoop.it
This is an attempt to collate all the information about ISIS comms within Europe, back to ISIS Syria. This is only operational terrorist…
Apptimate's insight:

Daesh (or ISIS) is NOT hiding behind encryption. We don't need a ban on encryption, we need better police work in the field. A ban on encryption will only hurt the common people and businesses that need to be safe from thiefs and cyber criminals.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Big Data’s Success May Be Entirely Dependent On Security

Big Data’s Success May Be Entirely Dependent On Security | Secure communication | Scoop.it
Is the Big Data revolution dependent on security? Well, it's here, and security concerns may be holding it back.
Apptimate's insight:

Big Data Security isn't only about privacy. It is also about validity and correctness of that data. To be able to have trustworthy data for the analysis and decision-making you need to know the quality of the data. Is it correct? Not tampered with? is the read device actually the device you think it is? Classic questions from IT security.

more...
Ken Feltman's curator insight, April 19, 8:08 AM
The Internet of Things and Big Data may not lead to a wonderful new world of connected convenience. When your household appliances and bank accounts can be hacked by smart teenagers and ruthless crooks, you may decide to unplug your refrigerator and coffeemaker, your car, home-security system, cell phone,  credit card and - if things get really bad - even your laptop.
Scooped by Apptimate
Scoop.it!

Ransomware in the Wild: It’s an Emergency - InfoSec Resources

Ransomware in the Wild: It’s an Emergency - InfoSec Resources | Secure communication | Scoop.it
Every week, new ransomware-based attacks are in the headlines. Malware authors are implementing new threats and new features to make these malicious codes
Apptimate's insight:

Ransomware is evolving into an ecosystem of cyber crime tools.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Försvarsmaktens server användes i hackerattack

Försvarsmaktens server användes i hackerattack | Secure communication | Scoop.it
En av svenska Försvarsmaktens servrar utnyttjades i en omfattande IT-attack som slog ut amerikanska storbankers webbsidor, rapporterar Dagens Nyheter.
Servern blev ofrivilligt del av en överbelastningsattack, en så kallad ddos-attack, där mängder av datorer på kommando skickade stora datapaket till sidorna så att de låg nere, vissa i flera dygn. Händelsen utreddes av FBI.
Försvarsmaktens server hade under en längre tid haft en säkerhetsbrist. Dess IP-adress fanns med i listor över sårbara servrar som låg ute på nätet.
Det var först när Myndigheten för samhällsskydd och beredskap (MSB) hörde av sig som Försvarsmakten reagerade.
– Vi har normalt bra koll på våra grejor. Detta misstag handlar om den mänskliga faktorn – vi har mycket folk som genomför drift. Det är viktigt att komma i håg att detta inte är en sårbarhet som går att utnyttja för att ta sig in i Försvarsmaktens IT-system, säger Dan Eriksson på Försvarsmakten till DN.
Apptimate's insight:

Att utnyttjas i attacker är mycket pinsamt. Man måste kunna ställa högre krav på en myndighet där säkerhet är högsta prioritet.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Cybercrime economy: The business of hacking - Help Net Security

Cybercrime economy: The business of hacking - Help Net Security | Secure communication | Scoop.it
The profile of attackers, and the interconnected nature of the cybercrime economy, have evolved dramatically in the last several years.
Apptimate's insight:

Cyber criminality is organized, but how is the business model?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

17 Hybrid Cloud Security Threats and How to Fix Them - DZone Cloud

17 Hybrid Cloud Security Threats and How to Fix Them - DZone Cloud | Secure communication | Scoop.it
Recognize these 17 hybrid cloud security threats and learn how to successfully implement a threat-free hybrid cloud into your corporate enterprise.
Apptimate's insight:

How to successfully manage and implement a secure hybrid cloud into your corporate enterprise.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Scammers impersonate legit cyber-security companies

Scammers impersonate legit cyber-security companies | Secure communication | Scoop.it
A scammer syndicate has been caught impersonating the services of cyber-security companies and charging high fees for doing very little.
Apptimate's insight:

Cyber Security is very much about trust, something that can be used by scammers. Always check if a web page has the correct links etc before you even trust what seems to be a security supplier home page. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Phishing Targets Archives • InfoSec Resources

Phishing Targets Archives • InfoSec Resources | Secure communication | Scoop.it
Why do phishing attacks that are targeted at personnel and human vulnerabilities continue to succeed? Too often scams are successful because of people’s lack of security awareness training. Everybody is a target, regardless of role or industry. We live in a digital age where gathering of information has become much easier; phishing is a method that exploits this ease. It is often difficult to detect and prevent, and phishing and malware protection (in addition to using a firewall and anti-virus application) to guard against these scams, might be easily bypassed by savvy phishers. Security awareness training can equip enterprise employees with the knowledge and tools necessary for resilience against such attacks, if coupled with clear endorsement by management and a company culture that supports empowerment of employees. 
Apptimate's insight:

Humans are the weakest link in any security strategy. People must be trained to be alert, like they are trained to spot strangers in the building. But scammers will always find ways to pass the reception or fool you into open a malware infested email attachment.
 
From an IT security point of view we need to take this into consideration and minimize the damage that can be done. Tools like encryption of all data at rest and in transit, advanced adaptive authentication, network segmentation, application based security, and so on, are all important pieces of the puzzle that spells: ZeroTrust.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How will cybersecurity look like in 2020? Five threat scenarios

How will cybersecurity look like in 2020? Five threat scenarios | Secure communication | Scoop.it
Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity Futures 20
Apptimate's insight:

In 2020, It's the cyber wild west!

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

No Phone Is Safe From Hackers And Spies

No Phone Is Safe From Hackers And Spies | Secure communication | Scoop.it
No Phone Is Safe From Hackers And Spies
Apptimate's insight:

The device can be tracked på the carrier and by anyone that can hack the vulnerable SS7 signalling system. The only way to protect the communication in mobile networks is through encryption and application based security. Secure voice calls should be protected by an encrypted VoIP app, and so on. Also, if you do not want anything stored you should select an app that provide end-2-end security, like WhatsApp or anything based upon https://apptimate.io.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

No. 1 thing IT departments can learn from the Panama Papers hack - TechRepublic

No. 1 thing IT departments can learn from the Panama Papers hack - TechRepublic | Secure communication | Scoop.it
Staggeringly out of date software supports the conclusion that documents from Mossack Fonseca were exfiltrated by a hacker. Learn what vulnerabilities could have been used.
Apptimate's insight:

The only security tech worth anything is the one that actually gets used. In this case it is even worse. Not even the simplest updates and patching was performed. Lesson learned: Don't trust crooks that don't know what they are doing.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Human Threat To Cyber-Security — Thoughts by StatusToday

Human Threat To Cyber-Security — Thoughts by StatusToday | Secure communication | Scoop.it
Big Takeaways from Security Leaders Breakfast
Apptimate's insight:

You are your company's' biggest vulnerability, even if you don't mean to be.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The economics of hacking: Change your thinking - Help Net Security

The economics of hacking: Change your thinking - Help Net Security | Secure communication | Scoop.it
Many conditions come together to make hacking a financially fruitful activity, driving something of a shift in the percentages around cyber attack motives.
Apptimate's insight:

Hacking is a global industry with very low risk of getting caught. This attracts organized criminality. It's all about the money.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Special Report: Confirmed cyber attack against air traffic control system - Threat Brief

Special Report: Confirmed cyber attack against air traffic control system - Threat Brief | Secure communication | Scoop.it
We have been following reports for the last two days indicating that outages in the Swedish Air Traffic Control System between 4 and 9 November 2015 were actually caused by malicious, sustained cyber attacks from highly trained groups either supported by or under the direction of the Russian government. For now we have not seen …
Apptimate's insight:

Air Traffic Control is an important node in critical infrastructure, and as such, targeted by hackers in the escalating cyber war.

In this case the purpose was probably not malicious in the way that it was meant to destroy and kill, it was probably more an analysis of capabilities and response.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Identify the ransomware you've been hit with

Identify the ransomware you've been hit with | Secure communication | Scoop.it
Michael Gillespie has created ID Ransomware for identifying ransomware infections. It points victims towards a decryption method (if available).
Apptimate's insight:

This guy fights back against Ransomware!

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Tripwire Study: Energy Sector Sees Dramatic Rise in Successful Cyber Attacks | Business Wire

Tripwire Study: Energy Sector Sees Dramatic Rise in Successful Cyber Attacks | Business Wire | Secure communication | Scoop.it
More than two-thirds of IT professionals in the energy sector said the rate of successful cyber attacks had increased by over 20% in November 2015.
Apptimate's insight:

The Energy sector is increasingly being targeted by hack attacks. When there is opportunity to destroy and create chaos, it will attract terrorist and extortionists like flies to fly paper.

more...
No comment yet.