Secure communication
3.4K views | +25 today
Follow
 
Scooped by Apptimate
onto Secure communication
Scoop.it!

The Industrial Cyber Myth: It's No Fantasy

The Industrial Cyber Myth: It's No Fantasy | Secure communication | Scoop.it
As threats become more sophisticated, the industry is still playing catch-up.
Apptimate's insight:

As cyber attacks targeting industry, utilities and infrastructure becomes everyday news we will also see an increase in cyber-criminality focusing on extortion. Even if an attacker "just" show that they can enter and read data doesn't mean that the financial harm can't be substantial. Today, everyone is (or should be) aware of the damage leaked emails can do, for instance highlighted by the Sony Entertainment hack. How much will anyone willingly pay to avoid that? And how much would someone pay to avoid a factory break down like the German steel mill incident?

more...
No comment yet.
Secure communication
Your new post is loading...
Your new post is loading...
Scooped by Apptimate
Scoop.it!

Cyber-crimes cost victims over $1 Billion according to 2015 IC3 report

Cyber-crimes cost victims over $1 Billion according to 2015 IC3 report | Secure communication | Scoop.it
Analyzing the data included in the Internet Crime Compliant Center - IC3 report 2015 recently issued by the Federal Bureau of Investigation.
Apptimate's insight:

127,145 people loosing an average of $3,178 in 2015. That's the cost of cyber crime.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The disturbing new way hackers are shaking down big business

The disturbing new way hackers are shaking down big business | Secure communication | Scoop.it
Imagine a burglar breaks into your home, photographs your stuff, then sends you the pics and a message: “Pay now, and I'll tell you how I got in.”
Apptimate's insight:

There are many ways to extort money from cyber attacks. Ransomware is the rising star on the criminality charts, but there are other, less obvious ways to finance your hacking career. You can simply exploit a vulnerability, document your findings and then ask for money to disclose the way in to the attacked enterprise. If they don't want to pay up it's just a simple step to ask others for money to exploit the same vulnerability (or the stolen data). If no-one wants to pay, then just publish it on the darknet and get back at the cheap skates not paying up.

 

It's way to easy to exploit the crumbling IT security of many companies, and there are numerous ways to exploit and make money on their low standards.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

7 common cyber security myths debunked

7 common cyber security myths debunked | Secure communication | Scoop.it
With cyber security such a big talking point, we tend to see a lot of information floating around – some of which is not in the least bit true.
Apptimate's insight:

Everyone is at cyber security risk, and it's mainly about the people, not the tech.

more...
Ken Feltman's curator insight, May 28, 7:55 AM
This article lets us worry about the real threats.
Scooped by Apptimate
Scoop.it!

How To Maximise Data Protection In Today’s Threat Landscape

How To Maximise Data Protection In Today’s Threat Landscape | Secure communication | Scoop.it
Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their data is protected against new threats
Apptimate's insight:

It's time to change focus from securing the perimeter to securing the data.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

4 Ways to Protect Against the Very Real Threat of Ransomware

4 Ways to Protect Against the Very Real Threat of Ransomware | Secure communication | Scoop.it
Ransomware is a hacking plague that knows no limits. Here's how to protect yourself and your business.
Apptimate's insight:

Most importantly; keep a regular off-line backup.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Popular messaging apps present real enterprise threat

Popular messaging apps present real enterprise threat | Secure communication | Scoop.it
CIOs and other IT professionals need to strategically manage the use of today's popular consumer messaging apps in the enterprise. While that process can be a challenge, it's possible to protect your business without blocking all rogue IT.
Apptimate's insight:

ShadowIT is a huge security risk. But it is also a symptom caused by too much lockdown and outdated tools and methods. Users are required to fulfill their job assignments and IT must support that to full extent. Otherwise the security strategy is flawed, since it leads to less control instead of better control.

 

Give the users the tools they need and like, or they will solve their own problems the best way they can, disregarding the problems they cause for IT security.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Rethinking physical biometrics: what you don’t know can hurt you

Rethinking physical biometrics: what you don’t know can hurt you | Secure communication | Scoop.it
Behavioral biometrics has emerged as a reliable alternative for secure online user authentication.
Apptimate's insight:

A fingerprint is more like a permanent user ID than a a secret password. But combined with other biometric technologies, like behavior, it will provide stronger authentication, but with an easier usage, than the password based security of today.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Phishing apps posing as popular payment services infiltrate Google Play

Phishing apps posing as popular payment services infiltrate Google Play | Secure communication | Scoop.it
Researchers from security firm PhishLabs found 11 phishing applications hosted on Google Play this year, targeting users of popular online payment services.
Apptimate's insight:

Beware of fake apps that use a brand name but that are not published by that company.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic

Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic | Secure communication | Scoop.it
RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.
Apptimate's insight:

Digital extortion is such a simple way to make some big bucks with very little risk of getting caught. You don't even have to meet your victim in an alley and threaten them with a lead pipe. You can do it all from the convenience of your desk. Street mugging going white collar criminality.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Computervirus in AKW Gundremmingen entdeckt - Deutschland | STERN.de

Computervirus in AKW Gundremmingen entdeckt - Deutschland | STERN.de | Secure communication | Scoop.it
Gundremmingen - Im bayerischen Atomkraftwerk Gundremmingen ist ein Computervirus entdeckt worden. Die Schadsoftware sei bei der Vorbereitung der
Apptimate's insight:

German nuclear power plant had a virus. Interesting things you can find when you dismantle things...

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Hackers don't just want your credit cards, now they want the pattern of your life | ZDNet

Hackers don't just want your credit cards, now they want the pattern of your life | ZDNet | Secure communication | Scoop.it
"gives any kind of fraudster very precise information on you which really helps them really target the people they want".
Apptimate's insight:

The more you know, the simpler it is to steal identities and commit fraud, or use that identity to dig even deeper, into your family member accounts or your employers system.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Just the Facts: ISIS Encryption — Medium

Just the Facts: ISIS Encryption — Medium | Secure communication | Scoop.it
This is an attempt to collate all the information about ISIS comms within Europe, back to ISIS Syria. This is only operational terrorist…
Apptimate's insight:

Daesh (or ISIS) is NOT hiding behind encryption. We don't need a ban on encryption, we need better police work in the field. A ban on encryption will only hurt the common people and businesses that need to be safe from thiefs and cyber criminals.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Big Data’s Success May Be Entirely Dependent On Security

Big Data’s Success May Be Entirely Dependent On Security | Secure communication | Scoop.it
Is the Big Data revolution dependent on security? Well, it's here, and security concerns may be holding it back.
Apptimate's insight:

Big Data Security isn't only about privacy. It is also about validity and correctness of that data. To be able to have trustworthy data for the analysis and decision-making you need to know the quality of the data. Is it correct? Not tampered with? is the read device actually the device you think it is? Classic questions from IT security.

more...
Ken Feltman's curator insight, April 19, 8:08 AM
The Internet of Things and Big Data may not lead to a wonderful new world of connected convenience. When your household appliances and bank accounts can be hacked by smart teenagers and ruthless crooks, you may decide to unplug your refrigerator and coffeemaker, your car, home-security system, cell phone,  credit card and - if things get really bad - even your laptop.
Scooped by Apptimate
Scoop.it!

Celebrity hacker Guccifer's confession gives us all a lesson in security

Celebrity hacker Guccifer's confession gives us all a lesson in security | Secure communication | Scoop.it
A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials.
Apptimate's insight:

The simple passwords and password reset functionality is easy to exploit by people with basic knowledge of googling and social engineering. These hacks would easily be stopped by enforcing two-factor authentication.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Context is Key to Identity and Access Management When Securing a Mobile Workforce - Information Security Buzz

Context is Key to Identity and Access Management When Securing a Mobile Workforce - Information Security Buzz | Secure communication | Scoop.it
As the workforce becomes more mobile and more critical enterprise applications are hosted in the cloud, identity and access management (IAM) grows increasingly important to help assure secure remote access to organizations’ web applications and data. When employees move around from network to network and repeatedly swap devices, their risk characteristics change. Currently, we take a binary more »
Apptimate's insight:

Cyber security tech will increasingly focus on behavior analytics, and context adaptive authentication is a vital part of this. If you try to authenticate from a new device, new location or strange hours the authentication mechanisms should automatically respond by asking you for maybe a fingerprint or retina scan. 2FA (2 factor authentication) is just the first step.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Cybercrime economy: The business of hacking - Help Net Security

Cybercrime economy: The business of hacking - Help Net Security | Secure communication | Scoop.it
The profile of attackers, and the interconnected nature of the cybercrime economy, have evolved dramatically in the last several years.
Apptimate's insight:

Cyber criminality is organized, but how is the business model?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

17 Hybrid Cloud Security Threats and How to Fix Them - DZone Cloud

17 Hybrid Cloud Security Threats and How to Fix Them - DZone Cloud | Secure communication | Scoop.it
Recognize these 17 hybrid cloud security threats and learn how to successfully implement a threat-free hybrid cloud into your corporate enterprise.
Apptimate's insight:

How to successfully manage and implement a secure hybrid cloud into your corporate enterprise.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Scammers impersonate legit cyber-security companies

Scammers impersonate legit cyber-security companies | Secure communication | Scoop.it
A scammer syndicate has been caught impersonating the services of cyber-security companies and charging high fees for doing very little.
Apptimate's insight:

Cyber Security is very much about trust, something that can be used by scammers. Always check if a web page has the correct links etc before you even trust what seems to be a security supplier home page. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Phishing Targets Archives • InfoSec Resources

Phishing Targets Archives • InfoSec Resources | Secure communication | Scoop.it
Why do phishing attacks that are targeted at personnel and human vulnerabilities continue to succeed? Too often scams are successful because of people’s lack of security awareness training. Everybody is a target, regardless of role or industry. We live in a digital age where gathering of information has become much easier; phishing is a method that exploits this ease. It is often difficult to detect and prevent, and phishing and malware protection (in addition to using a firewall and anti-virus application) to guard against these scams, might be easily bypassed by savvy phishers. Security awareness training can equip enterprise employees with the knowledge and tools necessary for resilience against such attacks, if coupled with clear endorsement by management and a company culture that supports empowerment of employees. 
Apptimate's insight:

Humans are the weakest link in any security strategy. People must be trained to be alert, like they are trained to spot strangers in the building. But scammers will always find ways to pass the reception or fool you into open a malware infested email attachment.
 
From an IT security point of view we need to take this into consideration and minimize the damage that can be done. Tools like encryption of all data at rest and in transit, advanced adaptive authentication, network segmentation, application based security, and so on, are all important pieces of the puzzle that spells: ZeroTrust.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How will cybersecurity look like in 2020? Five threat scenarios

How will cybersecurity look like in 2020? Five threat scenarios | Secure communication | Scoop.it
Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity Futures 20
Apptimate's insight:

In 2020, It's the cyber wild west!

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

No Phone Is Safe From Hackers And Spies

No Phone Is Safe From Hackers And Spies | Secure communication | Scoop.it
No Phone Is Safe From Hackers And Spies
Apptimate's insight:

The device can be tracked på the carrier and by anyone that can hack the vulnerable SS7 signalling system. The only way to protect the communication in mobile networks is through encryption and application based security. Secure voice calls should be protected by an encrypted VoIP app, and so on. Also, if you do not want anything stored you should select an app that provide end-2-end security, like WhatsApp or anything based upon https://apptimate.io.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

No. 1 thing IT departments can learn from the Panama Papers hack - TechRepublic

No. 1 thing IT departments can learn from the Panama Papers hack - TechRepublic | Secure communication | Scoop.it
Staggeringly out of date software supports the conclusion that documents from Mossack Fonseca were exfiltrated by a hacker. Learn what vulnerabilities could have been used.
Apptimate's insight:

The only security tech worth anything is the one that actually gets used. In this case it is even worse. Not even the simplest updates and patching was performed. Lesson learned: Don't trust crooks that don't know what they are doing.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Human Threat To Cyber-Security — Thoughts by StatusToday

Human Threat To Cyber-Security — Thoughts by StatusToday | Secure communication | Scoop.it
Big Takeaways from Security Leaders Breakfast
Apptimate's insight:

You are your company's' biggest vulnerability, even if you don't mean to be.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The economics of hacking: Change your thinking - Help Net Security

The economics of hacking: Change your thinking - Help Net Security | Secure communication | Scoop.it
Many conditions come together to make hacking a financially fruitful activity, driving something of a shift in the percentages around cyber attack motives.
Apptimate's insight:

Hacking is a global industry with very low risk of getting caught. This attracts organized criminality. It's all about the money.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Special Report: Confirmed cyber attack against air traffic control system - Threat Brief

Special Report: Confirmed cyber attack against air traffic control system - Threat Brief | Secure communication | Scoop.it
We have been following reports for the last two days indicating that outages in the Swedish Air Traffic Control System between 4 and 9 November 2015 were actually caused by malicious, sustained cyber attacks from highly trained groups either supported by or under the direction of the Russian government. For now we have not seen …
Apptimate's insight:

Air Traffic Control is an important node in critical infrastructure, and as such, targeted by hackers in the escalating cyber war.

In this case the purpose was probably not malicious in the way that it was meant to destroy and kill, it was probably more an analysis of capabilities and response.

more...
No comment yet.